Template-Type: ReDIF-Article 1.0 Author-Name: Robert C. Gray Author-X-Name-First: Robert C. Author-X-Name-Last: Gray Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 1-2 Issue: 1 Volume: 18 Year: 2002 Month: 3 X-DOI: 10.1080/07430170120113695 File-URL: http://hdl.handle.net/10.1080/07430170120113695 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 Author-Name: Stacy Bergstrom Haldi Author-X-Name-First: Stacy Bergstrom Author-X-Name-Last: Haldi Title: The Influence of Logistics on War Widening Journal: Defense & Security Analysis Pages: 3-14 Issue: 1 Volume: 18 Year: 2002 Month: 3 X-DOI: 10.1080/07430170120113703 File-URL: http://hdl.handle.net/10.1080/07430170120113703 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:3-14 Template-Type: ReDIF-Article 1.0 Author-Name: Avi Kober Author-X-Name-First: Avi Author-X-Name-Last: Kober Title: Low-intensity Conflicts: Why the Gap Between Theory and Practise? Journal: Defense & Security Analysis Pages: 15-38 Issue: 1 Volume: 18 Year: 2002 Month: 3 X-DOI: 10.1080/07430170120113712 File-URL: http://hdl.handle.net/10.1080/07430170120113712 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:15-38 Template-Type: ReDIF-Article 1.0 Author-Name: Jonathan O. Gackle Author-X-Name-First: Jonathan O. Author-X-Name-Last: Gackle Title: US-Australian Defense Cooperation: A Model for Twenty-first Century Security Arrangements Journal: Defense & Security Analysis Pages: 39-49 Issue: 1 Volume: 18 Year: 2002 Month: 3 X-DOI: 10.1080/07430170120113721 File-URL: http://hdl.handle.net/10.1080/07430170120113721 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:39-49 Template-Type: ReDIF-Article 1.0 Author-Name: David Detomasi Author-X-Name-First: David Author-X-Name-Last: Detomasi Title: The New Public Management and Defense Departments: The Case of Canada Journal: Defense & Security Analysis Pages: 51-73 Issue: 1 Volume: 18 Year: 2002 Month: 3 X-DOI: 10.1080/07430170120113730 File-URL: http://hdl.handle.net/10.1080/07430170120113730 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:51-73 Template-Type: ReDIF-Article 1.0 Author-Name: Glen M. Segell Author-X-Name-First: Glen M. Author-X-Name-Last: Segell Title: European Security and the Russian Duma Journal: Defense & Security Analysis Pages: 75-84 Issue: 1 Volume: 18 Year: 2002 Month: 3 X-DOI: 10.1080/07430170120113749 File-URL: http://hdl.handle.net/10.1080/07430170120113749 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:75-84 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas Schindlmayr Author-X-Name-First: Thomas Author-X-Name-Last: Schindlmayr Title: Future Personnel: Where Will They Come From? Journal: Defense & Security Analysis Pages: 85-88 Issue: 1 Volume: 18 Year: 2002 Month: 3 X-DOI: 10.1080/07430170120113758 File-URL: http://hdl.handle.net/10.1080/07430170120113758 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:85-88 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Agüera Author-X-Name-First: Martin Author-X-Name-Last: Agüera Title: What Future for Transatlantic Security Relations After 11 September? Journal: Defense & Security Analysis Pages: 89-91 Issue: 1 Volume: 18 Year: 2002 Month: 3 X-DOI: 10.1080/147517902753420229 File-URL: http://hdl.handle.net/10.1080/147517902753420229 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:89-91 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Landmark in Defense Literature Journal: Defense & Security Analysis Pages: 93-94 Issue: 1 Volume: 18 Year: 2002 Month: 3 X-DOI: 10.1080/07430170120113767 File-URL: http://hdl.handle.net/10.1080/07430170120113767 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:93-94 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Robert Gray Author-X-Name-First: Robert Author-X-Name-Last: Gray Title: Editorial Journal: Defense & Security Analysis Pages: 105-106 Issue: 2 Volume: 18 Year: 2002 Month: 6 X-DOI: 10.1080/14751790220132529 File-URL: http://hdl.handle.net/10.1080/14751790220132529 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:105-106 Template-Type: ReDIF-Article 1.0 Author-Name: Derek Reveron Author-X-Name-First: Derek Author-X-Name-Last: Reveron Title: Coalition warfare: The commander's role Journal: Defense & Security Analysis Pages: 107-121 Issue: 2 Volume: 18 Year: 2002 Month: 6 X-DOI: 10.1080/14751790220132538 File-URL: http://hdl.handle.net/10.1080/14751790220132538 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:107-121 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew James Author-X-Name-First: Andrew Author-X-Name-Last: James Title: Comparing European responses to defense industry globalization Journal: Defense & Security Analysis Pages: 123-143 Issue: 2 Volume: 18 Year: 2002 Month: 6 X-DOI: 10.1080/14751790220132547 File-URL: http://hdl.handle.net/10.1080/14751790220132547 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:123-143 Template-Type: ReDIF-Article 1.0 Author-Name: Chiang Ren Author-X-Name-First: Chiang Author-X-Name-Last: Ren Title: The dynamic limitations of the US defense acquisition process Journal: Defense & Security Analysis Pages: 145-155 Issue: 2 Volume: 18 Year: 2002 Month: 6 X-DOI: 10.1080/14751790220132556 File-URL: http://hdl.handle.net/10.1080/14751790220132556 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:145-155 Template-Type: ReDIF-Article 1.0 Author-Name: Daniel Nelson Author-X-Name-First: Daniel Author-X-Name-Last: Nelson Title: Definition, diagnosis, therapy: A civil-military critique Journal: Defense & Security Analysis Pages: 157-170 Issue: 2 Volume: 18 Year: 2002 Month: 6 X-DOI: 10.1080/14751790220132565 File-URL: http://hdl.handle.net/10.1080/14751790220132565 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:157-170 Template-Type: ReDIF-Article 1.0 Author-Name: Asifa Hussain Author-X-Name-First: Asifa Author-X-Name-Last: Hussain Author-Name: Mohammed Ishaq Author-X-Name-First: Mohammed Author-X-Name-Last: Ishaq Title: British Sikhs' identification with the armed forces Journal: Defense & Security Analysis Pages: 171-183 Issue: 2 Volume: 18 Year: 2002 Month: 6 X-DOI: 10.1080/14751790220132574 File-URL: http://hdl.handle.net/10.1080/14751790220132574 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:171-183 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: On the psychology of military incompetence Journal: Defense & Security Analysis Pages: 185-187 Issue: 2 Volume: 18 Year: 2002 Month: 6 X-DOI: 10.1080/14751790220132583 File-URL: http://hdl.handle.net/10.1080/14751790220132583 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:185-187 Template-Type: ReDIF-Article 1.0 Author-Name: John Morrison Author-X-Name-First: John Author-X-Name-Last: Morrison Title: American-British-Canadian intelligence relations 1939--2000 Journal: Defense & Security Analysis Pages: 189-195 Issue: 2 Volume: 18 Year: 2002 Month: 6 X-DOI: 10.1080/14751790220132592 File-URL: http://hdl.handle.net/10.1080/14751790220132592 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:189-195 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 199-200 Issue: 3 Volume: 18 Year: 2002 Month: 9 X-DOI: 10.1080/14751790220002307 File-URL: http://hdl.handle.net/10.1080/14751790220002307 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:199-200 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen Cimbala Author-X-Name-First: Stephen Author-X-Name-Last: Cimbala Title: Deterrence and friction: implications for missile defense Journal: Defense & Security Analysis Pages: 201-220 Issue: 3 Volume: 18 Year: 2002 Month: 9 X-DOI: 10.1080/14751790220002316 File-URL: http://hdl.handle.net/10.1080/14751790220002316 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:201-220 Template-Type: ReDIF-Article 1.0 Author-Name: Raymond Franck Author-X-Name-First: Raymond Author-X-Name-Last: Franck Title: Expanding the framework for analyzing National Missile Defenses: a proposal for discussion Journal: Defense & Security Analysis Pages: 221-226 Issue: 3 Volume: 18 Year: 2002 Month: 9 X-DOI: 10.1080/14751790220002325 File-URL: http://hdl.handle.net/10.1080/14751790220002325 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:221-226 Template-Type: ReDIF-Article 1.0 Author-Name: Raymond Franck Author-X-Name-First: Raymond Author-X-Name-Last: Franck Author-Name: Francois Melese Author-X-Name-First: Francois Author-X-Name-Last: Melese Title: The access deterrence scenario: A new approach to assessing national missile defenses Journal: Defense & Security Analysis Pages: 227-238 Issue: 3 Volume: 18 Year: 2002 Month: 9 X-DOI: 10.1080/14751790220002334 File-URL: http://hdl.handle.net/10.1080/14751790220002334 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:227-238 Template-Type: ReDIF-Article 1.0 Author-Name: Lisbeth Gronlund Author-X-Name-First: Lisbeth Author-X-Name-Last: Gronlund Author-Name: David Wright Author-X-Name-First: David Author-X-Name-Last: Wright Author-Name: Stephen Young Author-X-Name-First: Stephen Author-X-Name-Last: Young Title: An assessment of the intercept test program of the ground-based midcourse national missile defense system Journal: Defense & Security Analysis Pages: 239-260 Issue: 3 Volume: 18 Year: 2002 Month: 9 X-DOI: 10.1080/14751790220002343 File-URL: http://hdl.handle.net/10.1080/14751790220002343 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:239-260 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Ballistic missile defenses and the new triad Journal: Defense & Security Analysis Pages: 261-270 Issue: 3 Volume: 18 Year: 2002 Month: 9 X-DOI: 10.1080/14751790220002352 File-URL: http://hdl.handle.net/10.1080/14751790220002352 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:261-270 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Simon Author-X-Name-First: Michael Author-X-Name-Last: Simon Title: Rogue state response to BMD: The regional context Journal: Defense & Security Analysis Pages: 271-292 Issue: 3 Volume: 18 Year: 2002 Month: 9 X-DOI: 10.1080/14751790220002361 File-URL: http://hdl.handle.net/10.1080/14751790220002361 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:271-292 Template-Type: ReDIF-Article 1.0 Author-Name: Clifford Singer Author-X-Name-First: Clifford Author-X-Name-Last: Singer Title: How can national missile defense best enhance security? Journal: Defense & Security Analysis Pages: 293-302 Issue: 3 Volume: 18 Year: 2002 Month: 9 X-DOI: 10.1080/14751790220002370 File-URL: http://hdl.handle.net/10.1080/14751790220002370 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:293-302 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew Dorman Author-X-Name-First: Andrew Author-X-Name-Last: Dorman Author-Name: Thomas-Durell Young Author-X-Name-First: Thomas-Durell Author-X-Name-Last: Young Title: Editorial Journal: Defense & Security Analysis Pages: 303-305 Issue: 4 Volume: 18 Year: 2002 Month: 12 X-DOI: 10.1080/1475179022000024439 File-URL: http://hdl.handle.net/10.1080/1475179022000024439 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:303-305 Template-Type: ReDIF-Article 1.0 Author-Name: Eric Grove Author-X-Name-First: Eric Author-X-Name-Last: Grove Title: The Falklands War and British defense policy Journal: Defense & Security Analysis Pages: 307-317 Issue: 4 Volume: 18 Year: 2002 Month: 12 X-DOI: 10.1080/1475179022000024448 File-URL: http://hdl.handle.net/10.1080/1475179022000024448 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:307-317 Template-Type: ReDIF-Article 1.0 Author-Name: Alastair Finlan Author-X-Name-First: Alastair Author-X-Name-Last: Finlan Title: British Special Forces and the Falklands conflict: Twenty years on Journal: Defense & Security Analysis Pages: 319-332 Issue: 4 Volume: 18 Year: 2002 Month: 12 X-DOI: 10.1080/1475179022000024457 File-URL: http://hdl.handle.net/10.1080/1475179022000024457 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:319-332 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen Prince Author-X-Name-First: Stephen Author-X-Name-Last: Prince Title: British command and control in the Falklands Campaign Journal: Defense & Security Analysis Pages: 333-349 Issue: 4 Volume: 18 Year: 2002 Month: 12 X-DOI: 10.1080/1475179022000024466 File-URL: http://hdl.handle.net/10.1080/1475179022000024466 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:333-349 Template-Type: ReDIF-Article 1.0 Author-Name: John Arquilla Author-X-Name-First: John Author-X-Name-Last: Arquilla Author-Name: María Moyano Rasmussen Author-X-Name-First: María Moyano Author-X-Name-Last: Rasmussen Title: Twenty years after: Argentina in the wake of the South Atlantic War Journal: Defense & Security Analysis Pages: 351-362 Issue: 4 Volume: 18 Year: 2002 Month: 12 X-DOI: 10.1080/1475179022000024475 File-URL: http://hdl.handle.net/10.1080/1475179022000024475 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:351-362 Template-Type: ReDIF-Article 1.0 Author-Name: Ian Speller Author-X-Name-First: Ian Author-X-Name-Last: Speller Title: Delayed reaction: UK maritime expeditionary capabilities and the lessons of the Falklands conflict Journal: Defense & Security Analysis Pages: 363-378 Issue: 4 Volume: 18 Year: 2002 Month: 12 X-DOI: 10.1080/1475179022000024484 File-URL: http://hdl.handle.net/10.1080/1475179022000024484 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:363-378 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: A message from the Falklands: The life and gallant death of David Tinker Lieutenant RN Journal: Defense & Security Analysis Pages: 379-381 Issue: 4 Volume: 18 Year: 2002 Month: 12 X-DOI: 10.1080/1475179022000024493 File-URL: http://hdl.handle.net/10.1080/1475179022000024493 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:379-381 Template-Type: ReDIF-Article 1.0 Author-Name: Roderick Bailey Author-X-Name-First: Roderick Author-X-Name-Last: Bailey Title: The hidden hand: Britain, America and Gold War secret itelligence Journal: Defense & Security Analysis Pages: 383-388 Issue: 4 Volume: 18 Year: 2002 Month: 12 X-DOI: 10.1080/1475179022000024501 File-URL: http://hdl.handle.net/10.1080/1475179022000024501 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:383-388 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Robert Gray Author-X-Name-First: Robert Author-X-Name-Last: Gray Title: Editorial Journal: Defense & Security Analysis Pages: 1-3 Issue: 1 Volume: 19 Year: 2003 Month: 3 X-DOI: 10.1080/1475179032000057982 File-URL: http://hdl.handle.net/10.1080/1475179032000057982 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:1-3 Template-Type: ReDIF-Article 1.0 Author-Name: Gawdat Bahgat Author-X-Name-First: Gawdat Author-X-Name-Last: Bahgat Title: The United States, Iraq and weapons of mass destruction Journal: Defense & Security Analysis Pages: 5-14 Issue: 1 Volume: 19 Year: 2003 Month: 3 X-DOI: 10.1080/1475179032000057991 File-URL: http://hdl.handle.net/10.1080/1475179032000057991 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:5-14 Template-Type: ReDIF-Article 1.0 Author-Name: Adam Siegel Author-X-Name-First: Adam Author-X-Name-Last: Siegel Title: Missile defense at the waterfront: Implications of the SCUD missile attack and Al Jubayl Port, 15--16 February 1991 Journal: Defense & Security Analysis Pages: 15-33 Issue: 1 Volume: 19 Year: 2003 Month: 3 X-DOI: 10.1080/1475179032000058008 File-URL: http://hdl.handle.net/10.1080/1475179032000058008 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:15-33 Template-Type: ReDIF-Article 1.0 Author-Name: James Nathan Author-X-Name-First: James Author-X-Name-Last: Nathan Author-Name: Charles Tien Author-X-Name-First: Charles Author-X-Name-Last: Tien Title: The “China Threat”, National Missile Defense and American public opinion Journal: Defense & Security Analysis Pages: 35-54 Issue: 1 Volume: 19 Year: 2003 Month: 3 X-DOI: 10.1080/1475179032000058017 File-URL: http://hdl.handle.net/10.1080/1475179032000058017 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:35-54 Template-Type: ReDIF-Article 1.0 Author-Name: Sten Rynning Author-X-Name-First: Sten Author-X-Name-Last: Rynning Title: Potent or paralyzing? nuclear weapons in contemporary French military strategyThe author would like to thank Peter Viggo Jakobsen and Jens Claus Hansen for their helpful comments as well as the University of Southern Denmark and the Copenhagen Peace Research Institute (COPRI) for generous research support. Journal: Defense & Security Analysis Pages: 55-68 Issue: 1 Volume: 19 Year: 2003 Month: 3 X-DOI: 10.1080/1475179032000058026 File-URL: http://hdl.handle.net/10.1080/1475179032000058026 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:55-68 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: “Dirty Bombs”: An analysis of radiological weapons Journal: Defense & Security Analysis Pages: 69-72 Issue: 1 Volume: 19 Year: 2003 Month: 3 X-DOI: 10.1080/1475179032000058035 File-URL: http://hdl.handle.net/10.1080/1475179032000058035 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:69-72 Template-Type: ReDIF-Article 1.0 Author-Name: J. J. Mulhern Author-X-Name-First: J. J. Author-X-Name-Last: Mulhern Title: The next US defense investment cycle: Will experience improve it? Journal: Defense & Security Analysis Pages: 73-88 Issue: 1 Volume: 19 Year: 2003 Month: 3 X-DOI: 10.1080/1475179032000058044 File-URL: http://hdl.handle.net/10.1080/1475179032000058044 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:73-88 Template-Type: ReDIF-Article 1.0 Author-Name: Stanly Michalak Author-X-Name-First: Stanly Author-X-Name-Last: Michalak Title: Terrorism Journal: Defense & Security Analysis Pages: 89-90 Issue: 1 Volume: 19 Year: 2003 Month: 3 X-DOI: 10.1080/1475179032000058053 File-URL: http://hdl.handle.net/10.1080/1475179032000058053 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:89-90 Template-Type: ReDIF-Article 1.0 Author-Name: Robert Gray Author-X-Name-First: Robert Author-X-Name-Last: Gray Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 97-99 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083325 File-URL: http://hdl.handle.net/10.1080/1475179032000083325 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:97-99 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen Wrage Author-X-Name-First: Stephen Author-X-Name-Last: Wrage Title: Prospects for precision air power Journal: Defense & Security Analysis Pages: 101-109 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083334 File-URL: http://hdl.handle.net/10.1080/1475179032000083334 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:101-109 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas-Durell Young Author-X-Name-First: Thomas-Durell Author-X-Name-Last: Young Title: The revolution in military affairs and coalition operations: Problem areas and solutions Journal: Defense & Security Analysis Pages: 111-130 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083343 File-URL: http://hdl.handle.net/10.1080/1475179032000083343 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:111-130 Template-Type: ReDIF-Article 1.0 Author-Name: Bruce Newsome Author-X-Name-First: Bruce Author-X-Name-Last: Newsome Title: Don't get your mass kicked: A management theory of military capability Journal: Defense & Security Analysis Pages: 131-148 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083352 File-URL: http://hdl.handle.net/10.1080/1475179032000083352 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:131-148 Template-Type: ReDIF-Article 1.0 Author-Name: Tara Lavallee Author-X-Name-First: Tara Author-X-Name-Last: Lavallee Title: Globalizing the iron triangle: Policy-making within the US defense industrial sector Journal: Defense & Security Analysis Pages: 149-164 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083361 File-URL: http://hdl.handle.net/10.1080/1475179032000083361 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:149-164 Template-Type: ReDIF-Article 1.0 Author-Name: Joelien Pretorius Author-X-Name-First: Joelien Author-X-Name-Last: Pretorius Title: Ethics and international security in the information age Journal: Defense & Security Analysis Pages: 165-175 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083370 File-URL: http://hdl.handle.net/10.1080/1475179032000083370 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:165-175 Template-Type: ReDIF-Article 1.0 Author-Name: Geoff Shaw Author-X-Name-First: Geoff Author-X-Name-Last: Shaw Author-Name: David Spencer Author-X-Name-First: David Author-X-Name-Last: Spencer Title: Fighting in Afghanistan: Lessons from the Soviet intervention, 1979--89 Journal: Defense & Security Analysis Pages: 177-188 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083389 File-URL: http://hdl.handle.net/10.1080/1475179032000083389 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:177-188 Template-Type: ReDIF-Article 1.0 Author-Name: Simon King Author-X-Name-First: Simon Author-X-Name-Last: King Title: Strategic corporal or tactical colonel? Anchoring the right variable Journal: Defense & Security Analysis Pages: 189-190 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083398 File-URL: http://hdl.handle.net/10.1080/1475179032000083398 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:189-190 Template-Type: ReDIF-Article 1.0 Author-Name: Steven Main Author-X-Name-First: Steven Author-X-Name-Last: Main Title: The Soviet high command, 1918--1941. A military-political history Journal: Defense & Security Analysis Pages: 191-192 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083406 File-URL: http://hdl.handle.net/10.1080/1475179032000083406 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:191-192 Template-Type: ReDIF-Article 1.0 Author-Name: Tim Benbow Author-X-Name-First: Tim Author-X-Name-Last: Benbow Title: Masters of war: Classical strategic thought-third, revised and expanded edition Journal: Defense & Security Analysis Pages: 193-196 Issue: 2 Volume: 19 Year: 2003 Month: 6 X-DOI: 10.1080/1475179032000083415 File-URL: http://hdl.handle.net/10.1080/1475179032000083415 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:193-196 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 199-202 Issue: 3 Volume: 19 Year: 2003 Month: 9 X-DOI: 10.1080/1475179032000118786 File-URL: http://hdl.handle.net/10.1080/1475179032000118786 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:199-202 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Fitzsimmons Author-X-Name-First: Michael Author-X-Name-Last: Fitzsimmons Title: The importance of being special: Planning for the future of US special operations forces Journal: Defense & Security Analysis Pages: 203-218 Issue: 3 Volume: 19 Year: 2003 Month: 9 X-DOI: 10.1080/1475179032000118795 File-URL: http://hdl.handle.net/10.1080/1475179032000118795 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:203-218 Template-Type: ReDIF-Article 1.0 Author-Name: Christopher Flaherty Author-X-Name-First: Christopher Author-X-Name-Last: Flaherty Title: The relevance of the US transformation paradigm for the Australian defense forces Journal: Defense & Security Analysis Pages: 219-240 Issue: 3 Volume: 19 Year: 2003 Month: 9 X-DOI: 10.1080/1475179032000118803 File-URL: http://hdl.handle.net/10.1080/1475179032000118803 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:219-240 Template-Type: ReDIF-Article 1.0 Author-Name: William Charlesworth Author-X-Name-First: William Author-X-Name-Last: Charlesworth Title: Profiling terrorists: A taxonomy of evolutionary, developmental and situational causes of a terrorist actThanks go to Michael McGuire, MD, Neuropsychiatric Dept., UCLA, for commenting on the first draft of this paper and to Thomas Bouchard, PhD., James Butcher, PhD., and David Lykken, PhD., Dept of Psychology, University of Minnesota, for relevant reading material. Also, thanks to Jennifer Molina, Institute of Child Development, University of Minnesota, for helping in the preparation of this manuscript for publication. Journal: Defense & Security Analysis Pages: 241-264 Issue: 3 Volume: 19 Year: 2003 Month: 9 X-DOI: 10.1080/1475179032000118812 File-URL: http://hdl.handle.net/10.1080/1475179032000118812 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:241-264 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew Bouldin Author-X-Name-First: Matthew Author-X-Name-Last: Bouldin Title: Keeper of the peace: Canada and security transition operations Journal: Defense & Security Analysis Pages: 265-276 Issue: 3 Volume: 19 Year: 2003 Month: 9 X-DOI: 10.1080/1475179032000118821 File-URL: http://hdl.handle.net/10.1080/1475179032000118821 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:265-276 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen Wrage Author-X-Name-First: Stephen Author-X-Name-Last: Wrage Author-Name: Simon Baynham Author-X-Name-First: Simon Author-X-Name-Last: Baynham Author-Name: Greg Mills Author-X-Name-First: Greg Author-X-Name-Last: Mills Title: Profressional Notes Journal: Defense & Security Analysis Pages: 277-291 Issue: 3 Volume: 19 Year: 2003 Month: 9 X-DOI: 10.1080/1475179032000118830 File-URL: http://hdl.handle.net/10.1080/1475179032000118830 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:277-291 Template-Type: ReDIF-Article 1.0 Author-Name: James Hentz Author-X-Name-First: James Author-X-Name-Last: Hentz Title: The paradox of instability and stability: United States “Primacy”, China, and the National Missile Defense (NMD) debate Journal: Defense & Security Analysis Pages: 293-299 Issue: 3 Volume: 19 Year: 2003 Month: 9 X-DOI: 10.1080/1475179032000118849 File-URL: http://hdl.handle.net/10.1080/1475179032000118849 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:293-299 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: The essentials of military knowledge Journal: Defense & Security Analysis Pages: 301-304 Issue: 3 Volume: 19 Year: 2003 Month: 9 X-DOI: 10.1080/1475179032000118867 File-URL: http://hdl.handle.net/10.1080/1475179032000118867 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:301-304 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 307-308 Issue: 4 Volume: 19 Year: 2003 Month: 12 X-DOI: 10.1080/1475179032000149386 File-URL: http://hdl.handle.net/10.1080/1475179032000149386 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:307-308 Template-Type: ReDIF-Article 1.0 Author-Name: Li Bin Author-X-Name-First: Li Author-X-Name-Last: Bin Title: Absolute gains, relative gains, and US security policy on China This paper is translated from a Chinese version published at World Economics and International Politics, 11, 2002, pp. 17--21. Journal: Defense & Security Analysis Pages: 309-317 Issue: 4 Volume: 19 Year: 2003 Month: 12 X-DOI: 10.1080/1475179032000149395 File-URL: http://hdl.handle.net/10.1080/1475179032000149395 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:309-317 Template-Type: ReDIF-Article 1.0 Author-Name: Shen Dingli Author-X-Name-First: Shen Author-X-Name-Last: Dingli Title: China's evaluation of the adjustment to US security policy since September 11, 2001 Journal: Defense & Security Analysis Pages: 319-326 Issue: 4 Volume: 19 Year: 2003 Month: 12 X-DOI: 10.1080/1475179032000149403 File-URL: http://hdl.handle.net/10.1080/1475179032000149403 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:319-326 Template-Type: ReDIF-Article 1.0 Author-Name: Raymond Franck Author-X-Name-First: Raymond Author-X-Name-Last: Franck Author-Name: Francois Melese Author-X-Name-First: Francois Author-X-Name-Last: Melese Title: A game theory view of military conflict in the Taiwan strait Journal: Defense & Security Analysis Pages: 327-348 Issue: 4 Volume: 19 Year: 2003 Month: 12 X-DOI: 10.1080/1475179032000149412 File-URL: http://hdl.handle.net/10.1080/1475179032000149412 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:327-348 Template-Type: ReDIF-Article 1.0 Author-Name: Eric Nathaniel Heller Author-X-Name-First: Eric Author-X-Name-Last: Nathaniel Heller Title: The prospect for power projections of the People's Republic of China Journal: Defense & Security Analysis Pages: 349-367 Issue: 4 Volume: 19 Year: 2003 Month: 12 X-DOI: 10.1080/1475179032000149421 File-URL: http://hdl.handle.net/10.1080/1475179032000149421 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:349-367 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: US ballistic missile defense and China Journal: Defense & Security Analysis Pages: 369-375 Issue: 4 Volume: 19 Year: 2003 Month: 12 X-DOI: 10.1080/1475179032000149430 File-URL: http://hdl.handle.net/10.1080/1475179032000149430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:369-375 Template-Type: ReDIF-Article 1.0 Author-Name: T. S. Gopi Rethinaraj Author-X-Name-First: T. S. Author-X-Name-Last: Gopi Rethinaraj Title: China's energy and regional security perspectives Journal: Defense & Security Analysis Pages: 377-388 Issue: 4 Volume: 19 Year: 2003 Month: 12 X-DOI: 10.1080/1475179032000149449 File-URL: http://hdl.handle.net/10.1080/1475179032000149449 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:377-388 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Sengupta Author-X-Name-First: Martin Author-X-Name-Last: Sengupta Title: Is China the Next Superpower? Journal: Defense & Security Analysis Pages: 389-404 Issue: 4 Volume: 19 Year: 2003 Month: 12 X-DOI: 10.1080/1475179032000149458 File-URL: http://hdl.handle.net/10.1080/1475179032000149458 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:389-404 Template-Type: ReDIF-Article 1.0 Author-Name: Robert Gray Author-X-Name-First: Robert Author-X-Name-Last: Gray Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 1-2 Issue: 1 Volume: 20 Year: 2004 Month: 1 X-DOI: 10.1080/1475179042000195465 File-URL: http://hdl.handle.net/10.1080/1475179042000195465 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 Author-Name: Micah Zenko Author-X-Name-First: Micah Author-X-Name-Last: Zenko Title: Saving lives with speed: Using rapidly deployable forces for genocide prevention Journal: Defense & Security Analysis Pages: 3-19 Issue: 1 Volume: 20 Year: 2004 Month: 1 X-DOI: 10.1080/1475179042000195474 File-URL: http://hdl.handle.net/10.1080/1475179042000195474 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:3-19 Template-Type: ReDIF-Article 1.0 Author-Name: Erik Männik Author-X-Name-First: Erik Author-X-Name-Last: Männik Title: Small states: invited to NATO — able to contribute? Journal: Defense & Security Analysis Pages: 21-37 Issue: 1 Volume: 20 Year: 2004 Month: 1 X-DOI: 10.1080/1475179042000195483 File-URL: http://hdl.handle.net/10.1080/1475179042000195483 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:21-37 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Sheehan Author-X-Name-First: Michael Author-X-Name-Last: Sheehan Title: Creating an arms control mechanism in North East Asia: the application of the European security co-operation regime Journal: Defense & Security Analysis Pages: 39-54 Issue: 1 Volume: 20 Year: 2004 Month: 1 X-DOI: 10.1080/1475179042000195492 File-URL: http://hdl.handle.net/10.1080/1475179042000195492 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:39-54 Template-Type: ReDIF-Article 1.0 Author-Name: James Hasik Author-X-Name-First: James Author-X-Name-Last: Hasik Title: Dream teams and brilliant eyes: the SBIRS low program, Northrop Grumman's acquisition of TRW, and the implications for the structure of the military space industry Journal: Defense & Security Analysis Pages: 55-67 Issue: 1 Volume: 20 Year: 2004 Month: 1 X-DOI: 10.1080/1475179042000195500 File-URL: http://hdl.handle.net/10.1080/1475179042000195500 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:55-67 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: Fifty Years of British Army Officership 1960-2010 Journal: Defense & Security Analysis Pages: 69-86 Issue: 1 Volume: 20 Year: 2004 Month: 1 X-DOI: 10.1080/1475179042000195519 File-URL: http://hdl.handle.net/10.1080/1475179042000195519 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:69-86 Template-Type: ReDIF-Article 1.0 Author-Name: Tim Ripley Author-X-Name-First: Tim Author-X-Name-Last: Ripley Title: Landmark in Defense Literature Journal: Defense & Security Analysis Pages: 97-98 Issue: 1 Volume: 20 Year: 2004 Month: 1 X-DOI: 10.1080/1475179042000195537 File-URL: http://hdl.handle.net/10.1080/1475179042000195537 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:97-98 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Robert Gray Author-X-Name-First: Robert Author-X-Name-Last: Gray Title: Editorial Journal: Defense & Security Analysis Pages: 109-111 Issue: 2 Volume: 20 Year: 2004 Month: 6 X-DOI: 10.1080/1475179042000219080 File-URL: http://hdl.handle.net/10.1080/1475179042000219080 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:109-111 Template-Type: ReDIF-Article 1.0 Author-Name: Tom Sauer Author-X-Name-First: Tom Author-X-Name-Last: Sauer Title: The “Americanization” of EU nuclear non‐proliferation policy Journal: Defense & Security Analysis Pages: 113-131 Issue: 2 Volume: 20 Year: 2004 Month: 6 X-DOI: 10.1080/1475179042000219099 File-URL: http://hdl.handle.net/10.1080/1475179042000219099 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:113-131 Template-Type: ReDIF-Article 1.0 Author-Name: Richard Weitz Author-X-Name-First: Richard Author-X-Name-Last: Weitz Title: Jointness and desert storm: a retrospective Journal: Defense & Security Analysis Pages: 133-152 Issue: 2 Volume: 20 Year: 2004 Month: 6 X-DOI: 10.1080/1475179042000219107 File-URL: http://hdl.handle.net/10.1080/1475179042000219107 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:133-152 Template-Type: ReDIF-Article 1.0 Author-Name: Dan Lindley Author-X-Name-First: Dan Author-X-Name-Last: Lindley Title: UNDOF: operational analysis and lessons learned Journal: Defense & Security Analysis Pages: 153-164 Issue: 2 Volume: 20 Year: 2004 Month: 6 X-DOI: 10.1080/1475179042000219116 File-URL: http://hdl.handle.net/10.1080/1475179042000219116 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:153-164 Template-Type: ReDIF-Article 1.0 Author-Name: Trevor Taylor Author-X-Name-First: Trevor Author-X-Name-Last: Taylor Author-Name: Derrick Neal Author-X-Name-First: Derrick Author-X-Name-Last: Neal Title: The delineation of defense equipment projects in the UK ministry of defence Journal: Defense & Security Analysis Pages: 165-177 Issue: 2 Volume: 20 Year: 2004 Month: 6 X-DOI: 10.1080/1475179042000219125 File-URL: http://hdl.handle.net/10.1080/1475179042000219125 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:165-177 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: Fifty years of British army officership 1960--2010: Part II: Prospective Journal: Defense & Security Analysis Pages: 179-199 Issue: 2 Volume: 20 Year: 2004 Month: 6 X-DOI: 10.1080/1475179042000219134 File-URL: http://hdl.handle.net/10.1080/1475179042000219134 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:179-199 Template-Type: ReDIF-Article 1.0 Author-Name: Robert Bresler Author-X-Name-First: Robert Author-X-Name-Last: Bresler Title: Diplomacy by Henry Kissinger Journal: Defense & Security Analysis Pages: 201-203 Issue: 2 Volume: 20 Year: 2004 Month: 6 X-DOI: 10.1080/1475179042000219143 File-URL: http://hdl.handle.net/10.1080/1475179042000219143 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:201-203 Template-Type: ReDIF-Article 1.0 Author-Name: Mark Nissen Author-X-Name-First: Mark Author-X-Name-Last: Nissen Author-Name: Erik Jansen Author-X-Name-First: Erik Author-X-Name-Last: Jansen Author-Name: Carl Jones Author-X-Name-First: Carl Author-X-Name-Last: Jones Author-Name: Gail Thomas Author-X-Name-First: Gail Author-X-Name-Last: Thomas Title: Contextual Criticality of Knowledge-Flow Dynamics: Understanding a US Tragedy of Friendly Fire Journal: Defense & Security Analysis Pages: 209-228 Issue: 3 Volume: 20 Year: 2004 Month: 9 X-DOI: 10.1080/1475179042000260651 File-URL: http://hdl.handle.net/10.1080/1475179042000260651 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:209-228 Template-Type: ReDIF-Article 1.0 Author-Name: David Sanders Author-X-Name-First: David Author-X-Name-Last: Sanders Title: Knowledge management and potentially useful new hyperdidactic structures Journal: Defense & Security Analysis Pages: 229-243 Issue: 3 Volume: 20 Year: 2004 Month: 9 X-DOI: 10.1080/1475179042000260660 File-URL: http://hdl.handle.net/10.1080/1475179042000260660 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:229-243 Template-Type: ReDIF-Article 1.0 Author-Name: Robert McNab Author-X-Name-First: Robert Author-X-Name-Last: McNab Title: Base realignment and closure: Guiding principles for Peru Journal: Defense & Security Analysis Pages: 245-259 Issue: 3 Volume: 20 Year: 2004 Month: 9 X-DOI: 10.1080/1475179042000260679 File-URL: http://hdl.handle.net/10.1080/1475179042000260679 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:245-259 Template-Type: ReDIF-Article 1.0 Author-Name: Sorin Lungu Author-X-Name-First: Sorin Author-X-Name-Last: Lungu Title: Military modernization and political choice: Germany and the uspromoted military technological revolution during the 1990s Abstract: This paper focuses on the factors that impacted on the German debate with regard to the US-promoted Revolution in Military Affairs (RMA) during the 1990s.1 It suggests that domestic policy considerations and the lack of farsighted defense and security strategic thinking, especially with regard to “Bundeswehr's capabilities”, coupled with bureaucratic politics inside the German Ministry of Defense (MoD), played a significant role in shaping the German RMA-related response during the 1990s. Journal: Defense & Security Analysis Pages: 261-272 Issue: 3 Volume: 20 Year: 2004 Month: 9 X-DOI: 10.1080/1475179042000260688 File-URL: http://hdl.handle.net/10.1080/1475179042000260688 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:261-272 Template-Type: ReDIF-Article 1.0 Author-Name: William Gates Author-X-Name-First: William Author-X-Name-Last: Gates Author-Name: Mitchell McCarthy Author-X-Name-First: Mitchell Author-X-Name-Last: McCarthy Title: United states marine corps aerial refueling requirements: Queuing theory and simulation analysis Journal: Defense & Security Analysis Pages: 273-287 Issue: 3 Volume: 20 Year: 2004 Month: 9 X-DOI: 10.1080/1475179042000260697 File-URL: http://hdl.handle.net/10.1080/1475179042000260697 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:273-287 Template-Type: ReDIF-Article 1.0 Author-Name: Stewart Fraser Author-X-Name-First: Stewart Author-X-Name-Last: Fraser Title: Landmark in defense literature Abstract: Some books which have fallen within Defense & Security Analysis's fields of interest have paved the way for further studies, either because they have opened up a new era for enquiry and research, or because they have introduced new approaches and methodologies to existing areas. Other volumes have had impact, but have, in their turn, owed an intellectual debt to an earlier work. Again, there are many books and studies on defense which have become forgotten or which were unappreciated at the time of their publication, but which have immediate relevance to today's problems. This section is designed to review books that fall within these categories with a view to highlighting how and why they deserve serious attention. Journal: Defense & Security Analysis Pages: 301-303 Issue: 3 Volume: 20 Year: 2004 Month: 9 X-DOI: 10.1080/1475179042000260714 File-URL: http://hdl.handle.net/10.1080/1475179042000260714 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:301-303 Template-Type: ReDIF-Article 1.0 Author-Name: Julian I. Palmore Author-X-Name-First: Julian I. Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 311-312 Issue: 4 Volume: 20 Year: 2004 Month: 12 X-DOI: 10.1080/1475179042000305769 File-URL: http://hdl.handle.net/10.1080/1475179042000305769 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:311-312 Template-Type: ReDIF-Article 1.0 Author-Name: Audrey Kurth Cronin Author-X-Name-First: Audrey Kurth Author-X-Name-Last: Cronin Title: Terrorist motivations for chemical and biological weapons use: Placing the threat in context* Abstract: *This article is a reprint of CRS Report RL31831, dated 28 March 2003. Journal: Defense & Security Analysis Pages: 313-320 Issue: 4 Volume: 20 Year: 2004 Month: 12 X-DOI: 10.1080/1475179042000305778 File-URL: http://hdl.handle.net/10.1080/1475179042000305778 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:313-320 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: Nuclear proliferation and international systems Abstract: This article includes some material from an earlier study of this topic, in Stephen J. Cimbala, The Dead Volcano: The Background and effects of Nuclear War Complacency (Praeger Publishers: 2002) Journal: Defense & Security Analysis Pages: 321-336 Issue: 4 Volume: 20 Year: 2004 Month: 12 X-DOI: 10.1080/1475179042000305787 File-URL: http://hdl.handle.net/10.1080/1475179042000305787 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:321-336 Template-Type: ReDIF-Article 1.0 Author-Name: Francois Melese Author-X-Name-First: Francois Author-X-Name-Last: Melese Author-Name: Diana Angelis Author-X-Name-First: Diana Author-X-Name-Last: Angelis Title: Deterring terrorists from using WMD: A brinkmanship strategy for the United Nations Journal: Defense & Security Analysis Pages: 337-341 Issue: 4 Volume: 20 Year: 2004 Month: 12 X-DOI: 10.1080/1475179042000305796 File-URL: http://hdl.handle.net/10.1080/1475179042000305796 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:337-341 Template-Type: ReDIF-Article 1.0 Author-Name: Glen Segell Author-X-Name-First: Glen Author-X-Name-Last: Segell Title: Counter-proliferating the rogue states Journal: Defense & Security Analysis Pages: 343-354 Issue: 4 Volume: 20 Year: 2004 Month: 12 X-DOI: 10.1080/1475179042000305804 File-URL: http://hdl.handle.net/10.1080/1475179042000305804 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:343-354 Template-Type: ReDIF-Article 1.0 Author-Name: Raymond E. Franck Author-X-Name-First: Raymond E. Author-X-Name-Last: Franck Author-Name: Francois Melese Author-X-Name-First: Francois Author-X-Name-Last: Melese Title: Exploring the structure of terrorists' WMD decisions: A game theory approach Journal: Defense & Security Analysis Pages: 355-372 Issue: 4 Volume: 20 Year: 2004 Month: 12 X-DOI: 10.1080/1475179042000305813 File-URL: http://hdl.handle.net/10.1080/1475179042000305813 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:355-372 Template-Type: ReDIF-Article 1.0 Author-Name: M. D. Ginsberg Author-X-Name-First: M. D. Author-X-Name-Last: Ginsberg Author-Name: V. F. Hock Author-X-Name-First: V. F. Author-X-Name-Last: Hock Title: Terrorism and security of water distribution systems: A primer Journal: Defense & Security Analysis Pages: 373-380 Issue: 4 Volume: 20 Year: 2004 Month: 12 X-DOI: 10.1080/1475179042000305822 File-URL: http://hdl.handle.net/10.1080/1475179042000305822 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:373-380 Template-Type: ReDIF-Article 1.0 Author-Name: Julian I. Palmore Author-X-Name-First: Julian I. Author-X-Name-Last: Palmore Title: Missile defense and Europe: WMD and terrorism Journal: Defense & Security Analysis Pages: 381-389 Issue: 4 Volume: 20 Year: 2004 Month: 12 X-DOI: 10.1080/1475179042000305831 File-URL: http://hdl.handle.net/10.1080/1475179042000305831 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:381-389 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew James Author-X-Name-First: Andrew Author-X-Name-Last: James Title: European Military Capabilities, the Defense Industry and the Future Shape of Armaments Co-operation Journal: Defense & Security Analysis Pages: 5-19 Issue: 1 Volume: 21 Year: 2005 Month: 3 X-DOI: 10.1080/1475179052000341470 File-URL: http://hdl.handle.net/10.1080/1475179052000341470 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:5-19 Template-Type: ReDIF-Article 1.0 Author-Name: Kerry Longhurst Author-X-Name-First: Kerry Author-X-Name-Last: Longhurst Title: Endeavors to Restructure the Bundeswehr: The Reform of the German Armed Forces 1990--2003 Journal: Defense & Security Analysis Pages: 21-35 Issue: 1 Volume: 21 Year: 2005 Month: 3 X-DOI: 10.1080/1475179052000341489 File-URL: http://hdl.handle.net/10.1080/1475179052000341489 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:21-35 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew Fuhrmann Author-X-Name-First: Matthew Author-X-Name-Last: Fuhrmann Author-Name: Nathan Edwards Author-X-Name-First: Nathan Author-X-Name-Last: Edwards Author-Name: Michael Salomone Author-X-Name-First: Michael Author-X-Name-Last: Salomone Title: The German offensive of 1914: A new perspective Journal: Defense & Security Analysis Pages: 37-66 Issue: 1 Volume: 21 Year: 2005 Month: 3 X-DOI: 10.1080/1475179052000341498 File-URL: http://hdl.handle.net/10.1080/1475179052000341498 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:37-66 Template-Type: ReDIF-Article 1.0 Author-Name: Salvador Raza Author-X-Name-First: Salvador Author-X-Name-Last: Raza Title: The security and defense matrix: Concepts matter in defense analysis? Journal: Defense & Security Analysis Pages: 67-78 Issue: 1 Volume: 21 Year: 2005 Month: 3 X-DOI: 10.1080/1475179052000341506 File-URL: http://hdl.handle.net/10.1080/1475179052000341506 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:67-78 Template-Type: ReDIF-Article 1.0 Author-Name: Asifa Hussain Author-X-Name-First: Asifa Author-X-Name-Last: Hussain Author-Name: Mohammed Ishaq Author-X-Name-First: Mohammed Author-X-Name-Last: Ishaq Title: Public attitudes towards a career in the British Armed Forces Journal: Defense & Security Analysis Pages: 79-95 Issue: 1 Volume: 21 Year: 2005 Month: 3 X-DOI: 10.1080/1475179052000341515 File-URL: http://hdl.handle.net/10.1080/1475179052000341515 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:79-95 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew Morgan Author-X-Name-First: Matthew Author-X-Name-Last: Morgan Title: The art of war in operation Iraqi Freedom Journal: Defense & Security Analysis Pages: 97-104 Issue: 1 Volume: 21 Year: 2005 Month: 3 X-DOI: 10.1080/1475179052000341524 File-URL: http://hdl.handle.net/10.1080/1475179052000341524 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:97-104 Template-Type: ReDIF-Article 1.0 Author-Name: Simon Baynham Author-X-Name-First: Simon Author-X-Name-Last: Baynham Title: Cross-straits relations and the 2004 Taiwanese Elections Abstract: Contributions of between 250 and 1,000 words which are concerned with defense issues of the day, new source material, interesting methodological approaches, novel interpretations of defense matters, or comment and reaction to the subject matter and content of the Journal are included in this section. None is refereed, and each submission is included at the Editor's discretion. In the manner and style of similar sections in scientific journals, the objective is to provide a forum for quick response to current developments in defense affairs generally. Journal: Defense & Security Analysis Pages: 105-110 Issue: 1 Volume: 21 Year: 2005 Month: 3 X-DOI: 10.1080/1475179052000341533 File-URL: http://hdl.handle.net/10.1080/1475179052000341533 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:105-110 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Augustine's Laws: Norman Augustine Abstract: Some books which have fallen within Defense & Security Analysis's fields of interest have paved the way for further studies, either because they have opened up a new era for enquiry and research, or because they have introduced new approaches and methodologies to existing areas. Other volumes have had impact, but have, in their turn, owed an intellectual debt to an earlier work. Again, there are many books and studies on defense which have become forgotten or which were unappreciated at the time of their publication, but which have immediate relevance to today's problems. This section is designed to review books that fall within these categories with a view to highlighting how and why they deserve serious attention. Journal: Defense & Security Analysis Pages: 111-114 Issue: 1 Volume: 21 Year: 2005 Month: 3 X-DOI: 10.1080/1475179052000341542 File-URL: http://hdl.handle.net/10.1080/1475179052000341542 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:111-114 Template-Type: ReDIF-Article 1.0 Author-Name: Avi Kober Author-X-Name-First: Avi Author-X-Name-Last: Kober Title: Does the Iraq war reflect a phase change in warfare? Journal: Defense & Security Analysis Pages: 121-142 Issue: 2 Volume: 21 Year: 2005 Month: 6 X-DOI: 10.1080/1475179052000343973 File-URL: http://hdl.handle.net/10.1080/1475179052000343973 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:121-142 Template-Type: ReDIF-Article 1.0 Author-Name: James Mckay Author-X-Name-First: James Author-X-Name-Last: Mckay Title: Fear of the unknown: The coalition from operation desert fox to operation Iraqi freedom Journal: Defense & Security Analysis Pages: 143-158 Issue: 2 Volume: 21 Year: 2005 Month: 6 X-DOI: 10.1080/1475179052000343982 File-URL: http://hdl.handle.net/10.1080/1475179052000343982 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:143-158 Template-Type: ReDIF-Article 1.0 Author-Name: Valérie Merindol Author-X-Name-First: Valérie Author-X-Name-Last: Merindol Title: Defense RDT&E and knowledge management: A new enquiry into public and public‐private coordination Journal: Defense & Security Analysis Pages: 159-177 Issue: 2 Volume: 21 Year: 2005 Month: 6 X-DOI: 10.1080/1475179052000343991 File-URL: http://hdl.handle.net/10.1080/1475179052000343991 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:159-177 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Radseck Author-X-Name-First: Michael Author-X-Name-Last: Radseck Title: From casa militar to an instrument of political control: A functional analysis of the defense ministries in Argentina and Chile Journal: Defense & Security Analysis Pages: 179-199 Issue: 2 Volume: 21 Year: 2005 Month: 6 X-DOI: 10.1080/1475179052000344008 File-URL: http://hdl.handle.net/10.1080/1475179052000344008 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:179-199 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Mcnerney Author-X-Name-First: Michael Author-X-Name-Last: Mcnerney Title: Military innovation during war: Paradox or paradigm? Journal: Defense & Security Analysis Pages: 201-212 Issue: 2 Volume: 21 Year: 2005 Month: 6 X-DOI: 10.1080/1475179052000344017 File-URL: http://hdl.handle.net/10.1080/1475179052000344017 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:201-212 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: Amateurs, conscripts, citizens, professionals: How do armed forces measure up? Abstract: Contributions of between 250 and 1,000 words which are concerned with defense issues of the day, new source material, interesting methodological approaches, novel interpretations of defense matters, or comment and reaction to the subject matter and content of the Journal are included in this section. None is refereed, and each submission is included at the Editor's discretion. In the manner and style of similar sections in scientific journals, the objective is to provide a forum for quick response to current developments in defense affairs generally. Journal: Defense & Security Analysis Pages: 213-216 Issue: 2 Volume: 21 Year: 2005 Month: 6 X-DOI: 10.1080/1475179052000344026 File-URL: http://hdl.handle.net/10.1080/1475179052000344026 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:213-216 Template-Type: ReDIF-Article 1.0 Author-Name: Andrea Ellner Author-X-Name-First: Andrea Author-X-Name-Last: Ellner Title: The European security strategy: Multilateral security with teeth? Journal: Defense & Security Analysis Pages: 223-242 Issue: 3 Volume: 21 Year: 2005 Month: 9 X-DOI: 10.1080/0743017052000344929 File-URL: http://hdl.handle.net/10.1080/0743017052000344929 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:223-242 Template-Type: ReDIF-Article 1.0 Author-Name: Stefan Markowski Author-X-Name-First: Stefan Author-X-Name-Last: Markowski Author-Name: Massimiliano Tani Author-X-Name-First: Massimiliano Author-X-Name-Last: Tani Title: Defense expenditure, spill-ins and threats in Asia-Pacific 1985--2001 Journal: Defense & Security Analysis Pages: 243-265 Issue: 3 Volume: 21 Year: 2005 Month: 9 X-DOI: 10.1080/0743017052000344938 File-URL: http://hdl.handle.net/10.1080/0743017052000344938 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:243-265 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala* Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala* Title: Nuclear weapons in the Twenty-first century: From simplicity to complexity Abstract: *The author gratefully acknowledges the use of a model developed by Dr James Scouras in preparing Charts 1 through 6. Dr Scouras is not responsible for any of the analysis undertaken here, nor for any of the arguments or conclusions. Journal: Defense & Security Analysis Pages: 267-281 Issue: 3 Volume: 21 Year: 2005 Month: 9 X-DOI: 10.1080/0743017052000344947 File-URL: http://hdl.handle.net/10.1080/0743017052000344947 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:267-281 Template-Type: ReDIF-Article 1.0 Author-Name: David Sanders Author-X-Name-First: David Author-X-Name-Last: Sanders Title: Creation of new knowledge Journal: Defense & Security Analysis Pages: 283-302 Issue: 3 Volume: 21 Year: 2005 Month: 9 X-DOI: 10.1080/0743017052000344956 File-URL: http://hdl.handle.net/10.1080/0743017052000344956 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:283-302 Template-Type: ReDIF-Article 1.0 Author-Name: Jason Mead Author-X-Name-First: Jason Author-X-Name-Last: Mead Title: Game theory and the Second Iraq War Abstract: Throughout the world, there is a large number of young, and even not-so-young, scholars who are reading for higher degrees in strategic, security and defense studies, or engaged in analytical research in research institutes, think-tanks or consultancies; they bring to the subject innovative and fresh perspectives often ignored or missed by more established scholars. Most of these people have yet to make their mark in the defense and security field. The Editors of Defense & Security Analysis are resolved to tap this value source of information, observation, analysis and critical study by offering a new section of the journal for their views to be given an opportunity to be aired. Submissions of up to 3,000 words are encouraged from University Master's and Doctoral candidates and post-doctoral researchers. Journal: Defense & Security Analysis Pages: 303-311 Issue: 3 Volume: 21 Year: 2005 Month: 9 X-DOI: 10.1080/0743017052000344955 File-URL: http://hdl.handle.net/10.1080/0743017052000344955 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:303-311 Template-Type: ReDIF-Article 1.0 Author-Name: Michael J. Lombardi Author-X-Name-First: Michael J. Author-X-Name-Last: Lombardi Title: The decline of the American superpower Journal: Defense & Security Analysis Pages: 312-321 Issue: 3 Volume: 21 Year: 2005 Month: 9 X-DOI: 10.1080/0743017052000344965 File-URL: http://hdl.handle.net/10.1080/0743017052000344965 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:312-321 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 331-333 Issue: 4 Volume: 21 Year: 2005 Month: 12 X-DOI: 10.1080/1475179052000345395 File-URL: http://hdl.handle.net/10.1080/1475179052000345395 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:331-333 Template-Type: ReDIF-Article 1.0 Author-Name: Darryn J. Reid Author-X-Name-First: Darryn J. Author-X-Name-Last: Reid Author-Name: Graham Goodman Author-X-Name-First: Graham Author-X-Name-Last: Goodman Author-Name: Wayne Johnson Author-X-Name-First: Wayne Author-X-Name-Last: Johnson Author-Name: Ralph E. Giffin Author-X-Name-First: Ralph E. Author-X-Name-Last: Giffin Title: All that glisters: Is network-centric warfare really scientific? Journal: Defense & Security Analysis Pages: 335-367 Issue: 4 Volume: 21 Year: 2005 Month: 12 X-DOI: 10.1080/1475179052000345403 File-URL: http://hdl.handle.net/10.1080/1475179052000345403 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:335-367 Template-Type: ReDIF-Article 1.0 Author-Name: Matenia P. Sirseloudi Author-X-Name-First: Matenia P. Author-X-Name-Last: Sirseloudi Title: How to predict the unpredictable: On the early detection of terrorist campaigns Journal: Defense & Security Analysis Pages: 369-386 Issue: 4 Volume: 21 Year: 2005 Month: 12 X-DOI: 10.1080/1475179052000345421 File-URL: http://hdl.handle.net/10.1080/1475179052000345421 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:369-386 Template-Type: ReDIF-Article 1.0 Author-Name: Fotios Moustakis Author-X-Name-First: Fotios Author-X-Name-Last: Moustakis Author-Name: Rudra Chaudhuri Author-X-Name-First: Rudra Author-X-Name-Last: Chaudhuri Title: The transatlantic alliance revisited: Does america still need “old Europe”? Journal: Defense & Security Analysis Pages: 387-398 Issue: 4 Volume: 21 Year: 2005 Month: 12 X-DOI: 10.1080/1475179052000345430 File-URL: http://hdl.handle.net/10.1080/1475179052000345430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:387-398 Template-Type: ReDIF-Article 1.0 Author-Name: Siret Hürsoy Author-X-Name-First: Siret Author-X-Name-Last: Hürsoy Title: A regional dimension to peace operations: European contributions to the UN and implications for Turkish co-operation and co-ordination Journal: Defense & Security Analysis Pages: 399-412 Issue: 4 Volume: 21 Year: 2005 Month: 12 X-DOI: 10.1080/1475179052000345449 File-URL: http://hdl.handle.net/10.1080/1475179052000345449 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:399-412 Template-Type: ReDIF-Article 1.0 Author-Name: Erica Lynn Author-X-Name-First: Erica Author-X-Name-Last: Lynn Title: Analysis of the dispute over Taiwan using a game theory approach Abstract: Throughout the world, there is a large number of young, and even not-so-young, scholars who are reading for higher degrees in strategic, security and defense studies, or engaged in analytical research in research institutes, think-tanks or consultancies; they bring to the subject innovative and fresh perspectives often ignored or missed by more established scholars. Most of these people have yet to make their mark in the defense and security field. The Editors of Defense & Security Analysis are resolved to tap this valuable source of information, observation, analysis and critical study by offering a new section of the journal for their views to be given an opportunity to be aired. Submissions of up to 3,000 words are encouraged from University Master's and Doctoral candidates and post-doctoral researchers. Journal: Defense & Security Analysis Pages: 413-418 Issue: 4 Volume: 21 Year: 2005 Month: 12 X-DOI: 10.1080/1475179052000345458 File-URL: http://hdl.handle.net/10.1080/1475179052000345458 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:413-418 Template-Type: ReDIF-Article 1.0 Author-Name: Dingli Shen Author-X-Name-First: Dingli Author-X-Name-Last: Shen Title: Nuclear deterrence in the 21st century Abstract: The purpose behind this section is to encourage, and sometimes solicit, short commentary and/or comment on timely topics that play a role in shaping current national and international defense and security policies. There is no limit or constraint on what defense and security topics are chosen, so long as they are timely and have policy relevance. By way of guidance, the nearest equivalent would be feature articles in the more reputable broadsheet press. Journal: Defense & Security Analysis Pages: 419-424 Issue: 4 Volume: 21 Year: 2005 Month: 12 X-DOI: 10.1080/1475179052000345467 File-URL: http://hdl.handle.net/10.1080/1475179052000345467 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:419-424 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Missile Defense and Europe: Strengthening Transatlantic Co-operation in an Evolving Setting Journal: Defense & Security Analysis Pages: 425-432 Issue: 4 Volume: 21 Year: 2005 Month: 12 X-DOI: 10.1080/1475179052000345476 File-URL: http://hdl.handle.net/10.1080/1475179052000345476 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:425-432 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 1-4 Issue: 1 Volume: 22 Year: 2006 Month: 3 X-DOI: 10.1080/14751790600577058 File-URL: http://hdl.handle.net/10.1080/14751790600577058 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:1-4 Template-Type: ReDIF-Article 1.0 Author-Name: James Holmes Author-X-Name-First: James Author-X-Name-Last: Holmes Author-Name: Toshi Yoshihara Author-X-Name-First: Toshi Author-X-Name-Last: Yoshihara Author-Name: Andrew Winner Author-X-Name-First: Andrew Author-X-Name-Last: Winner Title: Maritime Counter-proliferation with Chinese Characteristics* Journal: Defense & Security Analysis Pages: 5-21 Issue: 1 Volume: 22 Year: 2006 Month: 3 X-DOI: 10.1080/14751790600577074 File-URL: http://hdl.handle.net/10.1080/14751790600577074 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:5-21 Template-Type: ReDIF-Article 1.0 Author-Name: Andrea Ellner Author-X-Name-First: Andrea Author-X-Name-Last: Ellner Title: Carrier Airpower in the Royal Navy during the Cold War: The International Strategic Context* Journal: Defense & Security Analysis Pages: 23-44 Issue: 1 Volume: 22 Year: 2006 Month: 3 X-DOI: 10.1080/14751790600577108 File-URL: http://hdl.handle.net/10.1080/14751790600577108 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:23-44 Template-Type: ReDIF-Article 1.0 Author-Name: Glen M. Segell Author-X-Name-First: Glen M. Author-X-Name-Last: Segell Title: Terrorism on London Public Transport Journal: Defense & Security Analysis Pages: 45-59 Issue: 1 Volume: 22 Year: 2006 Month: 3 X-DOI: 10.1080/14751790600577132 File-URL: http://hdl.handle.net/10.1080/14751790600577132 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:45-59 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: Military Persuasion, Intelligence and the War on Terror Journal: Defense & Security Analysis Pages: 61-72 Issue: 1 Volume: 22 Year: 2006 Month: 3 X-DOI: 10.1080/14751790600577157 File-URL: http://hdl.handle.net/10.1080/14751790600577157 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:61-72 Template-Type: ReDIF-Article 1.0 Author-Name: Nadim Hasbani Author-X-Name-First: Nadim Author-X-Name-Last: Hasbani Title: The Geopolitics of Weapons Procurement in the Gulf States Journal: Defense & Security Analysis Pages: 73-88 Issue: 1 Volume: 22 Year: 2006 Month: 3 X-DOI: 10.1080/14751790600577181 File-URL: http://hdl.handle.net/10.1080/14751790600577181 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:73-88 Template-Type: ReDIF-Article 1.0 Author-Name: Grant Kopec Author-X-Name-First: Grant Author-X-Name-Last: Kopec Title: Technical Obstacles and Limitations to the Implementation of Effective Mid-course Ground-based Missile Defense Journal: Defense & Security Analysis Pages: 89-94 Issue: 1 Volume: 22 Year: 2006 Month: 3 X-DOI: 10.1080/14751790600577231 File-URL: http://hdl.handle.net/10.1080/14751790600577231 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:89-94 Template-Type: ReDIF-Article 1.0 Author-Name: Timothy Bradley Author-X-Name-First: Timothy Author-X-Name-Last: Bradley Title: Why a Ballistic Missile Defense Program is the Wrong Path to US National Security Journal: Defense & Security Analysis Pages: 95-99 Issue: 1 Volume: 22 Year: 2006 Month: 3 X-DOI: 10.1080/14751790600577256 File-URL: http://hdl.handle.net/10.1080/14751790600577256 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:95-99 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: On Setting Priorities for International Security Journal: Defense & Security Analysis Pages: 101-102 Issue: 1 Volume: 22 Year: 2006 Month: 3 X-DOI: 10.1080/14751790600577272 File-URL: http://hdl.handle.net/10.1080/14751790600577272 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:101-102 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 105-110 Issue: 2 Volume: 22 Year: 2006 Month: 6 X-DOI: 10.1080/14751790600763963 File-URL: http://hdl.handle.net/10.1080/14751790600763963 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:105-110 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: A clear and present danger to international security: Highly Pathogenic Avian Influenza Journal: Defense & Security Analysis Pages: 111-121 Issue: 2 Volume: 22 Year: 2006 Month: 6 X-DOI: 10.1080/14751790600763989 File-URL: http://hdl.handle.net/10.1080/14751790600763989 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:111-121 Template-Type: ReDIF-Article 1.0 Author-Name: Raymond E. Franck Author-X-Name-First: Raymond E. Author-X-Name-Last: Franck Author-Name: Terry C. Pierce Author-X-Name-First: Terry C. Author-X-Name-Last: Pierce Title: Disruptive military innovation and the War on Terror: Some thoughts for perfect opponents Journal: Defense & Security Analysis Pages: 123-140 Issue: 2 Volume: 22 Year: 2006 Month: 6 X-DOI: 10.1080/14751790600763997 File-URL: http://hdl.handle.net/10.1080/14751790600763997 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:123-140 Template-Type: ReDIF-Article 1.0 Author-Name: James Devine Author-X-Name-First: James Author-X-Name-Last: Devine Author-Name: Julian Schofield Author-X-Name-First: Julian Author-X-Name-Last: Schofield Title: Coercive counter-proliferation and escalation: Assessing the Iran military option Journal: Defense & Security Analysis Pages: 141-157 Issue: 2 Volume: 22 Year: 2006 Month: 6 X-DOI: 10.1080/14751790600764029 File-URL: http://hdl.handle.net/10.1080/14751790600764029 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:141-157 Template-Type: ReDIF-Article 1.0 Author-Name: Vladimir Prebilič Author-X-Name-First: Vladimir Author-X-Name-Last: Prebilič Title: Theoretical aspects of military logistics Journal: Defense & Security Analysis Pages: 159-177 Issue: 2 Volume: 22 Year: 2006 Month: 6 X-DOI: 10.1080/14751790600764037 File-URL: http://hdl.handle.net/10.1080/14751790600764037 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:159-177 Template-Type: ReDIF-Article 1.0 Author-Name: Francois Melese Author-X-Name-First: Francois Author-X-Name-Last: Melese Author-Name: Jim Airola Author-X-Name-First: Jim Author-X-Name-Last: Airola Title: Managing defense infrastructure: The case of military housing Journal: Defense & Security Analysis Pages: 179-189 Issue: 2 Volume: 22 Year: 2006 Month: 6 X-DOI: 10.1080/14751790600764052 File-URL: http://hdl.handle.net/10.1080/14751790600764052 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:179-189 Template-Type: ReDIF-Article 1.0 Author-Name: Wu Yue Author-X-Name-First: Wu Author-X-Name-Last: Yue Title: US foreign and national security policies: An explanation based on theoretical approaches Journal: Defense & Security Analysis Pages: 191-196 Issue: 2 Volume: 22 Year: 2006 Month: 6 X-DOI: 10.1080/14751790600775462 File-URL: http://hdl.handle.net/10.1080/14751790600775462 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:191-196 Template-Type: ReDIF-Article 1.0 Author-Name: Caroline Croser Author-X-Name-First: Caroline Author-X-Name-Last: Croser Title: Commanding the future: Command and control in a networked environment Journal: Defense & Security Analysis Pages: 197-202 Issue: 2 Volume: 22 Year: 2006 Month: 6 X-DOI: 10.1080/14751790600775470 File-URL: http://hdl.handle.net/10.1080/14751790600775470 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:197-202 Template-Type: ReDIF-Article 1.0 Author-Name: David Barchard Author-X-Name-First: David Author-X-Name-Last: Barchard Title: Dipping a toe in the Black Sea Journal: Defense & Security Analysis Pages: 203-206 Issue: 2 Volume: 22 Year: 2006 Month: 6 X-DOI: 10.1080/14751790600775504 File-URL: http://hdl.handle.net/10.1080/14751790600775504 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:203-206 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 215-219 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600933814 File-URL: http://hdl.handle.net/10.1080/14751790600933814 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:215-219 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: Strategic Reassurance in a Proliferation-Permissive orld: American and Russian Options Journal: Defense & Security Analysis Pages: 221-239 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600933830 File-URL: http://hdl.handle.net/10.1080/14751790600933830 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:221-239 Template-Type: ReDIF-Article 1.0 Author-Name: Ta-Chen Cheng Author-X-Name-First: Ta-Chen Author-X-Name-Last: Cheng Title: The Evolution of China's Strategic Nuclear Weapons Journal: Defense & Security Analysis Pages: 241-260 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600933863 File-URL: http://hdl.handle.net/10.1080/14751790600933863 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:241-260 Template-Type: ReDIF-Article 1.0 Author-Name: Nazery Khalid Author-X-Name-First: Nazery Author-X-Name-Last: Khalid Title: Too Much of a Good Thing? Some Reflections on Increased Security and its Costs* Abstract: Security is like oxygen — you tend not to notice it until you begin to lose it, but once that occurs there is nothing else you will think about. Journal: Defense & Security Analysis Pages: 261-273 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600933871 File-URL: http://hdl.handle.net/10.1080/14751790600933871 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:261-273 Template-Type: ReDIF-Article 1.0 Author-Name: Michael A. Mcnerney Author-X-Name-First: Michael A. Author-X-Name-Last: Mcnerney Author-Name: Marshall V. Ecklund Author-X-Name-First: Marshall V. Author-X-Name-Last: Ecklund Title: Exploiting the Potential of Informal Networks in the Middle East for Conducting Non-conventional Assisted Recovery Journal: Defense & Security Analysis Pages: 275-299 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600933897 File-URL: http://hdl.handle.net/10.1080/14751790600933897 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:275-299 Template-Type: ReDIF-Article 1.0 Author-Name: Joseph R. Laracy Author-X-Name-First: Joseph R. Author-X-Name-Last: Laracy Title: A Systems Theoretic Accident Model Applied to Biodefense Journal: Defense & Security Analysis Pages: 301-310 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600933905 File-URL: http://hdl.handle.net/10.1080/14751790600933905 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:301-310 Template-Type: ReDIF-Article 1.0 Author-Name: Owen Kopon Author-X-Name-First: Owen Author-X-Name-Last: Kopon Title: Avian Influenza: Effects of an Epidemic Journal: Defense & Security Analysis Pages: 311-314 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600933921 File-URL: http://hdl.handle.net/10.1080/14751790600933921 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:311-314 Template-Type: ReDIF-Article 1.0 Author-Name: Jason Cooley Author-X-Name-First: Jason Author-X-Name-Last: Cooley Title: The War on Terrorism and the Need for Altercasting Journal: Defense & Security Analysis Pages: 315-323 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600933939 File-URL: http://hdl.handle.net/10.1080/14751790600933939 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:315-323 Template-Type: ReDIF-Article 1.0 Author-Name: Scott Woods Author-X-Name-First: Scott Author-X-Name-Last: Woods Title: Analysis of the US-India Nuclear Deal Journal: Defense & Security Analysis Pages: 325-328 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600933970 File-URL: http://hdl.handle.net/10.1080/14751790600933970 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:325-328 Template-Type: ReDIF-Article 1.0 Author-Name: Terence Mcnamee Author-X-Name-First: Terence Author-X-Name-Last: Mcnamee Author-Name: Greg Mills Author-X-Name-First: Greg Author-X-Name-Last: Mills Title: Denuclearizing a Regime: What South Africa's Nuclear Rollback Might Tell Us About Iran Journal: Defense & Security Analysis Pages: 329-335 Issue: 3 Volume: 22 Year: 2006 Month: 9 X-DOI: 10.1080/14751790600934002 File-URL: http://hdl.handle.net/10.1080/14751790600934002 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:329-335 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew Rosenstein Author-X-Name-First: Matthew Author-X-Name-Last: Rosenstein Title: Editorial Journal: Defense & Security Analysis Pages: 345-351 Issue: 4 Volume: 22 Year: 2006 Month: 12 X-DOI: 10.1080/14751790601104159 File-URL: http://hdl.handle.net/10.1080/14751790601104159 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:345-351 Template-Type: ReDIF-Article 1.0 Author-Name: Anupam Srivastava Author-X-Name-First: Anupam Author-X-Name-Last: Srivastava Author-Name: Seema Gahlaut Author-X-Name-First: Seema Author-X-Name-Last: Gahlaut Title: The New Energy in the US--India Relationship Journal: Defense & Security Analysis Pages: 353-372 Issue: 4 Volume: 22 Year: 2006 Month: 12 X-DOI: 10.1080/14751790601104209 File-URL: http://hdl.handle.net/10.1080/14751790601104209 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:353-372 Template-Type: ReDIF-Article 1.0 Author-Name: Jeffrey S. Lantis Author-X-Name-First: Jeffrey S. Author-X-Name-Last: Lantis Title: America's Nuclear Addiction Journal: Defense & Security Analysis Pages: 373-385 Issue: 4 Volume: 22 Year: 2006 Month: 12 X-DOI: 10.1080/14751790601104241 File-URL: http://hdl.handle.net/10.1080/14751790601104241 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:373-385 Template-Type: ReDIF-Article 1.0 Author-Name: Rizwan Zeb Author-X-Name-First: Rizwan Author-X-Name-Last: Zeb Title: David Versus Goliath? Pakistan'sNuclear Doctrine: Motivations, Principles and Future* Journal: Defense & Security Analysis Pages: 387-408 Issue: 4 Volume: 22 Year: 2006 Month: 12 X-DOI: 10.1080/14751790601104316 File-URL: http://hdl.handle.net/10.1080/14751790601104316 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:387-408 Template-Type: ReDIF-Article 1.0 Author-Name: Rifaat Hussain Author-X-Name-First: Rifaat Author-X-Name-Last: Hussain Title: The India--Pakistan Peace Process Journal: Defense & Security Analysis Pages: 409-419 Issue: 4 Volume: 22 Year: 2006 Month: 12 X-DOI: 10.1080/14751790601104357 File-URL: http://hdl.handle.net/10.1080/14751790601104357 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:409-419 Template-Type: ReDIF-Article 1.0 Author-Name: Jaideep Saikia Author-X-Name-First: Jaideep Author-X-Name-Last: Saikia Title: Quest for a Chindian Arc: Leadership in the Asian Century Journal: Defense & Security Analysis Pages: 421-434 Issue: 4 Volume: 22 Year: 2006 Month: 12 X-DOI: 10.1080/14751790601104431 File-URL: http://hdl.handle.net/10.1080/14751790601104431 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:421-434 Template-Type: ReDIF-Article 1.0 Author-Name: P. V. Ramana Author-X-Name-First: P. V. Author-X-Name-Last: Ramana Title: The Maoist Movement in India Journal: Defense & Security Analysis Pages: 435-449 Issue: 4 Volume: 22 Year: 2006 Month: 12 X-DOI: 10.1080/14751790601104464 File-URL: http://hdl.handle.net/10.1080/14751790601104464 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:435-449 Template-Type: ReDIF-Article 1.0 Author-Name: Swarna Rajagopalan Author-X-Name-First: Swarna Author-X-Name-Last: Rajagopalan Title: Silver Linings: Natural Disasters, International Relations and Political Change in South Asia, 2004--5 Journal: Defense & Security Analysis Pages: 451-468 Issue: 4 Volume: 22 Year: 2006 Month: 12 X-DOI: 10.1080/14751790601104506 File-URL: http://hdl.handle.net/10.1080/14751790601104506 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:451-468 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 1-5 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254417 File-URL: http://hdl.handle.net/10.1080/14751790701254417 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:1-5 Template-Type: ReDIF-Article 1.0 Author-Name: Emma Sky Author-X-Name-First: Emma Author-X-Name-Last: Sky Title: Increasing ISAF's Impact on Stability in Afghanistan Journal: Defense & Security Analysis Pages: 7-25 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254425 File-URL: http://hdl.handle.net/10.1080/14751790701254425 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:7-25 Template-Type: ReDIF-Article 1.0 Author-Name: J. Stone Author-X-Name-First: J. Author-X-Name-Last: Stone Title: Technology and War: A Trinitarian Analysis Journal: Defense & Security Analysis Pages: 27-40 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254441 File-URL: http://hdl.handle.net/10.1080/14751790701254441 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:27-40 Template-Type: ReDIF-Article 1.0 Author-Name: Bill Park Author-X-Name-First: Bill Author-X-Name-Last: Park Title: US—Turkish Relations: Can the Future Resemble the Past? Journal: Defense & Security Analysis Pages: 41-54 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254466 File-URL: http://hdl.handle.net/10.1080/14751790701254466 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:41-54 Template-Type: ReDIF-Article 1.0 Author-Name: Terry Moon Author-X-Name-First: Terry Author-X-Name-Last: Moon Title: Net-centric or Networked Military Operations? Journal: Defense & Security Analysis Pages: 55-67 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254474 File-URL: http://hdl.handle.net/10.1080/14751790701254474 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:55-67 Template-Type: ReDIF-Article 1.0 Author-Name: Robert Daniel Wallace Author-X-Name-First: Robert Author-X-Name-Last: Daniel Wallace Title: The Two-China Crisis: Background, Implications and Outcomes Journal: Defense & Security Analysis Pages: 69-85 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254482 File-URL: http://hdl.handle.net/10.1080/14751790701254482 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:69-85 Template-Type: ReDIF-Article 1.0 Author-Name: David R. Henderson Author-X-Name-First: David R. Author-X-Name-Last: Henderson Title: The Economics of War and Foreign Policy: What's Missing? Journal: Defense & Security Analysis Pages: 87-100 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254524 File-URL: http://hdl.handle.net/10.1080/14751790701254524 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:87-100 Template-Type: ReDIF-Article 1.0 Author-Name: Greg Mills Author-X-Name-First: Greg Author-X-Name-Last: Mills Author-Name: Terence Mcnamee Author-X-Name-First: Terence Author-X-Name-Last: Mcnamee Title: God, History and Countering Insurgency Journal: Defense & Security Analysis Pages: 101-106 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254573 File-URL: http://hdl.handle.net/10.1080/14751790701254573 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:101-106 Template-Type: ReDIF-Article 1.0 Author-Name: Dan Fayutkin Author-X-Name-First: Dan Author-X-Name-Last: Fayutkin Title: The Officer's Academic Training Options and His Preparation for Fighting in the Limited Conflict Area Journal: Defense & Security Analysis Pages: 107-114 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254607 File-URL: http://hdl.handle.net/10.1080/14751790701254607 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:107-114 Template-Type: ReDIF-Article 1.0 Author-Name: David R. Bowne Author-X-Name-First: David R. Author-X-Name-Last: Bowne Title: Is the Insurgency Growing? A Novel Analysis of the Spatial and Temporal Dynamics of the Iraqi Insurgency Journal: Defense & Security Analysis Pages: 115-118 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254649 File-URL: http://hdl.handle.net/10.1080/14751790701254649 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:115-118 Template-Type: ReDIF-Article 1.0 Author-Name: Shima Keene Author-X-Name-First: Shima Author-X-Name-Last: Keene Title: Book Review Journal: Defense & Security Analysis Pages: 119-122 Issue: 1 Volume: 23 Year: 2007 Month: 3 X-DOI: 10.1080/14751790701254664 File-URL: http://hdl.handle.net/10.1080/14751790701254664 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:119-122 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew Dorman Author-X-Name-First: Andrew Author-X-Name-Last: Dorman Author-Name: Matthew Uttley Author-X-Name-First: Matthew Author-X-Name-Last: Uttley Title: Editorial Journal: Defense & Security Analysis Pages: 125-126 Issue: 2 Volume: 23 Year: 2007 Month: 6 X-DOI: 10.1080/14751790701424689 File-URL: http://hdl.handle.net/10.1080/14751790701424689 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:125-126 Template-Type: ReDIF-Article 1.0 Author-Name: Colin McInnes Author-X-Name-First: Colin Author-X-Name-Last: McInnes Title: The British Army's New Way in Warfare: A Doctrinal Misstep? Journal: Defense & Security Analysis Pages: 127-141 Issue: 2 Volume: 23 Year: 2007 Month: 6 X-DOI: 10.1080/14751790701424697 File-URL: http://hdl.handle.net/10.1080/14751790701424697 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:127-141 Template-Type: ReDIF-Article 1.0 Author-Name: Huw Bennett Author-X-Name-First: Huw Author-X-Name-Last: Bennett Title: The Mau Mau Emergency as Part of the British Army's Post-War Counter-Insurgency Experience Journal: Defense & Security Analysis Pages: 143-163 Issue: 2 Volume: 23 Year: 2007 Month: 6 X-DOI: 10.1080/14751790701424705 File-URL: http://hdl.handle.net/10.1080/14751790701424705 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:143-163 Template-Type: ReDIF-Article 1.0 Author-Name: Christopher Tuck Author-X-Name-First: Christopher Author-X-Name-Last: Tuck Title: Northern Ireland and the British Approach to Counter-Insurgency Journal: Defense & Security Analysis Pages: 165-183 Issue: 2 Volume: 23 Year: 2007 Month: 6 X-DOI: 10.1080/14751790701424721 File-URL: http://hdl.handle.net/10.1080/14751790701424721 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:165-183 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew Dorman Author-X-Name-First: Andrew Author-X-Name-Last: Dorman Title: The British Experience of Low-Intensity Conflict in Sierra Leone Journal: Defense & Security Analysis Pages: 185-200 Issue: 2 Volume: 23 Year: 2007 Month: 6 X-DOI: 10.1080/14751790701424754 File-URL: http://hdl.handle.net/10.1080/14751790701424754 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:185-200 Template-Type: ReDIF-Article 1.0 Author-Name: Warren Chin Author-X-Name-First: Warren Author-X-Name-Last: Chin Title: British Counter-Insurgency in Afghanistan Journal: Defense & Security Analysis Pages: 201-225 Issue: 2 Volume: 23 Year: 2007 Month: 6 X-DOI: 10.1080/14751790701424762 File-URL: http://hdl.handle.net/10.1080/14751790701424762 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:201-225 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas G. Mahnken Author-X-Name-First: Thomas G. Author-X-Name-Last: Mahnken Title: The British Approach to Counter-Insurgency: An American View Journal: Defense & Security Analysis Pages: 227-232 Issue: 2 Volume: 23 Year: 2007 Month: 6 X-DOI: 10.1080/14751790701424770 File-URL: http://hdl.handle.net/10.1080/14751790701424770 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:227-232 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 233-235 Issue: 3 Volume: 23 Year: 2007 Month: 9 X-DOI: 10.1080/14751790701573840 File-URL: http://hdl.handle.net/10.1080/14751790701573840 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:233-235 Template-Type: ReDIF-Article 1.0 Author-Name: Edward Ifft Author-X-Name-First: Edward Author-X-Name-Last: Ifft Title: Deterrence, Blackmail, Friendly Persuasion Journal: Defense & Security Analysis Pages: 237-256 Issue: 3 Volume: 23 Year: 2007 Month: 9 X-DOI: 10.1080/14751790701573865 File-URL: http://hdl.handle.net/10.1080/14751790701573865 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:237-256 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: Russia's Evolving Strategic Nuclear Deterrent Journal: Defense & Security Analysis Pages: 257-279 Issue: 3 Volume: 23 Year: 2007 Month: 9 X-DOI: 10.1080/14751790701573873 File-URL: http://hdl.handle.net/10.1080/14751790701573873 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:257-279 Template-Type: ReDIF-Article 1.0 Author-Name: James R. Holmes Author-X-Name-First: James R. Author-X-Name-Last: Holmes Author-Name: Andrew C. Winner1 Author-X-Name-First: Andrew C. Author-X-Name-Last: Winner1 Title: The Proliferation Security Initiative: A Global Prohibition Regime in the Making? Journal: Defense & Security Analysis Pages: 281-295 Issue: 3 Volume: 23 Year: 2007 Month: 9 X-DOI: 10.1080/14751790701573881 File-URL: http://hdl.handle.net/10.1080/14751790701573881 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:281-295 Template-Type: ReDIF-Article 1.0 Author-Name: Tiran Rothman Author-X-Name-First: Tiran Author-X-Name-Last: Rothman Title: A State's Choice: Nuclear Policy in a Changing World Between Libya and North Korea Journal: Defense & Security Analysis Pages: 297-313 Issue: 3 Volume: 23 Year: 2007 Month: 9 X-DOI: 10.1080/14751790701573899 File-URL: http://hdl.handle.net/10.1080/14751790701573899 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:297-313 Template-Type: ReDIF-Article 1.0 Author-Name: Shaun Gregory Author-X-Name-First: Shaun Author-X-Name-Last: Gregory Title: Nuclear Command and Control in Pakistan Journal: Defense & Security Analysis Pages: 315-330 Issue: 3 Volume: 23 Year: 2007 Month: 9 X-DOI: 10.1080/14751790701573907 File-URL: http://hdl.handle.net/10.1080/14751790701573907 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:315-330 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew S. Duchene Author-X-Name-First: Matthew S. Author-X-Name-Last: Duchene Title: What If: A Perspective on the Iranian Nuclear Weapon Journal: Defense & Security Analysis Pages: 331-334 Issue: 3 Volume: 23 Year: 2007 Month: 9 X-DOI: 10.1080/14751790701573915 File-URL: http://hdl.handle.net/10.1080/14751790701573915 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:331-334 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 341-344 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752386 File-URL: http://hdl.handle.net/10.1080/14751790701752386 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:341-344 Template-Type: ReDIF-Article 1.0 Author-Name: Erica Chenoweth Author-X-Name-First: Erica Author-X-Name-Last: Chenoweth Author-Name: Elizabeth Lowham Author-X-Name-First: Elizabeth Author-X-Name-Last: Lowham Title: On Classifying Terrorism: A Potential Contribution of Cluster Analysis for Academics and Policy-makers Journal: Defense & Security Analysis Pages: 345-357 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752402 File-URL: http://hdl.handle.net/10.1080/14751790701752402 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:345-357 Template-Type: ReDIF-Article 1.0 Author-Name: Amy (Wenxuan) Ding Author-X-Name-First: Amy (Wenxuan) Author-X-Name-Last: Ding Title: A Mathematical Approach to Limit Illegal Border-Crossings -- with Application in Protecting Critical Infrastructure Abstract: The grand aim of all science is to cover the greatest number of empirical facts by logical deduction from the smallest number of hypotheses or axioms. Albert Einstein Current problem: Border Emergency Solutions in response US Congress's response: Set immigration policies, a series of immigration reform bills and proposals. Government's response: Make an appropriation/budget for border issues: increase law enforcement personnel and needed resources, pay officers overtime, and build fences along the border. Scientists' response: Describe this complex problem mathematically and provide scientific solutions. Journal: Defense & Security Analysis Pages: 359-377 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752410 File-URL: http://hdl.handle.net/10.1080/14751790701752410 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:359-377 Template-Type: ReDIF-Article 1.0 Author-Name: Svetoslav Gaidow* Author-X-Name-First: Svetoslav Author-X-Name-Last: Gaidow* Title: Quest for Credibility: Australian Defence Risk Management Framework Journal: Defense & Security Analysis Pages: 379-387 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752428 File-URL: http://hdl.handle.net/10.1080/14751790701752428 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:379-387 Template-Type: ReDIF-Article 1.0 Author-Name: Shih-Yueh Yang Author-X-Name-First: Shih-Yueh Author-X-Name-Last: Yang Author-Name: William C. Vocke Author-X-Name-First: William C. Author-X-Name-Last: Vocke Title: US Army Transformation: Where is the Future? Journal: Defense & Security Analysis Pages: 389-403 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752436 File-URL: http://hdl.handle.net/10.1080/14751790701752436 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:389-403 Template-Type: ReDIF-Article 1.0 Author-Name: Sean M. Maloney Author-X-Name-First: Sean M. Author-X-Name-Last: Maloney Title: Blood on the Ground: Canada and the Southern Campaign in Afghanistan Abstract: For the Americans, it's no longer just “boots on the ground”: it's blood on the ground that counts. Joel J. Sokolsky Journal: Defense & Security Analysis Pages: 405-417 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752444 File-URL: http://hdl.handle.net/10.1080/14751790701752444 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:405-417 Template-Type: ReDIF-Article 1.0 Author-Name: Manjeet S. Pardesi Author-X-Name-First: Manjeet S. Author-X-Name-Last: Pardesi Author-Name: Ron Matthews Author-X-Name-First: Ron Author-X-Name-Last: Matthews Title: India's Tortuous Road to Defence-Industrial Self-Reliance Abstract: …Rapid indigenisation is the cornerstone of our policy of self-reliance India MoD Annual Report 1978--9 Journal: Defense & Security Analysis Pages: 419-438 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752451 File-URL: http://hdl.handle.net/10.1080/14751790701752451 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:419-438 Template-Type: ReDIF-Article 1.0 Author-Name: Dmitri Vertkin Author-X-Name-First: Dmitri Author-X-Name-Last: Vertkin Title: Kazakhstan and Islam Journal: Defense & Security Analysis Pages: 439-440 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752469 File-URL: http://hdl.handle.net/10.1080/14751790701752469 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:439-440 Template-Type: ReDIF-Article 1.0 Author-Name: H. F. De Wet Author-X-Name-First: H. F. Author-X-Name-Last: De Wet Title: Economics and Security Studies: Is the South African Military Academy Still on Track? Journal: Defense & Security Analysis Pages: 441-447 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752477 File-URL: http://hdl.handle.net/10.1080/14751790701752477 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:441-447 Template-Type: ReDIF-Article 1.0 Author-Name: Shima Keene Author-X-Name-First: Shima Author-X-Name-Last: Keene Title: Book Review Journal: Defense & Security Analysis Pages: 449-453 Issue: 4 Volume: 23 Year: 2007 Month: 12 X-DOI: 10.1080/14751790701752485 File-URL: http://hdl.handle.net/10.1080/14751790701752485 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:449-453 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 1-3 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903145 File-URL: http://hdl.handle.net/10.1080/14751790801903145 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:1-3 Template-Type: ReDIF-Article 1.0 Author-Name: Terry Moon Author-X-Name-First: Terry Author-X-Name-Last: Moon Author-Name: Suzanne Fewell Author-X-Name-First: Suzanne Author-X-Name-Last: Fewell Author-Name: Hayley Reynolds Author-X-Name-First: Hayley Author-X-Name-Last: Reynolds Title: The What, Why, When and How of Interoperability Journal: Defense & Security Analysis Pages: 5-17 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903178 File-URL: http://hdl.handle.net/10.1080/14751790801903178 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:5-17 Template-Type: ReDIF-Article 1.0 Author-Name: David McCraw Author-X-Name-First: David Author-X-Name-Last: McCraw Title: New Zealand's Defence Policy: From Realism to Idealism? Journal: Defense & Security Analysis Pages: 19-32 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903194 File-URL: http://hdl.handle.net/10.1080/14751790801903194 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:19-32 Template-Type: ReDIF-Article 1.0 Author-Name: Harsh V. Pant* Author-X-Name-First: Harsh V. Author-X-Name-Last: Pant* Title: China in Africa: The Push Continues But All's Not Well Journal: Defense & Security Analysis Pages: 33-43 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903202 File-URL: http://hdl.handle.net/10.1080/14751790801903202 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:33-43 Template-Type: ReDIF-Article 1.0 Author-Name: Robert L. Feldman Author-X-Name-First: Robert L. Author-X-Name-Last: Feldman Title: Why Uganda Has Failed to Defeat the Lord's Resistance Army Journal: Defense & Security Analysis Pages: 45-52 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903210 File-URL: http://hdl.handle.net/10.1080/14751790801903210 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:45-52 Template-Type: ReDIF-Article 1.0 Author-Name: Heinz Gärtner Author-X-Name-First: Heinz Author-X-Name-Last: Gärtner Title: The Wassenaar Arrangement (WA): How it is Broken and Needs to be Fixed Journal: Defense & Security Analysis Pages: 53-60 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903236 File-URL: http://hdl.handle.net/10.1080/14751790801903236 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:53-60 Template-Type: ReDIF-Article 1.0 Author-Name: Jason E. Strakes Author-X-Name-First: Jason E. Author-X-Name-Last: Strakes Title: Illicit Arms Transfers: Linking Weapons Characteristics and Strategic Applications Journal: Defense & Security Analysis Pages: 61-64 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903244 File-URL: http://hdl.handle.net/10.1080/14751790801903244 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:61-64 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew Kowalski Author-X-Name-First: Matthew Author-X-Name-Last: Kowalski Title: Global Insurgency or Global Confrontation? Counter-insurgency Doctrine and the “‘Long’ War” on Terrorism Journal: Defense & Security Analysis Pages: 65-71 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903251 File-URL: http://hdl.handle.net/10.1080/14751790801903251 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:65-71 Template-Type: ReDIF-Article 1.0 Author-Name: Mark Fitzpatrick Author-X-Name-First: Mark Author-X-Name-Last: Fitzpatrick Title: Non-Proliferation and Counter‐Proliferation: What is the Difference?* Abstract: * An earlier version of this paper was presented at an April 26, 2007 international NATO advanced research workshop on “Priorities in Nuclear Arms Control and Non-Proliferation: Comparing and Tuning Approaches of Russia and the West” held at the International Federation for Peace and Conciliation, Moscow. Journal: Defense & Security Analysis Pages: 73-79 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903327 File-URL: http://hdl.handle.net/10.1080/14751790801903327 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:73-79 Template-Type: ReDIF-Article 1.0 Author-Name: Group Captain Neville Parton Author-X-Name-First: Author-X-Name-Last: Group Captain Neville Parton Title: In Defence of Doctrine…But Not Dogma Journal: Defense & Security Analysis Pages: 81-89 Issue: 1 Volume: 24 Year: 2008 Month: 3 X-DOI: 10.1080/14751790801903335 File-URL: http://hdl.handle.net/10.1080/14751790801903335 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:81-89 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 101-105 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802124915 File-URL: http://hdl.handle.net/10.1080/14751790802124915 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:101-105 Template-Type: ReDIF-Article 1.0 Author-Name: Raymond Franck Author-X-Name-First: Raymond Author-X-Name-Last: Franck Author-Name: Francois Melese Author-X-Name-First: Francois Author-X-Name-Last: Melese Title: Defense Acquisition: New Insights from Transaction Cost Economics* Abstract: * We are grateful to the editors of this journal, participants at the RAND sessions of theWestern Economic Association meetings, and colleagues at the Naval Postgraduate School for many helpful comments and suggestions.We would specifically like to thank our colleagues Dr Keith Snyder, John Dillard and Admiral James Greene of the Graduate School of Business and Public Policy for research sponsorship and for organizing a yearly Acquisition Research Symposium where we were invited to present this work. The usual disclaimers apply. Journal: Defense & Security Analysis Pages: 107-128 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802124931 File-URL: http://hdl.handle.net/10.1080/14751790802124931 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:107-128 Template-Type: ReDIF-Article 1.0 Author-Name: Simen A. Ellingsen Author-X-Name-First: Simen A. Author-X-Name-Last: Ellingsen Title: Safeguards Against Nuclear Terrorism: HEU vs Plutonium Journal: Defense & Security Analysis Pages: 129-146 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802124949 File-URL: http://hdl.handle.net/10.1080/14751790802124949 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:129-146 Template-Type: ReDIF-Article 1.0 Author-Name: James Nathan Author-X-Name-First: James Author-X-Name-Last: Nathan Title: The Retreat fromWestphalia: Iraq and the “Shadow of Power” Journal: Defense & Security Analysis Pages: 147-164 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802124956 File-URL: http://hdl.handle.net/10.1080/14751790802124956 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:147-164 Template-Type: ReDIF-Article 1.0 Author-Name: Christos Kassimeris Author-X-Name-First: Christos Author-X-Name-Last: Kassimeris Title: NATO and the Aegean Disputes Journal: Defense & Security Analysis Pages: 165-179 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802124964 File-URL: http://hdl.handle.net/10.1080/14751790802124964 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:165-179 Template-Type: ReDIF-Article 1.0 Author-Name: Charles Kirke Author-X-Name-First: Charles Author-X-Name-Last: Kirke Title: Issues in Integrating Territorial Army Soldiers into Regular British Units for Operations: A Regular View Journal: Defense & Security Analysis Pages: 181-195 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802124980 File-URL: http://hdl.handle.net/10.1080/14751790802124980 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:181-195 Template-Type: ReDIF-Article 1.0 Author-Name: Jacques Aben Author-X-Name-First: Jacques Author-X-Name-Last: Aben Title: The New French Military Reserve and the Test of Overseas Operations Journal: Defense & Security Analysis Pages: 197-202 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802124998 File-URL: http://hdl.handle.net/10.1080/14751790802124998 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:197-202 Template-Type: ReDIF-Article 1.0 Author-Name: Victoria Samson Author-X-Name-First: Victoria Author-X-Name-Last: Samson Title: Spiraling Out of Control: How Missile Defense's Acquisition Strategy is Setting a Dangerous Precedent Journal: Defense & Security Analysis Pages: 203-211 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802125011 File-URL: http://hdl.handle.net/10.1080/14751790802125011 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:203-211 Template-Type: ReDIF-Article 1.0 Author-Name: Dan Fayutkin Author-X-Name-First: Dan Author-X-Name-Last: Fayutkin Title: The Second Lebanon War: A One‐Year Perspective Journal: Defense & Security Analysis Pages: 213-216 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802125029 File-URL: http://hdl.handle.net/10.1080/14751790802125029 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:213-216 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: More on Avian Influenza A/H5N1 Threats in Light of Recent Statistics Journal: Defense & Security Analysis Pages: 217-224 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802125037 File-URL: http://hdl.handle.net/10.1080/14751790802125037 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:217-224 Template-Type: ReDIF-Article 1.0 Author-Name: Simon Reay Atkinson Author-X-Name-First: Simon Reay Author-X-Name-Last: Atkinson Author-Name: Jairo Lugo Author-X-Name-First: Jairo Author-X-Name-Last: Lugo Title: Book Reviews Journal: Defense & Security Analysis Pages: 225-230 Issue: 2 Volume: 24 Year: 2008 Month: 6 X-DOI: 10.1080/14751790802125045 File-URL: http://hdl.handle.net/10.1080/14751790802125045 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:225-230 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 233-236 Issue: 3 Volume: 24 Year: 2008 Month: 9 X-DOI: 10.1080/14751790802320976 File-URL: http://hdl.handle.net/10.1080/14751790802320976 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:233-236 Template-Type: ReDIF-Article 1.0 Author-Name: Gawdat Bahgat Author-X-Name-First: Gawdat Author-X-Name-Last: Bahgat Title: Security in the Persian Gulf: Two Conflicting Models Journal: Defense & Security Analysis Pages: 237-245 Issue: 3 Volume: 24 Year: 2008 Month: 9 X-DOI: 10.1080/14751790802321313 File-URL: http://hdl.handle.net/10.1080/14751790802321313 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:237-245 Template-Type: ReDIF-Article 1.0 Author-Name: Bao Nguyen Author-X-Name-First: Bao Author-X-Name-Last: Nguyen Author-Name: David Hopkin Author-X-Name-First: David Author-X-Name-Last: Hopkin Author-Name: Handson Yip Author-X-Name-First: Handson Author-X-Name-Last: Yip Title: Autonomous Underwater Vehicles: A Transformation in Mine Counter‐Measure Operations Journal: Defense & Security Analysis Pages: 247-266 Issue: 3 Volume: 24 Year: 2008 Month: 9 X-DOI: 10.1080/14751790802321321 File-URL: http://hdl.handle.net/10.1080/14751790802321321 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:247-266 Template-Type: ReDIF-Article 1.0 Author-Name: Major Robert L. Feldman Author-X-Name-First: Major Robert L. Author-X-Name-Last: Feldman Title: Problems Plaguing the African Union Peacekeeping Forces Journal: Defense & Security Analysis Pages: 267-279 Issue: 3 Volume: 24 Year: 2008 Month: 9 X-DOI: 10.1080/14751790802321388 File-URL: http://hdl.handle.net/10.1080/14751790802321388 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:267-279 Template-Type: ReDIF-Article 1.0 Author-Name: James Igoe Walsh Author-X-Name-First: James Igoe Author-X-Name-Last: Walsh Title: Intelligence Sharing for Counter‐Insurgency Journal: Defense & Security Analysis Pages: 281-301 Issue: 3 Volume: 24 Year: 2008 Month: 9 X-DOI: 10.1080/14751790802321396 File-URL: http://hdl.handle.net/10.1080/14751790802321396 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:281-301 Template-Type: ReDIF-Article 1.0 Author-Name: Kieran Webb Author-X-Name-First: Kieran Author-X-Name-Last: Webb Title: Strategic Bombardment and Kosovo: Evidence from the Boer War Journal: Defense & Security Analysis Pages: 303-315 Issue: 3 Volume: 24 Year: 2008 Month: 9 X-DOI: 10.1080/14751790802321412 File-URL: http://hdl.handle.net/10.1080/14751790802321412 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:303-315 Template-Type: ReDIF-Article 1.0 Author-Name: Jason Cooley Author-X-Name-First: Jason Author-X-Name-Last: Cooley Title: Which Moderates are More Important? Journal: Defense & Security Analysis Pages: 317-324 Issue: 3 Volume: 24 Year: 2008 Month: 9 X-DOI: 10.1080/14751790802321420 File-URL: http://hdl.handle.net/10.1080/14751790802321420 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:317-324 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: On Setting Priorities for International Security II: Economic and Security Implications of Natural Disasters Journal: Defense & Security Analysis Pages: 325-327 Issue: 3 Volume: 24 Year: 2008 Month: 9 X-DOI: 10.1080/14751790802321446 File-URL: http://hdl.handle.net/10.1080/14751790802321446 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:325-327 Template-Type: ReDIF-Article 1.0 Author-Name: David Whetham Author-X-Name-First: David Author-X-Name-Last: Whetham Title: Editorial Journal: Defense & Security Analysis Pages: 341-344 Issue: 4 Volume: 24 Year: 2008 Month: 12 X-DOI: 10.1080/14751790802569119 File-URL: http://hdl.handle.net/10.1080/14751790802569119 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:341-344 Template-Type: ReDIF-Article 1.0 Author-Name: John Kiszely Author-X-Name-First: John Author-X-Name-Last: Kiszely Title: Introduction Journal: Defense & Security Analysis Pages: 345-347 Issue: 4 Volume: 24 Year: 2008 Month: 12 X-DOI: 10.1080/14751790802569127 File-URL: http://hdl.handle.net/10.1080/14751790802569127 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:345-347 Template-Type: ReDIF-Article 1.0 Author-Name: Martin L. Cook Author-X-Name-First: Martin L. Author-X-Name-Last: Cook Title: A Force for (Relative) Good: An Augustinian Persepective Journal: Defense & Security Analysis Pages: 349-361 Issue: 4 Volume: 24 Year: 2008 Month: 12 X-DOI: 10.1080/14751790802569135 File-URL: http://hdl.handle.net/10.1080/14751790802569135 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:349-361 Template-Type: ReDIF-Article 1.0 Author-Name: Robert Wilton Author-X-Name-First: Robert Author-X-Name-Last: Wilton Title: The Beginning and the End of Humanitarian Intervention: Kosovo 1999 Journal: Defense & Security Analysis Pages: 363-380 Issue: 4 Volume: 24 Year: 2008 Month: 12 X-DOI: 10.1080/14751790802569150 File-URL: http://hdl.handle.net/10.1080/14751790802569150 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:363-380 Template-Type: ReDIF-Article 1.0 Author-Name: Paul Robinson Author-X-Name-First: Paul Author-X-Name-Last: Robinson Title: Why it is Time to Stop Being a “Force for Good” Journal: Defense & Security Analysis Pages: 381-391 Issue: 4 Volume: 24 Year: 2008 Month: 12 X-DOI: 10.1080/14751790802569168 File-URL: http://hdl.handle.net/10.1080/14751790802569168 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:381-391 Template-Type: ReDIF-Article 1.0 Author-Name: Mervyn Frost Author-X-Name-First: Mervyn Author-X-Name-Last: Frost Title: The Ethical Imperatives of Foreign and Defence Policy Journal: Defense & Security Analysis Pages: 393-400 Issue: 4 Volume: 24 Year: 2008 Month: 12 X-DOI: 10.1080/14751790802569184 File-URL: http://hdl.handle.net/10.1080/14751790802569184 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:393-400 Template-Type: ReDIF-Article 1.0 Author-Name: Rachel Kerr Author-X-Name-First: Rachel Author-X-Name-Last: Kerr Title: A Force for Good? War, Crime and Legitimacy: The British Army in Iraq Journal: Defense & Security Analysis Pages: 401-419 Issue: 4 Volume: 24 Year: 2008 Month: 12 X-DOI: 10.1080/14751790802569200 File-URL: http://hdl.handle.net/10.1080/14751790802569200 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:401-419 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 1-5 Issue: 1 Volume: 25 Year: 2009 Month: 3 X-DOI: 10.1080/14751790902749868 File-URL: http://hdl.handle.net/10.1080/14751790902749868 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:1-5 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Shubik Author-X-Name-First: Martin Author-X-Name-Last: Shubik Author-Name: Aaron Zelinsky Author-X-Name-First: Aaron Author-X-Name-Last: Zelinsky Title: Terrorism Damage Exchange Rates: Quantifying Defender Disadvantage Journal: Defense & Security Analysis Pages: 7-20 Issue: 1 Volume: 25 Year: 2009 Month: 3 X-DOI: 10.1080/14751790902749876 File-URL: http://hdl.handle.net/10.1080/14751790902749876 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:7-20 Template-Type: ReDIF-Article 1.0 Author-Name: Tim Benbow Author-X-Name-First: Tim Author-X-Name-Last: Benbow Title: Irresistible Force or Immoveable Object? The “Revolution in Military Affairs” and Asymmetric Warfare Journal: Defense & Security Analysis Pages: 21-36 Issue: 1 Volume: 25 Year: 2009 Month: 3 X-DOI: 10.1080/14751790902749884 File-URL: http://hdl.handle.net/10.1080/14751790902749884 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:21-36 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen D. Unwin Author-X-Name-First: Stephen D. Author-X-Name-Last: Unwin Author-Name: Barbara A. Fecht Author-X-Name-First: Barbara A. Author-X-Name-Last: Fecht Title: Consumer Choice and Dempster-Shafer Models of Threat Prioritization for Emerging Dual-Use Technologies: Their Application to Synthetic Biology Journal: Defense & Security Analysis Pages: 37-52 Issue: 1 Volume: 25 Year: 2009 Month: 3 X-DOI: 10.1080/14751790902749892 File-URL: http://hdl.handle.net/10.1080/14751790902749892 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:37-52 Template-Type: ReDIF-Article 1.0 Author-Name: Yi Yue Author-X-Name-First: Yi Author-X-Name-Last: Yue Author-Name: Michael Henshaw Author-X-Name-First: Michael Author-X-Name-Last: Henshaw Title: An Holistic View of UK Military Capability Development☆ Journal: Defense & Security Analysis Pages: 53-67 Issue: 1 Volume: 25 Year: 2009 Month: 3 X-DOI: 10.1080/14751790902749900 File-URL: http://hdl.handle.net/10.1080/14751790902749900 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:53-67 Template-Type: ReDIF-Article 1.0 Author-Name: Kevin Y.K. Ng Author-X-Name-First: Kevin Y.K. Author-X-Name-Last: Ng Author-Name: M. Natalie Lam Author-X-Name-First: M. Natalie Author-X-Name-Last: Lam Title: The Canadian Forces' Information and Intelligence Fusion Center: A Preliminary Capacity Planning Study-super-1 Journal: Defense & Security Analysis Pages: 69-79 Issue: 1 Volume: 25 Year: 2009 Month: 3 X-DOI: 10.1080/14751790902749918 File-URL: http://hdl.handle.net/10.1080/14751790902749918 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:69-79 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: Moral Dynamics andMilitary Operations Journal: Defense & Security Analysis Pages: 81-88 Issue: 1 Volume: 25 Year: 2009 Month: 3 X-DOI: 10.1080/14751790902749926 File-URL: http://hdl.handle.net/10.1080/14751790902749926 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:81-88 Template-Type: ReDIF-Article 1.0 Author-Name: Hugo L. E. Meijer Author-X-Name-First: Hugo L. E. Author-X-Name-Last: Meijer Title: Reflections on Politics, Strategy and Norms in Outer Space Journal: Defense & Security Analysis Pages: 89-98 Issue: 1 Volume: 25 Year: 2009 Month: 3 X-DOI: 10.1080/14751790902749942 File-URL: http://hdl.handle.net/10.1080/14751790902749942 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:89-98 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 99-104 Issue: 2 Volume: 25 Year: 2009 Month: 6 X-DOI: 10.1080/14751790902983582 File-URL: http://hdl.handle.net/10.1080/14751790902983582 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:99-104 Template-Type: ReDIF-Article 1.0 Author-Name: Claire Metelits Author-X-Name-First: Claire Author-X-Name-Last: Metelits Title: The Logic of Change: Pushing the Boundaries of Insurgent Behavior Theory-super-1 Journal: Defense & Security Analysis Pages: 105-118 Issue: 2 Volume: 25 Year: 2009 Month: 6 X-DOI: 10.1080/14751790902983590 File-URL: http://hdl.handle.net/10.1080/14751790902983590 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:105-118 Template-Type: ReDIF-Article 1.0 Author-Name: M. J.F. Healy Author-X-Name-First: M. J.F. Author-X-Name-Last: Healy Author-Name: K. Weston Author-X-Name-First: K. Author-X-Name-Last: Weston Author-Name: M. Romilly Author-X-Name-First: M. Author-X-Name-Last: Romilly Author-Name: K. Arbuthnot Author-X-Name-First: K. Author-X-Name-Last: Arbuthnot Title: A Model to Support CBRN Defence Journal: Defense & Security Analysis Pages: 119-135 Issue: 2 Volume: 25 Year: 2009 Month: 6 X-DOI: 10.1080/14751790902985157 File-URL: http://hdl.handle.net/10.1080/14751790902985157 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:119-135 Template-Type: ReDIF-Article 1.0 Author-Name: P. N. Ram Kumar Author-X-Name-First: P. N. Author-X-Name-Last: Ram Kumar Author-Name: T. T. Narendran Author-X-Name-First: T. T. Author-X-Name-Last: Narendran Title: A Mathematical Approach for Variable Speed Convoy Movement Problem(CMP) Journal: Defense & Security Analysis Pages: 137-155 Issue: 2 Volume: 25 Year: 2009 Month: 6 X-DOI: 10.1080/14751790902985165 File-URL: http://hdl.handle.net/10.1080/14751790902985165 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:137-155 Template-Type: ReDIF-Article 1.0 Author-Name: Gregory Levitin Author-X-Name-First: Gregory Author-X-Name-Last: Levitin Author-Name: Kjell Hausken Author-X-Name-First: Kjell Author-X-Name-Last: Hausken Title: Intelligence and Impact Contests in Systems with Fake Targets Journal: Defense & Security Analysis Pages: 157-173 Issue: 2 Volume: 25 Year: 2009 Month: 6 X-DOI: 10.1080/14751790902985181 File-URL: http://hdl.handle.net/10.1080/14751790902985181 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:157-173 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: US Strategic Nuclear Arms Control: Campaign Echoes and Obama's Options Journal: Defense & Security Analysis Pages: 175-192 Issue: 2 Volume: 25 Year: 2009 Month: 6 X-DOI: 10.1080/14751790902985207 File-URL: http://hdl.handle.net/10.1080/14751790902985207 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:175-192 Template-Type: ReDIF-Article 1.0 Author-Name: Lamont Colucci Author-X-Name-First: Lamont Author-X-Name-Last: Colucci Title: The Bush Doctrine and the Anglo-American Special Relationship Journal: Defense & Security Analysis Pages: 193-200 Issue: 2 Volume: 25 Year: 2009 Month: 6 X-DOI: 10.1080/14751790902985215 File-URL: http://hdl.handle.net/10.1080/14751790902985215 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:193-200 Template-Type: ReDIF-Article 1.0 Author-Name: Dan Fayutkin Author-X-Name-First: Dan Author-X-Name-Last: Fayutkin Title: The Second Lebanon War -- A Two-Year Perspective Journal: Defense & Security Analysis Pages: 201-204 Issue: 2 Volume: 25 Year: 2009 Month: 6 X-DOI: 10.1080/14751790902985231 File-URL: http://hdl.handle.net/10.1080/14751790902985231 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:201-204 Template-Type: ReDIF-Article 1.0 Author-Name: Daniel Rosenfield Author-X-Name-First: Daniel Author-X-Name-Last: Rosenfield Title: National Missile Defense Journal: Defense & Security Analysis Pages: 205-213 Issue: 2 Volume: 25 Year: 2009 Month: 6 X-DOI: 10.1080/14751790902985256 File-URL: http://hdl.handle.net/10.1080/14751790902985256 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:205-213 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 217-222 Issue: 3 Volume: 25 Year: 2009 Month: 9 X-DOI: 10.1080/14751790903201372 File-URL: http://hdl.handle.net/10.1080/14751790903201372 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:217-222 Template-Type: ReDIF-Article 1.0 Author-Name: James Kraska Author-X-Name-First: James Author-X-Name-Last: Kraska Author-Name: Brian Wilson Author-X-Name-First: Brian Author-X-Name-Last: Wilson Title: The Global Maritime Partnership and Somali Piracy Journal: Defense & Security Analysis Pages: 223-234 Issue: 3 Volume: 25 Year: 2009 Month: 9 X-DOI: 10.1080/14751790903201380 File-URL: http://hdl.handle.net/10.1080/14751790903201380 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:223-234 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew J. Enterline Author-X-Name-First: Andrew J. Author-X-Name-Last: Enterline Author-Name: J. Michael Greig Author-X-Name-First: J. Michael Author-X-Name-Last: Greig Author-Name: Yoav Gortzak Author-X-Name-First: Yoav Author-X-Name-Last: Gortzak Title: Testing Shinseki: Speed, Mass and Insurgency in Post-war Iraq Journal: Defense & Security Analysis Pages: 235-253 Issue: 3 Volume: 25 Year: 2009 Month: 9 X-DOI: 10.1080/14751790903201398 File-URL: http://hdl.handle.net/10.1080/14751790903201398 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:235-253 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas C. Bruneau Author-X-Name-First: Thomas C. Author-X-Name-Last: Bruneau Author-Name: Florina Cristiana (Cris) Matei Author-X-Name-First: Florina Cristiana (Cris) Author-X-Name-Last: Matei Author-Name: Sak Sakoda Author-X-Name-First: Sak Author-X-Name-Last: Sakoda Title: National Security Councils: Their Potential Functions in Democratic Civil-Military Relations Journal: Defense & Security Analysis Pages: 255-269 Issue: 3 Volume: 25 Year: 2009 Month: 9 X-DOI: 10.1080/14751790903201406 File-URL: http://hdl.handle.net/10.1080/14751790903201406 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:255-269 Template-Type: ReDIF-Article 1.0 Author-Name: Benjamin Armstrong Author-X-Name-First: Benjamin Author-X-Name-Last: Armstrong Title: Precision Approaches: Leadership Targeting and the Helicopter as a Strategic Strike Asset in Small Wars Journal: Defense & Security Analysis Pages: 271-284 Issue: 3 Volume: 25 Year: 2009 Month: 9 X-DOI: 10.1080/14751790903201414 File-URL: http://hdl.handle.net/10.1080/14751790903201414 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:271-284 Template-Type: ReDIF-Article 1.0 Author-Name: Jomana Amara Author-X-Name-First: Jomana Author-X-Name-Last: Amara Author-Name: Ann Hendricks Author-X-Name-First: Ann Author-X-Name-Last: Hendricks Title: Healthcare Issues of the Iraq and Afghan Wars: Short- and Long-term Impacts on US Veterans' Healthcare -super-1 Journal: Defense & Security Analysis Pages: 285-298 Issue: 3 Volume: 25 Year: 2009 Month: 9 X-DOI: 10.1080/14751790903201422 File-URL: http://hdl.handle.net/10.1080/14751790903201422 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:285-298 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Pandemic Scope and Severity of Novel Influenza A/H1N1 (Swine Flu) Journal: Defense & Security Analysis Pages: 299-304 Issue: 3 Volume: 25 Year: 2009 Month: 9 X-DOI: 10.1080/14751790903201430 File-URL: http://hdl.handle.net/10.1080/14751790903201430 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:299-304 Template-Type: ReDIF-Article 1.0 Author-Name: David Mugridge Author-X-Name-First: David Author-X-Name-Last: Mugridge Title: Malaise or Farce - The International Failure of Maritime Security Journal: Defense & Security Analysis Pages: 305-311 Issue: 3 Volume: 25 Year: 2009 Month: 9 X-DOI: 10.1080/14751790903201448 File-URL: http://hdl.handle.net/10.1080/14751790903201448 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:305-311 Template-Type: ReDIF-Article 1.0 Author-Name: James Dingley Author-X-Name-First: James Author-X-Name-Last: Dingley Author-Name: Shima Keene Author-X-Name-First: Shima Author-X-Name-Last: Keene Author-Name: Michael Smith Author-X-Name-First: Michael Author-X-Name-Last: Smith Author-Name: David Pinder Author-X-Name-First: David Author-X-Name-Last: Pinder Title: Book Reviews Journal: Defense & Security Analysis Pages: 313-320 Issue: 3 Volume: 25 Year: 2009 Month: 9 X-DOI: 10.1080/14751790903201455 File-URL: http://hdl.handle.net/10.1080/14751790903201455 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:313-320 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 325-329 Issue: 4 Volume: 25 Year: 2009 Month: 12 X-DOI: 10.1080/14751790903416681 File-URL: http://hdl.handle.net/10.1080/14751790903416681 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:325-329 Template-Type: ReDIF-Article 1.0 Author-Name: James A. Nathan Author-X-Name-First: James A. Author-X-Name-Last: Nathan Title: Poppy Blues: The Collapse of Poppy Eradication and the Road Ahead in Afghanistan Journal: Defense & Security Analysis Pages: 331-353 Issue: 4 Volume: 25 Year: 2009 Month: 12 X-DOI: 10.1080/14751790903416699 File-URL: http://hdl.handle.net/10.1080/14751790903416699 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:331-353 Template-Type: ReDIF-Article 1.0 Author-Name: Robert L. Feldman Author-X-Name-First: Robert L. Author-X-Name-Last: Feldman Title: The Root Causes of Terrorism: Why Parts of Africa Might Never Be at Peace Journal: Defense & Security Analysis Pages: 355-372 Issue: 4 Volume: 25 Year: 2009 Month: 12 X-DOI: 10.1080/14751790903416707 File-URL: http://hdl.handle.net/10.1080/14751790903416707 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:355-372 Template-Type: ReDIF-Article 1.0 Author-Name: Nicholas Kerton-Johnson Author-X-Name-First: Nicholas Author-X-Name-Last: Kerton-Johnson Title: Justifying War in the Post-Cold War Era: Shifting Norms of International Society? Journal: Defense & Security Analysis Pages: 373-392 Issue: 4 Volume: 25 Year: 2009 Month: 12 X-DOI: 10.1080/14751790903416715 File-URL: http://hdl.handle.net/10.1080/14751790903416715 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:373-392 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: North Korea and Nuclear Danger: Context and Policy Options Journal: Defense & Security Analysis Pages: 393-412 Issue: 4 Volume: 25 Year: 2009 Month: 12 X-DOI: 10.1080/14751790903416723 File-URL: http://hdl.handle.net/10.1080/14751790903416723 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:393-412 Template-Type: ReDIF-Article 1.0 Author-Name: P. K. Gautam Author-X-Name-First: P. K. Author-X-Name-Last: Gautam Title: Ways of Warfare and Strategic Culture Journal: Defense & Security Analysis Pages: 413-423 Issue: 4 Volume: 25 Year: 2009 Month: 12 X-DOI: 10.1080/14751790903416731 File-URL: http://hdl.handle.net/10.1080/14751790903416731 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:413-423 Template-Type: ReDIF-Article 1.0 Author-Name: Loro Horta Author-X-Name-First: Loro Author-X-Name-Last: Horta Title: A Brave New World: China Embraces the Caribbean Journal: Defense & Security Analysis Pages: 425-432 Issue: 4 Volume: 25 Year: 2009 Month: 12 X-DOI: 10.1080/14751790903416749 File-URL: http://hdl.handle.net/10.1080/14751790903416749 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:425-432 Template-Type: ReDIF-Article 1.0 Author-Name: Bart R. Smedts Author-X-Name-First: Bart R. Author-X-Name-Last: Smedts Title: The Sword of Damocles: An Everlasting Bio-Threat? Journal: Defense & Security Analysis Pages: 433-442 Issue: 4 Volume: 25 Year: 2009 Month: 12 X-DOI: 10.1080/14751790903416756 File-URL: http://hdl.handle.net/10.1080/14751790903416756 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:433-442 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 1-10 Issue: 1 Volume: 26 Year: 2010 Month: 3 X-DOI: 10.1080/14751791003658552 File-URL: http://hdl.handle.net/10.1080/14751791003658552 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:1-10 Template-Type: ReDIF-Article 1.0 Author-Name: John A. Gentry Author-X-Name-First: John A. Author-X-Name-Last: Gentry Title: Norms as Weapons of War Journal: Defense & Security Analysis Pages: 11-30 Issue: 1 Volume: 26 Year: 2010 Month: 3 X-DOI: 10.1080/14751791003658560 File-URL: http://hdl.handle.net/10.1080/14751791003658560 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:11-30 Template-Type: ReDIF-Article 1.0 Author-Name: Charles-Philippe David Author-X-Name-First: Charles-Philippe Author-X-Name-Last: David Title: How Not to do Post-invasion: Lessons Learned from US Decision-making in Iraq (2002--2008) Journal: Defense & Security Analysis Pages: 31-63 Issue: 1 Volume: 26 Year: 2010 Month: 3 X-DOI: 10.1080/14751791003658578 File-URL: http://hdl.handle.net/10.1080/14751791003658578 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:31-63 Template-Type: ReDIF-Article 1.0 Author-Name: Jomana Amara Author-X-Name-First: Jomana Author-X-Name-Last: Amara Author-Name: Robert M. McNab Author-X-Name-First: Robert M. Author-X-Name-Last: McNab Title: Is Iraq Different?: An Examination of Whether Civilian Fatalities Adhere to the “Law of War” in the 2003--2008 Iraq Conflict Journal: Defense & Security Analysis Pages: 65-80 Issue: 1 Volume: 26 Year: 2010 Month: 3 X-DOI: 10.1080/14751791003658586 File-URL: http://hdl.handle.net/10.1080/14751791003658586 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:65-80 Template-Type: ReDIF-Article 1.0 Author-Name: Travis Sharp Author-X-Name-First: Travis Author-X-Name-Last: Sharp Title: The US Defense Acquisition Workforce Since the Cold War Journal: Defense & Security Analysis Pages: 81-98 Issue: 1 Volume: 26 Year: 2010 Month: 3 X-DOI: 10.1080/14751791003658594 File-URL: http://hdl.handle.net/10.1080/14751791003658594 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:81-98 Template-Type: ReDIF-Article 1.0 Author-Name: W. Brian Howieson Author-X-Name-First: W. Brian Author-X-Name-Last: Howieson Title: The Leadership Behaviors of Senior Engineering Officers in the Royal Air Force Journal: Defense & Security Analysis Pages: 99-106 Issue: 1 Volume: 26 Year: 2010 Month: 3 X-DOI: 10.1080/14751791003658602 File-URL: http://hdl.handle.net/10.1080/14751791003658602 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:99-106 Template-Type: ReDIF-Article 1.0 Author-Name: David Mugridge Author-X-Name-First: David Author-X-Name-Last: Mugridge Title: Canadian Maritime Hubris: The Absence of a Future Maritime Security Strategy (FMSS) Journal: Defense & Security Analysis Pages: 107-115 Issue: 1 Volume: 26 Year: 2010 Month: 3 X-DOI: 10.1080/14751791003658610 File-URL: http://hdl.handle.net/10.1080/14751791003658610 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:107-115 Template-Type: ReDIF-Article 1.0 Author-Name: Shima Keene Author-X-Name-First: Shima Author-X-Name-Last: Keene Author-Name: Graham Edmonds Author-X-Name-First: Graham Author-X-Name-Last: Edmonds Title: Book Reviews Journal: Defense & Security Analysis Pages: 117-120 Issue: 1 Volume: 26 Year: 2010 Month: 3 X-DOI: 10.1080/14751791003658628 File-URL: http://hdl.handle.net/10.1080/14751791003658628 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:117-120 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 125-128 Issue: 2 Volume: 26 Year: 2010 Month: 6 X-DOI: 10.1080/14751798.2010.488854 File-URL: http://hdl.handle.net/10.1080/14751798.2010.488854 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:125-128 Template-Type: ReDIF-Article 1.0 Author-Name: Gregory D. Foster Author-X-Name-First: Gregory D. Author-X-Name-Last: Foster Title: Transforming US National Security: A Call for Strategic Idealism Journal: Defense & Security Analysis Pages: 129-142 Issue: 2 Volume: 26 Year: 2010 Month: 6 X-DOI: 10.1080/14751798.2010.488855 File-URL: http://hdl.handle.net/10.1080/14751798.2010.488855 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:129-142 Template-Type: ReDIF-Article 1.0 Author-Name: Charles Kirke Author-X-Name-First: Charles Author-X-Name-Last: Kirke Title: Military Cohesion, Culture and Social Psychology Journal: Defense & Security Analysis Pages: 143-159 Issue: 2 Volume: 26 Year: 2010 Month: 6 X-DOI: 10.1080/14751798.2010.488856 File-URL: http://hdl.handle.net/10.1080/14751798.2010.488856 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:143-159 Template-Type: ReDIF-Article 1.0 Author-Name: Natalie J. Webb Author-X-Name-First: Natalie J. Author-X-Name-Last: Webb Author-Name: Anke Richter Author-X-Name-First: Anke Author-X-Name-Last: Richter Title: Strategy at the Crossroads: Medical Humanitarian Assistance Missions for Navy Hospital Ships Journal: Defense & Security Analysis Pages: 161-179 Issue: 2 Volume: 26 Year: 2010 Month: 6 X-DOI: 10.1080/14751798.2010.488857 File-URL: http://hdl.handle.net/10.1080/14751798.2010.488857 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:161-179 Template-Type: ReDIF-Article 1.0 Author-Name: Peter Berck Author-X-Name-First: Peter Author-X-Name-Last: Berck Author-Name: Jonathan Lipow Author-X-Name-First: Jonathan Author-X-Name-Last: Lipow Title: Did Monetary Forces Help Turn the Tide in Iraq? Journal: Defense & Security Analysis Pages: 181-188 Issue: 2 Volume: 26 Year: 2010 Month: 6 X-DOI: 10.1080/14751798.2010.503100 File-URL: http://hdl.handle.net/10.1080/14751798.2010.503100 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:181-188 Template-Type: ReDIF-Article 1.0 Author-Name: Amy Wenxuan Ding Author-X-Name-First: Amy Wenxuan Author-X-Name-Last: Ding Title: A Tactical Campaign at the Horn of Africa: Deploy Unmanned Surface Vehicles for Maritime Security Journal: Defense & Security Analysis Pages: 189-211 Issue: 2 Volume: 26 Year: 2010 Month: 6 X-DOI: 10.1080/14751798.2010.488859 File-URL: http://hdl.handle.net/10.1080/14751798.2010.488859 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:189-211 Template-Type: ReDIF-Article 1.0 Author-Name: Erik Lin-Greenberg Author-X-Name-First: Erik Author-X-Name-Last: Lin-Greenberg Title: Dragon Boats: Assessing China's Anti-Piracy Operations in the Gulf of Aden Journal: Defense & Security Analysis Pages: 213-230 Issue: 2 Volume: 26 Year: 2010 Month: 6 X-DOI: 10.1080/14751798.2010.488867 File-URL: http://hdl.handle.net/10.1080/14751798.2010.488867 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:213-230 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Author-Name: John G. Allen Author-X-Name-First: John G. Author-X-Name-Last: Allen Author-Name: James Higgs Author-X-Name-First: James Author-X-Name-Last: Higgs Title: Book Reviews Journal: Defense & Security Analysis Pages: 231-235 Issue: 2 Volume: 26 Year: 2010 Month: 6 X-DOI: 10.1080/14751798.2010.488868 File-URL: http://hdl.handle.net/10.1080/14751798.2010.488868 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:231-235 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 239-242 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516540 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516540 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:239-242 Template-Type: ReDIF-Article 1.0 Author-Name: Allan Orr Author-X-Name-First: Allan Author-X-Name-Last: Orr Title: The Artful Dodger: On Pakistan, Reality Bites Journal: Defense & Security Analysis Pages: 243-260 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516541 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516541 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:243-260 Template-Type: ReDIF-Article 1.0 Author-Name: Peter J. Phillips Author-X-Name-First: Peter J. Author-X-Name-Last: Phillips Title: The Randomization of Terrorist Attacks Abstract: The purpose of this article is to explore the economic theoretical foundations of the idea that rational terrorist organizations deliberately randomize their attacks (by type, timing, location, and targets) to generate uncertainty and intimidation. A choice theoretic framework is applied to the analysis of the terrorist organization's behavior to determine whether welfare (utility) gains from the randomization of terrorist attacks are plausible and feasible. The randomization of attacks can appear to promise higher amounts of political influence for each resource input but it turns out that randomization cannot manufacture a situation where higher amounts of political influence are obtained for each resource input.The results imply that, rather than randomization and instability, the rational terrorist organization is more likely to prefer stability. The findings and implications provide a theoretical explanation for the non-randomness of terrorist attacks.Thismay be one small step towards explaining the patterns -- non-randomness -- in the time-series of terrorist incidents. Journal: Defense & Security Analysis Pages: 261-272 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516542 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516542 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:261-272 Template-Type: ReDIF-Article 1.0 Author-Name: Jeffrey A. McNeil Author-X-Name-First: Jeffrey A. Author-X-Name-Last: McNeil Title: A Cognitive Approach to COIN: Countering Dangerous Beliefs Journal: Defense & Security Analysis Pages: 273-288 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516543 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516543 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:273-288 Template-Type: ReDIF-Article 1.0 Author-Name: James A. Nathan Author-X-Name-First: James A. Author-X-Name-Last: Nathan Author-Name: Charles Tien Author-X-Name-First: Charles Author-X-Name-Last: Tien Title: Casualties and Threats: Conditions of Support for War Journal: Defense & Security Analysis Pages: 289-304 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516544 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516544 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:289-304 Template-Type: ReDIF-Article 1.0 Author-Name: Dmitry Shlapentokh Author-X-Name-First: Dmitry Author-X-Name-Last: Shlapentokh Title: Gulf States/Saudi Arabia and Russia's Approach to Iran: Similarities and Differences Journal: Defense & Security Analysis Pages: 305-319 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516545 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516545 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:305-319 Template-Type: ReDIF-Article 1.0 Author-Name: Tamir Libel Author-X-Name-First: Tamir Author-X-Name-Last: Libel Title: IDF Operational-Level Doctrine and Education During the 1990s Journal: Defense & Security Analysis Pages: 321-324 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516547 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516547 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:321-324 Template-Type: ReDIF-Article 1.0 Author-Name: Heinz Gärtner Author-X-Name-First: Heinz Author-X-Name-Last: Gärtner Title: Non-Proliferation and Engagement: Iran and North Korea Should Not Let the Opportunity Slip By Journal: Defense & Security Analysis Pages: 325-330 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516548 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516548 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:325-330 Template-Type: ReDIF-Article 1.0 Author-Name: Cédric Laguerre Author-X-Name-First: Cédric Author-X-Name-Last: Laguerre Author-Name: Marc De Vore Author-X-Name-First: Marc Author-X-Name-Last: De Vore Title: F-35: Price and Prejudice Journal: Defense & Security Analysis Pages: 331-333 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516549 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516549 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:331-333 Template-Type: ReDIF-Article 1.0 Author-Name: Rick “Ozzie” Nelson Author-X-Name-First: Rick Author-X-Name-Last: “Ozzie” Nelson Author-Name: Ben Bodurian Author-X-Name-First: Ben Author-X-Name-Last: Bodurian Title: Academia and Policy: Enhancing Co-operation; Increasing Understanding Journal: Defense & Security Analysis Pages: 335-341 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516551 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516551 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:335-341 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: Book Reviews Journal: Defense & Security Analysis Pages: 343-345 Issue: 3 Volume: 26 Year: 2010 Month: 9 X-DOI: 10.1080/14751798.2010.516553 File-URL: http://hdl.handle.net/10.1080/14751798.2010.516553 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:343-345 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 349-351 Issue: 4 Volume: 26 Year: 2010 Month: 12 X-DOI: 10.1080/14751798.2010.534644 File-URL: http://hdl.handle.net/10.1080/14751798.2010.534644 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:349-351 Template-Type: ReDIF-Article 1.0 Author-Name: Simen A. Ellingsen Author-X-Name-First: Simen A. Author-X-Name-Last: Ellingsen Title: Deliberations of a Nuclear Terrorist: Patience or Opportunism? Journal: Defense & Security Analysis Pages: 353-369 Issue: 4 Volume: 26 Year: 2010 Month: 12 X-DOI: 10.1080/14751798.2010.534645 File-URL: http://hdl.handle.net/10.1080/14751798.2010.534645 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:353-369 Template-Type: ReDIF-Article 1.0 Author-Name: Cathy Downes Author-X-Name-First: Cathy Author-X-Name-Last: Downes Title: Unintentional Militarism: Over-reliance on Military Methods and Mindsets in US National Security and its Consequences Journal: Defense & Security Analysis Pages: 371-385 Issue: 4 Volume: 26 Year: 2010 Month: 12 X-DOI: 10.1080/14751798.2010.534646 File-URL: http://hdl.handle.net/10.1080/14751798.2010.534646 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:371-385 Template-Type: ReDIF-Article 1.0 Author-Name: Natalie J. Webb Author-X-Name-First: Natalie J. Author-X-Name-Last: Webb Author-Name: Anke Richter Author-X-Name-First: Anke Author-X-Name-Last: Richter Author-Name: Donald Bonsper Author-X-Name-First: Donald Author-X-Name-Last: Bonsper Title: Linking Defense Planning and Resource Decisions: A Return to Systems Thinking Journal: Defense & Security Analysis Pages: 387-400 Issue: 4 Volume: 26 Year: 2010 Month: 12 X-DOI: 10.1080/14751798.2010.534647 File-URL: http://hdl.handle.net/10.1080/14751798.2010.534647 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:387-400 Template-Type: ReDIF-Article 1.0 Author-Name: Julien Malizard Author-X-Name-First: Julien Author-X-Name-Last: Malizard Title: Causality Between Economic Growth and Military Expenditure: The Case of France Journal: Defense & Security Analysis Pages: 401-413 Issue: 4 Volume: 26 Year: 2010 Month: 12 X-DOI: 10.1080/14751798.2010.534648 File-URL: http://hdl.handle.net/10.1080/14751798.2010.534648 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:401-413 Template-Type: ReDIF-Article 1.0 Author-Name: Håkon Lunde Saxi Author-X-Name-First: Håkon Lunde Author-X-Name-Last: Saxi Title: Defending Small States: Norwegian and Danish Defense Policies in the Post-Cold War Era Journal: Defense & Security Analysis Pages: 415-430 Issue: 4 Volume: 26 Year: 2010 Month: 12 X-DOI: 10.1080/14751798.2010.534649 File-URL: http://hdl.handle.net/10.1080/14751798.2010.534649 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:415-430 Template-Type: ReDIF-Article 1.0 Author-Name: Amitai Etzioni Author-X-Name-First: Amitai Author-X-Name-Last: Etzioni Title: Rational Actors: Neither Mad nor M.A.D.: The Meanings of Rationality, Rogue States and Terrorists Journal: Defense & Security Analysis Pages: 431-438 Issue: 4 Volume: 26 Year: 2010 Month: 12 X-DOI: 10.1080/14751798.2010.534650 File-URL: http://hdl.handle.net/10.1080/14751798.2010.534650 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:431-438 Template-Type: ReDIF-Article 1.0 Author-Name: Simon Reay Atkinson Author-X-Name-First: Simon Reay Author-X-Name-Last: Atkinson Title: Book Reviews Journal: Defense & Security Analysis Pages: 439-440 Issue: 4 Volume: 26 Year: 2010 Month: 12 X-DOI: 10.1080/14751798.2010.534651 File-URL: http://hdl.handle.net/10.1080/14751798.2010.534651 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:439-440 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew Dorman Author-X-Name-First: Andrew Author-X-Name-Last: Dorman Author-Name: David Hastings Dunn Author-X-Name-First: David Author-X-Name-Last: Hastings Dunn Title: Introduction and Editorial Journal: Defense & Security Analysis Pages: 1-4 Issue: 1 Volume: 27 Year: 2011 Month: 3 X-DOI: 10.1080/14751798.2011.557208 File-URL: http://hdl.handle.net/10.1080/14751798.2011.557208 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:1-4 Template-Type: ReDIF-Article 1.0 Author-Name: David Hastings Dunn Author-X-Name-First: David Author-X-Name-Last: Hastings Dunn Title: UK--US Relations After the Three Bs -- Blair, Brown and Bush Journal: Defense & Security Analysis Pages: 5-18 Issue: 1 Volume: 27 Year: 2011 Month: 3 X-DOI: 10.1080/14751798.2011.557210 File-URL: http://hdl.handle.net/10.1080/14751798.2011.557210 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:5-18 Template-Type: ReDIF-Article 1.0 Author-Name: Robert Dover Author-X-Name-First: Robert Author-X-Name-Last: Dover Title: Britain, Europe and Defense in the Post-Industrial Age Journal: Defense & Security Analysis Pages: 19-30 Issue: 1 Volume: 27 Year: 2011 Month: 3 X-DOI: 10.1080/14751798.2011.557211 File-URL: http://hdl.handle.net/10.1080/14751798.2011.557211 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:19-30 Template-Type: ReDIF-Article 1.0 Author-Name: Wyn Rees Author-X-Name-First: Wyn Author-X-Name-Last: Rees Title: Britain and the Wider World Journal: Defense & Security Analysis Pages: 31-41 Issue: 1 Volume: 27 Year: 2011 Month: 3 X-DOI: 10.1080/14751798.2011.557212 File-URL: http://hdl.handle.net/10.1080/14751798.2011.557212 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:31-41 Template-Type: ReDIF-Article 1.0 Author-Name: Helen McCartney Author-X-Name-First: Helen Author-X-Name-Last: McCartney Title: Hero, Victimor Villain? The Public Image of the British Soldier and its Implications for Defense Policy Journal: Defense & Security Analysis Pages: 43-54 Issue: 1 Volume: 27 Year: 2011 Month: 3 X-DOI: 10.1080/14751798.2011.557213 File-URL: http://hdl.handle.net/10.1080/14751798.2011.557213 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:43-54 Template-Type: ReDIF-Article 1.0 Author-Name: Anthony Forster Author-X-Name-First: Anthony Author-X-Name-Last: Forster Title: The Military, War and the State: Testing Authority, Jurisdiction, Allegiance and Obedience Journal: Defense & Security Analysis Pages: 55-64 Issue: 1 Volume: 27 Year: 2011 Month: 3 X-DOI: 10.1080/14751798.2011.557215 File-URL: http://hdl.handle.net/10.1080/14751798.2011.557215 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:55-64 Template-Type: ReDIF-Article 1.0 Author-Name: Warren Chin Author-X-Name-First: Warren Author-X-Name-Last: Chin Title: British Defense Policy and the War in Iraq 2003--2009 Journal: Defense & Security Analysis Pages: 65-76 Issue: 1 Volume: 27 Year: 2011 Month: 3 X-DOI: 10.1080/14751798.2011.557216 File-URL: http://hdl.handle.net/10.1080/14751798.2011.557216 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:65-76 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew M. Dorman Author-X-Name-First: Andrew M. Author-X-Name-Last: Dorman Title: Making 2+2=5: The 2010 Strategic Defence and Security Review Journal: Defense & Security Analysis Pages: 77-87 Issue: 1 Volume: 27 Year: 2011 Month: 3 X-DOI: 10.1080/14751798.2011.557218 File-URL: http://hdl.handle.net/10.1080/14751798.2011.557218 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:77-87 Template-Type: ReDIF-Article 1.0 Author-Name: Christopher Clapham Author-X-Name-First: Christopher Author-X-Name-Last: Clapham Author-Name: Mamun Ahmed Author-X-Name-First: Mamun Author-X-Name-Last: Ahmed Author-Name: Michael Shrimpton Author-X-Name-First: Michael Author-X-Name-Last: Shrimpton Title: Book Reviews Journal: Defense & Security Analysis Pages: 89-93 Issue: 1 Volume: 27 Year: 2011 Month: 3 X-DOI: 10.1080/14751798.2011.557219 File-URL: http://hdl.handle.net/10.1080/14751798.2011.557219 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:89-93 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 97-99 Issue: 2 Volume: 27 Year: 2011 Month: 6 X-DOI: 10.1080/14751798.2011.578714 File-URL: http://hdl.handle.net/10.1080/14751798.2011.578714 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:97-99 Template-Type: ReDIF-Article 1.0 Author-Name: Uzi Ben-Shalom Author-X-Name-First: Uzi Author-X-Name-Last: Ben-Shalom Author-Name: Eitan Shamir Author-X-Name-First: Eitan Author-X-Name-Last: Shamir Title: Mission Command Between Theory and Practice: The Case of the IDF Journal: Defense & Security Analysis Pages: 101-117 Issue: 2 Volume: 27 Year: 2011 Month: 6 X-DOI: 10.1080/14751798.2011.578715 File-URL: http://hdl.handle.net/10.1080/14751798.2011.578715 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:101-117 Template-Type: ReDIF-Article 1.0 Author-Name: Elena Irina Neaga Author-X-Name-First: Elena Irina Author-X-Name-Last: Neaga Author-Name: Michael Henshaw Author-X-Name-First: Michael Author-X-Name-Last: Henshaw Title: A Stakeholder-Based Analysis of the Benefits of Network Enabled Capability Journal: Defense & Security Analysis Pages: 119-134 Issue: 2 Volume: 27 Year: 2011 Month: 6 X-DOI: 10.1080/14751798.2011.578716 File-URL: http://hdl.handle.net/10.1080/14751798.2011.578716 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:119-134 Template-Type: ReDIF-Article 1.0 Author-Name: Lora Weiss Author-X-Name-First: Lora Author-X-Name-Last: Weiss Author-Name: Elizabeth Whitaker Author-X-Name-First: Elizabeth Author-X-Name-Last: Whitaker Author-Name: Erica Briscoe Author-X-Name-First: Erica Author-X-Name-Last: Briscoe Author-Name: Ethan Trewhitt Author-X-Name-First: Ethan Author-X-Name-Last: Trewhitt Title: Evaluating Counter-IED Strategies Journal: Defense & Security Analysis Pages: 135-147 Issue: 2 Volume: 27 Year: 2011 Month: 6 X-DOI: 10.1080/14751798.2011.578717 File-URL: http://hdl.handle.net/10.1080/14751798.2011.578717 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:135-147 Template-Type: ReDIF-Article 1.0 Author-Name: Jaïr van der Lijn Author-X-Name-First: Jaïr Author-X-Name-Last: van der Lijn Title: Crystal Balling Future Threats 2020--2030: Security Foresights of “Actors” and “Drivers” in Perspective Journal: Defense & Security Analysis Pages: 149-167 Issue: 2 Volume: 27 Year: 2011 Month: 6 X-DOI: 10.1080/14751798.2011.578718 File-URL: http://hdl.handle.net/10.1080/14751798.2011.578718 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:149-167 Template-Type: ReDIF-Article 1.0 Author-Name: David Dawson Author-X-Name-First: David Author-X-Name-Last: Dawson Title: Wiley Handbook of Science and Technology for Homeland Security Journal: Defense & Security Analysis Pages: 169-186 Issue: 2 Volume: 27 Year: 2011 Month: 6 X-DOI: 10.1080/14751798.2011.578719 File-URL: http://hdl.handle.net/10.1080/14751798.2011.578719 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:169-186 Template-Type: ReDIF-Article 1.0 Author-Name: Fiona McCallum Author-X-Name-First: Fiona Author-X-Name-Last: McCallum Author-Name: Mark Baillie Author-X-Name-First: Mark Author-X-Name-Last: Baillie Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Jeffrey Mills Author-X-Name-First: Jeffrey Author-X-Name-Last: Mills Title: BOOK REVIEWS Journal: Defense & Security Analysis Pages: 187-193 Issue: 2 Volume: 27 Year: 2011 Month: 6 X-DOI: 10.1080/14751798.2011.578720 File-URL: http://hdl.handle.net/10.1080/14751798.2011.578720 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:187-193 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 199-202 Issue: 3 Volume: 27 Year: 2011 Month: 9 X-DOI: 10.1080/14751798.2011.604480 File-URL: http://hdl.handle.net/10.1080/14751798.2011.604480 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:199-202 Template-Type: ReDIF-Article 1.0 Author-Name: Jonathan Luminati Author-X-Name-First: Jonathan Author-X-Name-Last: Luminati Title: Security Co-operation and 1206 Funding: More of the Same, a Dangerous Precedent, or a Model for the Future? Journal: Defense & Security Analysis Pages: 203-223 Issue: 3 Volume: 27 Year: 2011 Month: 9 X-DOI: 10.1080/14751798.2011.604481 File-URL: http://hdl.handle.net/10.1080/14751798.2011.604481 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:203-223 Template-Type: ReDIF-Article 1.0 Author-Name: Yael Brahms Author-X-Name-First: Yael Author-X-Name-Last: Brahms Title: “Get Real” -- A Pragmatic Approach to a Philosophical Debate on the Changing Nature of War Journal: Defense & Security Analysis Pages: 225-235 Issue: 3 Volume: 27 Year: 2011 Month: 9 X-DOI: 10.1080/14751798.2011.604483 File-URL: http://hdl.handle.net/10.1080/14751798.2011.604483 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:225-235 Template-Type: ReDIF-Article 1.0 Author-Name: Alain De Neve Author-X-Name-First: Alain Author-X-Name-Last: De Neve Author-Name: Christophe Wasinski Author-X-Name-First: Christophe Author-X-Name-Last: Wasinski Title: Looking Beyond the J-UCAS's Demise Journal: Defense & Security Analysis Pages: 237-249 Issue: 3 Volume: 27 Year: 2011 Month: 9 X-DOI: 10.1080/14751798.2011.604484 File-URL: http://hdl.handle.net/10.1080/14751798.2011.604484 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:237-249 Template-Type: ReDIF-Article 1.0 Author-Name: Laxman Kumar Behera Author-X-Name-First: Laxman Kumar Author-X-Name-Last: Behera Title: Enhancing Private Sector Participation in India's Defense Production Journal: Defense & Security Analysis Pages: 251-265 Issue: 3 Volume: 27 Year: 2011 Month: 9 X-DOI: 10.1080/14751798.2011.604485 File-URL: http://hdl.handle.net/10.1080/14751798.2011.604485 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:251-265 Template-Type: ReDIF-Article 1.0 Author-Name: Shannon O'Lear Author-X-Name-First: Shannon Author-X-Name-Last: O'Lear Title: Borders in the South Caucasus Journal: Defense & Security Analysis Pages: 267-276 Issue: 3 Volume: 27 Year: 2011 Month: 9 X-DOI: 10.1080/14751798.2011.604486 File-URL: http://hdl.handle.net/10.1080/14751798.2011.604486 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:267-276 Template-Type: ReDIF-Article 1.0 Author-Name: Jonathan Lipow Author-X-Name-First: Jonathan Author-X-Name-Last: Lipow Author-Name: Francois Melese Author-X-Name-First: Francois Author-X-Name-Last: Melese Title: Economic and Security Implications of Afghanistan's Newly Discovered Mineral Wealth Journal: Defense & Security Analysis Pages: 277-282 Issue: 3 Volume: 27 Year: 2011 Month: 9 X-DOI: 10.1080/14751798.2011.604487 File-URL: http://hdl.handle.net/10.1080/14751798.2011.604487 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:277-282 Template-Type: ReDIF-Article 1.0 Author-Name: Hiro Lugo Author-X-Name-First: Hiro Author-X-Name-Last: Lugo Author-Name: Lawrence James Author-X-Name-First: Lawrence Author-X-Name-Last: James Author-Name: Tim Ripley Author-X-Name-First: Tim Author-X-Name-Last: Ripley Title: Book Reviews Journal: Defense & Security Analysis Pages: 283-287 Issue: 3 Volume: 27 Year: 2011 Month: 9 X-DOI: 10.1080/14751798.2011.604488 File-URL: http://hdl.handle.net/10.1080/14751798.2011.604488 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:283-287 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 291-293 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632241 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632241 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:291-293 Template-Type: ReDIF-Article 1.0 Author-Name: Davina Miller Author-X-Name-First: Davina Author-X-Name-Last: Miller Title: Who Knows About This? Western Policy Towards Iran: The Lockerbie Case Journal: Defense & Security Analysis Pages: 295-309 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632245 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632245 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:295-309 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Schofield Author-X-Name-First: Julian Author-X-Name-Last: Schofield Author-Name: Michael Zekulin Author-X-Name-First: Michael Author-X-Name-Last: Zekulin Title: Appraising the Threat of an Islamist Military Coup in Post-OBL Pakistan Journal: Defense & Security Analysis Pages: 311-324 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632247 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632247 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:311-324 Template-Type: ReDIF-Article 1.0 Author-Name: James Dingley Author-X-Name-First: James Author-X-Name-Last: Dingley Title: Terrorism, Religion and Community Journal: Defense & Security Analysis Pages: 325-340 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632248 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632248 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:325-340 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew Moran Author-X-Name-First: Matthew Author-X-Name-Last: Moran Author-Name: Matthew Cottee Author-X-Name-First: Matthew Author-X-Name-Last: Cottee Title: Bound by History? Exploring Challenges to French Nuclear Disarmament Journal: Defense & Security Analysis Pages: 341-357 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632250 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632250 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:341-357 Template-Type: ReDIF-Article 1.0 Author-Name: Christopher M. Jones Author-X-Name-First: Christopher M. Author-X-Name-Last: Jones Author-Name: Kevin P. Marsh Author-X-Name-First: Kevin P. Author-X-Name-Last: Marsh Title: The Politics of Weapons Procurement:Why Some Programs Survive and Others Die Journal: Defense & Security Analysis Pages: 359-373 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632251 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632251 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:359-373 Template-Type: ReDIF-Article 1.0 Author-Name: Okon E. Eminue Author-X-Name-First: Okon E. Author-X-Name-Last: Eminue Author-Name: Henry U. Ufomba Author-X-Name-First: Henry U. Author-X-Name-Last: Ufomba Title: Modeling Terrorist Target Selection: Organski's Power Transition Theory Journal: Defense & Security Analysis Pages: 375-382 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632252 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632252 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:375-382 Template-Type: ReDIF-Article 1.0 Author-Name: Jonathan Lipow Author-X-Name-First: Jonathan Author-X-Name-Last: Lipow Author-Name: Yakir Plessner Author-X-Name-First: Yakir Author-X-Name-Last: Plessner Title: A Defense of Expensive Defense Systems Journal: Defense & Security Analysis Pages: 383-387 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632254 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632254 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:383-387 Template-Type: ReDIF-Article 1.0 Author-Name: Major David Berkland Author-X-Name-First: Major David Author-X-Name-Last: Berkland Title: Douhet, Trenchard, Mitchell, and the Future of Airpower Journal: Defense & Security Analysis Pages: 389-393 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632256 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632256 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:389-393 Template-Type: ReDIF-Article 1.0 Author-Name: Emilian Kavalski Author-X-Name-First: Emilian Author-X-Name-Last: Kavalski Author-Name: J. G. Allen Author-X-Name-First: J. G. Author-X-Name-Last: Allen Author-Name: James Dingley Author-X-Name-First: James Author-X-Name-Last: Dingley Author-Name: Marc Schelhase Author-X-Name-First: Marc Author-X-Name-Last: Schelhase Title: Book Reviews Journal: Defense & Security Analysis Pages: 395-401 Issue: 4 Volume: 27 Year: 2011 Month: 12 X-DOI: 10.1080/14751798.2011.632258 File-URL: http://hdl.handle.net/10.1080/14751798.2011.632258 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:395-401 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen Cimbala Author-X-Name-First: Stephen Author-X-Name-Last: Cimbala Title: Editorial Journal: Defense & Security Analysis Pages: 1-2 Issue: 1 Volume: 28 Year: 2012 Month: 3 X-DOI: 10.1080/14751798.2012.651373 File-URL: http://hdl.handle.net/10.1080/14751798.2012.651373 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew Futter Author-X-Name-First: Andrew Author-X-Name-Last: Futter Title: The elephant in the room: US ballistic missile defence under Barack Obama Abstract: Conventional wisdom seems to hold that under Barack Obama, the US ballistic missile defence programme has been pushed aside to allow for a refreshed domestic and international agenda. Proponents point to Obama's campaign thinking and rhetoric, the ballistic missile defence (BMD) budget cuts, the decision to end the Third Site in Europe, and the reset relations with Russia through the New Strategic Arms Reduction Treaty (New START) as evidence that the programme has undergone a significant period of change, retraction and rationalisation. This article argues instead that BMD has not fallen from prominence and that there is a change in focus rather than retraction of its strategic goal. Consequently, BMD continues to grow in importance as a component of US national security strategy. Journal: Defense & Security Analysis Pages: 3-16 Issue: 1 Volume: 28 Year: 2012 Month: 3 X-DOI: 10.1080/14751798.2012.651374 File-URL: http://hdl.handle.net/10.1080/14751798.2012.651374 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:3-16 Template-Type: ReDIF-Article 1.0 Author-Name: Daniel Goure Author-X-Name-First: Daniel Author-X-Name-Last: Goure Title: The Obama administration's phased-adaptive architecture: technological, operational and political issues Abstract: In 2009, the Obama administration announced a new missile defense strategy, termed a phased-adaptive architecture (PAA) focused primarily on countering the growing threat from theater ballistic missiles. The success of this strategy is predicated on the rapid development and fielding of successive increments of defensive capability in a manner adapted to the specific requirements for missile defenses in different regions of the world. The administration is committed to building a European regional missile defense system, the European PAA or EPAA between now and 2020. The first elements of the EPAA were deployed in late 2011. However, much progress is still required in order to reach the goals set for the PAA. This article addresses the technological, operational and political issues confronting the Obama administration in its efforts to make the PAA a reality. Journal: Defense & Security Analysis Pages: 17-35 Issue: 1 Volume: 28 Year: 2012 Month: 3 X-DOI: 10.1080/14751798.2012.651376 File-URL: http://hdl.handle.net/10.1080/14751798.2012.651376 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:17-35 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen Blank Author-X-Name-First: Stephen Author-X-Name-Last: Blank Title: The Chinese and Asian impact on Russian nuclear policy Abstract: Asia, where nuclear powers already interact (including North Korea), exerts a growing influence on the thinking and policy underlying Russia's current and future nuclear (and overall defense) posture. China's rise is forcing Russia into a greater reliance on strategic offensive weapons and tactical nuclear weapons. These in turn will reinforce its opposition to US missile defenses, not only in Europe but also in Asia. Russia must now entertain the possibility of nuclear use in regional conflicts that would otherwise remain purely conventional. It cannot be postulated blindly that nuclear weapons serve no discernible purpose other than to deter nuclear attacks by other nuclear powers. The strategic equation in Asia and in the Russian Far East convincingly demonstrates the falsity of this approach. Nuclear weapons will be the essential component of Russia's regional defense policy if not of its overall policies -- and this also includes contingencies in Europe. Journal: Defense & Security Analysis Pages: 36-54 Issue: 1 Volume: 28 Year: 2012 Month: 3 X-DOI: 10.1080/14751798.2012.651377 File-URL: http://hdl.handle.net/10.1080/14751798.2012.651377 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:36-54 Template-Type: ReDIF-Article 1.0 Author-Name: Mikhail Tsypkin Author-X-Name-First: Mikhail Author-X-Name-Last: Tsypkin Title: Russia, America and missile defense Abstract: Russia has sharply objected to US plans for ballistic missile defense. The Russian official explanation is that the real purpose of the US missile defense plan is to make it impossible for Russia to retaliate against a US nuclear (or massive conventional) attack, thus making Russia subject to military blackmail by the US. The Russian response has been the result of a sum total of various factors, mostly political and cultural, while the technical capabilities of the proposed system have played a secondary role. Journal: Defense & Security Analysis Pages: 55-64 Issue: 1 Volume: 28 Year: 2012 Month: 3 X-DOI: 10.1080/14751798.2012.651379 File-URL: http://hdl.handle.net/10.1080/14751798.2012.651379 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:55-64 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: Minimum deterrence and missile defenses: what's new, what's true, what's arguable Abstract: Minimum deterrence is a compromise, or halfway house, between nuclear abolition or nearly zero and assured destruction, the dominant paradigm for strategic nuclear arms control during and after the cold war. Minimum deterrence as applied to the current relationship between the United States and Russia would require downsizing the numbers of operationally deployed long-range nuclear weapons to 1000, or fewer, on each side. More drastic bilateral Russian--American reductions would require the cooperation of other nuclear weapons states in making proportional reductions in their own arsenals. In addition, US plans for European-based and global missile defenses cause considerable angst in Russia and threaten to derail the Obama “reset” in Russian--American relations, despite the uncertainties about current and plausible future performances of missile defense technologies. Journal: Defense & Security Analysis Pages: 65-80 Issue: 1 Volume: 28 Year: 2012 Month: 3 X-DOI: 10.1080/14751798.2012.651380 File-URL: http://hdl.handle.net/10.1080/14751798.2012.651380 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:65-80 Template-Type: ReDIF-Article 1.0 Author-Name: Ian Bellany Author-X-Name-First: Ian Author-X-Name-Last: Bellany Title: Outflanking missile defences: the Nuclear Non-proliferation Treaty, nuclear weapons and terrorism Abstract: Ian Bellany, an Emeritus Professor of Politics at Lancaster University, died in July 2011 at the age of 70, after a long and painful struggle with myelofibrosis, a rare and invariably terminal blood cancer. Between early 2009 and August 2010, under contract to Hurst & Co., he worked intermittently on a book about nuclear terrorism, which he provisionally entitled Before the Storm. The editor and I are grateful to Michael Dwyer at Hurst & Co. for releasing the draft. What is published here is an edited version of that draft. It may seem presumptuous to speak for Ian, but I am sure he would also have liked to thank the doctors and nurses of the NHS Morecambe Bay Universities Hospital Trust, whose skill, knowledge, and flair for improvisation kept him alive and writing for much longer than anyone expected. Alastair Bellany, Rutgers University, New Jersey, USA. In the past, terrorists have tended to eschew acts of extreme violence for fear of alienating those whom they wish to persuade and attract to their cause. The first to discard this philosophy was the Aum group in Japan, which sought to use anthrax and acquire a nuclear weapon. Since then, attitudes have changed, spurred on by the impact on public perception of the successful Al Qaeda 9/11 attack on New York and Washington. By crossing the line between moderation and extreme violence, terrorist groups retain one valuable capability: they are much less easily deterred and have few inhibitions. This article considers the three nuclear options open to terrorists -- produce a radiological contaminant bomb; build a nuclear bomb; or steal or get given a nuclear device. It examines the possibilities and probabilities of each option and considers how the implementation of the Nuclear Non-proliferation Treaty (NPT) provisions might impose some constraints on terrorists’ nuclear ambitions. By examining the doubtful nuclear security practices of different states and providing statistical evidence of an increase in levels of international terrorist violence, this article points to determined terrorists in time acquiring the means to acquire one or other variants of a nuclear weapon. It concludes that it is not a matter of “if” but “when.” Journal: Defense & Security Analysis Pages: 81-96 Issue: 1 Volume: 28 Year: 2012 Month: 3 X-DOI: 10.1080/14751798.2012.651381 File-URL: http://hdl.handle.net/10.1080/14751798.2012.651381 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:81-96 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 97-99 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678144 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678144 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:97-99 Template-Type: ReDIF-Article 1.0 Author-Name: Eric Gons Author-X-Name-First: Eric Author-X-Name-Last: Gons Author-Name: Jonathan Schroden Author-X-Name-First: Jonathan Author-X-Name-Last: Schroden Author-Name: Ryan McAlinden Author-X-Name-First: Ryan Author-X-Name-Last: McAlinden Author-Name: Marcus Gaul Author-X-Name-First: Marcus Author-X-Name-Last: Gaul Author-Name: Bret Van Poppel Author-X-Name-First: Bret Author-X-Name-Last: Van Poppel Title: Challenges of measuring progress in Afghanistan using violence trends: the effects of aggregation, military operations, seasonality, weather, and other causal factors Abstract: Measuring nationwide progress of counterinsurgency operations in Afghanistan using violence trends is difficult due to several factors: aggregation of data to the national level may obfuscate disparate local trends; the observed seasonality in violence makes comparisons difficult and may obscure progress; and short-term spikes or troughs -- attributable to weather, military operations and tempo, or holiday periods -- heavily influence simple averaging schemes. Despite these challenges, proper understanding of violence statistics is critical to estimating the effectiveness of military forces added during a surge or redeployed as part of transition. This article explores methods for analyzing observed violence trends to identify causal factors, to provide a comparable baseline, and to inform assessments at appropriate levels of aggregation. One methodology for seasonal adjustment of violence data is discussed and shown to provide a logical baseline for examining trends. An ordinary least squares regression model is developed and implemented using time-series violence data. Journal: Defense & Security Analysis Pages: 100-113 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678164 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678164 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:100-113 Template-Type: ReDIF-Article 1.0 Author-Name: Sjef Orbons Author-X-Name-First: Sjef Author-X-Name-Last: Orbons Title: Are non‐lethal weapons a viable military option to strengthen the hearts and minds approach in Afghanistan? Abstract: Commanders of the International Security Assistance Force (ISAF) have repeatedly stressed the hearts and minds approach in Afghanistan, in saying that the human terrain is decisive for a successful outcome of the mission. Avoidance of civilian casualties is considered of strategic importance, and by nature highly dependent on the management of tactical level Escalation of Force (EoF) situations. Non‐lethal weapons (NLWs) are expected to enable tactical commanders to avoid innocent civilian casualties in such situations. This article considers a selected NLW on its potential to accomplish this requirement. It uses a defence technology assessment approach to analyse EoF situations experienced by Dutch ISAF forces in which the NLW is inserted. The analysis demonstrates that a range of contextual factors in the Afghanistan high‐risk environment tend to narrow down the window of opportunity for the NLW to help defuse the risk of unintended civil casualties. Journal: Defense & Security Analysis Pages: 114-130 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678163 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678163 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:114-130 Template-Type: ReDIF-Article 1.0 Author-Name: Mark Clegg Author-X-Name-First: Mark Author-X-Name-Last: Clegg Title: Force protection and society Abstract: Wars have long been fought with a firm focus upon armies' domestic contexts. These socio-political foundations have underpinned decisions regarding embarking upon war as well  the conduct of war itself. Of particular importance among liberal democracies is the emphasis which is now placed upon force protection; broadly conceived as the range of measures employed to ensure the protection of servicemen and women on operations. Decisions surrounding protective equipment, deployed locations and wartime activities all face detailed scrutiny in contemporary operating environments. The attitudes of the government, the military and the civilian population combine to create a complex and dynamic backdrop of harmony and tension to this most sensitive characteristic of modern wars. Journal: Defense & Security Analysis Pages: 131-139 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678150 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678150 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:131-139 Template-Type: ReDIF-Article 1.0 Author-Name: Peter Jones Author-X-Name-First: Peter Author-X-Name-Last: Jones Author-Name: Philippe Lagassé Author-X-Name-First: Philippe Author-X-Name-Last: Lagassé Title: Rhetoric versus reality: Canadian defence planning in a time of austerity Abstract: As Canada's military mission in Afghanistan winds down and the country faces several years of fiscal austerity, all of Canada's major political parties are agreed that Canadian defence budgets must stay level or be cut. This comes at a time when the defence department is slated to replace the Canadian Forces’ (CF) major equipment fleets. Canada's defence establishment thus faces some critical decisions. One option is to try to maintain its expeditionary capabilities across all three services: army, navy and air force. Absent substantial new infusions of funds, however, this approach is likely to lead to an overall and largely chaotic reduction of capabilities. Another option is to make some difficult choices as to which expeditionary capabilities to maintain as part of a strategic review of Canada's future military needs. Such an option would ensure that Canada has at least some military capacities which can reliably be devoted to the most demanding international operations, while maintaining those capabilities required for domestic duties and North American defence. Pursuing this option would accord with the new North Atlantic Treaty Organization Strategic Concept and the call for “Smart Defense” within the Alliance. This article assesses the arguments for and against the option of specialising Canada's future defence capabilities and explores scenarios as to what a future CF may look like. Journal: Defense & Security Analysis Pages: 140-151 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678160 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678160 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:140-151 Template-Type: ReDIF-Article 1.0 Author-Name: Ron Matthews Author-X-Name-First: Ron Author-X-Name-Last: Matthews Author-Name: Alma Lozano Author-X-Name-First: Alma Author-X-Name-Last: Lozano Title: The mercurial development of Russia's United Aircraft Corporation Abstract: Russia's 2006 renationalisation of its aerospace industry heralded a new era in industrial policy. Symbolising a return to the importance of securing sovereignty over the Federation's strategic assets, it also posits, powerfully, that sectors like aerospace and shipbuilding are too important to be left to the market. In what now appears a reversal of this policy approach, Moscow is promoting partial privatisation and encouraging partnership with Western aerospace companies. Foreign infusion of capital and technology is viewed as the catalyst for Russian dominance in the global military and commercial aerospace industries. Journal: Defense & Security Analysis Pages: 152-162 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678158 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678158 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:152-162 Template-Type: ReDIF-Article 1.0 Author-Name: Björn Hagelin Author-X-Name-First: Björn Author-X-Name-Last: Hagelin Title: Into the black box? Technology sharing in major arms transfers and beyond Abstract: From the recipients’ perspective, arms transfers have, through the use of offsets, technology transfers, and industrial participation, become an opportunity to receive not only advanced weapons, but also technologies not otherwise available. How important are friendly relations for securing a military export order? To what extent do buyers demand advanced military or commercial technology and how are these demands accepted by the supplier? How does this influence smaller producers in relation to major producers? These questions are addressed by studying (a) the Joint Strike Fighter/F-35 by Lockheed Martin, USA, and the JAS-39 Gripen aircraft by Saab, Sweden, (b) the Medium Multi-Role Combat Aircraft competition in India for 126 combat aircraft, and (c) the Indian offset policy. In the final section, some long-term consequences are discussed. Journal: Defense & Security Analysis Pages: 163-175 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678146 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678146 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:163-175 Template-Type: ReDIF-Article 1.0 Author-Name: Henry Philippens Author-X-Name-First: Henry Author-X-Name-Last: Philippens Title: The Shi Lang, a vehicle for regional change? Abstract: In a succession of disclosures over the summer of 2011, the People's Republic of China acknowledged the near completion of its first aircraft carrier and the initiation of a carrier building program. These revelations have come at a time of increased tension in the South China Sea on top of the wider worries in the region concerning China's overly assertive stance and the pace of its military modernization. This perspective will examine why the status of the vessel and the program have now been made public, in addition to surveying the wider implications this upgrade to Chinese maritime capabilities will have on the stability of the region over the coming years. However, this paper concludes that there is, at present, no reason for the sensationalism nor the threat‐mongering seen in many media outlets, of late. Hastily drawn conclusions based primarily on realpolitik fail to understand the nuances of this issue. Journal: Defense & Security Analysis Pages: 176-184 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678165 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678165 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:176-184 Template-Type: ReDIF-Article 1.0 Author-Name: Ehud Eilam Author-X-Name-First: Ehud Author-X-Name-Last: Eilam Title: Egypt: new government, old challenges Abstract: The new government in Egypt will have to deal with the following challenges in its foreign policy: the Palestinians, Sinai, the arms race between Israel and Egypt, the nuclear issue, the Suez Canal, and the Tiran Straits. Egypt has to decide what its approach would be toward these issues and as to how to maneuver between its own interests and those of other states such as Israel and the USA. All the sides have to consider their steps carefully in order to avoid an unnecessary crisis. Journal: Defense & Security Analysis Pages: 185-191 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678166 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678166 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:185-191 Template-Type: ReDIF-Article 1.0 Author-Name: Cdr Ken Jay Author-X-Name-First: Cdr Ken Author-X-Name-Last: Jay Title: British naval aviation -- the first 100 years Journal: Defense & Security Analysis Pages: 192-193 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678168 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678168 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:192-193 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew R.H. Uttley Author-X-Name-First: Matthew R.H. Author-X-Name-Last: Uttley Title: Democracy's arsenal: creating a twenty-first-century defense industry Journal: Defense & Security Analysis Pages: 194-195 Issue: 2 Volume: 28 Year: 2012 Month: 6 X-DOI: 10.1080/14751798.2012.678169 File-URL: http://hdl.handle.net/10.1080/14751798.2012.678169 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:194-195 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 199-201 Issue: 3 Volume: 28 Year: 2012 Month: 9 X-DOI: 10.1080/14751798.2012.708592 File-URL: http://hdl.handle.net/10.1080/14751798.2012.708592 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:199-201 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew Moran Author-X-Name-First: Matthew Author-X-Name-Last: Moran Author-Name: Christopher Hobbs Author-X-Name-First: Christopher Author-X-Name-Last: Hobbs Title: The Iranian nuclear dilemma: light at the end of the tunnel? Abstract: In February 2012, Iran announced its willingness to resume negotiations with the Western powers. This statement followed in the wake of a damning report by the International Atomic Energy Agency (IAEA) Board of Governors and the imposition of additional sanctions by the international community on an Iranian economy already under pressure. Tehran's announcement also coincided with increased speculation regarding an Israeli military strike on Iranian nuclear facilities. At the same time, however, this seemingly positive step appeared to be undermined by Iran's concomitant announcement that “huge” technical progress has been made on Iran's nuclear programme. This article will explore the significance of the recent political, diplomatic and technical developments in the Iranian nuclear affair and situate them in the broader context of Tehran's nuclear strategy. The analysis will assess the potential for this latest phase in the Iranian nuclear crisis to reverse Iran's current trajectory and initiate a rapprochement between Iran and Western powers. Journal: Defense & Security Analysis Pages: 202-212 Issue: 3 Volume: 28 Year: 2012 Month: 9 X-DOI: 10.1080/14751798.2012.703463 File-URL: http://hdl.handle.net/10.1080/14751798.2012.703463 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:202-212 Template-Type: ReDIF-Article 1.0 Author-Name: Bart Smedts Author-X-Name-First: Bart Author-X-Name-Last: Smedts Title: Iran's nuclear programme: civil and/or military goals? Abstract: The ultimate goal of Iran's nuclear programme remains uncertain. While the nuclear reactor of Bushehr has finally been connected to the power grid, the nuclear fuel enrichment activities and their location cause concern to the international community. Thirty years of nuclear investments demonstrate a negative cost--benefit analysis: technical constraints and economic and infrastructural requirements constitute a burden on the implementation of a nuclear programme. This article analyses the economic, legal, technical and political aspects of the Iranian programme in order to uncover its civil and/or military finality. Journal: Defense & Security Analysis Pages: 213-225 Issue: 3 Volume: 28 Year: 2012 Month: 9 X-DOI: 10.1080/14751798.2012.708593 File-URL: http://hdl.handle.net/10.1080/14751798.2012.708593 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:213-225 Template-Type: ReDIF-Article 1.0 Author-Name: Jonathan Lipow Author-X-Name-First: Jonathan Author-X-Name-Last: Lipow Title: Can NATO survive an accident prone Euro? Abstract: The European Monetary Union (EMU) is inherently unstable, and will be prone to repeated financial and fiscal crises. These crises pose a clear threat to NATO security and the political institutions of Alliance member states. There is no definitive way to eliminate the risks posed by monetary union, but straightforward reforms in EMU sovereign debt management represent a low-cost near-term means of mitigating these risks. With EMU nations facing a seeming leadership vacuum, it is well within NATO purview to press for adoption of such reforms. Journal: Defense & Security Analysis Pages: 226-233 Issue: 3 Volume: 28 Year: 2012 Month: 9 X-DOI: 10.1080/14751798.2012.708594 File-URL: http://hdl.handle.net/10.1080/14751798.2012.708594 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:226-233 Template-Type: ReDIF-Article 1.0 Author-Name: Adam D.M. Svendsen Author-X-Name-First: Adam D.M. Author-X-Name-Last: Svendsen Title: “Flectas non frangas”: revisiting early twenty-first century UK--US defense relations (2000--2005) after five years Abstract: Adopting the analytical framework of the established interpretive “schools” of Anglo-American relations, this article offers several reflections on UK--US defense relations as they occurred over the significant years of 2000--2005. During those years, trajectories were established on which UK--US defense relations continue to travel today and outcomes emerged which are still being navigated. This article concludes that the Latin phrase, “Flectas Non Frangas” (essentially translated as: “Bend not Break”), is the most appropriate to adopt to characterize the developments undergone in recent UK--US defense relations. Many historical and strategic lessons with contemporary relevance are drawn. Journal: Defense & Security Analysis Pages: 234-246 Issue: 3 Volume: 28 Year: 2012 Month: 9 X-DOI: 10.1080/14751798.2012.708595 File-URL: http://hdl.handle.net/10.1080/14751798.2012.708595 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:234-246 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew H. Wahlert Author-X-Name-First: Matthew H. Author-X-Name-Last: Wahlert Title: The “motivated bias” dilemma in warfare and intelligence Abstract: The goal of this article is to challenge the assumption of rationality in the behavior of decision-making units involved in security, defense, intelligence and warfare and to consider the influence of “motivated bias” in such instances. A review of motivational literature within international politics and a discussion of literature applying “motivated biases” to warfare and strategic surprise will offer an alternative view of the primacy of rationality in such decisions. Journal: Defense & Security Analysis Pages: 247-259 Issue: 3 Volume: 28 Year: 2012 Month: 9 X-DOI: 10.1080/14751798.2012.708596 File-URL: http://hdl.handle.net/10.1080/14751798.2012.708596 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:247-259 Template-Type: ReDIF-Article 1.0 Author-Name: Ehud Eilam Author-X-Name-First: Ehud Author-X-Name-Last: Eilam Title: Operational aspects of a future war between Egypt and Israel Abstract: The peace treaty between Israel and Egypt has survived since 1979. Even so, following the events in Egypt, there is a growing tension between the two states, particularly surrounding the Sinai, which could cause a crisis and even a war. In such a case, the main battlefield would be in Sinai, and there would be several dominant aspects. Some of them would appear for the first time, compared with previous wars, such as a collision between Israeli and Egyptian units of around corps size. Other aspects would be more familiar, such as the ratio between the size of the forces to that of the battlefield, the “fog of war,” night fighting, “friendly fire” and deception. Journal: Defense & Security Analysis Pages: 260-267 Issue: 3 Volume: 28 Year: 2012 Month: 9 X-DOI: 10.1080/14751798.2012.708597 File-URL: http://hdl.handle.net/10.1080/14751798.2012.708597 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:260-267 Template-Type: ReDIF-Article 1.0 Author-Name: Steven Jermy Author-X-Name-First: Steven Author-X-Name-Last: Jermy Title: Land based air power or aircraft carriers? A case study of the British debate about maritime air power in the 1960s Journal: Defense & Security Analysis Pages: 268-269 Issue: 3 Volume: 28 Year: 2012 Month: 9 X-DOI: 10.1080/14751798.2012.709048 File-URL: http://hdl.handle.net/10.1080/14751798.2012.709048 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:268-269 Template-Type: ReDIF-Article 1.0 Author-Name: Bernard Jenkin Author-X-Name-First: Bernard Author-X-Name-Last: Jenkin Title: Strategy for action: using force wisely in the twenty-first century Journal: Defense & Security Analysis Pages: 270-271 Issue: 3 Volume: 28 Year: 2012 Month: 9 X-DOI: 10.1080/14751798.2012.708619 File-URL: http://hdl.handle.net/10.1080/14751798.2012.708619 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:270-271 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 273-274 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.731849 File-URL: http://hdl.handle.net/10.1080/14751798.2012.731849 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:273-274 Template-Type: ReDIF-Article 1.0 Author-Name: Leo J. Blanken Author-X-Name-First: Leo J. Author-X-Name-Last: Blanken Title: Reconciling strategic studies … with itself: a common framework for choosing among strategies Abstract: Three distinct, and seemingly irreconcilable, schools of thought are identified within the strategic studies literature. One which searches for “universal principles of war,” a second, “context-dependent,” approach that seeks to embed each instance of warfare within its concurrent social, political, technological milieu and, finally a “paradoxical logic” school, which equates strategy with the generation of uncertainty. The author offers some intuitive concepts from non-cooperative game theory to develop a “dominate-mix” approach to strategy choice. In doing so, he helps to reconcile these disparate approaches and provides a simple framework to assist researchers in framing military decisions as well as to assist planners in choosing among strategies. Journal: Defense & Security Analysis Pages: 275-287 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730723 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730723 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:275-287 Template-Type: ReDIF-Article 1.0 Author-Name: Louise Stanton Author-X-Name-First: Louise Author-X-Name-Last: Stanton Title: The national defense function and federalism: the importance of the 2008 National Defense Authorization Act Abstract: Countries with a federalist system of government have different arrangements for providing national security. US national security is provided by national and State defense forces. The quintessential national function -- national defense -- experienced some changes that enhanced the role of the States. Policy changes in the National Defense Authorization Act of 2008 (2008 NDAA) introduced new roles for the Governors and the State defense forces, or the National Guard. This article explores how the interests of Congress and States aligned in the 2008 NDAA such that the national defense function changed. This article finds that the national government continues to have the central coordinating role, but that the politics and provisions of the 2008 NDAA changed the national--State relationship in mission, decision-making, and command and control so that US federalism in the national defense function is evolving in unexpected ways. Journal: Defense & Security Analysis Pages: 288-302 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730724 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730724 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:288-302 Template-Type: ReDIF-Article 1.0 Author-Name: Robert R. Tomes Author-X-Name-First: Robert R. Author-X-Name-Last: Tomes Title: An historical review of US defense strategy from Vietnam to operation Iraqi freedom Abstract: Facing nearly half a billion dollars in spending cuts over the next five years, US defense planners and strategists must simultaneously rebuild a war-weary Army weakened from over a decade of war, build new sea and air capabilities for the Pacific theater, and reduce manpower, procurement, and contractor budgets while promoting innovation. The US defense department is embarking on what may be the most sweeping period of defense transformation in recent memory. This article reviews the history of American defense transformation, focusing on an important but largely overlooked period of military innovation that began in the shadow of Vietnam and ended with troops fighting through blinding sandstorms at night on the road to Baghdad. The multifaceted transformation strategy conceived in the 1970s paved the way for a military revolution in the 1990s and enabled unprecedented battlefield adaptation in the 2000s. After reviewing the revolutionary changes that led to American dominance in conventional warfare in the 1990s, the article examines US transformation policies in the 2000s to inform defense strategy and planning efforts in the 2010s. Journal: Defense & Security Analysis Pages: 303-315 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730722 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730722 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:303-315 Template-Type: ReDIF-Article 1.0 Author-Name: Jonathan Lipow Author-X-Name-First: Jonathan Author-X-Name-Last: Lipow Author-Name: Francois Melese Author-X-Name-First: Francois Author-X-Name-Last: Melese Title: Can Afghanistan avoid the Natural Resource Curse? Abstract: Recent discoveries of significant mineral deposits offer Afghanistan the opportunity to attain a level of economic development sufficient to stabilize that country's volatile security situation while providing Afghans with a reasonable standard of living. Much, however, depends on whether Afghanistan can avoid the “Natural Resource Curse,” an inter-related set of economic and social pathologies that often bedevil resource-endowed countries. In this article, the authors describe the Natural Resource Curse, evaluate the obstacles it raises for Afghan economic development, and offer a strategy to minimize the risks Afghanistan faces in its efforts to exploit its mineral wealth for the benefit of the population. Journal: Defense & Security Analysis Pages: 316-325 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730725 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730725 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:316-325 Template-Type: ReDIF-Article 1.0 Author-Name: Leo J. Blanken Author-X-Name-First: Leo J. Author-X-Name-Last: Blanken Author-Name: Jason J. Lepore Author-X-Name-First: Jason J. Author-X-Name-Last: Lepore Title: Unpacking the various meanings of redundancy: from refining the concept to military planning Abstract: The authors engage in the debate over waste in military force structure planning by rigorously deconstructing the concept of “redundancy.” First, a typology of redundancy is constructed that provides a common framework for identifying variety among redundant structures. These are labeled “true redundancy,” “expanded capacity,” “portfolio diversification,” and “mission overlap.” Further, a number of mechanisms are identified that produce these types of structures, and show the conditions under which planners may utilize redundant structure in the search for optimization. In sum, the article provides refined concepts for analysts and planners to identify when redundancy is deleterious or beneficial. Journal: Defense & Security Analysis Pages: 326-342 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730721 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730721 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:326-342 Template-Type: ReDIF-Article 1.0 Author-Name: Steven J. Childs Author-X-Name-First: Steven J. Author-X-Name-Last: Childs Title: Small world, big guns: globalization, interstate security networks and conventional weapons imports Abstract: With the burgeoning influence of emerging markets in Asia, a tectonic shift is taking place in the global security landscape. Asian states are concomitantly arming as their economic clout grows. In light of these developments, security analysts would benefit from a formal means of placing these arms acquisitions in a structural context. Are arms acquisitions on par with the expectations of Asian states, given their structural dispositions, or are recent acquisitions beyond anticipated levels? By using a dynamic panel regression of 187 states from 1950 to 2011, this research predicts arms import volume using the degree of interstate arms linkages, the size of a state's military, and its level of economic development. The technique offers analysts a formal means of distinguishing orthodox behavior in importing conventional weapons from extraneous security motivations. The article concludes by generating near-term forecasts of Asian arms imports and discussing the implications of the technique. Journal: Defense & Security Analysis Pages: 343-359 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730726 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730726 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:343-359 Template-Type: ReDIF-Article 1.0 Author-Name: Henry U. Ufomba Author-X-Name-First: Henry U. Author-X-Name-Last: Ufomba Title: Involving the elephant: technical isolation and the role of India in a possible solution to the Iranian nuclear crisis Abstract: Apart from North Korea, no state's nuclear program in the twenty-first century has raised more concern to international security than Iran's. While Iran insists that its nuclear program is strictly for civilian purpose in line with Article IV of non-proliferation treaty, the USA and its allies insist that Iran has military intentions and called for sanctions. The failure of sanctions to deter Iran from its nuclear agenda had made many scholars and policy-makers call for a preemptive attack on Iranian nuclear facilities. Situated within this debate, this paper positions itself as an antagonist to the preemptive airstrike option and argues that involving India in a possible nuclear “iron curtain” against Iran -- a move known as technical isolation -- remains the best option to the current nuclear crises. Journal: Defense & Security Analysis Pages: 360-367 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730727 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730727 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:360-367 Template-Type: ReDIF-Article 1.0 Author-Name: John G. Allen Author-X-Name-First: John G. Author-X-Name-Last: Allen Title: Underground structures of the Cold War: the world below Journal: Defense & Security Analysis Pages: 368-369 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730719 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730719 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:368-369 Template-Type: ReDIF-Article 1.0 Author-Name: John G. Allen Author-X-Name-First: John G. Author-X-Name-Last: Allen Title: Nomonhan 1939: the Red Army's victory that shaped World War II Journal: Defense & Security Analysis Pages: 369-371 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730720 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730720 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:369-371 Template-Type: ReDIF-Article 1.0 Author-Name: Eric Grove Author-X-Name-First: Eric Author-X-Name-Last: Grove Title: Theorist of maritime strategy: Sir Julian Corbett and his contribution to military and naval thought Journal: Defense & Security Analysis Pages: 371-372 Issue: 4 Volume: 28 Year: 2012 Month: 12 X-DOI: 10.1080/14751798.2012.730718 File-URL: http://hdl.handle.net/10.1080/14751798.2012.730718 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:371-372 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 1-2 Issue: 1 Volume: 29 Year: 2013 Month: 3 X-DOI: 10.1080/14751798.2013.764047 File-URL: http://hdl.handle.net/10.1080/14751798.2013.764047 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 Author-Name: Jorge Battaglino Author-X-Name-First: Jorge Author-X-Name-Last: Battaglino Title: The politics of defense revival in Argentina Abstract: In marked contrast with previous decades, defense issues in Argentina have started to receive increasing political attention over the last few years. The main goal of this article is to account for this new found interest in defense policy. The article contends that this revival could be accounted for by both the implementation of a neo-developmentalist strategy and a type of control that emphasizes civilian oversight over the armed forces. Both factors have promoted the implementation of policies that favored an increase in the military budget, the reconstruction of the defense industry and the establishment of a new military doctrine. This article evaluates the impact of factors that have not been previously considered by the literature on defense attention in South America. Journal: Defense & Security Analysis Pages: 3-15 Issue: 1 Volume: 29 Year: 2013 Month: 3 X-DOI: 10.1080/14751798.2013.760251 File-URL: http://hdl.handle.net/10.1080/14751798.2013.760251 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:3-15 Template-Type: ReDIF-Article 1.0 Author-Name: Simon Haddad Author-X-Name-First: Simon Author-X-Name-Last: Haddad Title: Explaining Lebanese Shii adherence to Hezbollah: alienation, religiosity and welfare provision Abstract: Data from a cross-sectional survey of 176 Lebanese Shiis living in Metropolitan Beirut have been used to investigate the relationship between social and religious variables and attitudes toward Lebanon's “Party of God” (Hezbollah). The results indicate that Islamic religiosity, political discontent, and access to social welfare are positively associated with endorsement of the party. The implications of these findings for the party's future in light of recent political developments are discussed. Journal: Defense & Security Analysis Pages: 16-29 Issue: 1 Volume: 29 Year: 2013 Month: 3 X-DOI: 10.1080/14751798.2013.760250 File-URL: http://hdl.handle.net/10.1080/14751798.2013.760250 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:16-29 Template-Type: ReDIF-Article 1.0 Author-Name: Zafar Khan Author-X-Name-First: Zafar Author-X-Name-Last: Khan Title: Pakistan's policy on minimum deterrence: why minimum is not the minimum? Abstract: This article focuses on Pakistan's policy option of “minimum deterrence” (MD) post-1998 nuclearization of South Asia and explores why “minimum” in reality is not the minimum. It states that the term “minimum” has not been fully defined yet due to which MD stays ambiguous. In addition, it endeavors to elaborate the rudimentary factors responsible for the non-existence of an MD, which, in turn, keeps the Pakistani stance on MD dynamic and evolving. Journal: Defense & Security Analysis Pages: 30-41 Issue: 1 Volume: 29 Year: 2013 Month: 3 X-DOI: 10.1080/14751798.2013.760247 File-URL: http://hdl.handle.net/10.1080/14751798.2013.760247 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:30-41 Template-Type: ReDIF-Article 1.0 Author-Name: Spencer Willardson Author-X-Name-First: Spencer Author-X-Name-Last: Willardson Title: Strategic intelligence during coin detention operations -- relational data and understanding latent terror networks Abstract: One aspect of the global “War on Terror” that has received limited coverage in the academic literature is the problem of detained persons as it relates to intelligence. This is a surprising oversight, given the number of detainees that the USA has been responsible for (over 25,000 were in custody in Iraq alone at one time during its peak). The detention environment offers a prime strategic intelligence opportunity for the US intelligence community to study the tactics and organizations of individuals who have been removed from the overall conflict. In this article an easily implemented collection program is recommended to be deployed in US/coalition detention centers. The primary recommendation is to gather relational data on detainee communication, both authorized and illicit, and to use these data to perform network analyses of terrorist groups and their individual members. Journal: Defense & Security Analysis Pages: 42-53 Issue: 1 Volume: 29 Year: 2013 Month: 3 X-DOI: 10.1080/14751798.2013.760249 File-URL: http://hdl.handle.net/10.1080/14751798.2013.760249 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:42-53 Template-Type: ReDIF-Article 1.0 Author-Name: Daniel Uiterwijk Author-X-Name-First: Daniel Author-X-Name-Last: Uiterwijk Author-Name: Joseph Soeters Author-X-Name-First: Joseph Author-X-Name-Last: Soeters Author-Name: Paul van Fenema Author-X-Name-First: Paul Author-X-Name-Last: van Fenema Title: Aligning national “logics” in a European military helicopter program Abstract: This article analyzes the public side of the NH90 network consisting of four participating countries (Germany, France, Italy, and the Netherlands) and their industrial partners. Comparable to observations in earlier international projects in the defense sector, the development and production of the NH90 defense helicopter did not match original plans and costs estimates. On the basis of four mechanisms that were intended to facilitate the cooperation between the partnering countries (the General Memorandum of Understanding; coalition formation; the role of the central agency; and the process of vertical escalation) the question is posed whether or not there was a true alignment of national interests and “logics.” The lack of standardization, as well as program delays and issues concerning the division of the work-share, lead to the emerging alignment being characterized as “quasi-alignment” at best. Journal: Defense & Security Analysis Pages: 54-67 Issue: 1 Volume: 29 Year: 2013 Month: 3 X-DOI: 10.1080/14751798.2013.760248 File-URL: http://hdl.handle.net/10.1080/14751798.2013.760248 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:54-67 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Steinberg Author-X-Name-First: Michael Author-X-Name-Last: Steinberg Title: Reforming the notion of national sovereignty by external intervention Abstract: In principle, national sovereignty is the right of a nation to govern its internal affairs without foreign interference. In practice, it is defined by one's interpretation of international law, which may permit legal external intervention under some circumstances, ultimately removing a nation's sovereignty. This paper will examine the current system of international law outlined by the United Nations, analyse the ambiguities contained within its Charter and elaborate on how external intervention can be justified. The case-study of recent developments related to Libya will demonstrate that the manner in which international law is interpreted is changing the notion of principles of sovereignty. Journal: Defense & Security Analysis Pages: 68-75 Issue: 1 Volume: 29 Year: 2013 Month: 3 X-DOI: 10.1080/14751798.2013.768015 File-URL: http://hdl.handle.net/10.1080/14751798.2013.768015 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:68-75 Template-Type: ReDIF-Article 1.0 Author-Name: Terry Moon Author-X-Name-First: Terry Author-X-Name-Last: Moon Author-Name: Paul Whitbread Author-X-Name-First: Paul Author-X-Name-Last: Whitbread Author-Name: Peter Dortmans Author-X-Name-First: Peter Author-X-Name-Last: Dortmans Title: Portfolio analysis for defense: taking account of networking Abstract: To manage their assets at an enterprise level, defense organizations have turned to portfolio theory for the planning, analysis and management of their military forces and materiel. Despite being well established in the commercial sector, the application of portfolio approaches in defense is problematic. The vexatious question for defense of how to define and measure benefits arising is complicated by the increased utility and effectiveness achieved through networking of military forces and the equipment they use. The authors discuss the challenges for defense in using a portfolio approach and propose a conceptual model for dealing with the effects arising from networking with information and communications technologies. Journal: Defense & Security Analysis Pages: 76-84 Issue: 1 Volume: 29 Year: 2013 Month: 3 X-DOI: 10.1080/14751798.2013.760246 File-URL: http://hdl.handle.net/10.1080/14751798.2013.760246 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:76-84 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 87-88 Issue: 2 Volume: 29 Year: 2013 Month: 6 X-DOI: 10.1080/14751798.2013.787787 File-URL: http://hdl.handle.net/10.1080/14751798.2013.787787 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:87-88 Template-Type: ReDIF-Article 1.0 Author-Name: Scott Firsing Author-X-Name-First: Scott Author-X-Name-Last: Firsing Author-Name: Ogi Williams Author-X-Name-First: Ogi Author-X-Name-Last: Williams Title: Increased Chinese and American defence involvement in Africa Abstract: There is often a perception put forth of a fight for supremacy between China and the USA. This is often the case when discussing the continent of Africa. Both countries have recently increased their involvement in Africa for a variety of reasons. In 2011, China surpassed the USA as Africa's largest trading partner, with Africa predicted to be Beijing's largest trading partner by 2017. As expected, their bilateral and multilateral defence cooperation with strategic countries and organisations has matured and expanded along with it. Washington's own economic interests, al-Qa'ida and threats to maritime security are some of the crucial elements behind the US's presence on the continent. This article analyses both the USA and China's rising defence involvement in Africa. It compares and contrasts their similarities and differences, and argues that cooperation in certain areas can prove beneficial for all parties involved. Journal: Defense & Security Analysis Pages: 89-103 Issue: 2 Volume: 29 Year: 2013 Month: 6 X-DOI: 10.1080/14751798.2013.787789 File-URL: http://hdl.handle.net/10.1080/14751798.2013.787789 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:89-103 Template-Type: ReDIF-Article 1.0 Author-Name: Majak D'Agoôt Author-X-Name-First: Majak Author-X-Name-Last: D'Agoôt Title: Coping with traps of vulnerability: a review of the impact of post-colonial issues on the independence of South Sudan Abstract: In a world virtually free of slavery and colonialism and one mainly driven by the sovereign state rationale, allusion to manifestations or the existence of some form of these phenomena within a state is often received with dumbfounding indifference or denial. However, a form of rule that had continued in South Sudan long after the departure of the British in 1956 was colonial both in its quintessence and flair in that it disenfranchised its citizens and denied them the most basic freedoms, services and development. Under this establishment, resistance against the coercive vision of the state was brutally suppressed for many decades. This state of affairs finally ended in July 2011. Nonetheless, there is a miscellany of unresolved post-colonial issues between the two countries that warrant attention. These include security and the demarcation of borders, the issue of ludicrous transit fees for South Sudan's oil exportation through Sudan, citizenship, external debt repayment, etc. These issues are part of traps inherited from the anti-colonial struggle, which have now supplanted the old ensemble of North--South conflict paroxysm. As a matter of urgency, the two countries will have to wrap up the incomplete process of negotiation on these substantive issues. The talks should be approached with a new mindset based on the new reality of two sovereign states. To the extent that it is widely established that South Sudan and Sudan must coexist peacefully in order to develop into viable entities, such mutual dependency must be based on equality and respect. Journal: Defense & Security Analysis Pages: 104-116 Issue: 2 Volume: 29 Year: 2013 Month: 6 X-DOI: 10.1080/14751798.2013.787791 File-URL: http://hdl.handle.net/10.1080/14751798.2013.787791 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:104-116 Template-Type: ReDIF-Article 1.0 Author-Name: Nina Wilén Author-X-Name-First: Nina Author-X-Name-Last: Wilén Title: Identifying the spoilers in the security sector reform -- disarmament demobilisation and reintegration process in the Congo Abstract: The Congolese security sector reform -- disarmament demobilisation and reintegration (SSR-DDR) process has suffered from setbacks in its military sector during the last 10 years, such as insufficient funding, lack of coordination and domestic reluctance to major changes, with as a result, a very fragile and disjointed Army. These problems have deepened as officers have defected from the Army and caused new instability in the East of the Congo. This article aims to analyse the recent mutinies and the reaction by the Congolese government by applying a capabilities-based approach in combination with a typology of spoilers. The objective is to identify and classify the spoilers and answer the questions of why they emerge now and how they are dealt with on a national level. From the analysis, the author suggests that there are several spoilers involved in the current situation -- the most powerful being the Congolese and the Rwandan governments, prompting the question of whether an international involvement is necessary to solve the problem. Journal: Defense & Security Analysis Pages: 117-127 Issue: 2 Volume: 29 Year: 2013 Month: 6 X-DOI: 10.1080/14751798.2013.787792 File-URL: http://hdl.handle.net/10.1080/14751798.2013.787792 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:117-127 Template-Type: ReDIF-Article 1.0 Author-Name: Chiara Ruffa Author-X-Name-First: Chiara Author-X-Name-Last: Ruffa Title: The long and winding road … to success? Unit peace operation effectiveness and its effect on mission success Abstract: Why does peacekeeping sometimes fail? How can effective peacekeepers increase the likelihood of success of a mission? The two main flaws in the current evaluations of peace operations are that they mainly rely on already concluded missions and that they make use of indicators that do not reveal micro-level dynamics. This article introduces an analytical framework relating the effectiveness of soldiers to their actual impact in their area of operation in a peace operation. The framework is called “unit peace operation effectiveness” (UPOE). Focusing on soldiers in peace operations, this article shows that: different units behave differently; emphasize different aspects of the mandate; and are effective in different ways. Ultimately, this has an actual impact on the end-state of the mission. It relies on and adapts classic security studies works to theoretically enrich the peacekeeping literature. The model is tested in an illustrative case study based on ethnographic work on French and Italian units in Afghanistan between 2008 and 2010. Journal: Defense & Security Analysis Pages: 128-140 Issue: 2 Volume: 29 Year: 2013 Month: 6 X-DOI: 10.1080/14751798.2013.787793 File-URL: http://hdl.handle.net/10.1080/14751798.2013.787793 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:128-140 Template-Type: ReDIF-Article 1.0 Author-Name: Jordan Cohen Author-X-Name-First: Jordan Author-X-Name-Last: Cohen Author-Name: Johnny Quilenderino Author-X-Name-First: Johnny Author-X-Name-Last: Quilenderino Author-Name: Joseph Bubulka Author-X-Name-First: Joseph Author-X-Name-Last: Bubulka Author-Name: Eugene P. Paulo Author-X-Name-First: Eugene P. Author-X-Name-Last: Paulo Title: Linking a throughput simulation to a systems dynamics simulation to assess the utility of a US Navy foreign humanitarian aid mission Abstract: The success of any humanitarian aid mission is generally measured by the timeliness of critical supplies that are delivered to the affected area. However, a more interesting analysis may be to determine the effect of the aid on the overall satisfaction of the local population. The authors' research focused on the delivery of humanitarian aid to a notional region that was decimated by flooding with ships, landing craft and security personnel provided by the US Navy and Marines. While the research effort addressed naval force structure, the focus of the research was: (1) to assess different delivery methods for the aid; and (2) to determine how the aid delivery impacted the overall satisfaction of the local population. To examine both concerns, two simulation models were developed, with one examining the throughput of aid delivered during the operation, and the other the satisfaction of the population based on the humanitarian aid effort. Journal: Defense & Security Analysis Pages: 141-155 Issue: 2 Volume: 29 Year: 2013 Month: 6 X-DOI: 10.1080/14751798.2013.787795 File-URL: http://hdl.handle.net/10.1080/14751798.2013.787795 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:141-155 Template-Type: ReDIF-Article 1.0 Author-Name: Mark Ginsberg Author-X-Name-First: Mark Author-X-Name-Last: Ginsberg Author-Name: Jeff Schiano Author-X-Name-First: Jeff Author-X-Name-Last: Schiano Author-Name: Megan Kramer Author-X-Name-First: Megan Author-X-Name-Last: Kramer Author-Name: Marianne Alleyne Author-X-Name-First: Marianne Author-X-Name-Last: Alleyne Title: A case study in bio-inspired engineering design: defense applications of exoskeletal sensors Abstract: As part of a bio-inspired design process, the authors examine exoskeletal sensors found in insects and their potential application to armor and hardened buildings. In this way, the outer hardening of a structure or vehicle would not limit the ability of occupants to arrive at an actionable picture of the outer environment. To this end, various sensor modalities employed by insects are compared and contrasted with their current human-engineered equivalents. In several sensing modalities, biosensors perform better, are smaller, and more energy efficient than human-engineered equivalents. They note that biological designs tend to employ non-linear response to signal amplitude and respond with heightened sensitivity over a greater dynamic range of signals than human-engineered sensors. The insect biological sensors have structural and mechanical innovations that preserve the protective capacity of the exoskeleton. Journal: Defense & Security Analysis Pages: 156-169 Issue: 2 Volume: 29 Year: 2013 Month: 6 X-DOI: 10.1080/14751798.2013.787798 File-URL: http://hdl.handle.net/10.1080/14751798.2013.787798 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:156-169 Template-Type: ReDIF-Article 1.0 Author-Name: M. J. Williams Author-X-Name-First: M. J. Author-X-Name-Last: Williams Title: Contractors at war: the transformation of US expeditionary operations Journal: Defense & Security Analysis Pages: 170-171 Issue: 2 Volume: 29 Year: 2013 Month: 6 X-DOI: 10.1080/14751798.2013.787799 File-URL: http://hdl.handle.net/10.1080/14751798.2013.787799 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:170-171 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Levi Author-X-Name-First: Michael Author-X-Name-Last: Levi Title: Threat finance: disconnecting the lifeline of organised crime and terrorism Journal: Defense & Security Analysis Pages: 172-173 Issue: 2 Volume: 29 Year: 2013 Month: 6 X-DOI: 10.1080/14751798.2013.788770 File-URL: http://hdl.handle.net/10.1080/14751798.2013.788770 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:172-173 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 175-176 Issue: 3 Volume: 29 Year: 2013 Month: 9 X-DOI: 10.1080/14751798.2013.820607 File-URL: http://hdl.handle.net/10.1080/14751798.2013.820607 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:175-176 Template-Type: ReDIF-Article 1.0 Author-Name: Allan Orr Author-X-Name-First: Allan Author-X-Name-Last: Orr Title: Terrorism: a philosophical discourse Abstract: Though it is nigh on 12 years since 9/11, there is still no agreed definition of terrorism. Indeed, the original nations of the “Coalition of the Willing,” who previously pursued a “War on Terror” so vigorously (Australia, Britain and the USA) have come full circle now to disown entirely the very notion of a “War on Terror.” A key stumbling point towards a definition remains whether terrorism should be classified as an act of crime or of war. The two conceptualisations are philosophically and fundamentally opposed and inevitably from each flows entirely different strategic prescriptions to counter the phenomenon. If policy is to be guided adequately, let alone optimally, the philosophical arguments of each camp must be thrown headlong into one another, with the last philosophy standing the victor and then claiming the policy spoils. Journal: Defense & Security Analysis Pages: 177-187 Issue: 3 Volume: 29 Year: 2013 Month: 9 X-DOI: 10.1080/14751798.2013.820608 File-URL: http://hdl.handle.net/10.1080/14751798.2013.820608 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:177-187 Template-Type: ReDIF-Article 1.0 Author-Name: Alastair Finlan Author-X-Name-First: Alastair Author-X-Name-Last: Finlan Title: The perils of special approaches to counterterrorism: the shooting of Jean Charles de Menezes in 2005 Abstract: The death of Jean Charles de Menezes on the London Underground in 2005 remains a horrifying example of what happens when counterterrorism goes wrong. One of the extraordinary features of the shooting was the remarkable number of special elements, police units, military Special Forces, and unusual procedures and tactics involved in the incident. This article attempts to assess the causal significance of the special dimension in the horrific chain of circumstances. It does so by interrogating numerous explanations for the tragedy and highlighting the role of the special factor. The Stockwell shooting remains very important today because it casts a sharp and somewhat harsh spotlight on the particular pitfalls of special responses, measures and units to the multitudinous threats posed by international terrorism in the twenty-first century. Journal: Defense & Security Analysis Pages: 188-202 Issue: 3 Volume: 29 Year: 2013 Month: 9 X-DOI: 10.1080/14751798.2013.820967 File-URL: http://hdl.handle.net/10.1080/14751798.2013.820967 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:188-202 Template-Type: ReDIF-Article 1.0 Author-Name: James Hasik Author-X-Name-First: James Author-X-Name-Last: Hasik Title: Learning in counterinsurgency: what do we really know? Abstract: Since the publication in 2002 of John Nagl's Learning to Eat Soup with a Knife, organizational learning has been widely presumed an important ingredient for success in counterinsurgency. But sampling the literature from before and after this time shows remarkably little analytical treatment of the issue of learning and even confusion over what it may mean. This article considers the theories, hypotheses, research strategies, threats to validity, methods of measurement, treatments of time, and general lack of statistical analysis in the work to date and recommends a course for future research. Journal: Defense & Security Analysis Pages: 203-217 Issue: 3 Volume: 29 Year: 2013 Month: 9 X-DOI: 10.1080/14751798.2013.820964 File-URL: http://hdl.handle.net/10.1080/14751798.2013.820964 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:203-217 Template-Type: ReDIF-Article 1.0 Author-Name: Orlandrew E. Danzell Author-X-Name-First: Orlandrew E. Author-X-Name-Last: Danzell Author-Name: Steve Zidek Author-X-Name-First: Steve Author-X-Name-Last: Zidek Title: Does counterterrorism spending reduce the incidence and lethality of terrorism? A quantitative analysis of 34 countries Abstract: Following the 11 September 2001 attacks, the US government increased its counterterrorism (CT) funding and created several Federal Agencies such as the Department of Homeland Security; Transportation Security Administration; and National Counterterrorism Center. Similarly, the 7 July 2005, London bombings also compelled the British government to increase its CT funding. These examples illustrate a phenomenon that when states experience terrorism, they dramatically increase public safety spending in order to reduce or eliminate the incidents of and casualties resulting from acts of terror. Using statistical data collected from 34 countries covering nine years, this article examines recent CT spending increases. Critically, the authors explore whether recent public safety expenditures can measurably reduce the number of domestic and international terrorist attacks. The implications of their findings should be salient for policy-makers’ assessments of their countries’ current CT strategies and policies concerning their respective Intelligence and Security Communities. Journal: Defense & Security Analysis Pages: 218-233 Issue: 3 Volume: 29 Year: 2013 Month: 9 X-DOI: 10.1080/14751798.2013.820970 File-URL: http://hdl.handle.net/10.1080/14751798.2013.820970 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:218-233 Template-Type: ReDIF-Article 1.0 Author-Name: Shireen K. Burki Author-X-Name-First: Shireen K. Author-X-Name-Last: Burki Title: Jihad or qatal? Examining Al Qaeda's modus operandi Abstract: There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir. Journal: Defense & Security Analysis Pages: 234-252 Issue: 3 Volume: 29 Year: 2013 Month: 9 X-DOI: 10.1080/14751798.2013.820965 File-URL: http://hdl.handle.net/10.1080/14751798.2013.820965 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:234-252 Template-Type: ReDIF-Article 1.0 Author-Name: Samuel Oyewole Author-X-Name-First: Samuel Author-X-Name-Last: Oyewole Title: Boko Haram and the challenges of Nigeria's war on terror Abstract: Boko Haram terrorism has been recognized by Nigerian President Jonathan as the most threatening and complex security issue in Nigeria since independence. In response, the Federal Government of Nigeria has committed itself to different counterterrorism measures, which are largely dominated by “hard politics” and military mobilization. Spending heavily on defense to upgrade military hardware and train personnel in a counterterrorism role, Nigeria has also boosted its strategic importance in the “Global War on Terror”. However, this attempt has become unpopular as it has failed to contain Boko Haram within a short time frame and has made insufficient headway against unabated terror, with human rights costs among the host communities and amidst a surge of stakeholders' discordance. As a matter of concern, this article seeks to assess Boko Haram as an opponent in Nigeria's war on terror (WOT) and to ascertain the challenges the country faces, the alternative measures open to it, and possible ways forward. Journal: Defense & Security Analysis Pages: 253-262 Issue: 3 Volume: 29 Year: 2013 Month: 9 X-DOI: 10.1080/14751798.2013.820968 File-URL: http://hdl.handle.net/10.1080/14751798.2013.820968 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:253-262 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 263-265 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.845413 File-URL: http://hdl.handle.net/10.1080/14751798.2013.845413 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:263-265 Template-Type: ReDIF-Article 1.0 Author-Name: Susan M. Jellissen Author-X-Name-First: Susan M. Author-X-Name-Last: Jellissen Author-Name: Fred M. Gottheil Author-X-Name-First: Fred M. Author-X-Name-Last: Gottheil Title: On the utility of security fences along international borders Abstract: States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions -- expressed in terms of opportunity-cost functions -- a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many -- among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus -- the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed. Journal: Defense & Security Analysis Pages: 266-279 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842707 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842707 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:266-279 Template-Type: ReDIF-Article 1.0 Author-Name: Tamir Libel Author-X-Name-First: Tamir Author-X-Name-Last: Libel Title: From the people's army to the Jewish people's army: the IDF's force structure between professionalization and militarization Abstract: The article discusses processes of “religionization” within the institutional identity and ethos of the Israel Defense Forces (IDF) and the connection of these processes with the significant structural changes the IDF has undergone in recent decades. The main argument presented is that since the late 1980s, the IDF has been in a culture conflict, torn between soldiers and civilians who advocate turning the IDF into a professional army “military professionalization,” and others who wish to preserve, and even strengthen, the “people's army” model. The present article shows that the meaning of the term “people” in this phrase has shifted to refer strictly to the Jewish people, and that a national-ethnic perception strongly influenced by religious-national ideology has been adopted. Journal: Defense & Security Analysis Pages: 280-292 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842708 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842708 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:280-292 Template-Type: ReDIF-Article 1.0 Author-Name: Leonard C. Sebastian Author-X-Name-First: Leonard C. Author-X-Name-Last: Sebastian Author-Name: Iis Gindarsah Author-X-Name-First: Iis Author-X-Name-Last: Gindarsah Title: Assessing military reform in Indonesia Abstract: This article seeks to assess the magnitude of military reform in Indonesia and its impact in establishing greater levels of professionalism within the armed forces. To this end, the authors will offer some reflections on the studies of civil-military relations and military transformation for inculcating a higher degree of military professionalism; analyse to what extent the process of military reform in Indonesia has reshaped the institutional role of the armed forces; and discern three major strategic gaps in Indonesia's military reform, namely the “legal loopholes and regulation vacuum,” the “shortcomings of democratic civilian control,” and the “defence-economic gap.” This article asserts that military professionalism will grow more substantially depending on the ability of civilian elites to exercise effective control over the military and the capacity of the government to transform the military establishment keeping pace with strategic challenges and operational requirements. Journal: Defense & Security Analysis Pages: 293-307 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842709 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842709 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:293-307 Template-Type: ReDIF-Article 1.0 Author-Name: Jason E. Strakes Author-X-Name-First: Jason E. Author-X-Name-Last: Strakes Title: Political opposition, external threats, and elite responses: analyzing domestic security policy in post-Rose Revolution Georgia Abstract: In the years since the 2003 Rose Revolution, the popularly elected leadership of the Republic of Georgia has responded to organized protests with a variety of repressive tactics. These reactions suggest that former challengers to authoritarian elites may utilize similar methods of retaining power during crisis periods. Yet, the alleged involvement of agencies of the Russian Federation in fomenting domestic instability has also occupied a central position in the national security policies of the outgoing Saakashvili government. These conditions both preceded and were reinforced by the South Ossetia War of August 2008. This article proposes a theoretical model that represents the intervening effect of interstate conflicts on state--society relations in Georgia from 2003 to present. It presents several hypotheses and possible indicators, data sources, and techniques for analyzing the interaction between characteristics of opposition groups, external threats, and the domestic security practices of contemporary Georgian political elites. Journal: Defense & Security Analysis Pages: 308-322 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842710 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842710 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:308-322 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas Overhage Author-X-Name-First: Thomas Author-X-Name-Last: Overhage Title: Pool it, share it, or lose it: an economical view on pooling and sharing of European military capabilities Abstract: In a general and economical view, this article analyzes methods and mechanisms for the pooling and sharing of military forces and weapons inside the European Union (EU) in times of scarcity. Pooling and sharing could improve the EU military capabilities significantly if differences in location factors were taken into account and all states would focus on their respective strengths. More competition and less concentration are the keys to ensuring guaranteed access to military assets. Pooling and sharing are likely to be successful only if large states enhance their emphasis on collective defense by mutual aid and self-help, and reduce particularistic and parochial interests of local gain. The realm of personnel has the most potential for improvement but any change is likely to generate policy implications. Journal: Defense & Security Analysis Pages: 323-341 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842712 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842712 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:323-341 Template-Type: ReDIF-Article 1.0 Author-Name: Hans Mouritzen Author-X-Name-First: Hans Author-X-Name-Last: Mouritzen Title: In spite of reform: NATO HQ still in the grips of nations Abstract: Security Intergovernmental Organizations, here illustrated by NATO, persist in a “permitted interval” of internationalization, i.e. permitted by its member-states. On the one hand, they are seldom or never permitted to vanish due to member-states' vested interests in retaining them as tools of statecraft, even if their original purposes have become redundant. On the other hand, there is an internationalization ceiling that they must respect: they should not become too autonomous and thereby no longer be suitable as member-state tools. In spite of post-Cold War reform, interviews carried out at NATO Headquarters (HQ) in the late 1980s compared to interviews in 2012 display that a continuous pulling and hauling of forces of internationalization and renationalization have taken place around NATO HQ. The only instance of clear internationalization can be observed in the proactive diplomacy of Secretary General Fogh Rasmussen. There is stiff opposition to the internationalization of abolishing the Military Committee/International Military Staff among minor and South European states, and there is no waning in states' attempts to micro-manage the International Staff. Only external shocks can overcome resistance to internationalizing reform. Journal: Defense & Security Analysis Pages: 342-355 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.843833 File-URL: http://hdl.handle.net/10.1080/14751798.2013.843833 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:342-355 Template-Type: ReDIF-Article 1.0 Author-Name: Andrei Makarychev Author-X-Name-First: Andrei Author-X-Name-Last: Makarychev Author-Name: Alexander Sergunin Author-X-Name-First: Alexander Author-X-Name-Last: Sergunin Title: Russian military reform: institutional, political and security implications Abstract: This critical comment examines the incentives, major priorities, difficulties and first results of the Russian military reform that is being implemented since 2008. The authors conclude that despite numerous drawbacks and barriers to the reformist efforts certain successes can be identified. Particularly, there is a clear shift from the old-fashioned, Soviet-type army to a more compact, mobile, better equipped and combat-ready armed forces that are capable to cope with today's challenges to Russian national security. Journal: Defense & Security Analysis Pages: 356-364 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842711 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842711 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:356-364 Template-Type: ReDIF-Article 1.0 Author-Name: Katherine E. Brown Author-X-Name-First: Katherine E. Author-X-Name-Last: Brown Title: The Ashgate research companion to political violence Journal: Defense & Security Analysis Pages: 365-366 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842713 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842713 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:365-366 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Anthony Steinberg Author-X-Name-First: Michael Anthony Author-X-Name-Last: Steinberg Title: European Security: the roles of regional organisations Journal: Defense & Security Analysis Pages: 367-368 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842714 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842714 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:367-368 Template-Type: ReDIF-Article 1.0 Author-Name: John Allen Author-X-Name-First: John Author-X-Name-Last: Allen Title: Soldier at heart -- from private to general Journal: Defense & Security Analysis Pages: 368-370 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842721 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842721 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:368-370 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Anthony Steinberg Author-X-Name-First: Michael Anthony Author-X-Name-Last: Steinberg Title: NATO: the power of partnershipsPursuing strategy: NATO operations from the Gulf War to Gaddafi Journal: Defense & Security Analysis Pages: 370-372 Issue: 4 Volume: 29 Year: 2013 Month: 12 X-DOI: 10.1080/14751798.2013.842722 File-URL: http://hdl.handle.net/10.1080/14751798.2013.842722 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:370-372 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 1-3 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2014.874093 File-URL: http://hdl.handle.net/10.1080/14751798.2014.874093 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:1-3 Template-Type: ReDIF-Article 1.0 Author-Name: Bao U. Nguyen Author-X-Name-First: Bao U. Author-X-Name-Last: Nguyen Title: Assessment of a Ballistic Missile Defense System Abstract: This article presents a complete and self-contained analysis that assesses the effectiveness of a Ballistic Missile Defense System (BMDS). It does that by applying several techniques such as the properties of stochastic processes, the use of dynamical programing, the concept of generating functions and the applications of orbital mechanics. A step-by-step description starting from the computation of the number of engagement opportunities to the calculation of the probability of raid negation to the evaluation of the probability of integrated system effectiveness is introduced. The analysis also compares firing tactics in terms of effectiveness and inventory savings, assesses their contributions and limitations, as well as determines the driving parameters of a BMDS. New and optimal firing tactics based on more than one category of engagement opportunity are also described. The concept of redundancy and the possibility of boost-phase engagement are also explored in order to evaluate their impacts on the effectiveness of a BMDS. Journal: Defense & Security Analysis Pages: 4-16 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2013.864870 File-URL: http://hdl.handle.net/10.1080/14751798.2013.864870 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:4-16 Template-Type: ReDIF-Article 1.0 Author-Name: Nicholas Khoo Author-X-Name-First: Nicholas Author-X-Name-Last: Khoo Author-Name: Reuben Steff Author-X-Name-First: Reuben Author-X-Name-Last: Steff Title: “This program will not be a threat to them”: Ballistic Missile Defense and US relations with Russia and China Abstract: Although the Obama Administration has differed from its predecessor in a number of respects, on the specific issue of Ballistic Missile Defense (BMD), there is a striking continuity. The Obama Administration has remained committed to the BMD project, even as it has modified the schedule of deployments and prioritized different systems from the Bush Administration. Significantly, this has led to Chinese and Russian balancing in the nuclear sphere. As a result, there is evidence of a security dilemma-type dynamics in US relations with China and Russia. At present, there is no study that analyzes Russian and Chinese hard internal balancing against the USA in the sphere of missile defense during the Obama Administration. This article fills this gap. Journal: Defense & Security Analysis Pages: 17-28 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2013.864869 File-URL: http://hdl.handle.net/10.1080/14751798.2013.864869 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:17-28 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: Strategic “defensivism” and post-reset blues: US--Russian nuclear arms reductions, missile defenses and minimum deterrence Abstract: US nuclear deterrence and arms control policy may be moving, by design and by inadvertence, toward a posture of strategic “defensivism”. Strategic “defensivism” emphasizes the overlapping and reinforcing impact of: (1) reductions in US, Russian and possibly other strategic nuclear forces, possibly down to the level of “minimum deterrence,” (2) deployment of improved strategic and/or theater antimissile defenses for the US, NATO allies and other partners; and (3) additional reliance on conventional military forces for some missions hitherto preferentially assigned to nuclear weapons. This article deals with the first two of these aspects only: the interaction between missile defenses and offensive force reductions in US--Russian strategy and policy. The findings are that stable deterrence as between the USA and Russia is possible at lower than New Strategic Arms Reduction Treaty levels, but reductions below 1000 deployed long-range weapons for each state, toward a true minimum deterrent posture, will require multilateral as opposed to bilateral coordination of arms limitations. Missile defenses might provide some denial capability against light attacks by states with small arsenals, but they still fall short of meaningful damage limitation as between powers capable of massive nuclear strikes. Journal: Defense & Security Analysis Pages: 29-43 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2013.864871 File-URL: http://hdl.handle.net/10.1080/14751798.2013.864871 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:29-43 Template-Type: ReDIF-Article 1.0 Author-Name: Kunal Mukherjee Author-X-Name-First: Kunal Author-X-Name-Last: Mukherjee Title: The Kashmir conflict in South Asia: voices from Srinagar Abstract: This article looks at the Kashmir conflict in South Asia, which has been going on since 1947, when India and Pakistan became independent from British colonial rule. After looking at some historical background, the article looks at both the external dimension as well as the internal dimension of the conflict. The external dimension tends to focus on Indo-Pak relations over Kashmir and the internal dimension looks at India's repressive state policies within the state of Kashmir. This article uses Mary Kaldor's “New War” thesis as a theoretical framework to understand the situation and pays special attention to the conflict's very complex and multifaceted nature. The article argues that although the levels of violence have differed from time to time in the region since 1947, today the conflict seems to have less to do with Indo-Pak relations or the external side of things and has more to do with the internal dimension and India's undemocratic ways within Kashmir. Today, Kashmir is one of the most militarised conflict zones in the world. The stationing of the Indian military and paramilitary forces in the region has only exacerbated the situation since it is the security personnel who cause much of the problem. The Armed Forces Special Powers Act gives these security forces extraordinary powers in the region, which they often abuse. The armed forces have no real understanding of the local culture or sympathy for local religious sentiments. Poverty, corruption, administrative failure, police brutality, identity politics and human rights abuses are some of the key features associated with this conflict. Methodologically, a number of interviews were carried out with the local people in the region recently. From the data gathered through the interviews, it is very obvious that the people still feel very oppressed and that the situation is still very volatile, fraught with uncertainty. Finally, after making an assessment of the situation, the article tries to suggest methods of peaceful building and conflict management as the way forward. Journal: Defense & Security Analysis Pages: 44-54 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2013.864868 File-URL: http://hdl.handle.net/10.1080/14751798.2013.864868 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:44-54 Template-Type: ReDIF-Article 1.0 Author-Name: Michel Ben Arrous Author-X-Name-First: Michel Ben Author-X-Name-Last: Arrous Author-Name: Robert Feldman Author-X-Name-First: Robert Author-X-Name-Last: Feldman Title: Understanding contemporary conflicts in Africa: a state of affairs and current knowledge Abstract: Understanding contemporary conflicts in Africa remains directly dependent on the approaches employed to decipher or interpret them. This article first examines the bias of conventional approaches (inherited from the Cold War) and then those of a series of supposedly “newer” approaches. Relying primarily on West African examples, it offers a brief overview of current knowledge, issues, and avenues for research, based on three apparent characteristics of a “new generation” of conflicts: the regionalization of wars, the privatization of violence and security, and the recourse to extreme forms of brutality. These three major trends bear witness to a rapid transformation of war and armed violence over the past 20 years, but they are not sufficient to establish a radical historical break between “old” and “new” conflicts in Africa. By concealing elements of continuity a priori, the most influential “new” approaches actually make it impossible to ponder their own limits. To that end, fashionability and struggles for influence within the Africanist field play a major role in perpetuating dominant, sensationalistic, or simplistic (and invariably incorrect) portrayals of African conflicts. Journal: Defense & Security Analysis Pages: 55-66 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2013.864865 File-URL: http://hdl.handle.net/10.1080/14751798.2013.864865 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:55-66 Template-Type: ReDIF-Article 1.0 Author-Name: Yu Wang Author-X-Name-First: Yu Author-X-Name-Last: Wang Title: Guns--butter tradeoff in contemporary China Abstract: This study offers an investigation of the relationship between defense and social spending in the People's Republic of China. In particular, three consecutive questions are answered here. Does a warfare--welfare tradeoff exist in China's budgetary allocation? Is it positive or negative? What is the causal direction involved? By applying a vector autoregression analysis for the period of 1952--2006, this study finds a unidirectional crowd-out effect going from defense to social spending. Journal: Defense & Security Analysis Pages: 67-75 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2013.864867 File-URL: http://hdl.handle.net/10.1080/14751798.2013.864867 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:67-75 Template-Type: ReDIF-Article 1.0 Author-Name: Alexei Filinkov Author-X-Name-First: Alexei Author-X-Name-Last: Filinkov Author-Name: Peter J. Dortmans Author-X-Name-First: Peter J. Author-X-Name-Last: Dortmans Title: An enterprise portfolio approach for defence capability planning Abstract: Capability-based planning (CBP) is considered by many defence organisations to be the best practice for enterprise-level planning, analysis and management. This approach, loosely based around investment portfolio theory, is premised on balancing the cost, benefit and risk of capability options across the defence enterprise. However a number of authors have recently noted limitations of its current applications. The authors propose a more general, insurance-based approach, which can support the evolutionary improvement of the current CBP approach. This approach is implemented as hedging-based planning and aims to better reflect the enterprise nature of defence organisations, capturing both force structure and force generation aspects of military systems. Journal: Defense & Security Analysis Pages: 76-82 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2013.864866 File-URL: http://hdl.handle.net/10.1080/14751798.2013.864866 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:76-82 Template-Type: ReDIF-Article 1.0 Author-Name: Tamir Libel Author-X-Name-First: Tamir Author-X-Name-Last: Libel Title: Divine service? Judaism and Israel's armed forces Journal: Defense & Security Analysis Pages: 83-84 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2014.872325 File-URL: http://hdl.handle.net/10.1080/14751798.2014.872325 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:83-84 Template-Type: ReDIF-Article 1.0 Author-Name: Richard Connaughton Author-X-Name-First: Richard Author-X-Name-Last: Connaughton Title: British generals in Blair's wars Journal: Defense & Security Analysis Pages: 85-86 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2014.874693 File-URL: http://hdl.handle.net/10.1080/14751798.2014.874693 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:85-86 Template-Type: ReDIF-Article 1.0 Author-Name: Kunal Mukherjee Author-X-Name-First: Kunal Author-X-Name-Last: Mukherjee Title: The Islamist challenge in West Asia Journal: Defense & Security Analysis Pages: 86-87 Issue: 1 Volume: 30 Year: 2014 Month: 3 X-DOI: 10.1080/14751798.2014.875244 File-URL: http://hdl.handle.net/10.1080/14751798.2014.875244 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:86-87 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 89-91 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.897107 File-URL: http://hdl.handle.net/10.1080/14751798.2014.897107 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:89-91 Template-Type: ReDIF-Article 1.0 Author-Name: Olive Emil Wetter Author-X-Name-First: Olive Emil Author-X-Name-Last: Wetter Title: Terrorism research: should we focus on the opponent or on our own people? Abstract: In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted. Journal: Defense & Security Analysis Pages: 92-105 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.894298 File-URL: http://hdl.handle.net/10.1080/14751798.2014.894298 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:92-105 Template-Type: ReDIF-Article 1.0 Author-Name: Yakov Ben-Haim Author-X-Name-First: Yakov Author-X-Name-Last: Ben-Haim Title: Strategy selection: an info-gap methodology Abstract: The evaluation and selection of military strategy requires consideration of myriad factors -- social, historical, political, geographical and technological -- together with vast uncertainties encompassing all these domains. Info-gap decision theory is a conceptual framework that can support these deliberations and that has substantive implications for the formulation, evaluation and selection of strategic goals and of the means to attain them. In particular, while the analyst may desire to reliably achieve the best possible outcome, info-gap theory provides a critique of, and alternative to, the paradigm of optimizing the outcome of a decision. In selecting between strategy alternatives, the analyst must sometimes choose between one alternative that is purportedly better than another, but also more uncertain. Such a choice is a dilemma whose resolution requires the analyst to balance between the different predicted qualities of each alternative and their different vulnerabilities to uncertainty. The dilemma can be managed with the info-gap methodology of robustly satisfying critical requirements. Journal: Defense & Security Analysis Pages: 106-119 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.894292 File-URL: http://hdl.handle.net/10.1080/14751798.2014.894292 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:106-119 Template-Type: ReDIF-Article 1.0 Author-Name: Kevin Marsh Author-X-Name-First: Kevin Author-X-Name-Last: Marsh Title: “Leading from behind”: neoclassical realism and operation Odyssey Dawn Abstract: In March 2011, President Barack Obama ordered US air and naval forces to commence Operation Odyssey Dawn in Libya to impose a no-fly zone. The decision by the Obama Administration to intervene in a limited and supporting role in Libya is an important development in US foreign policy. Operation Odyssey Dawn presents scholars with a valuable opportunity to analyze and explore how US foreign policy is made and what roles domestic politics and elite perceptions play in decisions to use force. The author argues that neoclassical realism is a useful and compelling theoretic framework with which to analyze Operation Odyssey Dawn. While the Administration intervened in response to perceived external-level threats to US national interests, salient intervening domestic-level variables and elite perceptions shaped and guided the tenor and scope of the operation. Journal: Defense & Security Analysis Pages: 120-132 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.894295 File-URL: http://hdl.handle.net/10.1080/14751798.2014.894295 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:120-132 Template-Type: ReDIF-Article 1.0 Author-Name: David R. Henderson Author-X-Name-First: David R. Author-X-Name-Last: Henderson Author-Name: Chad W. Seagren Author-X-Name-First: Chad W. Author-X-Name-Last: Seagren Title: Would conscription reduce support for war? Abstract: An increasingly popular justification for conscription is that it would increase the probability that the “children” of politically powerful people would serve in the military, thus giving them an incentive to lobby against war. However, this argument neglects the fact that avoiding war for a nation is a public good and is, therefore, subject to the classic free-rider problem. Under-provision of anti-war agitation from those seeking to avoid the draft is exacerbated by the fact that seeking a deferment provides an alternative with a superior private payoff. Empirical findings since World War II are consistent with our thesis. Journal: Defense & Security Analysis Pages: 133-147 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.894293 File-URL: http://hdl.handle.net/10.1080/14751798.2014.894293 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:133-147 Template-Type: ReDIF-Article 1.0 Author-Name: Stefan Markowski Author-X-Name-First: Stefan Author-X-Name-Last: Markowski Author-Name: Peter Hall Author-X-Name-First: Peter Author-X-Name-Last: Hall Title: Mandated defence offsets: can they ever deliver? Abstract: Defence offsets are elements of defence procurement deals additional to the primary content. Offsets are usually expected to yield technological or industrial benefits to the purchasing country (e.g. countertrade, technology transfers, or additional jobs) and military buyers often require suppliers to make offsets available “cost-free.” The authors argued previously that such strategies achieve little of value to buyers that lack market power and are unnecessary otherwise, since purchasers with the market power to extract more value for money from foreign suppliers can do so anyway. This article also focuses on the supply side of offset deals. The USA is the world's largest defence offsets supplier but the US government opposes offsets demands as economically inefficient and trade distorting. Even if offsets are inefficient and trade distorting, they may still benefit a materiel-exporting country such as the USA as they may induce exports and create associated benefits for the offsets provider. Journal: Defense & Security Analysis Pages: 148-162 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.894294 File-URL: http://hdl.handle.net/10.1080/14751798.2014.894294 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:148-162 Template-Type: ReDIF-Article 1.0 Author-Name: Dmitri Shlapentokh Author-X-Name-First: Dmitri Author-X-Name-Last: Shlapentokh Title: Ukrainian and Belorussian dimensions of Turkmenistan foreign policy: small states in a multipolar world Abstract: As the USA continues to decline both in relative and absolute terms, the global order emerges where no center of power exists. This creates a complicated and instable geopolitical situation where small states could act behind the back of the great powers. The relationship between Turkmenistan and Ukraine is the example of this sort of relationship. Whereas Ukraine wants to get cheap gas, Turkmenistan wants to find the way to sell its gas to the West. It looks as though both countries pay little attention to Russian objection and act without direct help from either the USA or other great powers. Journal: Defense & Security Analysis Pages: 163-175 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.894297 File-URL: http://hdl.handle.net/10.1080/14751798.2014.894297 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:163-175 Template-Type: ReDIF-Article 1.0 Author-Name: Henry Prunckun Author-X-Name-First: Henry Author-X-Name-Last: Prunckun Title: Covert radio communications: a viable tactic for international terrorists? Abstract: Covert operations by underground groups, such as transnational terrorists, are not new and neither are the methods members of these groups use to communicate in their shadowy world. In this regard, one of the enduring myths is that the main means these covert operatives use to communicate within their cell structure are telephones and emails in their various manifestations. This article critically discusses the possible use of wireless transmissions by transnational terrorists as a reliable form of communications. To critically discuss this proposition, a force field analysis was used to assess the theory that radio is a viable option. Implications of this study's findings are considered in terms of the ramifications they have for defence and security policy. Journal: Defense & Security Analysis Pages: 176-184 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.894296 File-URL: http://hdl.handle.net/10.1080/14751798.2014.894296 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:176-184 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: New wars, new books, new ethics Journal: Defense & Security Analysis Pages: 185-188 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.894291 File-URL: http://hdl.handle.net/10.1080/14751798.2014.894291 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:185-188 Template-Type: ReDIF-Article 1.0 Author-Name: John Allen Author-X-Name-First: John Author-X-Name-Last: Allen Title: Diversionary war -- domestic unrest and international conflict Journal: Defense & Security Analysis Pages: 189-190 Issue: 2 Volume: 30 Year: 2014 Month: 6 X-DOI: 10.1080/14751798.2014.897109 File-URL: http://hdl.handle.net/10.1080/14751798.2014.897109 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:189-190 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 193-195 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.927670 File-URL: http://hdl.handle.net/10.1080/14751798.2014.927670 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:193-195 Template-Type: ReDIF-Article 1.0 Author-Name: Saroj Kumar Rath Author-X-Name-First: Saroj Kumar Author-X-Name-Last: Rath Title: New terrorist threat to India's internal security: the danger from Pakistan's “Karachi Project” Abstract: The spectacular commando-style terrorist strike on Mumbai in November 2008 exposed India's lax internal security structure. As nearly all the security apparatus broke down during the long spell of attacks, massive public outrage flared up across the country calling for a firmer government response. Shockingly, India has done little to prevent a recurrence and a new security threat faces the country every single day not merely before but even after the Mumbai attacks. In contrast, Pakistan's Inter Services Intelligence and the Lashkar-e-Taiba have successfully evaded pressures from both India and the international community and continue their terror campaign against India under the “Karachi Project” with the explicit intention to unsettle South Asia. Classified documents indicated that India is at the forefront of a cataclysmic “nuclear terrorism” threat from a “combination of Pakistan-based terrorists and homegrown radicals.” This article analyses the danger posed by the Indo-Pak radical groups targeting India and India's lack of preparedness to the new security threat from the “Karachi Project.” Journal: Defense & Security Analysis Pages: 196-208 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.924738 File-URL: http://hdl.handle.net/10.1080/14751798.2014.924738 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:196-208 Template-Type: ReDIF-Article 1.0 Author-Name: Luqman Saeed Author-X-Name-First: Luqman Author-X-Name-Last: Saeed Author-Name: Shabib Haider Syed Author-X-Name-First: Shabib Haider Author-X-Name-Last: Syed Author-Name: Roger P. Martin Author-X-Name-First: Roger P. Author-X-Name-Last: Martin Title: Historical patterns of terrorism in Pakistan Abstract: This article presents a descriptive analysis of terrorism in Pakistan over the past three decades. Using statistical tools, the authors disentangle terrorist violence to expose underlying trends. Continuities and discontinuities in the various types of terrorism are identified and correlated with domestic and international events. The gravity of terrorist violence is found to change from one region of the country to another in response to geopolitical events. The Khyber Pakhtunkhwa share of terrorist incidents during the last three decades fell from 45% to 5% and then rebounded to 58%. Sindh's share of terrorist incidents followed an opposite pattern over the three decades, increasing from 23% to 68% and then decreasing again to just 9%. Terrorist incidents were most frequent in the 1990s but most lethal in the 2000s. Overall, terrorist violence has followed an increasing trend. The composition of terrorist attacks (sectarian, ethnic, and non-sectarian religious) has changed over the past three decades, with sectarian terrorism emerging as the more lethal, causing almost six casualties per attack. Terrorist methods have also changed over time, with bombings becoming less prominent in the 1990s but much more common in the 2000s. The geographical distribution of terrorist incidents has likewise changed over time -- national and provincial capitals were targeted 64% of the time in the 1980s and just 25% of the time today. Overall, the authors conclude that the methods and pattern of terrorist incidents change logically in response to changes in the geopolitical environment. Journal: Defense & Security Analysis Pages: 209-229 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.921450 File-URL: http://hdl.handle.net/10.1080/14751798.2014.921450 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:209-229 Template-Type: ReDIF-Article 1.0 Author-Name: Rizwan Zeb Author-X-Name-First: Rizwan Author-X-Name-Last: Zeb Title: Pakistan’s nuclear weapons: how safe is safe enough? Transparency versus opacity Abstract: Due to expanding and increasing religious extremism and terrorism coupled with political instability in Pakistan, most western observers believe that Pakistan's nuclear weapons are not secure and could be taken over by terrorists. This would have adverse implications for the region and for global peace, especially for the security of USA and Europe. This article argues that this perception is based on a flawed understanding and knowledge of how Pakistan's command and control setup has evolved and operates. Pakistan's nuclear weapons are as safe as any other state's nuclear weapons. Pakistan has also been active in supporting and participating in global efforts to improve nuclear safety and security. Over the years, Pakistan has been quite open in sharing information regarding how it is improving its command and control system with western governments as well as scholars. This article argues that the steps Pakistan has taken to secure its nuclear weapons are adequate and that Pakistan would continue to further strengthen these measures; however, it is the expanding religious extremism, terrorism and anti-Americanism in the country which make the international perception of Pakistan extremely negative and then seep into the perception of Pakistan's nuclear weapons safety and security. Journal: Defense & Security Analysis Pages: 230-244 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.925640 File-URL: http://hdl.handle.net/10.1080/14751798.2014.925640 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:230-244 Template-Type: ReDIF-Article 1.0 Author-Name: Mahmood Ahmad Author-X-Name-First: Mahmood Author-X-Name-Last: Ahmad Title: The legality of unmanned aerial vehicles outside the combat zone: a case study of the Federally Administered Tribal Areas of Pakistan Abstract: The drone is the latest tool to promote interests of a nation-state. It is clear that USA as well as other major powers anticipate that robotics will play a key role in future warfare. Today, more than 70 countries have already acquired drone technology and many others are desperate to join the ranks. This urge for drone technology will ultimately lead to a “boundless and borderless war without end.” In the case of Pakistan, the US drone campaign has raised some important issues regarding how their use could, or should, be regulated in the future. This article analyses the legal issues raised by the US's use of drone technology in non-combat zones, such as Pakistan. It is argued that a reckless disrespect of Pakistan's sovereignty has had adverse implications and consequences for the legitimacy of the Pakistani government. Drone strikes have prompted instinctive opposition among the Pakistani population, hurt their feelings and estranged them from the government. This in turn has added to Pakistan's instability and stimulated a ground-swell of animosity toward the USA. Journal: Defense & Security Analysis Pages: 245-253 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.921448 File-URL: http://hdl.handle.net/10.1080/14751798.2014.921448 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:245-253 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew J. Webb Author-X-Name-First: Matthew J. Author-X-Name-Last: Webb Title: Grievance and the Kashmiri diaspora Abstract: Grievance theories that emphasize injustice as the primary cause of secessionist violence offer valuable insights into the motivations of sponsors and participants. However, they face a difficulty in explaining the participation and support of geographically dispersed populations of co-ethnics (diaspora) that is not shared by rival theories that instead emphasize self-interest. This article uses the Kashmiri diaspora in Britain to examine how appeal to nationalist factors of shared identity, mutual sympathy and common understandings might allow grievance theories to effectively explain diaspora support. It concludes that, while a hybrid grievance-nationalist model might offer a more accurate and nuanced explanatory account of secessionist violence, it does so at the cost of conceptual clarity. Finally, the article addresses the implications for states and strategies to reduce the mobilization of diaspora in order to deny secessionists’ valuable assistance. Journal: Defense & Security Analysis Pages: 254-265 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.921451 File-URL: http://hdl.handle.net/10.1080/14751798.2014.921451 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:254-265 Template-Type: ReDIF-Article 1.0 Author-Name: Zain Rafique Author-X-Name-First: Zain Author-X-Name-Last: Rafique Author-Name: Muhammad Azfar Anwar Author-X-Name-First: Muhammad Azfar Author-X-Name-Last: Anwar Title: Insurgency in Afghanistan: implications for Pakistan's internal and external security Abstract: In the aftermath of 9/11, the USA embarked on a massive global hunt for terrorists and launched its “Operation Enduring Freedom” in Afghanistan. Its failure to control insurgency in Afghanistan spilled over into Pakistan, with disastrous consequences. The resurgence of the Taliban with more formidable tactics and maneuvering skills has become more troublesome for both Afghanistan and Pakistan and for the USA and its allied forces. The fierce comeback of the insurgents has challenged the political and territorial integrity of Pakistan, one that it cannot tolerate. This article analyzes the current situation and its implications for Pakistan's security. Moreover, it looks into the internal and external security complexities that Pakistan faces and the possible implications of the US exit strategy for Pakistan's security. It concludes that the security situation in Pakistan is continuously deteriorating and no part of her territory is immune from terrorists' attacks. To be successful, Pakistan must pursue a broad-based strategy that encompasses military, political, social, economic and informational domains aimed at accomplishing four major objectives: (1) elimination of foreign terrorists and their facilitators; (2) strengthening of the political and administrative institutions in the Federally Administered Tribal Areas (FATA); (3) establishing a safe and secure environment conducive for sustained development and the realization of real socio-economic progress and (4) integrating the FATA into the national mainstream. In the long term, a strategy based on the concept of “Enlightened Moderation” is the right solution, not only to the internal problems of Pakistan but also for the Muslim world and the international community. Journal: Defense & Security Analysis Pages: 266-282 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.921449 File-URL: http://hdl.handle.net/10.1080/14751798.2014.921449 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:266-282 Template-Type: ReDIF-Article 1.0 Author-Name: Steve Carpenter Author-X-Name-First: Steve Author-X-Name-Last: Carpenter Title: Countering the Quetta Shura: a viable strategy to US policy in Afghanistan Abstract: The US strategy in Afghanistan has fallen short of neutralizing the insurgency that threatens the future stability. The primary insurgency's leadership council, the Quetta Shura, has effectively managed influence through a shadow government and superior tactics in recruiting marginalized tribal leaders, leading to a questionable outcome once Coalition forces withdraw in 2014. This article summarizes the threat posed by the Quetta Shura, coinciding with the deficiencies in the current US policy, and recommends a more viable strategy conducive to the current circumstances, based on historical and cultural precedence. Coalition forces have put a great amount of time, money, and effort into establishing a more stable Afghanistan. The USA needs a more aggressive strategy to counter the aspirations of the insurgency, thereby giving the Afghans the opportunity to further progress in the future. Under the current circumstances and policies, a peaceful transition after the Coalition withdrawal is becoming more unlikely. Journal: Defense & Security Analysis Pages: 283-295 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.921447 File-URL: http://hdl.handle.net/10.1080/14751798.2014.921447 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:283-295 Template-Type: ReDIF-Article 1.0 Author-Name: Steve Dobransky Author-X-Name-First: Steve Author-X-Name-Last: Dobransky Title: The rise of China vs. the logic of strategy Journal: Defense & Security Analysis Pages: 296-298 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.924727 File-URL: http://hdl.handle.net/10.1080/14751798.2014.924727 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:296-298 Template-Type: ReDIF-Article 1.0 Author-Name: Peter Rowe Author-X-Name-First: Peter Author-X-Name-Last: Rowe Title: The law of war Journal: Defense & Security Analysis Pages: 298-299 Issue: 3 Volume: 30 Year: 2014 Month: 9 X-DOI: 10.1080/14751798.2014.924728 File-URL: http://hdl.handle.net/10.1080/14751798.2014.924728 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:298-299 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 301-303 Issue: 4 Volume: 30 Year: 2014 Month: 12 X-DOI: 10.1080/14751798.2014.964913 File-URL: http://hdl.handle.net/10.1080/14751798.2014.964913 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:301-303 Template-Type: ReDIF-Article 1.0 Author-Name: Amitai Etzioni Author-X-Name-First: Amitai Author-X-Name-Last: Etzioni Title: The United States' retreat from the Middle East and pivot to the Far East is likely to intensify Abstract: A combination of threat analysis and “subterranean forces” (such as proclivities to fight conventional wars as compared to asymmetric ones) leads the USA to prefer focusing on the threats from China rather than those emanating from the Middle East. Journal: Defense & Security Analysis Pages: 304-310 Issue: 4 Volume: 30 Year: 2014 Month: 12 X-DOI: 10.1080/14751798.2014.964914 File-URL: http://hdl.handle.net/10.1080/14751798.2014.964914 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:304-310 Template-Type: ReDIF-Article 1.0 Author-Name: P.I. Kasatkin Author-X-Name-First: P.I. Author-X-Name-Last: Kasatkin Author-Name: V.A. Avatkov Author-X-Name-First: V.A. Author-X-Name-Last: Avatkov Title: The soft power of migration -- a hard task for the European union Abstract: The article studies the range of problems that have emerged due to the growing immigration from Muslim countries into the European Union (EU). While describing the functions of immigrants' communities, the authors focus on their political role in the receiving states. The study of the historical development of government--diaspora relations in three cases (the UK, France, and Germany) shows that Muslim communities' political influence does not reflect their economic and cultural role, which in the future might threaten the EU security, unless these countries develop a new approach to an “acculturation” policy. Journal: Defense & Security Analysis Pages: 311-322 Issue: 4 Volume: 30 Year: 2014 Month: 12 X-DOI: 10.1080/14751798.2014.948282 File-URL: http://hdl.handle.net/10.1080/14751798.2014.948282 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:311-322 Template-Type: ReDIF-Article 1.0 Author-Name: Valery Konyshev Author-X-Name-First: Valery Author-X-Name-Last: Konyshev Author-Name: Alexander Sergunin Author-X-Name-First: Alexander Author-X-Name-Last: Sergunin Title: Is Russia a revisionist military power in the Arctic? Abstract: In contrast with a widespread perception of Russia as an expansionist power in the Arctic, this article argues that Moscow does not seek military superiority in the region. Rather, Moscow's military strategies in the Arctic pursue three major goals: first, to demonstrate and ascertain Russia's sovereignty over its exclusive economic zone and continental shelf in the region; second, to protect its economic interests in the High North; and third, to demonstrate that Russia retains its great power status and still has world-class military capabilities. The Russian military modernization programs are quite modest and aim at upgrading the Russian armed forces in the High North rather than providing them with additional offensive capabilities or provoking a regional arms race. The Russian ambitions in the Arctic may be high, but they are not necessarily implying the intentions and proper capabilities to confront other regional players by military means. On the contrary, Moscow opts for soft rather than hard power strategy in the Arctic. Journal: Defense & Security Analysis Pages: 323-335 Issue: 4 Volume: 30 Year: 2014 Month: 12 X-DOI: 10.1080/14751798.2014.948276 File-URL: http://hdl.handle.net/10.1080/14751798.2014.948276 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:323-335 Template-Type: ReDIF-Article 1.0 Author-Name: Heinz Gaertner Author-X-Name-First: Heinz Author-X-Name-Last: Gaertner Title: North Korea, deterrence, and engagement Abstract: The Democratic People's Republic of Korea (DPRK) justifies its nuclear weapon arsenal with the concept of deterrence. It means that it will try to miniaturize and modernize its warheads and missiles. This leads to a first-use doctrine of nuclear weapons. Obama's policy of engagement does not offer a solution to the North Korean nuclear issue as yet. In the context of its policy of critical engagement with the DPRK, the European Union has three key interests: regional peace and stability, denuclearization, and human rights. The Conference on Security and Cooperation (CSCE) could be a precedent. The CSCE process was based on three “baskets”: security, economics, and humanitarian. The multilateral Trans-Pacific Partnership is a step in this regard. This article looks at three theoretical approaches: realism, liberal institutionalism, and liberal internationalism. It concludes that a political strategy to create a stable North Korean peninsula has to go beyond nuclear deterrence that is based on the realist notion of balance of power. Journal: Defense & Security Analysis Pages: 336-345 Issue: 4 Volume: 30 Year: 2014 Month: 12 X-DOI: 10.1080/14751798.2014.950464 File-URL: http://hdl.handle.net/10.1080/14751798.2014.950464 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:336-345 Template-Type: ReDIF-Article 1.0 Author-Name: Anke Richter Author-X-Name-First: Anke Author-X-Name-Last: Richter Author-Name: Natalie J Webb Author-X-Name-First: Natalie J Author-X-Name-Last: Webb Title: Can Smart Defense work? A suggested approach to increasing risk- and burden-sharing within NATO Abstract: “Smart Defense” is NATO's new approach to risk- and burden-sharing, which has been a chronic problem within the alliance since the 1950s. Numerous solutions have been proposed, but initiatives resulting in more equitable burden-sharing have never been fully implemented. There are two driving forces influencing a county's willingness to support such initiatives -- the economic theory of alliances and the risks posed by the implementation of capability sharing. The authors examine each of these and propose that rather than aiming for group consensus on the production of capabilities, NATO should focus on interoperability through support functions. This approach provides the most likely solution for connecting the forces, doctrine, procedures, standards and other factors of joint capability production such that country leaders find the risks of doing so to be politically and militarily acceptable. Journal: Defense & Security Analysis Pages: 346-359 Issue: 4 Volume: 30 Year: 2014 Month: 12 X-DOI: 10.1080/14751798.2014.948279 File-URL: http://hdl.handle.net/10.1080/14751798.2014.948279 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:346-359 Template-Type: ReDIF-Article 1.0 Author-Name: Peter J. Coughlan Author-X-Name-First: Peter J. Author-X-Name-Last: Coughlan Author-Name: William R. Gates Author-X-Name-First: William R. Author-X-Name-Last: Gates Author-Name: Noah Myung Author-X-Name-First: Noah Author-X-Name-Last: Myung Title: One size does not fit all: personalized incentives in military compensation Abstract: A critical element in implementing a compensation scheme including nonmonetary incentives (NMIs) is recognizing that preferences vary widely across Service members. There are at least three sources of variability: across different population classes, across individuals within a population class, and across NMI packages for a particular individual. Surveys across different military communities, ranks, and years of Service show the difficulty of identifying any NMI that has significant value for even 50% of the active duty force. At the same time, approximately 80% of the surveyed Service members expressed a significant positive value for at least one NMI. Therefore, one-size-fits-all incentive packages will not be nearly as effective as more personalized incentive packages. The authors discuss variability in Service member NMI preferences and outline an approach to implementing personalized NMI packages in military compensation through a sealed-bid reverse auction, where Service members select individual NMIs from a “cafeteria-style” menu of options. Journal: Defense & Security Analysis Pages: 360-378 Issue: 4 Volume: 30 Year: 2014 Month: 12 X-DOI: 10.1080/14751798.2014.948283 File-URL: http://hdl.handle.net/10.1080/14751798.2014.948283 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:360-378 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: Tommy this an’ Tommy that. The Military Covenant; The Military Covenant. Its impact on civil--military relations in Britain Journal: Defense & Security Analysis Pages: 379-381 Issue: 4 Volume: 30 Year: 2014 Month: 12 X-DOI: 10.1080/14751798.2014.967942 File-URL: http://hdl.handle.net/10.1080/14751798.2014.967942 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:379-381 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 1-3 Issue: 1 Volume: 31 Year: 2015 Month: 3 X-DOI: 10.1080/14751798.2014.1003458 File-URL: http://hdl.handle.net/10.1080/14751798.2014.1003458 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:1-3 Template-Type: ReDIF-Article 1.0 Author-Name: M.D. Ginsberg Author-X-Name-First: M.D. Author-X-Name-Last: Ginsberg Author-Name: A.T. Bui Author-X-Name-First: A.T. Author-X-Name-Last: Bui Title: Bioprotection of facilities Abstract: The anthrax attacks of 2001 energized research directed toward reducing health consequences from airborne contaminants by augmenting current heating ventilation and air-conditioning (HVAC) systems. Even during peacetime, interest will continue in improving HVAC components to reduce biocontaminants associated with sick building syndrome. Current HVAC design uses numerical simulation methods of ordinary differential equations to predict approximate performance. The authors show that state-space Laplace Transform calculations actually solve the underlying differential equations and yield algebraic expressions that provide new insight. To sharpen the arguments in favor of this methodology, attention is restricted to improving existing HVAC systems to increase protection from an external release of hazardous particulates. By nearly eliminating the need for dynamical simulation, the resulting methods can be applied to far more complex HVAC designs with little additional computational effort. The new methods reduce the time required for computation by three orders of magnitude. These algebraic methods also can be extended to disparate technical problems including internal particulate release, gas masks, and designing new protective buildings. Journal: Defense & Security Analysis Pages: 4-21 Issue: 1 Volume: 31 Year: 2015 Month: 3 X-DOI: 10.1080/14751798.2014.995335 File-URL: http://hdl.handle.net/10.1080/14751798.2014.995335 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:4-21 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew J. Webb Author-X-Name-First: Matthew J. Author-X-Name-Last: Webb Title: The importance of predecessor centers of sovereignty and processes of state formation in explaining secession Abstract: A range of theories have sought to explain and predict secession with varying degrees of success. Arguing that a disproportionate focus upon the seceding group as the unit of analysis has frustrated the development of a comprehensive theoretical framework that is universally valid, this article highlights the role of predecessor institutions of governance and the failure of states to successfully incorporate these as an important, but neglected, causal factor in the study of secession. The inclusion of pre-state institutions of governance and processes of state formation not only results in a more complete, and therefore accurate, explanatory account of secession, but also explains why some regions have been more prone to secession than others. Journal: Defense & Security Analysis Pages: 22-34 Issue: 1 Volume: 31 Year: 2015 Month: 3 X-DOI: 10.1080/14751798.2014.989711 File-URL: http://hdl.handle.net/10.1080/14751798.2014.989711 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:22-34 Template-Type: ReDIF-Article 1.0 Author-Name: Carol Atkinson Author-X-Name-First: Carol Author-X-Name-Last: Atkinson Title: US strategic preferences in the early twenty-first century Abstract: This article investigates how US national security planners have envisioned the emerging strategic environment during the early twenty-first century and evaluates how their perceptions of this strategic environment have changed during these years. This conceptual evolution can be seen in how defense planners define threats, identify defense priorities, and design security strategies. Five key strategic planning documents serve as the basis for this analysis and illustrate significant shifts in how the US government has envisioned its own security requirements as well as the context within which its strategic vision will need to be realized. These planning documents are: (1) Joint Vision 2020, (2) the Bush Administration's 2002 National Security Strategy of the United States, (3) the Obama Administration's 2010 National Security Strategy, (4) US Strategic Defense Guidance entitled Sustaining US Global Leadership: Priorities for 21-super-st Century Defense, and (5) the US Chairman of the Joint Chiefs of Staff's Capstone Concept for Joint Operations: Joint Force 2020. Journal: Defense & Security Analysis Pages: 35-43 Issue: 1 Volume: 31 Year: 2015 Month: 3 X-DOI: 10.1080/14751798.2014.995334 File-URL: http://hdl.handle.net/10.1080/14751798.2014.995334 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:35-43 Template-Type: ReDIF-Article 1.0 Author-Name: Roger Handberg Author-X-Name-First: Roger Author-X-Name-Last: Handberg Title: The symbolic politics of ballistic missile defense: seeking the perfect defense in an imperfect world Abstract: Ballistic missile defense (BMD) politics present an interesting evolution in how the USA, especially Congress, has come to think about BMD both as operational reality and as a symbolic policy. The argument here is that BMD's operational reality is increasingly overshadowed by its symbolic aspects. Such a status arose from rapidly changing international and domestic politics. The end result is a situation in which BMD policy in a sense floats above the question of its actual combat effectiveness. Its primary mission in part is sustaining US capacity to remain a global power and support its allies. Journal: Defense & Security Analysis Pages: 44-57 Issue: 1 Volume: 31 Year: 2015 Month: 3 X-DOI: 10.1080/14751798.2014.995336 File-URL: http://hdl.handle.net/10.1080/14751798.2014.995336 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:44-57 Template-Type: ReDIF-Article 1.0 Author-Name: Adam D.M. Svendsen Author-X-Name-First: Adam D.M. Author-X-Name-Last: Svendsen Title: Advancing “Defence-in-depth”: intelligence and systems dynamics Abstract: This article aims to encourage the fostering of more systems thinking, and its greater exploitation, within the domain of contemporary intelligence. With particular focus on “micro systems thinking” and with reference to key intelligence processes, such as intelligence analysis, the utility of many systems dynamics within the intelligence context seeks to be further revealed. Through their greater collective harnessing, including up to “System of Systems” (“SoS”) dynamics, and promoting all that they can offer, more sophisticated overarching operational-to-strategic/policy “ends,” notably that of “defence-in-depth,” can be viably further advanced in a sustainable manner into the future. Arguably, a much-needed transformative impact on contemporary intelligence can also be increasingly realised through comprehensively engaging in and with more systems and SoS thinking. Aiding civil protection tasks, crisis management, emergency planners, and civil contingency practitioners likewise gain. Journal: Defense & Security Analysis Pages: 58-73 Issue: 1 Volume: 31 Year: 2015 Month: 3 X-DOI: 10.1080/14751798.2014.995337 File-URL: http://hdl.handle.net/10.1080/14751798.2014.995337 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:58-73 Template-Type: ReDIF-Article 1.0 Author-Name: Charles Kirke Author-X-Name-First: Charles Author-X-Name-Last: Kirke Title: “Respect” as a personal attribute in the British Army Abstract: This article describes the results of research into the social phenomenon of “respect” as framed by junior members of the British Army, as part of a wider study into the Values and Standards of the British Army. This research was interview based, using qualitative analysis software to detect, manage, and draw conclusions from the qualitative data recorded in those interviews. The data indicated that the primary situation in which “respect” was visualised by the participants was the unit context, and that it comprised a combination of three different strands: respect for rank or “hierarchical respect,” “professional respect” for a person's military competence, and “personal respect” for an individual's character, personal behaviour, and attributes. The overall respect that an individual is given arises from the combination of these three areas. “Respect” as a concept was, in the soldiers’ characterisation, something that had to be earned (except for the “given” represented by rank) and was not stable: a person's fund of respect could go up or down in social value. Respect was also linked to trust: the more respect a person had, the more they could be trusted. Although the unit context was the primary one for discussing their framing of the concept of respect, many of the participants reported a wider dimension in which every human being deserves a basic level of respect simply for being human, and this level could not be forfeited. Journal: Defense & Security Analysis Pages: 74-82 Issue: 1 Volume: 31 Year: 2015 Month: 3 X-DOI: 10.1080/14751798.2015.1014156 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1014156 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:74-82 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: A Dorset parish remembers 1914--1918: Thankful and not so thankful: how the Great War changed three English villages forever Journal: Defense & Security Analysis Pages: 83-84 Issue: 1 Volume: 31 Year: 2015 Month: 3 X-DOI: 10.1080/14751798.2014.1003459 File-URL: http://hdl.handle.net/10.1080/14751798.2014.1003459 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:83-84 Template-Type: ReDIF-Article 1.0 Author-Name: Eric Grove Author-X-Name-First: Eric Author-X-Name-Last: Grove Title: China's naval power: an offensive realist approach Journal: Defense & Security Analysis Pages: 84-86 Issue: 1 Volume: 31 Year: 2015 Month: 3 X-DOI: 10.1080/14751798.2014.1003460 File-URL: http://hdl.handle.net/10.1080/14751798.2014.1003460 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:84-86 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 87-89 Issue: 2 Volume: 31 Year: 2015 Month: 6 X-DOI: 10.1080/14751798.2015.1038451 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1038451 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:87-89 Template-Type: ReDIF-Article 1.0 Author-Name: Yoel Guzansky Author-X-Name-First: Yoel Author-X-Name-Last: Guzansky Title: Lines in the sand: the use and misuse of red lines Abstract: This article explores series of “red lines” issued over the years by the USA and Israel toward Iran and Syria. It argues that the effectiveness of inflexible “red lines” in an environment that is given to rapid change is doubtful. They provide an adversary with the ability to determine when the deterring party will act and when they will not, a situation that is often undesirable. Moreover, their inflexible nature on the one hand opens the doors for circumvention while technically staying within their parameters. On the other hand, a strategy of more ambiguous “red lines” that allow flexibility in choosing the time, intensity, and nature of the response could also achieve a considerable deterrent effect, provided that they do not remain mere bluffs. Journal: Defense & Security Analysis Pages: 90-98 Issue: 2 Volume: 31 Year: 2015 Month: 6 X-DOI: 10.1080/14751798.2015.1014158 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1014158 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:90-98 Template-Type: ReDIF-Article 1.0 Author-Name: Joseph T. Buontempo Author-X-Name-First: Joseph T. Author-X-Name-Last: Buontempo Title: A trajectory for homeland ballistic missile defense Abstract: The Ground-based Midcourse Defense system is intended to protect the US homeland against limited attacks from intermediate- and long-range ballistic missiles. It has succeeded in intercepting target missiles and can engage a threat launched from North Korea or the Middle East, targeting any point in the USA. Nevertheless, high-profile struggles and program changes related to homeland ballistic missile defense (BMD) continue to make headlines. The most significant struggle has been a string of three straight intercept test failures over five years, followed by the recent successful intercept test in June 2014. This article first briefly reviews the current threats of concern. It then examines homeland BMD policy objectives, followed by the current major technical issues in supporting these objectives and, then, the likelihood of negating a warhead. Finally, it highlights major considerations that should be part of the trajectory the US government takes moving forward. Journal: Defense & Security Analysis Pages: 99-109 Issue: 2 Volume: 31 Year: 2015 Month: 6 X-DOI: 10.1080/14751798.2015.1014157 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1014157 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:99-109 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Martindale Author-X-Name-First: Michael Author-X-Name-Last: Martindale Title: Evaluating state willingness to pursue space weapons Abstract: Many studies exist which evaluate the domain of space from a political perspective in order to advocate for a certain position regarding what states ought to do or not do in space. Few studies exist which address how states actually behave with regard to outer space. In an attempt to fill this gap in the literature, the present study evaluates the determinants of state space behavior. The results identify a blend of the realist pursuit of power and liberal normative restrains acting on state space behavior. Journal: Defense & Security Analysis Pages: 110-122 Issue: 2 Volume: 31 Year: 2015 Month: 6 X-DOI: 10.1080/14751798.2015.1014159 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1014159 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:110-122 Template-Type: ReDIF-Article 1.0 Author-Name: Caleb Slayton Author-X-Name-First: Caleb Author-X-Name-Last: Slayton Title: Underselling Islamist extremism in Sub-Saharan Africa Abstract: Islamist extremism as an ideology has seemingly spread in influence in the past few years. The violent Islamist threat may have a singular religious dogma, but that does not mean that it will interact in the same fashion within the various cultures it infests. The Sub-Saharan region is one general context where Islamist extremism is both vividly active and misunderstood. Africa's reaction to: Arabization; the adjustment to post-colonial rule; the perception of secular government institutions; the extent of cultural and religious pluralism; and the local character of Muslim leadership and institutions are all very different from that of the Middle East. Scores of terrorism analysts and even Arab populations only too familiar with the Middle East context superimpose Middle East threats over the Sub-Saharan African cultural landscape. Instead of generalizing the Islamist threats, it might be better to ask why it is that violent Islamist groups have traditionally been challenged to expand their influence in Muslim Sub-Saharan Africa. The underestimated Islamist is using ignorance to its advantage, recruiting through channels unnoticed by its Arab counterparts while creatively catering its message by region. Journal: Defense & Security Analysis Pages: 123-136 Issue: 2 Volume: 31 Year: 2015 Month: 6 X-DOI: 10.1080/14751798.2015.1056933 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056933 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:123-136 Template-Type: ReDIF-Article 1.0 Author-Name: Raul Gouvea Author-X-Name-First: Raul Author-X-Name-Last: Gouvea Title: Brazil's new defense paradigm Abstract: In 2015, Brazil has taken steps toward re-consolidating its domestic defense industry. In the 1980s, Brazil built a dynamic and diversified defense industry. The state-driven effort resulted in a tripod strategy, where the state, state-run companies, and their private sector became the pillars of Brazil's defense industry. Brazil developed an export-driven defense industry; where close to 80--90% of its output was exported to Latin American, African, Arab, and Asian nations. In the 1980s, Brazil became the world's fifth largest exporter of defense products and services, exporting to over 40 countries. In the 1990s and 2000s, Brazil's defense industry suffered a dramatic reduction in size, diversification, and momentum. Successions of domestic political and economic policies have relegated Brazil's once emerging defense industry to a marginal position in the global defense industry. This article analyzes future prospects, challenges, and growth strategies for Brazil's defense industry. Journal: Defense & Security Analysis Pages: 137-151 Issue: 2 Volume: 31 Year: 2015 Month: 6 X-DOI: 10.1080/14751798.2015.1038452 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1038452 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:137-151 Template-Type: ReDIF-Article 1.0 Author-Name: Garrett Grochowski Author-X-Name-First: Garrett Author-X-Name-Last: Grochowski Title: Planning for the next Takur Ghar Abstract: The USA is currently facing an increasingly diverse range of threats, including non-state actors, particularly violent extremist organizations attempting to do harm. The national leadership has made it clear that for the near future it will employ Special Operations Forces (SOF) as the tool of choice in short-duration, high-intensity operations that have more in common with the battle of Takur Ghar, than those with a larger footprint. It is critical then that the lessons of the past are learnt now and are applied before employing SOF in the future. This becomes especially important given the short lead-time in concert with the short-duration/high-intensity tempo of their operations. In the Battle of Takur Ghar, during Operation Anaconda, rigid adherence to the joint functions, especially clearer and more robust Command and Control (C2) and Intelligence, Surveillance, and Reconnaissance (ISR) in the planning and execution of Operation Anaconda would have yielded a better operational outcome and saved lives. With the benefit of hindsight, many things could have been done differently, but several key issues stand out. The C2 structure must include all components from the outset to synchronize effects and rapidly re-task ISR. There must be multiple communications redundancies and adequate bandwidth. Finally, all SOF, conventional and interagency capabilities must be synchronized under one task force commander with a sufficiently robust C2 infrastructure to direct the entire effort. As our nation calls on SOF at an ever-increasing rate, we must take those lessons learned and apply them to future operations. Journal: Defense & Security Analysis Pages: 152-158 Issue: 2 Volume: 31 Year: 2015 Month: 6 X-DOI: 10.1080/14751798.2015.1069490 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1069490 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:152-158 Template-Type: ReDIF-Article 1.0 Author-Name: Francis C. Domingo Author-X-Name-First: Francis C. Author-X-Name-Last: Domingo Title: The contexts of strategy as a guide for defense planning in the Philippines Abstract: Efforts toward developing an independent and credible Philippine defense policy were revived when Benigno Simeon C. Aquino III was elected President of the Philippines in 2010. President Aquino renewed the military modernization program in 2012 and emphasized the necessity of a “minimum credible defense posture.” Given the modernization efforts of the government, this article aims to contribute to the development of the concept of minimum credible defense posture by exploring how theory contributes to defense planning. It argues that the contexts of strategy are useful in planning for national defense because these contexts can provide a conceptual framework for defense planners. It proceeds in three parts: the opening section reviews the literature on defense planning; the second surveys the context of developing strategies as discussed in the General Theory of Strategy; and the last provides a definition of minimum credible defense and applies the context of developing strategies to the case of the Philippines. Journal: Defense & Security Analysis Pages: 159-167 Issue: 2 Volume: 31 Year: 2015 Month: 6 X-DOI: 10.1080/14751798.2015.1069109 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1069109 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:159-167 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 169-171 Issue: 3 Volume: 31 Year: 2015 Month: 9 X-DOI: 10.1080/14751798.2015.1058522 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1058522 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:169-171 Template-Type: ReDIF-Article 1.0 Author-Name: Peter J. Dortmans Author-X-Name-First: Peter J. Author-X-Name-Last: Dortmans Author-Name: Nitin Thakur Author-X-Name-First: Nitin Author-X-Name-Last: Thakur Author-Name: Anthony Ween Author-X-Name-First: Anthony Author-X-Name-Last: Ween Title: Conjectures for framing cyberwarfare Abstract: Cyberspace has emerged as a potentially new (and unconventional) domain for warfare. Much debate has focused on understanding cyber conflict. The ability to critically analyse this phenomenon is important; however, the nascent nature of cyberwarfare and the complexity of the systems involved create challenges not met by conventional approaches. As a first step, this requires an analytical construct to frame discussions in a way that highlights distinct characteristics of the cyber domain. An approach proposed is one of the postulating conjectures for debate as a way to achieve this and to demonstrate its use, both at the strategic and operational levels. It is suggested that such an approach provides one component of a mature analytical framework for the analysis of cyber across a range of warfare domains. Journal: Defense & Security Analysis Pages: 172-184 Issue: 3 Volume: 31 Year: 2015 Month: 9 X-DOI: 10.1080/14751798.2015.1056935 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056935 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:172-184 Template-Type: ReDIF-Article 1.0 Author-Name: Olive Emil Wetter Author-X-Name-First: Olive Emil Author-X-Name-Last: Wetter Author-Name: Valentino Wüthrich Author-X-Name-First: Valentino Author-X-Name-Last: Wüthrich Title: “What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism Abstract: Up to the present, there is only very little research on how the population perceives terrorism and its threats, even though support from the population is crucial for effective counterterrorism. By eliciting beliefs and subjecting them to content analyses, six factors were found that determine the protection worthiness of a target in the people's view: the potential damage to “people,” “symbolism,” “economy,” “politics,” “nature,” and “image/publicity.” These empirically found factors are in line with factors specified by terrorist target selection models. They differ in the strength of their cognitive representation among participants and, thus, their subjective importance to the people. The first three factors are shared among all participants, whereas the latter ones could only be found in a part of the participant sample. People's judgments of the targets' protection worthiness differ substantially from their judgments of the targets' attractiveness to terrorists, even though the same factors seem to be involved. This study offers an insight into the people's mental model about protection worthiness of targets. Together with classical risk analysis and knowledge about terrorists, these results can form a basis for setting up a holistic scheme for critical infrastructure protection. Journal: Defense & Security Analysis Pages: 185-198 Issue: 3 Volume: 31 Year: 2015 Month: 9 X-DOI: 10.1080/14751798.2015.1056941 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056941 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:185-198 Template-Type: ReDIF-Article 1.0 Author-Name: Robbie J. Totten Author-X-Name-First: Robbie J. Author-X-Name-Last: Totten Title: Epidemics, national security, and US immigration policy Abstract: What are relationships between epidemics, national security, and US immigration policy? This question is important because it sheds light on transnational or nontraditional security areas, American immigration policy, and a pressing issue for US leaders who have recently faced epidemics such as the West Africa Ebola outbreak that began in 2013. This article answers it and lays ground in the area by reviewing epidemics in world history, using International Relations and Security Studies works to specify dangers of contagions for states, and identifying three general immigration measures that American leaders have utilized from the seventeenth century to the present day to protect against contagions, which are (1) policies restricting entrance of foreigners thought to carry specified diseases, (2) the isolation or quarantining of immigrants with contagious disease, and (3) delegating the President with authority to stop immigration in the event of an epidemic abroad. This study has implications for research and contemporary US immigration policy. Journal: Defense & Security Analysis Pages: 199-212 Issue: 3 Volume: 31 Year: 2015 Month: 9 X-DOI: 10.1080/14751798.2015.1056940 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056940 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:199-212 Template-Type: ReDIF-Article 1.0 Author-Name: Tamir Libel Author-X-Name-First: Tamir Author-X-Name-Last: Libel Author-Name: Reuven Gal Author-X-Name-First: Reuven Author-X-Name-Last: Gal Title: Between military--society and religion--military relations: different aspects of the growing religiosity in the Israeli defense forces Abstract: The growing religiosity in the Israel Defense Forces (IDF) in recent years is discussed by employing the broader lens of changes to the organization's overall manpower. First, the authors will indicate the dynamic and changing make-up of those serving in the IDF, in terms of both the socio-demographic characteristics of conscripted soldiers, and the motivation of individuals enlisting in the IDF. Second, it is demonstrated how a window has opened in the IDF, especially in combat units and command roles, for a growth in religiosity as a result of the gradual increase in the number of conscripts affiliated with the Zionist national-religious population. Journal: Defense & Security Analysis Pages: 213-227 Issue: 3 Volume: 31 Year: 2015 Month: 9 X-DOI: 10.1080/14751798.2015.1056938 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056938 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:213-227 Template-Type: ReDIF-Article 1.0 Author-Name: Anna Antczak-Barzan Author-X-Name-First: Anna Author-X-Name-Last: Antczak-Barzan Title: Poland's national potential and its international position within the European Union -- research remarks Abstract: This article examines Poland's national potential and its international position within the European Union (EU) with respect to security issues. It presents research results based on a comparison of Poland's national potential as it relates to other EU countries, which is useful when evaluating Poland's power within the EU. The article also evaluates Poland's crisis potential, i.e. it identifies those factors that may potentially be treated as threats to national and regional security. Finally, it enables the identification of challenges to Poland's security in the second decade of the twenty-first century. The research is conducted according to a multidimensional comparative analysis, which is perceived by the author as the best available to measure a country's power despite its weaknesses. Journal: Defense & Security Analysis Pages: 228-245 Issue: 3 Volume: 31 Year: 2015 Month: 9 X-DOI: 10.1080/14751798.2015.1056934 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056934 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:228-245 Template-Type: ReDIF-Article 1.0 Author-Name: Kevin Marsh Author-X-Name-First: Kevin Author-X-Name-Last: Marsh Author-Name: Christopher M. Jones Author-X-Name-First: Christopher M. Author-X-Name-Last: Jones Title: From rivals to partners: AirSea Battle and the US air force--navy relationship Abstract: AirSea Battle (ASB) has generated significant publicity, controversy, and debate among scholars, analysts, commentators, and observers of US defense strategy. However, a research gap exists concerning formal analysis of the impact of the operational concept on the relationship between the US Air Force (USAF) and the US Navy (USN). The impact of the ASB operational concept on the USAF--USN relationship is examined across the issue areas of strategy, budgets, weapons procurement, and training. These four issue areas represent important areas of historical conflict and competition between the Air Force and Navy. The conclusion is that ASB is ushering in a new era of Air Force--Navy partnership that advances the inter-service dynamic from “jointness” toward integration. The emergent USAF--USN partnership therefore represents a significant development in US defense politics and defense strategy. Journal: Defense & Security Analysis Pages: 246-259 Issue: 3 Volume: 31 Year: 2015 Month: 9 X-DOI: 10.1080/14751798.2015.1056939 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056939 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:246-259 Template-Type: ReDIF-Article 1.0 Author-Name: Hassan M. Kamara Author-X-Name-First: Hassan M. Author-X-Name-Last: Kamara Title: Making long-range planning work: the case of the US Army's 30-year strategic modernization plan Abstract: The extensive timespan of evolving assumptions about future adversaries, US military engagements, and technology inherent in the US Army's 30-year modernization strategy can overwhelm the management capacity of planners, and misdirect acquisition investments. Some military scholars have argued that long-range planning is futile due to the complexities of the global security environment. So how can the US Army manage the evolving assumptions inherent in its 30-year modernization strategy to ensure it remains a superior global force? This study will answer the above question by arguing that the US Army's 30-year modernization strategy, while emulative of a similar modernization approach in the threat-based planning environment of the Cold War, is viable if supported by a method and a tool that manage investments and planning assumptions. Journal: Defense & Security Analysis Pages: 260-269 Issue: 3 Volume: 31 Year: 2015 Month: 9 X-DOI: 10.1080/14751798.2015.1056936 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056936 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:260-269 Template-Type: ReDIF-Article 1.0 Author-Name: Jesse Kirkpatrick Author-X-Name-First: Jesse Author-X-Name-Last: Kirkpatrick Title: Drone wars: transforming conflict, law, and policy Journal: Defense & Security Analysis Pages: 270-272 Issue: 3 Volume: 31 Year: 2015 Month: 9 X-DOI: 10.1080/14751798.2015.1056937 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056937 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:270-272 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 273-275 Issue: 4 Volume: 31 Year: 2015 Month: 12 X-DOI: 10.1080/14751798.2015.1101220 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1101220 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:273-275 Template-Type: ReDIF-Article 1.0 Author-Name: Glen Diehl Author-X-Name-First: Glen Author-X-Name-Last: Diehl Author-Name: Solomon Major Author-X-Name-First: Solomon Author-X-Name-Last: Major Title: White hull or white elephant? Soft power and the Chinese hospital ship, the Peace Ark Abstract: Although soft power is now seen as an indispensable foreign policy tool, its efficacy has rarely been put to a rigorous empirical test. Using data from HARMONIOUS MISSIONs 2010, 2011 and 2013, this article seeks to examine the degree to which the soft power engagement missions of the Chinese hospital ship, the Peace Ark, has advanced Chinese interests. Although any conclusions drawn must be considered preliminary, as so little time has passed between the ship's visits and the current analysis, this research indicates that these missions’ impact on advancing Chinese interests was at best limited. Although observations from a single set of cases are unlikely to settle the debate between soft power advocates and detractors, it is hoped that this research will serve as a catalyst to further empirically based research on this topic. Journal: Defense & Security Analysis Pages: 276-292 Issue: 4 Volume: 31 Year: 2015 Month: 12 X-DOI: 10.1080/14751798.2015.1087101 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1087101 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:276-292 Template-Type: ReDIF-Article 1.0 Author-Name: Christo Odeyemi Author-X-Name-First: Christo Author-X-Name-Last: Odeyemi Title: UNCLOS and maritime security: the “securitisation” of the South China Sea disputes Abstract: This Critical Comment seeks to situate the United Nations Convention on the Law of the Sea (UNCLOS) within the context of South China Sea (SCS) dispute. Bearing in mind that maritime actions of the main disputants -- China, Vietnam, and the Philippines -- increasingly “securitise” these long-standing disputes and vice versa, the study examines the concept of a maritime “regime complex.” Whereas efforts have being made to examine UNCLOS and indeed the dispute within the framework of a maritime “regime complex,” the key finding shows that the increased “securitisation” of the disputes makes it difficult to envisage effective engagement of UNCLOS as a resolution mechanism. It will also reveal that China's firmly established expansionist agenda in the SCS region is indicative of Beijing's susceptibility to compromise a diplomatic solution to these long-standing disputes. These discoveries are structured around the knowledge that the spatial relation of the SCS critically espouses not only its geo-strategic significance in terms of natural resources endowment, but also the enduring maritime disputes within the region. Journal: Defense & Security Analysis Pages: 293-302 Issue: 4 Volume: 31 Year: 2015 Month: 12 X-DOI: 10.1080/14751798.2015.1101186 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1101186 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:293-302 Template-Type: ReDIF-Article 1.0 Author-Name: Azeez Olaniyan Author-X-Name-First: Azeez Author-X-Name-Last: Olaniyan Author-Name: Shola Omotola Author-X-Name-First: Shola Author-X-Name-Last: Omotola Title: Ethnic crises and national security in Nigeria Abstract: The article focuses on the interface between ethnicity and national security in Nigeria. It critically explores the negative mobilization of ethnicity in Nigeria's fourth republic, and how this has been shaping (and reshaping) the democratization process, particularly in the management of cooperation and conflict over contestations for power and other resources. The re-democratization of Nigeria in 1999 has been preceded with high expectations of meaningful reductions in the high level of insecurity witnessed under the long years of military suzerainty. However, this has not been the case. Rather, what is obtained is an increase in national insecurity on a much larger scale. This article argues that one of the banes of national security in the Nigerian state is ethnic politics, which continues to witness changes in context and character with grave consequences for the future of democracy. The central argument is that ethnicity has always been a major driver of politics and conflicts in Nigeria and the trend is not likely to change anytime soon. Journal: Defense & Security Analysis Pages: 303-318 Issue: 4 Volume: 31 Year: 2015 Month: 12 X-DOI: 10.1080/14751798.2015.1087104 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1087104 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:303-318 Template-Type: ReDIF-Article 1.0 Author-Name: Surulola James Eke Author-X-Name-First: Surulola James Author-X-Name-Last: Eke Title: How and why Boko Haram blossomed: examining the fatal consequences of treating a purposive terrorist organisation as less so Abstract: Boko Haram (BH) is an insurgent group that operates mainly in northeastern Nigeria. Its stated aim is to establish an Islamic state, and it employs terrorism as its strategy. Earlier interests of security analysts centred on the drivers of BH uprising and the possibility of its internationalisation. Today's concerns relate more to why the rebellion has lasted this long. In toeing the same line, this article demonstrates that BH is a purposive terror group against which the government has evolved no viable strategy. It examines some gains of BH over the past six years and how it benefitted from the government's underestimation of its capacity and determination. It concludes that to effectively engage BH, the Nigerian government must revaluate its threat and sincerely pursue an expanded strategy beyond the current military-centric approach. To be effective, government's response must be packaged in such a way as to enhance human security in the region. Journal: Defense & Security Analysis Pages: 319-329 Issue: 4 Volume: 31 Year: 2015 Month: 12 X-DOI: 10.1080/14751798.2015.1087102 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1087102 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:319-329 Template-Type: ReDIF-Article 1.0 Author-Name: Nikolay I. Geraskin Author-X-Name-First: Nikolay I. Author-X-Name-Last: Geraskin Author-Name: Andrey A. Krasnoborodko Author-X-Name-First: Andrey A. Author-X-Name-Last: Krasnoborodko Author-Name: Vasily B. Glebov Author-X-Name-First: Vasily B. Author-X-Name-Last: Glebov Author-Name: Taisia A. Piskureva Author-X-Name-First: Taisia A. Author-X-Name-Last: Piskureva Title: Nuclear security culture enhancement: the role of culture coordinators at Russian nuclear sites Abstract: In 2002, a Nuclear Security Culture (NSC) Enhancement Program with the mission to raise the level of the NSC at sites and facilities in Russia's nuclear complex was launched under the guidance of the Russian State Corporation “ROSATOM” and with support from the US Department of Energy. A Joint Working Group for NSC with both Russian Federation and US members was formed and charged with the design and implementation of the program. The program was implemented at sites and facilities on a pilot basis. Nine sites participated in the Pilot Project. The key program component was an establishment of Culture Coordinators (CCs) with the authority to coordinate and implement NSC enhancement activities at sites and facilities. The CCs have served as the force that has maintained the momentum of the Pilot Project and continuously steered the site NSC enhancement efforts. The contribution of the CCs in achieving the positive outcomes of the program cannot be overstated. Journal: Defense & Security Analysis Pages: 330-345 Issue: 4 Volume: 31 Year: 2015 Month: 12 X-DOI: 10.1080/14751798.2015.1087103 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1087103 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:330-345 Template-Type: ReDIF-Article 1.0 Author-Name: Andrea Ellner Author-X-Name-First: Andrea Author-X-Name-Last: Ellner Title: Sicherheit, Sicherheitspolitik und Militär -- Deutschland seit der Vereinigung [Security, security policy and the military -- Germany since unification] Journal: Defense & Security Analysis Pages: 346-347 Issue: 4 Volume: 31 Year: 2015 Month: 12 X-DOI: 10.1080/14751798.2015.1101187 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1101187 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:346-347 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: Part 1 Human conflict and universal ethics Journal: Defense & Security Analysis Pages: 348-355 Issue: 4 Volume: 31 Year: 2015 Month: 12 X-DOI: 10.1080/14751798.2015.1101221 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1101221 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:348-355 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Defence and security analysis Journal: Defense & Security Analysis Pages: 1-3 Issue: 1 Volume: 32 Year: 2016 Month: 3 X-DOI: 10.1080/14751798.2015.1133163 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1133163 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:1-3 Template-Type: ReDIF-Article 1.0 Author-Name: Darrell Driver Author-X-Name-First: Darrell Author-X-Name-Last: Driver Title: Burden sharing and the future of NATO: wandering between two worlds Abstract: The US role in the North Atlantic Treaty Organization (NATO) Alliance is a 65-year history of retrenchment and renewal. When Washington has sought a retrenchment from the world, it traditionally increased burden sharing pressure on Europe to do more. During times of increased global ambition, the USA reaffirmed its traditional leadership role in the Alliance and its commitment to NATO effectiveness and relevance. This cycle of NATO retrenchment and renewal, however, is halting. Though the USA will continue to go through periods of relative increases and decreases in security policy ambition, signs point to a permanent defense and security retrenchment in Europe. Germany is the ally singularly capable of filling the resulting security gap. If NATO is to avoid the drift toward irrelevance many critics have predicted, Germany will need to cast off old inhibitions toward security and defense leadership. These trends and their implications for NATO's future are explored through historical case studies and the shifting contemporary security environment. Journal: Defense & Security Analysis Pages: 4-18 Issue: 1 Volume: 32 Year: 2016 Month: 3 X-DOI: 10.1080/14751798.2015.1126970 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1126970 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:4-18 Template-Type: ReDIF-Article 1.0 Author-Name: Josselin Droff Author-X-Name-First: Josselin Author-X-Name-Last: Droff Author-Name: Renaud Bellais Author-X-Name-First: Renaud Author-X-Name-Last: Bellais Title: Fleet management in European integration: the case of military helicopter support Abstract: The article focuses on both economics and spatial issues related to Maintenance Repair and Overhaul (MRO) of defence platforms in Europe. Using facts and figures related to costs, trends and fleet sizes evolution, the authors discuss the interest of a spatial reorganisation of MRO production. Given the fiscal situation of the main European countries with a modern army, the relevant scale to consider the reorganisation is certainly Europe. Through the example of defence helicopters fleets of a selection of European countries, the authors address the question of cooperation of the MRO. A greater cooperation in the support of fleets would lead to a spatial reorganisation of MRO. On one side economies can be expected from this reorganisation, but, on the other hand, new problems arise. Specifically, a number of costs associated with different forms of “distances” -- geographical, operational and political distances -- limit the potential savings that could be expected. This work provides insights on these important issues for the construction of a European defence, both in its political, military and industrial dimensions. Journal: Defense & Security Analysis Pages: 19-35 Issue: 1 Volume: 32 Year: 2016 Month: 3 X-DOI: 10.1080/14751798.2015.1130315 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130315 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:19-35 Template-Type: ReDIF-Article 1.0 Author-Name: Asifa Maaria Hussain Author-X-Name-First: Asifa Maaria Author-X-Name-Last: Hussain Author-Name: Mohammed Ishaq Author-X-Name-First: Mohammed Author-X-Name-Last: Ishaq Title: Equality and diversity in the British armed forces: progress, challenges and prospects Abstract: The UK's changing political and legal landscape since 2000 reflecting transformations in wider society have elevated equality and diversity (E&D) issues to prominence in the public sector, including in the British armed forces. This research highlights key developments in the British military in relation to E&D, focusing both on areas of progress, and on the challenges still confronting the Forces. The findings reveal that the Forces have made significant strides in advancing E&D through the implementation of a range of policy initiatives but the persistence of discrimination, developments in the wider environment and the dilemmas raised by the strands of age and disability pose challenges. The value of this research is to increase our understanding of diversity management in a public sector institution that has been under-researched and views itself as “different,” and will be of interest to policymakers, E&D practitioners and academics in the field. Journal: Defense & Security Analysis Pages: 36-50 Issue: 1 Volume: 32 Year: 2016 Month: 3 X-DOI: 10.1080/14751798.2015.1130317 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130317 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:36-50 Template-Type: ReDIF-Article 1.0 Author-Name: Edgar Jones Author-X-Name-First: Edgar Author-X-Name-Last: Jones Author-Name: Hugh Milroy Author-X-Name-First: Hugh Author-X-Name-Last: Milroy Title: Stolen trauma: why some veterans elaborate their psychological experience of military service Abstract: The embellishment of a warrior biography has a long history but examples of veteran elaboration of traumatic experience have become increasingly apparent. Although legislative change in the UK has removed the penalties for fabrication and a progressive decline in the military footprint may have increased the likelihood of such false trauma narratives, a paradigm shift in explanations for mental illness underpins this phenomenon. The recognition of post-traumatic stress disorder (PTSD) in 1980, followed by studies to identify risk factors, led to a greater appreciation of psychological vulnerability. As a result, the use of shame to discourage acts formerly labelled as “cowardly” or “lacking in morale fibre” is no longer considered appropriate. Recent conflicts in Iraq and Afghanistan generated popular sympathy for service personnel, whilst media focus on PTSD has led the UK public to believe that most veterans have been traumatised by their tours of duty. Journal: Defense & Security Analysis Pages: 51-63 Issue: 1 Volume: 32 Year: 2016 Month: 3 X-DOI: 10.1080/14751798.2015.1130318 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130318 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:51-63 Template-Type: ReDIF-Article 1.0 Author-Name: Maja Garb Author-X-Name-First: Maja Author-X-Name-Last: Garb Author-Name: Marjan Malešič Author-X-Name-First: Marjan Author-X-Name-Last: Malešič Title: The causes of trust and distrust in the military Abstract: Trust in institutions is an important issue of political science and sociology. This article contributes to the discussion by exploring public trust in the military at the global, regional and national levels, and the causes of trust and distrust in the military. Analyses of public opinion data reveal that the military is a highly trusted social institution across the world. In Slovenia, the trust in the military is high as well; however, it is lower than international data would suggest, averaging at 50%. Against this background, the article focuses on the causes of trust. The original empirical survey was accomplished and shows that the most significant causes of a high level of trust in the military are its frequent and successful involvement in disaster relief, its professional qualifications and high performance, as well as its national defense role. Whereas the key causes of distrust are: the poor levels of transparency in its procurement process; the politicization of the military and organizational problems. Journal: Defense & Security Analysis Pages: 64-78 Issue: 1 Volume: 32 Year: 2016 Month: 3 X-DOI: 10.1080/14751798.2015.1130316 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130316 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:64-78 Template-Type: ReDIF-Article 1.0 Author-Name: Andrea Malizia Author-X-Name-First: Andrea Author-X-Name-Last: Malizia Title: Disaster management in case of CBRNe events: an innovative methodology to improve the safety knowledge of advisors and first responders Abstract: Nowadays, Chemical-Biological-Radiological-Nuclear-explosive (CBRNe) risks are one of the world's main safety concerns. The radiological disasters of Fukushima and Chernobyl, the chemical events of Seveso or the release of Sarin in the Tokyo Subway, the biological emergencies such as the H1N1 flu or the recent Ebola outbreak, and recent news about the availability of non-conventional weapons acquired by fundamentalist organisations represent evidence of potential future threats. CBRNe risks are a real and global threat. The University of Rome, Tor Vergata, in collaboration with the most important Italian and international bodies working in the field of CBRNe safety and security, and supported by the North Atlantic Treaty Organisation and the Organisation for the Prohibition of Chemical Weapons, organises International Masters Courses on the Protection against CBRNe events. Within this framework, a Table-Top Exercise was planned, in collaboration with the Italian Ministry of Interior and Ministry of Defence. The scenario, the logistic organisation, on-going adjustments during the exercise and the outcomes are presented here and analysed. Journal: Defense & Security Analysis Pages: 79-90 Issue: 1 Volume: 32 Year: 2016 Month: 3 X-DOI: 10.1080/14751798.2015.1130319 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130319 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:79-90 Template-Type: ReDIF-Article 1.0 Author-Name: Andrey Zhukov Author-X-Name-First: Andrey Author-X-Name-Last: Zhukov Author-Name: Nikolay Geraskin Author-X-Name-First: Nikolay Author-X-Name-Last: Geraskin Author-Name: Andrey Krasnoborodko Author-X-Name-First: Andrey Author-X-Name-Last: Krasnoborodko Title: Defining quantitative criteria for the physical protection system effectiveness of nuclear facilities Abstract: The article is devoted to problems of defining quantitative criteria for the physical protection system (PPS) effectiveness of nuclear facilities. The article briefly describes the scheme of the PPS development used in the nuclear industry in Russia, gives a review of existing approaches to defining the minimal acceptable value of the system's effectiveness, and reveals advantages and disadvantages of the approaches. The article describes in detail an approach based on facility categorization by potential losses and a technique of defining the minimal acceptable value of the PPS effectiveness developed on its base. Journal: Defense & Security Analysis Pages: 91-96 Issue: 1 Volume: 32 Year: 2016 Month: 3 X-DOI: 10.1080/14751798.2015.1130320 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130320 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:91-96 Template-Type: ReDIF-Article 1.0 Author-Name: Patrick Mileham Author-X-Name-First: Patrick Author-X-Name-Last: Mileham Title: Human conflict and universal ethics (part 2) Abstract: This second part of the review article begins with a definition of military power, when and how it should be used. From a large number of authors, “moral forces” are linked to “codes of conduct”, and the fundamental understandings about the “profession of arms”, based on “fiduciary trust”, “covenanted” service and professional and personal “conscience”. The article covers what authors have written about “culture” and the ethics of “technology” devices and systems, including “cyber” warfare. It concludes with recognition of the increase in ethical sensitivity in this century which is characterized by a phenomenon, the crises of “identity”, personal, national and global. Journal: Defense & Security Analysis Pages: 97-111 Issue: 1 Volume: 32 Year: 2016 Month: 3 X-DOI: 10.1080/14751798.2015.1133164 File-URL: http://hdl.handle.net/10.1080/14751798.2015.1133164 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:97-111 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 113-114 Issue: 2 Volume: 32 Year: 2016 Month: 6 X-DOI: 10.1080/14751798.2016.1165394 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1165394 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:113-114 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: Unblocking inertia: US-Russian nuclear arms control and missile defenses Abstract: The United States and Russia, in the aftermath of Russia’s annexation of Crimea and destabilization of Ukraine, seem to have ditched entirely the “reset” in their political relations. Despite this odor of Cold War redux, there remain the opportunities and necessities for renewed attention to strategic nuclear arms control as between the two governments. US and NATO missile defenses as planned for European deployment figure into this equation, although in somewhat unpredictable ways, given technological uncertainties in existing and foreseeable defenses, as well as the possibility of improved delivery systems for offensive conventional or nuclear weapons. Journal: Defense & Security Analysis Pages: 115-128 Issue: 2 Volume: 32 Year: 2016 Month: 6 X-DOI: 10.1080/14751798.2016.1160485 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160485 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:115-128 Template-Type: ReDIF-Article 1.0 Author-Name: Glenn Diesen Author-X-Name-First: Glenn Author-X-Name-Last: Diesen Author-Name: Conor Keane Author-X-Name-First: Conor Author-X-Name-Last: Keane Title: Constraining missile defence Abstract: Assessing missile defence through the prism of offence--defence theory requires primarily an examination of legal and structural constraints on future development. New weapons technology is frequently cited as having the most critical impact on the offence--defence balance. Yet, the method for assessing the introduction of a new weapons technology tends to neglect projected maturity and instead focus excessively on the initial rudimentary capabilities. It is argued here that the North Atlantic Treaty Organisation’s (NATO’s) missile defence is set to incrementally become more advanced in terms of quality, quantity and mobility, which is supported by a strategy that is increasingly favouring offence. As the system gradually enhances the offensive advantage vis-à-vis Russia, NATO categorically rejects any legal or structural constraints on future deployments. Journal: Defense & Security Analysis Pages: 129-143 Issue: 2 Volume: 32 Year: 2016 Month: 6 X-DOI: 10.1080/14751798.2016.1160487 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160487 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:129-143 Template-Type: ReDIF-Article 1.0 Author-Name: Nicolas Groffman Author-X-Name-First: Nicolas Author-X-Name-Last: Groffman Title: Indian and Chinese espionage Abstract: India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy -- which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security -- but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries. Journal: Defense & Security Analysis Pages: 144-162 Issue: 2 Volume: 32 Year: 2016 Month: 6 X-DOI: 10.1080/14751798.2016.1160486 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160486 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:144-162 Template-Type: ReDIF-Article 1.0 Author-Name: Kristian Åtland Author-X-Name-First: Kristian Author-X-Name-Last: Åtland Title: North European security after the Ukraine conflict Abstract: Russia’s illegal occupation and annexation of the Crimean peninsula in February--March 2014, and the country’s well-documented involvement in the separatist conflict in Eastern Ukraine, have led to a significant worsening of Russia’s relations with the West. Vladimir Putin’s move to redraw Russia’s southern borders through the use of military force and subversive measures has given rise to an uncertainty that goes well beyond the post-Soviet space. Since 2014, North Atlantic Treaty Organization (NATO) has had to reassess many aspects of its relationship with Russia. The alliance has also initiated various measures to strengthen the military security of its eastern member states, particularly the Baltic states, Poland, and Romania. Further to the North, NATO’s northernmost member -- Norway -- is following developments in Russia with a heightened sense of awareness. The same goes for non-aligned Sweden and Finland, which are trying to adapt to the emerging, and increasingly complex, security environment in Northern Europe. Journal: Defense & Security Analysis Pages: 163-176 Issue: 2 Volume: 32 Year: 2016 Month: 6 X-DOI: 10.1080/14751798.2016.1160484 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160484 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:163-176 Template-Type: ReDIF-Article 1.0 Author-Name: Steven T. Zech Author-X-Name-First: Steven T. Author-X-Name-Last: Zech Title: Decapitation, disruption, and unintended consequences in counterterrorism: lessons from Islamist terror networks in Spain Abstract: This study examines the unintended consequences of decapitation strategies. Two Islamist terror networks in Spain have been used to critically evaluate theories of leadership removal guided by large-N cross-sectional research. Arguably, current models neglect to include relational variables that constitute the foundation for policies of network disruption. Spanish terror networks are mapped out over a 10-year period (1995--2004) to demonstrate the importance of network variables. Policies meant to disrupt militant networks can generate unintended consequences, as was the case with Spain’s Operation Dátil following the 9/11 attacks on the Twin Towers and the Pentagon in the United States. The Madrid train bombing network developed in the vacant political space following the counterterrorism operation that targeted radical Islamists in Spain. Journal: Defense & Security Analysis Pages: 177-191 Issue: 2 Volume: 32 Year: 2016 Month: 6 X-DOI: 10.1080/14751798.2016.1160489 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160489 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:177-191 Template-Type: ReDIF-Article 1.0 Author-Name: Shameer Modongal Author-X-Name-First: Shameer Author-X-Name-Last: Modongal Title: Deterrence of nuclear terrorism in the context of South Asia Abstract: Stability among the great powers during the Cold War is widely theorized in terms of nuclear deterrence. Rationality of States and their preference for survival are the basis of nuclear deterrence. The rationality of non-state terrorist groups is different from that of nation-states. Even though they are also rational actors with their own hierarchy of preferences, survival may not be their ultimate goal. Deterrence of nuclear terrorism is therefore different from deterrence against states. South Asia is more vulnerable to nuclear terrorism than any other region of the world for many reasons. This article analyzes the possibility of nuclear terrorism and the ways of deterrence against it in the context of South Asia. Journal: Defense & Security Analysis Pages: 192-198 Issue: 2 Volume: 32 Year: 2016 Month: 6 X-DOI: 10.1080/14751798.2016.1160488 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160488 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:192-198 Template-Type: ReDIF-Article 1.0 Author-Name: Sean M. Maloney Author-X-Name-First: Sean M. Author-X-Name-Last: Maloney Title: Towards a new national security policy for Canada Abstract: Canada is now at a crossroads unlike any other period in its history and needs to carefully consider which path to take. With the new Trudeau government comfortably ensconced since the defeat of the Harper government in the fall of 2015, a variety of competing interests have emerged in an attempt to turn Canadian policy back to a more nostalgic period of the 1970s that some see as preferable to the institutional lash-up that existed since the rolling out of the Canada First policy in the 2000s. That nostalgic period is, however, misunderstood both willfully for political purposes but also through a lack of historical context. Firmly rooting future actions in a blunt analysis of national interests is preferable to the alternative. Journal: Defense & Security Analysis Pages: 199-206 Issue: 2 Volume: 32 Year: 2016 Month: 6 X-DOI: 10.1080/14751798.2016.1161363 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1161363 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:199-206 Template-Type: ReDIF-Article 1.0 Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 207-208 Issue: 3 Volume: 32 Year: 2016 Month: 9 X-DOI: 10.1080/14751798.2016.1201729 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1201729 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:207-208 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Makara Author-X-Name-First: Michael Author-X-Name-Last: Makara Title: Rethinking military behavior during the Arab Spring Abstract: Why did some Arab militaries remain loyal to authoritarian rulers amid mass uprisings during the Arab Spring while others defected to the opposition? One popular explanation shows this variation with reference to the degree of military institutionalization: institutionalized militaries defected, while patrimonial militaries remained loyal. This article argues that the institutionalization hypothesis does not provide a complete account of the mechanisms through which the degree of military institutionalization leads to either defection or continued loyalty. This shortcoming stems from the fact that scholars have treated military institutionalization as a catch-all concept for three distinct variables: ethnic stacking of the military, patronage distribution, and organizational factionalization. Examining the interaction between these variables highlights the mechanisms through which military defection occurs, and therefore that disaggregating institutionalization into its component parts provides a more complete explanation of military behavior during the Arab Spring. Journal: Defense & Security Analysis Pages: 209-223 Issue: 3 Volume: 32 Year: 2016 Month: 9 X-DOI: 10.1080/14751798.2016.1199121 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199121 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:209-223 Template-Type: ReDIF-Article 1.0 Author-Name: Jason Heeg Author-X-Name-First: Jason Author-X-Name-Last: Heeg Title: Pakistan’s response to US foreign policy towards South Asia 1977--1993 Abstract: Relations between the USA and Pakistan have been tenuous since the 1947 partition of British India and the subsequent creation of the former. The 1979 Soviet intervention in Afghanistan focused the attention of the international community on South Asia. This article will examine the foreign policies of three successive US Presidential Administrations between 1977 and 1993, and how their decisions and corresponding actions were interpreted by the Pakistani government and its people. The key finding is the trend of the ebb and flow of US interest in Pakistan. The primary research conducted for this article shows that Pakistanis recognize this trend and consider it hypocritical of the US government. The current conditions in South Asia are ominously similar to those of 1992 with the drawdown of US and NATO troops from Afghanistan. Policy-makers would be wise to review the events of 1977--1993 so that the cycle is not repeated again. Journal: Defense & Security Analysis Pages: 224-236 Issue: 3 Volume: 32 Year: 2016 Month: 9 X-DOI: 10.1080/14751798.2016.1199120 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199120 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:224-236 Template-Type: ReDIF-Article 1.0 Author-Name: Colin Robinson Author-X-Name-First: Colin Author-X-Name-Last: Robinson Title: Revisiting the rise and fall of the Somali Armed Forces, 1960--2012 Abstract: The history of the Somali Armed Forces, principally the army, forms an important part of studying the Somali civil war. Two key themes are evident from 1960: the pursuit of an irredentist agenda beyond reasonable limits, which led to the downfall of Siad Barre’s regime, and the clan divisions and agendas that Barre used to shore up his rule in the 1980s and that have bedeviled the rebirth of the Somali Army in the twenty-first century. With the twentieth-century context covered, and in some places reinterpreted, this article then focuses on the uncertain rebirth of the Somali Armed Forces since 2008, using a host of primary and United Nations official sources. Assistance efforts have been focused on Mogadishu, but limited success has been made in forming truly national armed forces. Future prospects are uncertain, but there are some signs of hope. Journal: Defense & Security Analysis Pages: 237-252 Issue: 3 Volume: 32 Year: 2016 Month: 9 X-DOI: 10.1080/14751798.2016.1199122 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199122 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:237-252 Template-Type: ReDIF-Article 1.0 Author-Name: James Hasík Author-X-Name-First: James Author-X-Name-Last: Hasík Title: Mimetic and normative isomorphism in the establishment and maintenance of independent air forces Abstract: Why do countries have air forces? Organizational alternatives, such as maintaining separate air arms for the army and navy, have become quite rare. The conventional narrative advanced by advocates of independent air forces stress that the primacy of airpower in modern warfare mandates centralized control of most military aviation. In this view, political--military uncertainty has driven mimetic isomorphism -- pressure on national governments to organize as others organize so as to fight or deter war just as effectively. However, working from a set of 56 countries that were politically independent within a few years of the establishment of the first ever independent air force (the Royal Air Force) in 1918, and continuing through nearly the present, there is no clear pattern of external military pressure prompting this particular reorganization. Rather, from anecdotal evidence, the cause has more likely been normative isomorphism -- a professional craving to look as others look to foster political or personal legitimacy. For whatever reason, though, choices of structures tend to lead to specific choices of policies. Thus, the result suggests that defense ministries looking for more effective or less costly organizational schemas may reasonably consider alternatives to the tripartite army--navy--air force structure. Journal: Defense & Security Analysis Pages: 253-263 Issue: 3 Volume: 32 Year: 2016 Month: 9 X-DOI: 10.1080/14751798.2016.1199119 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199119 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:253-263 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Bang Author-X-Name-First: Martin Author-X-Name-Last: Bang Author-Name: Hans Liwång Author-X-Name-First: Hans Author-X-Name-Last: Liwång Title: Influences on threat assessment in a military context Abstract: The anchoring effect is a well-studied subject. This article connects the effect with the rules-in-use within a military intelligence institution. Particularly the rules-in-use that dictate that an analyst takes his or hers starting point from recently conducted assessments of the specific area or threat. The threat assessment as well as the written assessment were affected. The results show that officers have an aversion to lower a previous given threat assessment. This gives that to understand risk assessment we not only need to understand the methods used, we also need to understand the institutions in which they are used. This is especially relevant for military intelligence as the assessments are conducted in an environment of high uncertainty. Journal: Defense & Security Analysis Pages: 264-277 Issue: 3 Volume: 32 Year: 2016 Month: 9 X-DOI: 10.1080/14751798.2016.1199118 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199118 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:264-277 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 279-280 Issue: 4 Volume: 32 Year: 2016 Month: 12 X-DOI: 10.1080/14751798.2016.1238702 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1238702 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:279-280 Template-Type: ReDIF-Article 1.0 Author-Name: Joel R. Hillison Author-X-Name-First: Joel R. Author-X-Name-Last: Hillison Author-Name: Avram Isaacson Author-X-Name-First: Avram Author-X-Name-Last: Isaacson Title: Deviant globalization: the application of strategic landpower Abstract: In both Afghanistan and Iraq, US landpower was able to gain control rapidly over terrain. However, that control ebbed as US presence weakened. Non-state actors, such as the Taliban, the Haqqani network, the Islamic State, and Al Qaeda, gained control of segments of the population. Transnational Criminal Organizations capitalized on this permissive environment to strengthen their networks, often eroding the legitimacy of the host nation government, fueling regional instability, and, ultimately, undermining US policy objectives. The proliferation of deviant globalization, or the connectedness of subversive elements, is a key indicator of future conflict. Strategic landpower is uniquely positioned to influence the physical, psychological, economic, and social interactions of various non-state actors and their association with deviant globalization. It is no longer enough to seize and hold terrain. Landpower must also have the capability to influence the actions and attitudes of populations on that terrain wherever and whenever these interactions occur. Journal: Defense & Security Analysis Pages: 281-292 Issue: 4 Volume: 32 Year: 2016 Month: 12 X-DOI: 10.1080/14751798.2016.1233697 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233697 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:281-292 Template-Type: ReDIF-Article 1.0 Author-Name: Lawrence E. Cline Author-X-Name-First: Lawrence E. Author-X-Name-Last: Cline Title: Tipping the scales: short-term interventions and counterinsurgency Abstract: Particularly in African operations, United Nations (UN) peacekeeping forces have faced significant problems in restoring stability. In at least a few situations, unilateral national military interventions have been launched in the same countries. In the cases of Sierra Leone and Côte d’Ivoire, the British and French interventions respectively played a significant role in re-establishing stability. Lessons from these operations suggest that if effective coordination and liaison channels are established, such hybrid unilateral-UN missions can in fact be more successful than “pure” peace operations. Journal: Defense & Security Analysis Pages: 293-311 Issue: 4 Volume: 32 Year: 2016 Month: 12 X-DOI: 10.1080/14751798.2016.1233694 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233694 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:293-311 Template-Type: ReDIF-Article 1.0 Author-Name: Shay Shabtai Author-X-Name-First: Shay Author-X-Name-Last: Shabtai Title: The war after next is here -- what does the elephant look like? Abstract: A comprehensive paradigm of future wars can be defined, and is called in this article “Extended conflicts.” These can be characterized by strategic attrition, to which all national resources and all possible international legitimacy are mobilized, in order to achieve a resolution by transformation of the opponent. The use of military force in this kind of conflict is limited. The understanding that we are facing an era of extended conflicts will improve the way it is utilized. Journal: Defense & Security Analysis Pages: 312-320 Issue: 4 Volume: 32 Year: 2016 Month: 12 X-DOI: 10.1080/14751798.2016.1233699 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233699 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:312-320 Template-Type: ReDIF-Article 1.0 Author-Name: Bence Nemeth Author-X-Name-First: Bence Author-X-Name-Last: Nemeth Title: Making defense planning meaningful: the evolution of strategic guidance in the Hungarian Ministry of Defense Abstract: Hungary, a former communist state, adapted a Western-style defense planning system during the 1990s and 2000s. Although on the surface the elements of this planning system were similar to the planning programming budgeting system (PPBS) developed by the US Department of Defense, strategic guidance for defense planning has not been properly developed until recently. Thus, albeit PPBS-based defense plans were developed in the Hungarian Ministry of Defense (Hungarian MoD) regularly, they lacked both an expression of clear priorities and strategic focus. This article delineates the evolution of strategic guidance in the Hungarian MoD concentrating on current developments, and introduces the newly elaborated analytical concepts and tools, which helped to create needed strategic guidance in Hungary. Journal: Defense & Security Analysis Pages: 321-335 Issue: 4 Volume: 32 Year: 2016 Month: 12 X-DOI: 10.1080/14751798.2016.1233693 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233693 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:321-335 Template-Type: ReDIF-Article 1.0 Author-Name: Iis Gindarsah Author-X-Name-First: Iis Author-X-Name-Last: Gindarsah Title: Strategic hedging in Indonesia’s defense diplomacy Abstract: With the rapid pace of regional arms modernization and unresolved territorial disputes, Indonesia is increasingly susceptible to the impact of emerging great power rivalry in Asia-Pacific. Rather than pursuing a robust military build-up, Indonesian policy-makers assert that diplomacy is the country’s first line of defense. This article argues that defense diplomacy serves two agenda of Indonesia’s hedging strategy -- strategic engagement and military modernization. This way, Indonesian defense and security officials seek to moderate the impact of geopolitical changes while maintaining the country’s defensive ability against regional uncertainties. Journal: Defense & Security Analysis Pages: 336-353 Issue: 4 Volume: 32 Year: 2016 Month: 12 X-DOI: 10.1080/14751798.2016.1233695 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233695 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:336-353 Template-Type: ReDIF-Article 1.0 Author-Name: Shameer Modongal Author-X-Name-First: Shameer Author-X-Name-Last: Modongal Title: Deterrence of nuclear terrorism in the context of South Asia Abstract: Stability among the great powers during the Cold War is widely theorized in terms of nuclear deterrence. Rationality of states and their preference for survival are the basis of nuclear deterrence. The rationality of non-state terrorist groups is different from that of nation-states. Even though they are also rational actors with their own hierarchy of preferences, survival may not be their ultimate goal. Deterrence of nuclear terrorism is therefore different from deterrence against states. South Asia is more vulnerable to nuclear terrorism than any other region of the world for many reasons. This article analyzes the possibility of nuclear terrorism and the ways of deterrence against it in the context of South Asia. Journal: Defense & Security Analysis Pages: 354-360 Issue: 4 Volume: 32 Year: 2016 Month: 12 X-DOI: 10.1080/14751798.2016.1233698 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233698 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:354-360 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 1-2 Issue: 1 Volume: 33 Year: 2017 Month: 3 X-DOI: 10.1080/14751798.2017.1299448 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1299448 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 Author-Name: James Horncastle Author-X-Name-First: James Author-X-Name-Last: Horncastle Title: Majority rule, minority issues: The Macedonian question in the Dekemvriana Abstract: This article examines the role of the Macedonian Question in the 1944 December Uprising (Dekemvriana) in Greece. While the Dekemvriana is commonly portrayed in right--left terminology in the historiography, this article argues that part of the reason for the left’s failure was their inability to manage the Macedonian ethnic component of the struggle, either within their armed forces or in their relationship with Yugoslavia. As such, this article integrates the early phases of the Greek Civil War into the broader literature on minorities in civil conflict, while simultaneously exposing some of the myths about Macedonian involvement that result from its contemporary political ramifications. Journal: Defense & Security Analysis Pages: 3-14 Issue: 1 Volume: 33 Year: 2017 Month: 3 X-DOI: 10.1080/14751798.2016.1269388 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1269388 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:3-14 Template-Type: ReDIF-Article 1.0 Author-Name: Jason Ridler Author-X-Name-First: Jason Author-X-Name-Last: Ridler Title: The fertile ground of Hell’s carnival: Charles T. R. Bohannan and the US Army’s Counter Intelligence Corps’ investigations of war criminals, collaborators, and the Huk, in the Philippines 1945--1947 Abstract: Insurgencies thrive in regions where government legitimacy is absent. In the post-war Philippines, Captain Charles T. R. Bohannan of the Army’s Counter Intelligence Corps became actively aware of this dynamic. Bohannan is best known for his later work with Edward Lansdale and Ramon Magsaysay in defeating the Huk Rebellion (1950--1954). Here the author examines Bohannan’s early investigative work against Japanese war criminals, wartime Filipino collaborators, and the rising threat of communist subversion most associated with the Huk. All of these experiences fed into what would be the successful campaign against the Huk, chronicled in his seminal work, Counter Guerrilla Operations: The Philippines Experience, and offers lessons on the investigative (as opposed to tactical or psychological) nature of effective counter-insurgency work, as it relates to both legitimacy in governance and the rise of insurgencies. Journal: Defense & Security Analysis Pages: 15-29 Issue: 1 Volume: 33 Year: 2017 Month: 3 X-DOI: 10.1080/14751798.2016.1269391 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1269391 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:15-29 Template-Type: ReDIF-Article 1.0 Author-Name: Hans Liwång Author-X-Name-First: Hans Author-X-Name-Last: Liwång Title: Risk communication within military decision-making: pedagogic considerations Abstract: Risk management is a decision-support process and a vital tool for military planning and decision-making. Today, several nations utilize risk-based approaches to analyze the level of security in military operations. There are both strengths and challenges in applying risk-based approaches to support military decisions. In this article, the challenges related to risk communication are investigated with the aim of describing how a military organization should train to create a good environment for effective risk communication. The analysis finds that it is important for the organization to define and consistently use a shared risk understanding. Such a shared risk understanding will need a systematic development process that focuses on the future decision makers’ and analysts’ education and training. To reach understanding, all involved parties must have the chance to identify the problem, reflect on its implications, test different solutions and develop a solution. Journal: Defense & Security Analysis Pages: 30-44 Issue: 1 Volume: 33 Year: 2017 Month: 3 X-DOI: 10.1080/14751798.2016.1269389 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1269389 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:30-44 Template-Type: ReDIF-Article 1.0 Author-Name: Christine Sixta Rinehart Author-X-Name-First: Christine Sixta Author-X-Name-Last: Rinehart Title: Sharing security in an era of international cooperation: unmanned aerial vehicles and the United States’ Air Force Abstract: The United States’ Air Force (USAF) has developed and used unmanned aerial vehicle (UAV) technology to monitor and assassinate dangerous terrorists in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen. Currently, there are few countries that possess armed UAV and since the US created much of this technology, the USAF is usually part of the training that automatically accompanies the purchase of its UAVs. The research question this article attempts to answer is, “What is the extent of the United States’ Air Force assistance in the training and proliferation of UAV technology to foreign militaries?” Journal: Defense & Security Analysis Pages: 45-56 Issue: 1 Volume: 33 Year: 2017 Month: 3 X-DOI: 10.1080/14751798.2016.1269390 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1269390 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:45-56 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: Putin and Russia in retro and forward: the nuclear dimension Abstract: Deterioration in security relations as between NATO and Russia reached boiling point in the aftermath of Russia’s annexation of Crimea in 2014 and its subsequent destabilization of Eastern Ukraine. As a result, some voices in the West look forward to the departure of Vladimir Putin from power, and others to the possible disintegration of Russia as a unitary state. However, both the departure of Putin and the collapse of Russia have a nuclear dimension. Putin has issued pointed reminders of Russia’s status as a nuclear great power, and Russian military doctrine allows for nuclear first use in the event of a conventional war with extremely high stakes. Beyond Putin, a breakup of Russia would leave political chaos in Eastern Europe, Central Asia and elsewhere, inviting ambiguous command and control over formerly Russian nuclear forces. Journal: Defense & Security Analysis Pages: 57-67 Issue: 1 Volume: 33 Year: 2017 Month: 3 X-DOI: 10.1080/14751798.2017.1289636 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1289636 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:57-67 Template-Type: ReDIF-Article 1.0 Author-Name: Douglas Mastriano Author-X-Name-First: Douglas Author-X-Name-Last: Mastriano Title: Putin -- the masked nemesis of the strategy of ambiguity Abstract: Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. Journal: Defense & Security Analysis Pages: 68-76 Issue: 1 Volume: 33 Year: 2017 Month: 3 X-DOI: 10.1080/14751798.2016.1272175 File-URL: http://hdl.handle.net/10.1080/14751798.2016.1272175 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:68-76 Template-Type: ReDIF-Article 1.0 Author-Name: Jon Rahbek-Clemmensen Author-X-Name-First: Jon Author-X-Name-Last: Rahbek-Clemmensen Title: The strategic purpose of individual augmentee officers for junior partners in multinational military operations Abstract: This article examines the strategic purpose of Individual Augmentee Officers (IAOs) for junior partners in multinational military operations through an exploratory case study of Danish IAOs in Iraq and South Sudan between 2014 and 2017. IAOs are individual officers who are moved from their normal functions to be seconded to other units of the armed forces of their own or another country or an international institution. The study concludes that IAOs function as strategically important, yet not necessarily indispensable, supplements to military contingents in several ways: making tangible contributions to the overall mission (contributing), gaining access to information, knowledge, and experience (learning), and lobbying decision-making processes within mission headquarters (lobbying). The usefulness of IAOs depends on whether the junior partner has specific interests and a significant presence in the theatre and whether the mission is conducted as a UN mission, a NATO mission, or an ad hoc coalition. Journal: Defense & Security Analysis Pages: 343-361 Issue: 4 Volume: 35 Year: 2019 Month: 10 X-DOI: 10.1080/14751798.2019.1675937 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675937 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:343-361 Template-Type: ReDIF-Article 1.0 Author-Name: Anna Jackman Author-X-Name-First: Anna Author-X-Name-Last: Jackman Title: Consumer drone evolutions: trends, spaces, temporalities, threats Abstract: While the drone has become synonymous with the War on Terror, the asymmetric iconography of the battlefield is shifting. Commercially available off-the-shelf (COTS) drones are increasingly prevalent features of global battlefields, employed by non-state actors in both visualising such spaces, and the directing and inflicting of harm. As such usage increases, so too do concerns around their evolving adoption, adaptation, and potential portability into homeland spheres. While cognizant of the range of positive drone applications, it is asserted that drones nonetheless remain simultaneously bound to an inverse potential for exploitation. In examining drone risk, this article approaches the consumer drone through a series of sites and spaces through which it is technically and socially constructed. Reflecting upon industry innovation, community-driven experimentation, and evolving airspace – it calls for greater attention to the drone’s malleability, arguing that understandings of COTS drones must remain attentive to both drone potential and potential drone threat. Journal: Defense & Security Analysis Pages: 362-383 Issue: 4 Volume: 35 Year: 2019 Month: 10 X-DOI: 10.1080/14751798.2019.1675934 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675934 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:362-383 Template-Type: ReDIF-Article 1.0 Author-Name: Antti Seppo Author-X-Name-First: Antti Author-X-Name-Last: Seppo Author-Name: Iulia-Sabina Joja Author-X-Name-First: Iulia-Sabina Author-X-Name-Last: Joja Title: The struggle of a Kantian power in a Lockean world – German leadership in security and defence policy Abstract: German security and defence policy has undergone substantial transformation. This transformation requires an unprecedented level of political leadership, suggesting that Germany needs to solve the dilemma of how to supply leadership to increasingly demanding partners. What are the conditions under which German leadership can unfold in security and defence policy? To what degree do German role-conceptions of international agency and role-expectations of German leadership coincide? What kind of leadership outputs are produced? This study offers a comprehensive analysis of German security and defence policy in terms of supply (role conceptions) and demand (role expectations). We outline three leadership role conceptions present in the German strategic debate, which we then assess in the context of the Wendtian theory of cultures of anarchy. We then analyse Berlin's leadership in terms of outputs via the case study on Anchor Army and the Framework Nations Concept. We conclude that while Germany has tried to match leadership role expectations both rhetorically and in action, Berlin's leadership inputs have so far been insufficient. This has led to an imbalance in terms of role conceptions and expectations hampering effective German leadership in security and defence policy. Journal: Defense & Security Analysis Pages: 384-405 Issue: 4 Volume: 35 Year: 2019 Month: 10 X-DOI: 10.1080/14751798.2019.1678718 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1678718 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:384-405 Template-Type: ReDIF-Article 1.0 Author-Name: Viljar Veebel Author-X-Name-First: Viljar Author-X-Name-Last: Veebel Author-Name: Illimar Ploom Author-X-Name-First: Illimar Author-X-Name-Last: Ploom Title: Are the Baltic States and NATO on the right path in deterring Russia in the Baltic? Abstract: The aim of the current study is to discuss which particular factors Russia considers as sufficient deterrent capabilities and whether the national defence models implemented in the Baltic countries have the potential to deter Russia's military planners and political leadership. Whilst the existing conventional reserves of NATO are sizeable, secure, and rapid, deployment is still a critical variable in case of a conflict in the Baltic countries because of the limited range of safe transportation options. However, whilst the Baltic States are developing their capabilities according to the priorities defined by NATO in 2010; which were updated after the invasion of Crimea in 2014, Russian military planners have meanwhile redesigned both their military doctrine and military forces, learning from the experience of the Russo-Georgian war, the Russia-Ukraine conflict, and other recent confrontations. Accordingly, there is a risk that the efforts of the Baltic countries could prove rather inefficient in deterring Russia. Journal: Defense & Security Analysis Pages: 406-422 Issue: 4 Volume: 35 Year: 2019 Month: 10 X-DOI: 10.1080/14751798.2019.1675947 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675947 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:406-422 Template-Type: ReDIF-Article 1.0 Author-Name: Colin D. Robinson Author-X-Name-First: Colin D. Author-X-Name-Last: Robinson Title: Glimpse into an army at its peak: notes on the Somali National Army in the 1960–80s Abstract: Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state. Journal: Defense & Security Analysis Pages: 423-429 Issue: 4 Volume: 35 Year: 2019 Month: 10 X-DOI: 10.1080/14751798.2019.1675944 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675944 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:423-429 Template-Type: ReDIF-Article 1.0 Author-Name: Paul B. Rich Author-X-Name-First: Paul B. Author-X-Name-Last: Rich Title: The snowball phenomenon: the US Marine Corps, military mythology and the spread of hybrid warfare theory Abstract: This article reviews the book by Ofer Fridman and seeks to situate the strategic debate on hybrid war in the context of debate on the US involvement in Iraq. It points to intellectuals from the Marine Corps having a significant role in the initial development of the hybrid warfare concept at a time of some reservation in US military circles over COIN strategy as this was set out in the field manual FM3-24. Thereafter, the hybrid war concept rapidly spread and became a conceptual device used to explain Russian strategic intentions in the aftermath of the invasion of Ukraine in 2014. Journal: Defense & Security Analysis Pages: 430-446 Issue: 4 Volume: 35 Year: 2019 Month: 10 X-DOI: 10.1080/14751798.2019.1675942 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675942 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:430-446 Template-Type: ReDIF-Article 1.0 Author-Name: Lazar Zsolt Author-X-Name-First: Lazar Author-X-Name-Last: Zsolt Title: The Hungarian experience with Gripen fighter aircraft Abstract: The post-communist countries transition from the Warsaw Pact style of platforms and systems to Western-compatible capabilities has never been an easy task or a process without conflicts. This was no different for the Visegrád countries either, in which case the Hungarian Gripen procurement stands out. After much debate, Budapest decided to modernize its fighter fleet with the not battle tested Swedish-made Gripen fighter aircraft. This decision received several critiques due to the lack of transparency in the selection process and the initial lack of NATO-required systems. Subsequently, the fleet has had to operate in a financially demanding environment. Moreover, the air force has lost two aircrafts in accidents. Now that the jets are in the middle of their envisaged life cycle, it is more than appropriate to answer the question if the Gripens can utilize their full combat potential or will they fail the test of time? Journal: Defense & Security Analysis Pages: 161-175 Issue: 2 Volume: 34 Year: 2018 Month: 4 X-DOI: 10.1080/14751798.2018.1478180 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478180 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:161-175 Template-Type: ReDIF-Article 1.0 Author-Name: Roger Handberg Author-X-Name-First: Roger Author-X-Name-Last: Handberg Title: War and rumours of war, do improvements in space technologies bring space conflict closer? Abstract: Combat in near-Earth orbit is emerging as a more realistic possibility. The argument here is that changes in space technologies combined with a sea change in political rhetoric is bringing the possibility of military conflict in space technologies. This movement reflects a generational shift as the original decisions regarding military conflict in space are now being reassessed by a generation who did not experience World War II or the Cold War. For these, the sanctuary approach to space activities is not as persuasive and new enhanced space technologies bring the possibility of victory or at least survival possible during a conflict in space. Journal: Defense & Security Analysis Pages: 176-190 Issue: 2 Volume: 34 Year: 2018 Month: 4 X-DOI: 10.1080/14751798.2018.1478181 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478181 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:176-190 Template-Type: ReDIF-Article 1.0 Author-Name: Glen Grant Author-X-Name-First: Glen Author-X-Name-Last: Grant Author-Name: Vladimir Milenski Author-X-Name-First: Vladimir Author-X-Name-Last: Milenski Title: Identifying the challenges to defence reform in Central and Eastern Europe: observations from the field Abstract: The authors have over 50 years' experience of working on defence in Central and Eastern Europe. They have been intimately involved in trying to reform over 10 national defence organisations including Ukraine. During this work, they often faced intractable resistance and scepticism or conversely, apparent unbounded support, but following this, a complete lack of any actual implementation work by officials. This paper addresses some of the findings and observations identified by the authors that appear to cause these responses and the consequent failure of reform. A new research approach has been taken by using the business and culture tools from Schein, Hofstede and Kotter to try and unravel the underlying causality of that failure. The second part of the paper produces a new process for change based upon the research conclusions to help other advisers and consultants working on reform in the post communist defence arena. Journal: Defense & Security Analysis Pages: 191-209 Issue: 2 Volume: 34 Year: 2018 Month: 4 X-DOI: 10.1080/14751798.2018.1478182 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478182 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:191-209 Template-Type: ReDIF-Article 1.0 Author-Name: Ash Rossiter Author-X-Name-First: Ash Author-X-Name-Last: Rossiter Title: Drone usage by militant groups: exploring variation in adoption Abstract: Judging by recent media reporting and pronouncements by senior US military and security officials, the use of drones by militant groups is both reshaping conflict between armed non-state actors and state parties and now presents a grave and direct threat to nations in the West and elsewhere. But does this threat warrant the attention it is currently receiving? To answer this question, this article surveys how various militant groups have used drones both tactically on the battlefield and for wider strategic purposes. Closely examining how drones have been employed and by whom provides a basis for understanding variation in adoption. The article shows how drone usage or non-usage is highly contingent on the setting of the conflict, the aims of different groups, and the capacity of groups to adopt the technology. Though advances in drone technology could make the use-case more appealing for militant groups, drones will be subject to the same back-and-forth, techno-tactical adaptation dynamic between adversaries that have accompanied prior military innovations. Journal: Defense & Security Analysis Pages: 113-126 Issue: 2 Volume: 34 Year: 2018 Month: 4 X-DOI: 10.1080/14751798.2018.1478183 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478183 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:113-126 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas Bolland Author-X-Name-First: Thomas Author-X-Name-Last: Bolland Author-Name: Jan Andre Lee Ludvigsen Author-X-Name-First: Jan Andre Author-X-Name-Last: Lee Ludvigsen Title: “No boots on the ground”: the effectiveness of US drones against Al Qaeda in the Arabian Peninsula Abstract: The number of US drone strikes against Al Qaeda in the Arabian Peninsula (AQAP) in Yemen has increased significantly since 2010, but received limited academic attention. This article examines the effectiveness of this drone campaign using an existing theoretical framework. Crucially, we contribute to the framework by adding a fourth intervening variable, namely target correspondence. Through a single case study, it is found that drones have only enjoyed limited success in degrading AQAP's hierarchical structure, qualified human resources and access to key material resources, and in some cases – owing to our target correspondence analysis – this limited success has come at a price. It is found that drones have temporarily disrupted AQAP by successfully eliminating senior leaders involved in coordinating and overseeing external operations. Overall, AQAP's ability to hit Western targets remains significant. Journal: Defense & Security Analysis Pages: 127-143 Issue: 2 Volume: 34 Year: 2018 Month: 4 X-DOI: 10.1080/14751798.2018.1478184 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478184 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:127-143 Template-Type: ReDIF-Article 1.0 Author-Name: Paul B. Rich Author-X-Name-First: Paul B. Author-X-Name-Last: Rich Title: Cinema, drone warfare and the framing of counter-terrorism Abstract: The study of the cinematic representation is extremely useful in framing of counter-terrorism policies, whether in the US or elsewhere. This paper examines cinema’s interest in drone warfare as well as the lives and personalities of drone pilots. It argues that drone warfare suffers a considerable image problem that has been brought out in several recent features and it is unlikely that any major cinematic myth of drone warfare will easily develop, certainly in comparison to myths concerning special forces and special operations. Journal: Defense & Security Analysis Pages: 144-160 Issue: 2 Volume: 34 Year: 2018 Month: 4 X-DOI: 10.1080/14751798.2018.1478185 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478185 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:144-160 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas-Durell Young Author-X-Name-First: Thomas-Durell Author-X-Name-Last: Young Title: professor Emeritus Martin Hugh Anthony Edmonds of Hornby Journal: Defense & Security Analysis Pages: 1-1 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565340 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565340 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:1-1 Template-Type: ReDIF-Article 1.0 Author-Name: Daniel Salisbury Author-X-Name-First: Daniel Author-X-Name-Last: Salisbury Title: An evolving state of play? Exploring competitive advantages of state assets in proliferation networks Abstract: Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation. Journal: Defense & Security Analysis Pages: 2-22 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565362 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565362 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:2-22 Template-Type: ReDIF-Article 1.0 Author-Name: David S. Sorenson Author-X-Name-First: David S. Author-X-Name-Last: Sorenson Title: More military base closure? Considering the alternatives Abstract: Despite multiple base closing rounds, the United States Department of Defense still has excess base capacity, and thus President Trump and high-level Defense Department officials are calling for more base closure through the Base Realignment and Closure (BRAC) process. However, another BRAC may not be the optimal solution, because simple base closure is not an efficient way to reduce surplus base capacity. Thus, Defense Department officials should consider other methods to reduce surplus capacity, including reduction in base size, leasing excess base property, or transferring it to another government agency for a variety of alternative uses. The surplus capacity issue also offers an opportunity to DOD to reassess base utilization, to update base requirements with current and future force structure. While BRAC focuses on American military bases, the process and alternatives also have international applications. Journal: Defense & Security Analysis Pages: 23-39 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565363 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565363 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:23-39 Template-Type: ReDIF-Article 1.0 Author-Name: Murat Caliskan Author-X-Name-First: Murat Author-X-Name-Last: Caliskan Title: Hybrid warfare through the lens of strategic theory Abstract: Hybrid warfare is the latest of the terms/concepts that have been used within the defence community in the last three decades to label contemporary warfare. It has been officially adopted in the core strategic documents of NATO, EU and national governments and has already inspired many articles, policy papers and books; however, this paper is unique in the sense that it analysis the hybrid warfare concept through the lens of strategic theory. It is argued that hybrid warfare does not merit the adoption as a doctrinal concept. Strategic theory instead, which lies at the nexus of all dimensions of warfare, provides a better viewpoint to approach contemporary warfare. It concludes that efforts should be directed towards exploring warfare under the light of eternal principles instead of proving the emergence of new types of warfare. Journal: Defense & Security Analysis Pages: 40-58 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565364 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565364 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:40-58 Template-Type: ReDIF-Article 1.0 Author-Name: Stephan De Spiegeleire Author-X-Name-First: Stephan Author-X-Name-Last: De Spiegeleire Author-Name: Karlijn Jans Author-X-Name-First: Karlijn Author-X-Name-Last: Jans Author-Name: Mischa Sibbel Author-X-Name-First: Mischa Author-X-Name-Last: Sibbel Author-Name: Khrystyna Holynska Author-X-Name-First: Khrystyna Author-X-Name-Last: Holynska Author-Name: Deborah Lassche Author-X-Name-First: Deborah Author-X-Name-Last: Lassche Title: Implementing defence policy: a benchmark-“lite” Abstract: Most countries put significant amounts of time and effort in writing and issuing high-level policy documents. These are supposed to guide subsequent national defence efforts. But do they? And how do countries even try to ensure that they do? This paper reports on a benchmarking effort of how a few “best of breed” small- to medium-sized defence organisations (Australia, Canada, and New Zealand) deal with these issues. We find that most countries fail to link goals to resources and pay limited attention to specific and rigorous ex-ante or post-hoc evaluation, even when compared to their own national government-wide provisions. We do, however, observe a (modest) trend towards putting more specific goals and metrics in these documents that can be – and in a few rare cases were – tracked. The paper identifies 42 concrete policy “nuggets” – both “do’s and don’ts” – that should be of interest to most defence policy planning/analysis communities. It ends with two recommendations that are in line with recent broader (non-defence) scholarship on the policy formulation-policy implementation gap: to put more rigorous emphasis on implementation (especially on achieving desired policy effects), but to do so increasingly in more experiential (“design”) ways, rather than in industrial-age bureaucratic ones (“PPBS”-systems). Journal: Defense & Security Analysis Pages: 59-81 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565365 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565365 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:59-81 Template-Type: ReDIF-Article 1.0 Author-Name: Glen Grant Author-X-Name-First: Glen Author-X-Name-Last: Grant Author-Name: Vladimir Milenski Author-X-Name-First: Vladimir Author-X-Name-Last: Milenski Title: Defence models uncovered: how to understand the defence style of a country Abstract: This paper describes four different styles, or models, of defence organisation that can be found worldwide. The framework outlined in the paper has been designed to help politicians, diplomats and officials understand better their own system so they can improve it, or to understand the system of others so they can produce better interoperability. The four styles (or models) suggested are mutually exclusive as each has defining factors that mark them out from the other three. The models are rational focusing upon warfighting; emotional, the antithesis of rationality where choices of the day dominate; politically dominant, where a political solution is chosen for the country such as conscription; and militarily dominant, where the whole defence system is controlled by the military with no proper civilian oversight. Each model is hard to sustain and most countries tend towards one style being dominant with elements of the others. Journal: Defense & Security Analysis Pages: 82-94 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565669 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565669 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:82-94 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas Durell Young Author-X-Name-First: Thomas Durell Author-X-Name-Last: Young Title: Editorial to open a debate: VOSTOK 2018: are Russian armed forces experimenting with mission-command? Journal: Defense & Security Analysis Pages: 95-95 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565670 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565670 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:95-95 Template-Type: ReDIF-Article 1.0 Author-Name: Michael H. Clemmesen Author-X-Name-First: Michael H. Author-X-Name-Last: Clemmesen Title: On the roles of free play in army exercises and the Russians Abstract: The article outlines the essential role of free play elements in various types of exercises for the development of in-depth and practical military professionalism. It thereafter argues why such use of free play contradicts the military science founded Russian Way of War. Journal: Defense & Security Analysis Pages: 96-97 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565671 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565671 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:96-97 Template-Type: ReDIF-Article 1.0 Author-Name: Vladimir Milenski Author-X-Name-First: Vladimir Author-X-Name-Last: Milenski Title: VOSTOK-2018 and the fear of free-play in Russian military training Journal: Defense & Security Analysis Pages: 98-99 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565673 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565673 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:98-99 Template-Type: ReDIF-Article 1.0 Author-Name: Daivis Petraitis Author-X-Name-First: Daivis Author-X-Name-Last: Petraitis Title: Russian mission-command in VOSTOK strategic exercises Abstract: Russian military prefers and exercises differently compare to the Western planning and execution philosophies with mission command allowed and appreciated in sub unit levels only. “Vostok-2018” provided a lot of evidences Russians using de-centralised execution in the sub-unit levels and at the same time centralised control at levels of units and formations. Journal: Defense & Security Analysis Pages: 100-102 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565672 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565672 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:100-102 Template-Type: ReDIF-Article 1.0 Author-Name: Mathieu Boulègue Author-X-Name-First: Mathieu Author-X-Name-Last: Boulègue Title: Did the Russian General Staff experiment with free play during VOSTOK-2018? Abstract: The VOSTOK-2018 strategic field training exercise (FTX) that took place in mid-September 2018 rehearsed forces’ integration and combat preparedness across multiple strategic directions. Regarding combat readiness, the research question outlined in this paper relates to whether the General Staff experimented with mission-command - a key component of Russia’s modern military thinking. The answer is clearly no: operational creative manoeuvring hardly featured during the VOSTOK-2018 drills for clearly identified reasons. At the systemic level, little room was left for initiatives since the drills focused on implementing and testing command and control (C2) systems. At the structural level, VOSTOK-2018 was not oriented towards mission-command but ‘mission-control’ and streamlining centralised decision-making processes down to the tactical level. At the symbolic level, free play was not exercised due to the participation of China in the drills, and the necessity to impress Chinese military observers. Journal: Defense & Security Analysis Pages: 103-105 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565674 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565674 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:103-105 Template-Type: ReDIF-Article 1.0 Author-Name: Jyri Raitasalo Author-X-Name-First: Jyri Author-X-Name-Last: Raitasalo Title: Lessons from VOSTOK-2018: free-play manoeuvers are overrated and mission-command needs to be bounded Journal: Defense & Security Analysis Pages: 106-107 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565675 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565675 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:106-107 Template-Type: ReDIF-Article 1.0 Author-Name: Alex Gould Author-X-Name-First: Alex Author-X-Name-Last: Gould Title: Security entrepreneurs: performing protection in post-cold war Europe Journal: Defense & Security Analysis Pages: 108-110 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565676 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565676 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:108-110 Template-Type: ReDIF-Article 1.0 Author-Name: Jeffrey Michaels Author-X-Name-First: Jeffrey Author-X-Name-Last: Michaels Title: Cinema and unconventional warfare in the twentieth century: insurgency, terrorism and special operations Journal: Defense & Security Analysis Pages: 110-112 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565677 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565677 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:110-112 Template-Type: ReDIF-Article 1.0 Author-Name: Gergely Németh Author-X-Name-First: Gergely Author-X-Name-Last: Németh Title: Strategy, evolution and warfare: from apes to artificial intelligence Journal: Defense & Security Analysis Pages: 112-113 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565689 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565689 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:112-113 Template-Type: ReDIF-Article 1.0 Author-Name: Benjamin Tuck Author-X-Name-First: Benjamin Author-X-Name-Last: Tuck Title: Learning to fight: military innovation and change in the British Army, 1914–1918 Journal: Defense & Security Analysis Pages: 114-115 Issue: 1 Volume: 35 Year: 2019 Month: 1 X-DOI: 10.1080/14751798.2019.1565690 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565690 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:114-115 Template-Type: ReDIF-Article 1.0 Author-Name: Blažo M. Radović Author-X-Name-First: Blažo M. Author-X-Name-Last: Radović Title: The Serbian defence institution: the need for clear policy guidance to improve the Serbian defence planning, management, and command processes Abstract: The uncritical layering of western liberal defence governance norms and concepts on top of existing legacy concepts has impeded achieving coherent military capabilities and capacities when Serbia’s political and military leadership tried to reform the defence system using Western benchmarking principles and Western countries’ best practices. The process of this change has been more valuable than its actual output, as defined by increased capabilities. Such outcomes should be reflective of policy guidance, and can be thought of as closing the trinity loop of a defence planning system: plans, money and execution. This article addresses two key functional areas of the Serbian defence institution. First, it assesses the current state of defence planning to discern its strengths and weaknesses to ascertain if plans are tied to financial decision-making. Second, a full examination of current Serbian defence management is conducted to discern whether weaknesses exist that distract from producing operational capabilities. Both areas are analyzed thoroughly and some solutions for change are proposed. Also, the article analyzes the appearance of two negative phenomena in the planning process – economization and managerialism. Journal: Defense & Security Analysis Pages: 211-231 Issue: 3 Volume: 34 Year: 2018 Month: 7 X-DOI: 10.1080/14751798.2018.1500753 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500753 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:211-231 Template-Type: ReDIF-Article 1.0 Author-Name: Kenneth Boutin Author-X-Name-First: Kenneth Author-X-Name-Last: Boutin Title: Feeding the Lion: China and defence development in African states Abstract: In analysing trends in Chinese defence engagement and their impact on defence development in African states, it is important to consider both China's changing policy priorities and its capabilities for the provision of defence support. China's international ambitions and its economic development contribute to its emergence as a key supporter of defence capability development in Africa, occupying a crucial niche as a provider of support, particularly arms transfers, appropriate to evolving local requirements. The economic and politico-military imperatives driving China's engagement of Africa, which stem from its economic reforms and re-emergence as a great power, are facilitating defence modernisation by accelerating the introduction of modern arms in substantial quantities. The commercial importance of arms exports and the growing importance of strategic ties strongly situate China to help sustain processes of defence capability development in African states over the long term. Journal: Defense & Security Analysis Pages: 232-248 Issue: 3 Volume: 34 Year: 2018 Month: 7 X-DOI: 10.1080/14751798.2018.1500755 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500755 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:232-248 Template-Type: ReDIF-Article 1.0 Author-Name: Colin D. Robinson Author-X-Name-First: Colin D. Author-X-Name-Last: Robinson Title: What explains the failure of U.S. army reconstruction in Afghanistan? Abstract: This author wrote his doctorate thesis on post-conflict army reconstruction, submitting it in 2011. Continued research on the subject in the intervening seven years indicates that his theoretical propositions can be refined and improved. This article examines refinements to the model, and then applies those refinements in detail to the Afghan case. In so doing, it shifts the focus from potentially altruistic state-building to a case that was driven by pure national-strategic interests. Issues surrounding the liberal peace ideology dominate recent army reconstruction in conflict-affected states. The liberal peace underpinning is of supreme importance, so much so that in many discussions, it is internalised and accepted virtually without thought. This paper will advance the body of knowledge by establishing, for the first time, a theoretical basis for the widespread failure of army reconstruction in Afghanistan. The empirical basis builds on extensive previous research by other scholars. The resulting model can also be applied to better explain outcomes in other similar cases. Journal: Defense & Security Analysis Pages: 249-266 Issue: 3 Volume: 34 Year: 2018 Month: 7 X-DOI: 10.1080/14751798.2018.1500756 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500756 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:249-266 Template-Type: ReDIF-Article 1.0 Author-Name: Jahara Matisek Author-X-Name-First: Jahara Author-X-Name-Last: Matisek Title: The crisis of American military assistance: strategic dithering and Fabergé Egg armies Abstract: The United States has provided substantial amounts of military assistance and aid since the end of World War Two. During the Cold War, it proved vital in protecting numerous regimes from communist takeovers. Successful outcomes occurred when American leaders made large initial aid commitments, and the states had the capacity and political willpower to use it effectively. However, Vietnam was an example of how U.S. support lagged, as leaders in Saigon preferred political survival instead of creating regime legitimacy. Following 9/11, American security aid focused on making weak countries develop stronger security forces. Unfortunately, this created Fabergé egg militaries: expensive and easily broken by insurgents. This article suggests long-term strategic commitments need to be made alongside more resources for the American State Department and similar organizations to focus on the politics of state-building. Finally, this article suggests strategies, such as “whole-of-government” approaches, to improve long-term security and political institution building. Journal: Defense & Security Analysis Pages: 267-290 Issue: 3 Volume: 34 Year: 2018 Month: 7 X-DOI: 10.1080/14751798.2018.1500757 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500757 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:267-290 Template-Type: ReDIF-Article 1.0 Author-Name: Viljar Veebel Author-X-Name-First: Viljar Author-X-Name-Last: Veebel Title: (Un)justified expectations on nuclear deterrence of non-nuclear NATO members: the case of Estonia and Latvia? Abstract: Nuclear assets are one of the cornerstones of credible collective deterrence of the North Atlantic Treaty Organisation. Paradoxically, the most endangered member states are the ones without nuclear capabilities, left with the hope and expectation that the owners of nuclear assets will defend them and that their potential enemies are deterred by these capabilities. However, the expectations from one side, practical commitment of allies from other side may not go in harmony and synchronisation. Is there a capability gap which needs to be fulfilled? If yes then, is the gap in the side of nuclear powers or is it on the side of those endangered states who need to understand what can or cannot realistically be expected? The current article focuses on the question of how the political and military elite of the Baltic states describes their expectations in terms of using Alliance's nuclear capabilities to deter Russia's regional ambitions. Journal: Defense & Security Analysis Pages: 291-309 Issue: 3 Volume: 34 Year: 2018 Month: 7 X-DOI: 10.1080/14751798.2018.1500758 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500758 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:291-309 Template-Type: ReDIF-Article 1.0 Author-Name: Paul B. Rich Author-X-Name-First: Paul B. Author-X-Name-Last: Rich Title: Counter-insurgency as Magic: Edward G Lansdale, covert operations and the cultural Cold War Journal: Defense & Security Analysis Pages: 310-319 Issue: 3 Volume: 34 Year: 2018 Month: 7 X-DOI: 10.1080/14751798.2018.1500764 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500764 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:310-319 Template-Type: ReDIF-Article 1.0 Author-Name: The Editors Title: Correction Journal: Defense & Security Analysis Pages: X-X Issue: 3 Volume: 34 Year: 2018 Month: 7 X-DOI: 10.1080/14751798.2018.1532029 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1532029 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:X-X Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 289-291 Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2017.1393865 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1393865 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:289-291 Template-Type: ReDIF-Article 1.0 Author-Name: Gjorgji Veljovski Author-X-Name-First: Gjorgji Author-X-Name-Last: Veljovski Author-Name: Nenad Taneski Author-X-Name-First: Nenad Author-X-Name-Last: Taneski Author-Name: Metodija Dojchinovski Author-X-Name-First: Metodija Author-X-Name-Last: Dojchinovski Title: The danger of “hybrid warfare” from a sophisticated adversary: the Russian “hybridity” in the Ukrainian conflict Abstract: The term “hybrid warfare” is a new one that the West began to use to explain its failure to cope with asymmetric threats. Focusing on the war on global terrorism, the West temporarily withdrew its attention from traditional adversaries, such as Russia, which has used this gap and has audaciously returned to the stage as a global actor. Until the Russian annexation of the Crimean Peninsula in 2014 and inflaming the Ukrainian crisis, most Western authors attributed “hybrid threats” mostly to non-state actors. But the Ukrainian scenario showed the true face of “hybridity” in the modern battlefield when practised by a powerful state actor. Russian “hybrid warfare” in Ukraine has already been seen as a combination of conventional and unconventional methods, that have been complemented with other instruments of national power – diplomatic, economic and information. The purpose of this article is, through an analysis of the Ukrainian scenario, to demonstrate that although the term “hybrid” is new, the concept itself is old and is a continuation of already seen doctrine from the Cold War era. Although “hybrid threats” can come both from state and non-state actors, the Russian interference in Ukraine is proof that they are especially dangerous for the West if, or when, they are initiated from a traditional, sophisticated adversary that has the capacity to use all forms of warfare. Journal: Defense & Security Analysis Pages: 292-307 Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2017.1377883 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377883 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:292-307 Template-Type: ReDIF-Article 1.0 Author-Name: Anton Bebler Author-X-Name-First: Anton Author-X-Name-Last: Bebler Title: Turkey’s imperial legacy and the conflict potential in the Balkans Abstract: Turkey is the only Eurasian state surrounded in almost a full circle by acute hot or “frozen conflicts,” ranging from low-intensity violence, terrorism to fully fledged wars. The prevailing pattern of intercommunal and interethnic conflicts in the continental Balkans and on Cyprus has long been different from those in the rest of Europe and in the Near East. This difference is closely related to the fact that these lands had experienced in the past centuries-long rule by the Ottoman Empire, whose legal successor is the Republic of Turkey. The intercommunal conflict potential in the rest of Europe used to differ substantially, but the difference has been greatly reduced as Western Europe has, in one respect, become “balkanized.” Journal: Defense & Security Analysis Pages: 308-319 Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2017.1377368 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377368 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:308-319 Template-Type: ReDIF-Article 1.0 Author-Name: Idowu Johnson Author-X-Name-First: Idowu Author-X-Name-Last: Johnson Author-Name: Azeez Olaniyan Author-X-Name-First: Azeez Author-X-Name-Last: Olaniyan Title: The politics of renewed quest for a Biafra Republic in Nigeria Abstract: The quest for a Biafran Republic by the Igbo ethnic group has become a recurring demand in Nigeria since the late 1960s. The agitation has been premised on claims of marginalisation and exclusion of the Igbo people in the Nigerian body politic. In spite of the consistency of the agitation through various Administrations, there was a noticeable lull in such demands during the time of President Goodluck Jonathan, only to assume a frightening proportion since the advent of the Administration of President Muhammadu Buhari. This article locates the factors in the outcomes of the 2015 general elections: the question of inclusion and representation; the unfinished nature of the Nigerian civil war; economic challenges, miscalculation both on the part of the Igbo people and indiscretion in the initial appointments made by President Muhammadu Buhari. The article recommends political restructuring of Nigeria as one of the ways to address secessionist tendencies. Journal: Defense & Security Analysis Pages: 320-332 Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2017.1382029 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1382029 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:320-332 Template-Type: ReDIF-Article 1.0 Author-Name: Yan Cimon Author-X-Name-First: Yan Author-X-Name-Last: Cimon Title: Perspectives for the development of key industrial capabilities for Canada’s defence sector Abstract: With the Canada First Defence Strategy, Canada has put forth a major opportunity to reconcile national security imperatives and industrial policy. The Jenkins Report (2013) set out to examine ways to use that procurement effort to foster key industrial capabilities (KICs) that would put the Canadian defence industry at an advantage both nationally and internationally. The Canadian defence industry should then develop highly focused capabilities with a view to moving up global value chains. As such, KICs that hold the best potential should be selected. They should be sustained through a range of strategies that are however contingent on the elimination of policy gaps. This leads to a balancing act between the need to control intellectual property assets versus accessing them in a world where national boundaries are eroded. Canada’s industry should target opportunities outside North America while continuing to focus on better integration with the North American industry. Journal: Defense & Security Analysis Pages: 333-346 Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2017.1377422 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377422 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:333-346 Template-Type: ReDIF-Article 1.0 Author-Name: Evan A. Laksmana Author-X-Name-First: Evan A. Author-X-Name-Last: Laksmana Title: Threats and civil–military relations: explaining Singapore’s “trickle down” military innovation Abstract: This article explains why Singapore, despite its small size and semi-authoritarian regime, retains one of the best military forces in the Indo-Pacific. It unpacks Singapore’s ability to continuously innovate since the 1960s – technologically, organizationally, and conceptually – and even recently joined the Revolution in Military Affairs bandwagon. Drawing from the broader military innovation studies literature, this article argues evolutionary peacetime military innovation is more likely to occur in a state with a unified civil–military relation and whose military faces a high-level diverse set of threats. This argument explains how the civil–military fusion under the People’s Action Party-led government since Singapore’s founding moment has been providing coherent and consistent strategic guidance, political support, and financial capital, allowing the Singapore Armed Forces to continuously innovate in response to high levels and diversity of threats. Journal: Defense & Security Analysis Pages: 347-365 Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2017.1377369 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377369 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:347-365 Template-Type: ReDIF-Article 1.0 Author-Name: Paul Antonopoulos Author-X-Name-First: Paul Author-X-Name-Last: Antonopoulos Author-Name: Renato Velez Author-X-Name-First: Renato Author-X-Name-Last: Velez Author-Name: Drew Cottle Author-X-Name-First: Drew Author-X-Name-Last: Cottle Title: NATO’s push into the Caucasus: geopolitical flashpoints and limits for expansion Abstract: The Caucasus has been a major flashpoint of contention between NATO and a resurgent Russia since the collapse of the Soviet Union. The rivalry saw the escalation of hostility in the region during the brief 2008 Russo-Georgian War where a NATO-backed Georgia challenged South Ossetia supported by the Russian military. In 2011, NATO officially recognised Georgia as a potential member, challenging Russia’s traditional sphere of influence in the Caucasus. Moscow says the Eastward expansion of NATO into the Baltics and to include Georgia as a member state is a method of containing a resurgent Russia. However, the former Soviet Republics of Ukraine, the Baltics and Georgia, maintain that Russia represents a threat to their sovereignty, as seen by the Russian support of the breakaway unrecognised Republics of South Ossetia and Abkhazia. A hostile rivalry between the Russian-backed Armenia and Azerbaijan, which is reliant upon NATO-member Turkey, intensifies the polarisation in the Caucasus. Journal: Defense & Security Analysis Pages: 366-379 Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2017.1379119 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1379119 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:366-379 Template-Type: ReDIF-Article 1.0 Author-Name: Stefano Musco Author-X-Name-First: Stefano Author-X-Name-Last: Musco Title: The art of meddling: a theoretical, strategic and historical analysis of non-official covers for clandestine Humint Abstract: The building of reliable covers has always been of the utmost importance for clandestine Humint. Using both primary and secondary sources, this study seeks to examine how classical authors and modern scholars have dealt with this topic, and which kind of covers have been the most used throughout history in different sociopolitical contexts, and what are the new perspectives for today’s challenges. Findings suggest that a careful reading of the political milieu in which intelligence officers are required to work, and a certain degree of creativity, are the essential premises for the construction of a plausible cover; that some apparently outdated disguises such as merchants, itinerant monks and philosophers should be understood more broadly today to include business people, humanitarian NGOs and academics; that undercover practices have been theoretically and historically recognized as necessary and convenient by a great number of societies, often with scant regard for ethical considerations. Journal: Defense & Security Analysis Pages: 380-394 Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2017.1377367 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377367 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:380-394 Template-Type: ReDIF-Article 1.0 Author-Name: Oluwaseun Bamidele Author-X-Name-First: Oluwaseun Author-X-Name-Last: Bamidele Title: RETRACTED ARTICLE: Boko Haram “Jama'atu Ahlus-Sunnah Lidda'Awati Wal Jihad” in North-eastern Nigeria: implications for Sub-Saharan African peace and security Journal: Defense & Security Analysis Pages: iii-xiv Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2014.948280 File-URL: http://hdl.handle.net/10.1080/14751798.2014.948280 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:iii-xiv Template-Type: ReDIF-Article 1.0 Author-Name: The Editors Title: Editorial board Journal: Defense & Security Analysis Pages: ebi-ebi Issue: 4 Volume: 33 Year: 2017 Month: 10 X-DOI: 10.1080/14751798.2017.1393866 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1393866 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:ebi-ebi Template-Type: ReDIF-Article 1.0 Author-Name: Maja Garb Author-X-Name-First: Maja Author-X-Name-Last: Garb Title: Coping with the refugee and migrant crisis in Slovenia: the role of the military Abstract: Approximately 470,000 refugees and migrants passed through Slovenian territory between September 2015 and March 2016, creating a crisis that required a great deal of organisational and field work on the part of many governmental and non-governmental institutions. In the social sciences, a discourse on “security versus humanitarian approach” on the refugees and migrant issue appeared; however, the article goes over such a discourse and deals with roles and problems of different institutions – mostly the military – that responded to the crisis. Namely, coping with the crisis was characterised by significant institutional adjustments, difficult co-ordination, and intense public debate. The Slovenian Armed Forces were included in this process as support for Civil Protection and Police. The military’s role followed the military missions defined by the Defence Act; however, the government also proposed some changes to the act that were met with some doubts on the part of the public and different institutions. Journal: Defense & Security Analysis Pages: 3-15 Issue: 1 Volume: 34 Year: 2018 Month: 1 X-DOI: 10.1080/14751798.2018.1421400 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421400 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:3-15 Template-Type: ReDIF-Article 1.0 Author-Name: Bence Nemeth Author-X-Name-First: Bence Author-X-Name-Last: Nemeth Title: Militarisation of cooperation against mass migration – the Central European Defence Cooperation (CEDC) Abstract: As a result of the migration crisis of 2015–2016, the management of mass migration and border control became militarised in Central Europe, and this process has also reshaped the dynamics of multinational defence cooperation in the region. Accordingly, while the so-called Central European Defence Cooperation (CEDC) was created by Austria, Croatia, the Czech Republic, Hungary, Slovakia and Slovenia in 2010 to support NATO and EU capability development projects via defence cooperation, after the migration crisis it became the major Central European forum for military cooperation against irregular mass migration. Although many defence officials in the region are not necessarily enthusiastic about this development, the Central European political environment and also practical defence considerations pushed the defence ministries of CEDC countries towards deeper cooperation on border control, as well as better coordination with ministries of interior affairs on the national and the regional levels. Journal: Defense & Security Analysis Pages: 16-34 Issue: 1 Volume: 34 Year: 2018 Month: 1 X-DOI: 10.1080/14751798.2018.1421401 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421401 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:16-34 Template-Type: ReDIF-Article 1.0 Author-Name: Aslı Ilgıt Author-X-Name-First: Aslı Author-X-Name-Last: Ilgıt Author-Name: Özlem Kayhan Pusane Author-X-Name-First: Özlem Author-X-Name-Last: Kayhan Pusane Title: Countering insurgency: Turkey’s policy toward the PKK’s transnational dynamics in Europe Abstract: Insurgents often develop international connections and benefit from external assistance from a variety of sources. Support from diaspora communities has long been considered one of the critical external factors in the persistence of insurgent groups. Yet how the counterinsurgent state addresses external support from transnational ethnic communities and what factors influence the state's policies remain understudied. By focusing on the transnational political practices of the Kurdish community and the PKK in Western Europe, this paper examines how Turkey has addressed the diasporic support for the PKK since the 1980s. It shows that three major factors – the composition of foreign policy decision-makers, their ideological contestation over the Kurdish question, and the European political context – have affected Turkey's policy regarding the PKK's transnational dynamics in Europe. Journal: Defense & Security Analysis Pages: 35-52 Issue: 1 Volume: 34 Year: 2018 Month: 1 X-DOI: 10.1080/14751798.2018.1421402 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421402 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:35-52 Template-Type: ReDIF-Article 1.0 Author-Name: Abel Esterhuyse Author-X-Name-First: Abel Author-X-Name-Last: Esterhuyse Author-Name: Gerhard Louw Author-X-Name-First: Gerhard Author-X-Name-Last: Louw Title: The practice of strategy: South African defence in stasis Abstract: The article concerns the strategy development processes of the South African Department of Defence in South Africa. It intends to identify the probable causes of the observed failure of the South African National Defence Force to develop appropriate departmental policy and military strategy. Military strategy comprises force development, force employment, force deployment and the coordination of these elements in pursuit of national, grand-strategic objectives. (See Dennis M. Drew and Donald M. Snow, Making Twenty-first Century Strategy: An Introduction to Modern National Security Processes and Problems Montgomery, AL: Air University Press, Maxwell Air Force Base, November 2006, 103). Of these four constructs, the article concerns itself only with the first two. The article analyses two complementary approaches to strategy formation: a resource-driven, inside-out model and an interests-driven, outside-in method. The article concludes that the Department is preoccupied with the inside-out method to the lasting detriment of the declared strategic intent of the defence policy. Journal: Defense & Security Analysis Pages: 53-72 Issue: 1 Volume: 34 Year: 2018 Month: 1 X-DOI: 10.1080/14751798.2018.1421403 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421403 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:53-72 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas-Durell Young Author-X-Name-First: Thomas-Durell Author-X-Name-Last: Young Title: Programming challenges and impediments to reform: identifying pragmatic solutions Abstract: Using two recently published essays by the current writer that assesses the dismal record of performance of Planning, Programming, and Budgeting System in enabling communist legacy defence institutions in Central and Eastern Europe to develop viable defence plans, this essay argues the need for deep reforms in the region’s defence institutions. To guide this reform effort, pragmatic solutions are suggested to improve the ability of these organisations to produce viable defence plans. Recommended reforms are: (1) conduct conceptual and cultural “audits,” (2) make operational and financial data central to decision-making, (3) change current organisational sociology, (4) examine planning methods and practices, and (5) stress the need to adopt policy frameworks to drive the operation of defence institutions. Journal: Defense & Security Analysis Pages: 73-92 Issue: 1 Volume: 34 Year: 2018 Month: 1 X-DOI: 10.1080/14751798.2018.1421404 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421404 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:73-92 Template-Type: ReDIF-Article 1.0 Author-Name: Mihail Naydenov Author-X-Name-First: Mihail Author-X-Name-Last: Naydenov Title: The subversion of the Bulgarian defence system – the Russian way Abstract: Russia has long been pursuing an intended and calculated policy of keeping enough influence in Bulgaria in order to have control over national decisions. Together with the economic, energy, political and information tools used by Russia in its hybrid war against Bulgaria and in its bid to achieve an enduring “state capture,” defence is also a distinct target of Russian subversion now. A list of noticeable subversive actions with tangible effects can be summarised, ranging from fuelling division and manipulating public opinion, preventing the strengthening of the NATO position in the Black Sea, sabotaging defence reform to various options of subverting the modernisation of the Bulgarian Armed Forces and seeking new ways to keep legacy Soviet military equipment in operation as long as possible. This issue must be urgently addressed both nationally and in NATO. Journal: Defense & Security Analysis Pages: 93-112 Issue: 1 Volume: 34 Year: 2018 Month: 1 X-DOI: 10.1080/14751798.2018.1421408 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421408 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:93-112 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas-Durell Young Author-X-Name-First: Thomas-Durell Author-X-Name-Last: Young Title: Editorial by the new editor-in-chief Journal: Defense & Security Analysis Pages: 1-2 Issue: 1 Volume: 34 Year: 2018 Month: 1 X-DOI: 10.1080/14751798.2018.1433493 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1433493 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:1-2 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Title: Editorial Journal: Defense & Security Analysis Pages: 191-192 Issue: 3 Volume: 33 Year: 2017 Month: 7 X-DOI: 10.1080/14751798.2017.1351164 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351164 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:191-192 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Title: Nuclear deterrence and cyber warfare: coexistence or competition? Abstract: Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. Journal: Defense & Security Analysis Pages: 193-208 Issue: 3 Volume: 33 Year: 2017 Month: 7 X-DOI: 10.1080/14751798.2017.1351142 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351142 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:193-208 Template-Type: ReDIF-Article 1.0 Author-Name: Christopher G. Pernin Author-X-Name-First: Christopher G. Author-X-Name-Last: Pernin Author-Name: Angela O’Mahony Author-X-Name-First: Angela Author-X-Name-Last: O’Mahony Author-Name: Thomas S. Szayna Author-X-Name-First: Thomas S. Author-X-Name-Last: Szayna Author-Name: Derek Eaton Author-X-Name-First: Derek Author-X-Name-Last: Eaton Author-Name: Katharina Ley Best Author-X-Name-First: Katharina Ley Author-X-Name-Last: Best Author-Name: Elizabeth Bodine-Baron Author-X-Name-First: Elizabeth Author-X-Name-Last: Bodine-Baron Author-Name: Joshua Mendelsohn Author-X-Name-First: Joshua Author-X-Name-Last: Mendelsohn Author-Name: Osonde A. Osoba Author-X-Name-First: Osonde A. Author-X-Name-Last: Osoba Title: What is the global landpower network and what value might it provide? Abstract: US national security guidance, as well as the US Army’s operational experiences since 2001, emphasizes the importance of working closely with partner countries to achieve US strategic objectives. The US Army has introduced the global landpower network (GLN) concept as a means to integrate, sustain and advance the Army’s considerable ongoing efforts to meet US national security guidance. This study develops the GLN concept further, and addresses three questions. What benefits can the GLN provide the Army? What are the essential components of the GLN? What options exist for implementing the GLN concept? By developing the GLN concept, the Army has the opportunity to transition the GLN from an often ad hoc and reactive set of relationships to one that the Army more self-consciously prioritizes and leverages as a resource to meet US strategic objectives. Journal: Defense & Security Analysis Pages: 209-222 Issue: 3 Volume: 33 Year: 2017 Month: 7 X-DOI: 10.1080/14751798.2017.1351153 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351153 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:209-222 Template-Type: ReDIF-Article 1.0 Author-Name: Raul Gouvea Author-X-Name-First: Raul Author-X-Name-Last: Gouvea Title: US–Latin America’s security: moving through an inflection point? Abstract: Recent elections in Latin America, such as those of Mauricio Macri in Argentina, Horacio Cartes in Paraguay, and the impeachment process of Dilma Rousseff in Brazil, point to a new direction in Latin American politics and away from the “hard left;” they also point to a new momentum in the security relationship between the US and Latin American countries. Former US President Obama’s 2016 trip to Cuba and Argentina was a clear demonstration of this new security paradigm and also a clear indication that there is a new momentum brewing in the US towards a rethinking and reshaping of security strategies and mindsets. This article will explore the multidimensional security relationship between the US and Latin American countries in light of recent changes in the US’ posture toward the region. Journal: Defense & Security Analysis Pages: 223-241 Issue: 3 Volume: 33 Year: 2017 Month: 7 X-DOI: 10.1080/14751798.2017.1351138 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351138 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:223-241 Template-Type: ReDIF-Article 1.0 Author-Name: Simon Haddad Author-X-Name-First: Simon Author-X-Name-Last: Haddad Title: Accounting for Lebanese Muslims’ perspectives on the Islamic state (ISIS): religious militancy, sectarianism and personal attributions Abstract: This article seeks to determine the correlates of Lebanese Muslims perceptions of the Islamic State (ISIS) which are measured using the hypotheses that commitment to political Islam, young age, education and occupational status would predict approval of ISIS. In view of the accentuated polarisation between Sunnis and Shiis along sectarian lines, it is proposed that dislike for the Shiis would enhance the level of support for ISIS. The study was based on a cross-sectional survey Lebanese Muslims (N = 302) administered during the fall of 2015.The suggestion is that adherence to the tenets of political Islam, sectarianism and educational attainment are major predictors of endorsement for ISIS. Journal: Defense & Security Analysis Pages: 242-262 Issue: 3 Volume: 33 Year: 2017 Month: 7 X-DOI: 10.1080/14751798.2017.1349997 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1349997 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:242-262 Template-Type: ReDIF-Article 1.0 Author-Name: Hans-Georg Ehrhart Author-X-Name-First: Hans-Georg Author-X-Name-Last: Ehrhart Title: Postmodern warfare and the blurred boundaries between war and peace Abstract: Each age has its own wars and its own forms of warfare. In today’s evolving world risk society warfare has entered a new development stage. The states of the “global North” adapt their forms of intervention. They increasingly practice postmodern warfare characterized especially by the role of influencing the information space, networked approaches, the incorporation of indirect and covert actions, and the special quality of new technologies. This practice furthers an increasing grey zone between limiting and de-bounding of warfare. The phenomenon of postmodern warfare raises some tough questions and offers a rich research agenda. Journal: Defense & Security Analysis Pages: 263-275 Issue: 3 Volume: 33 Year: 2017 Month: 7 X-DOI: 10.1080/14751798.2017.1351156 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351156 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:263-275 Template-Type: ReDIF-Article 1.0 Author-Name: Ian Westerman Author-X-Name-First: Ian Author-X-Name-Last: Westerman Title: Too much Western bias? The need for a more culturally adaptable approach to post-conflict security sector reform Abstract: The existing guidelines for security sector reform (SSR) tend to draw on theoretical work in the field of civil–military relations, which in turn has been derived from Western, liberal democratic models of governance. Although guidelines strongly advise that local culture and context need to be considered when drawing up objectives for post-conflict SSR programmes, this is not often reflected in practice. This article considers some of the reasons for this, citing both in-country challenges and donor-related issues, and suggests that one of the biggest problems is a lack of alternative, non-orthodox models of civil–military relations to draw upon. It is further suggested that elements of suitable alternative models may be found in states which possess political structures not entirely dissimilar to the Western, liberal democratic ideal, but which can offer different perspectives. Detailed research of these structures should produce a pool of sub-models which could then be employed to create bespoke, culturally appropriate objectives for use in post-conflict SSR programmes. Journal: Defense & Security Analysis Pages: 276-288 Issue: 3 Volume: 33 Year: 2017 Month: 7 X-DOI: 10.1080/14751798.2017.1351602 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351602 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:276-288 Template-Type: ReDIF-Article 1.0 Author-Name: Martin Edmonds Author-X-Name-First: Martin Author-X-Name-Last: Edmonds Author-Name: Julian Palmore Author-X-Name-First: Julian Author-X-Name-Last: Palmore Title: Editorial Journal: Defense & Security Analysis Pages: 77-78 Issue: 2 Volume: 33 Year: 2017 Month: 4 X-DOI: 10.1080/14751798.2017.1313533 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1313533 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:77-78 Template-Type: ReDIF-Article 1.0 Author-Name: Jon Strandquist Author-X-Name-First: Jon Author-X-Name-Last: Strandquist Title: US paramilitary programs in comparative perspective: CIA, the US Army Special Forces, and the question of organizational form Abstract: Assumed in the long-standing debate over which agency, CIA or the Department of Defense, should conduct US paramilitary operations is the idea that these organizations’ paramilitary programs are fundamentally the same kinds of things. This article questions that assumption by investigating the organizational forms underlying these agencies’ paramilitary programs in four empirical cases drawn from South Vietnam and post-9/11 Afghanistan. A typology is constructed around two identified organizational forms: “franchising” for CIA vs. “company ownership” for the US Army Special Forces. Different paramilitary organizational forms are found to have significant operational implications that should inform the paramilitary transfer debate. Journal: Defense & Security Analysis Pages: 79-93 Issue: 2 Volume: 33 Year: 2017 Month: 4 X-DOI: 10.1080/14751798.2017.1310701 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1310701 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:79-93 Template-Type: ReDIF-Article 1.0 Author-Name: Matthew Crosston Author-X-Name-First: Matthew Author-X-Name-Last: Crosston Title: The Millenials’ war: dilemmas of network dependency in today’s military Abstract: This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way. Journal: Defense & Security Analysis Pages: 94-105 Issue: 2 Volume: 33 Year: 2017 Month: 4 X-DOI: 10.1080/14751798.2017.1310699 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1310699 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:94-105 Template-Type: ReDIF-Article 1.0 Author-Name: James J. Wirtz Author-X-Name-First: James J. Author-X-Name-Last: Wirtz Title: Life in the “Gray Zone”: observations for contemporary strategists Abstract: The term “Gray Zone” is gaining in popularity as a way of describing contemporary security challenges. This article describes the “short-of-war” strategies – the fait accompli, proxy warfare, and the exploitation of ambiguous deterrence situations, i.e. “salami tactics” – that are captured by the term and offers several explanations for why state and non-state actors are drawn to these strategies. The analysis highlights why defense postures based on deterrence are especially vulnerable to the short-of-war strategies that populate the “Gray Zone.” The article concludes by suggesting how defense officials might adapt defense policies to life in the “Gray Zone.” Journal: Defense & Security Analysis Pages: 106-114 Issue: 2 Volume: 33 Year: 2017 Month: 4 X-DOI: 10.1080/14751798.2017.1310702 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1310702 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:106-114 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen J. Cimbala Author-X-Name-First: Stephen J. Author-X-Name-Last: Cimbala Author-Name: Peter Kent Forster Author-X-Name-First: Peter Author-X-Name-Last: Kent Forster Title: The US NATO and military burden sharing: post-Cold War accomplishments and future prospects Abstract: NATO burden sharing has become an especially timely issue in the past several years as a result of a number of factors, including Russian annexation of Crimea and destabilization of eastern Ukraine in 2014. This article argues that alliance unity among the great democracies of Europe and North America is indispensable to peace and stability on the Eurasian continent. A fractured NATO, and especially, a large divide in purposes or commitments as between the United States and its European security partners, invites aggression and the possibility of inadvertent escalation. Past successes and failures in US-involved multinational peace and stability operations, within and outside of Europe, show that mission accomplishment requires give and take, including the occasional acceptance of unequal costs and benefits among the members, in order to achieve peace and security objectives. Journal: Defense & Security Analysis Pages: 115-130 Issue: 2 Volume: 33 Year: 2017 Month: 4 X-DOI: 10.1080/14751798.2017.1302575 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1302575 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:115-130 Template-Type: ReDIF-Article 1.0 Author-Name: Jordan Becker Author-X-Name-First: Jordan Author-X-Name-Last: Becker Title: The correlates of transatlantic burden sharing: revising the agenda for theoretical and policy analysis Abstract: While recent work has attempted to update the research agenda for transatiantic defense burden-sharing, there remain significant gaps between the public choice defense economics literature and the security studies literature. The presence of such a gap is unfortunate, because defense spending choices are likely shaped by factors identified by the public choice literature, as well as the strategic and cultural variables that the security studies literature tends to focus on, as well as domestic macroeconomic factors. The independent variables identified in recent qualitative literature are extremely useful analytically, and, fortunately, they have reasonable proxies in available quantitative data, which enables scholars to study them across large groups of countries and many years. This article builds upon such work to synthesize the most notable of the factors identified in the current literature, and offers some common analytical ground that will benefit both scholars and practitioners.. Journal: Defense & Security Analysis Pages: 131-157 Issue: 2 Volume: 33 Year: 2017 Month: 4 X-DOI: 10.1080/14751798.2017.1311039 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1311039 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:131-157 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Kluth Author-X-Name-First: Michael Author-X-Name-Last: Kluth Title: European defence industry consolidation and domestic procurement bias Abstract: How have European cross-border defence industrial mergers and acquisitions affected domestic procurement bias among the major EU powers? This article departs from the findings of Andrew Moravcsik more than two decades ago suggesting that major West European states had no ingrained preferences for defence industrial autarchy. When cross-national armament projects were derailed, this could be attributed to political efforts of national defence industrial champions favouring purely domestic projects. As former national champions join pan-European defence groups, their preferences are likely modified. Does this shift procurement towards non-European “off-the-shelf” solutions which, according to Moravcsik, are favoured by defence departments? Or does it give impetus to a stronger preference for European as opposed to domestic systems? In this article, procurement patterns in the aftermath of cross-border defence industry consolidation will be analysed. Procurement bias is assessed in two industry segments characterised by pervasive consolidation. Journal: Defense & Security Analysis Pages: 158-173 Issue: 2 Volume: 33 Year: 2017 Month: 4 X-DOI: 10.1080/14751798.2017.1302576 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1302576 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:158-173 Template-Type: ReDIF-Article 1.0 Author-Name: Ling Li Author-X-Name-First: Ling Author-X-Name-Last: Li Author-Name: Ron Matthews Author-X-Name-First: Ron Author-X-Name-Last: Matthews Title: “Made in China”: an emerging brand in the global arms market Abstract: Possession of a brand is a sine qua non for economic success, not least because it connotes trust in delivering the value promised. Although Western arms exporters offer branded systems whose sales are influenced by price, there is a plethora of other economic variables, such as offset requirements and life-cycle support. Entrants to the international arms market will struggle without such arms “packages.” China’s entry, however, goes beyond the traditional economic paradigm. A four-stage historical model offers the backdrop for identifying the drivers that have forged its market entry into 55 countries worldwide. The strategy initially focused on sales of rudimentary military equipment for political purposes, but recently it has begun to commercialize exports, repositioning them from a low- to a high-tech sales trajectory. A Sino “brand” is thus emerging, reflecting both competitiveness and diplomatic considerations, especially non-interference in client state domestic affairs. Journal: Defense & Security Analysis Pages: 174-189 Issue: 2 Volume: 33 Year: 2017 Month: 4 X-DOI: 10.1080/14751798.2017.1310700 File-URL: http://hdl.handle.net/10.1080/14751798.2017.1310700 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:174-189 Template-Type: ReDIF-Article 1.0 Author-Name: Joakim Berndtsson Author-X-Name-First: Joakim Author-X-Name-Last: Berndtsson Title: The market and the military profession: competition and change in the case of Sweden Abstract: The rise of private military and security companies (PMSCs) challenges our notion of military professionals. PMSCs bring new claims to professional status and legitimacy outside military institutions and represent an increasing diffusion of - and competition over - military and security expertise. In light of this development, understanding the formation of professional identities in military and private security organisations is as an important undertaking. This paper contributes to this endeavour by analysing professional self-images in the Swedish Armed Forces and how these relate to PMSCs. The study is based on data collected from official documents, semi-structured interviews and a small-scale survey among senior military officers. Focusing on military understandings of PMSCs and contractors, the analysis provides much-needed insight into relational aspects of professional identity formation outside the US context. Furthermore, it points to discrepancies in organisational and group levels in understandings of commercial security actors, and paves the way for future research. Journal: Defense & Security Analysis Pages: 190-210 Issue: 2 Volume: 35 Year: 2019 Month: 4 X-DOI: 10.1080/14751798.2019.1600798 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600798 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:190-210 Template-Type: ReDIF-Article 1.0 Author-Name: Sebastian Bruns Author-X-Name-First: Sebastian Author-X-Name-Last: Bruns Title: From show of force to naval presence, and back again: the U.S. Navy in the Baltic, 1982–2017 Abstract: This article discusses roles and missions of the United States Navy with a particular focus on the Baltic Sea. That particular sea has gained renewed political and military attention following Russia's resurgent and increasingly hybrid-offensive foreign policy. Baltic nations, uncertain of what the future holds, ought to look at sea power and maritime missions in the Baltic, as well as US naval presence in Europe, to draw lessons for future posture. Journal: Defense & Security Analysis Pages: 117-132 Issue: 2 Volume: 35 Year: 2019 Month: 4 X-DOI: 10.1080/14751798.2019.1600799 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600799 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:117-132 Template-Type: ReDIF-Article 1.0 Author-Name: James Johnson Author-X-Name-First: James Author-X-Name-Last: Johnson Title: Artificial intelligence & future warfare: implications for international security Abstract: Recent developments in artificial intelligence (AI) suggest that this emerging technology will have a deterministic and potentially transformative influence on military power, strategic competition, and world politics more broadly. After the initial surge of broad speculation in the literature related to AI this article provides some much needed specificity to the debate. It argues that left unchecked the uncertainties and vulnerabilities created by the rapid proliferation and diffusion of AI could become a major potential source of instability and great power strategic rivalry. The article identifies several AI-related innovations and technological developments that will likely have genuine consequences for military applications from a tactical battlefield perspective to the strategic level. Journal: Defense & Security Analysis Pages: 147-169 Issue: 2 Volume: 35 Year: 2019 Month: 4 X-DOI: 10.1080/14751798.2019.1600800 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600800 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:147-169 Template-Type: ReDIF-Article 1.0 Author-Name: Colin D. Robinson Author-X-Name-First: Colin D. Author-X-Name-Last: Robinson Title: The Somali National Army: an assessment Abstract: To engage properly with the Somali National Army, to understand it in the hope of improving stability and the lives of over 12 million Somalis, good basic information on its composition and characteristics is necessary. Authoritative accounts on the subject have been scarce for over 25 years. This account seeks to detail the army’s dispositions across southern Somalia, and, more importantly, the brigades’ clan compositions and linkages. Clan ties supersede loyalties to the central government. The army as it stands is a collection of former militias which suffer from ill-discipline and commit crime along with greater atrocities. Estimates of numbers are unreliable, but there might be 13,000 or more fighters in six brigades in the Mogadishu area and five beyond. Journal: Defense & Security Analysis Pages: 211-221 Issue: 2 Volume: 35 Year: 2019 Month: 4 X-DOI: 10.1080/14751798.2019.1600805 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600805 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:211-221 Template-Type: ReDIF-Article 1.0 Author-Name: Jan Angstrom Author-X-Name-First: Jan Author-X-Name-Last: Angstrom Author-Name: Peter Haldén Author-X-Name-First: Peter Author-X-Name-Last: Haldén Title: The poverty of power in military power: how collective power could benefit strategic studies Abstract: Strategic studies deals intimately with the topic of power. Most scholars in the discipline work with a concept of power as an adversarial zero-sum competition. This is natural and necessary. However, other conceptions of power developed within political science and sociology could enrich strategic studies. Approaching two typical, traditional tasks of strategy – alliance building and war-fighting – this article demonstrates the heuristic mileage of theories of collective power. In particular, we can shed new light on the post-Cold War transformation of NATO as well as state-building as a strategy in counter-insurgencies with new ideas of power. Broadening the palette of theories of power is thus valuable if strategic studies is to prosper as an independent field of study. Journal: Defense & Security Analysis Pages: 170-189 Issue: 2 Volume: 35 Year: 2019 Month: 4 X-DOI: 10.1080/14751798.2019.1600812 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600812 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:170-189 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Evans Author-X-Name-First: Michael Author-X-Name-Last: Evans Title: A usable past: a contemporary approach to history for the Western profession of arms Abstract: The most effective way for the Western profession of arms to use history is to disavow the purism and narrow specialisation of today’s academia in favour of developing a contemporary approach to the subject. The latter aims to foster a range of applied diagnostic skills that transcend the temporal dimensions of past, present, and future. A contemporary approach to history for military professionals emphasises the use of inter-disciplinary war studies to enhance policy relevance. In any defense and security organisation, history must be usable in the sense of providing cognitive and interpretative skills for probing relationships between possibility and actuality, between experience and expectation, and between singularity and repetition. Using history to examine such dialectical interconnections is particularly valuable when military establishments confront their essential task of analyzing emerging trends in the future of war. Journal: Defense & Security Analysis Pages: 133-146 Issue: 2 Volume: 35 Year: 2019 Month: 4 X-DOI: 10.1080/14751798.2019.1600813 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600813 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:133-146 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Tkacik Author-X-Name-First: Michael Author-X-Name-Last: Tkacik Title: Understanding China’s goals and strategy in the South China Sea: bringing context to a revisionist systemic challenge – intentions and impact Abstract: The slow moving conflict in the South China Sea has been characterized by some as “not worth the candle.” China claims the entirety of the South China Sea pursuant to a nine-dash line, the legal impact of which has been limited by international courts. At the same time, China has changed the reality of control over the South China Sea by building a number of fortified islands in the Spratly Islands and elsewhere. The US has either refused to stand up to China's behavior (Obama) or responded unevenly (Trump). This paper examines the impact of China's behaviour on local parties, US interests, and the liberal international system. Journal: Defense & Security Analysis Pages: 321-344 Issue: 4 Volume: 34 Year: 2018 Month: 10 X-DOI: 10.1080/14751798.2018.1529092 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529092 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:321-344 Template-Type: ReDIF-Article 1.0 Author-Name: Thomas C. Bruneau Author-X-Name-First: Thomas C. Author-X-Name-Last: Bruneau Title: A conceptual framework for the analysis of civil-military relations and intelligence Abstract: The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements. Journal: Defense & Security Analysis Pages: 345-364 Issue: 4 Volume: 34 Year: 2018 Month: 10 X-DOI: 10.1080/14751798.2018.1529085 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529085 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:345-364 Template-Type: ReDIF-Article 1.0 Author-Name: Marian Zulean Author-X-Name-First: Marian Author-X-Name-Last: Zulean Author-Name: Emilia Şercan Author-X-Name-First: Emilia Author-X-Name-Last: Şercan Title: Democratic control of Romanian intelligence after three decades: quis custodiet ipsos custodes? Abstract: Romania faced one of the most dramatic transitions from authoritarian communism to become a democracy and a member of the North-Atlantic Treaty Organization (NATO) and the European Union (EU). The backbone of building a democratic society has been civilian control of the military. This article briefly describes the norms and institutions of democratic control of the intelligence services in Romania and assesses how the mechanisms of democratic control have worked in practice after almost three decades of reform. We argue that many of the post-1989 reforms have been only superficial implemented and monitored, particularly after Romania joined NATO and the EU. The article concludes that the democratic control of intelligence in Romania is an unfinished business. There are structural shortcomings embedded in the process of democracy consolidation that need to be addressed. Journal: Defense & Security Analysis Pages: 365-384 Issue: 4 Volume: 34 Year: 2018 Month: 10 X-DOI: 10.1080/14751798.2018.1529103 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529103 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:365-384 Template-Type: ReDIF-Article 1.0 Author-Name: Leandro Bolzan de Rezende Author-X-Name-First: Leandro Bolzan Author-X-Name-Last: de Rezende Author-Name: Paul Blackwell Author-X-Name-First: Paul Author-X-Name-Last: Blackwell Author-Name: Marcos Degaut Author-X-Name-First: Marcos Author-X-Name-Last: Degaut Title: Brazilian National Defence Policy: foreign policy, national security, economic growth, and technological innovation Abstract: With the world’s ninth largest economy and comprising nearly 60% of South America’s GDP, 47% of its territory, and 49% of its population, Brazil has become a regional power and an important actor in world affairs over recent decades. This scenario has led the government to re-evaluate its role in the world order, resulting in the enactment of the National Defence Policy, whose objective was to consolidate the country as a regional power while at the same time addressing national security issues, promoting economic development through a series of defence programmes, restructuring the defence industrial base, fostering innovation through technology and knowledge transfer to Brazil, and indigenous research and development. However, the policy’s implementation suffers from several challenges discussed in this article, which may test the capability and competence of Brazilian policymakers, military, industrialists, and other individuals and organisations involved in its implementation. Journal: Defense & Security Analysis Pages: 385-409 Issue: 4 Volume: 34 Year: 2018 Month: 10 X-DOI: 10.1080/14751798.2018.1529084 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529084 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:385-409 Template-Type: ReDIF-Article 1.0 Author-Name: Andrew Ross Author-X-Name-First: Andrew Author-X-Name-Last: Ross Author-Name: Bob Hall Author-X-Name-First: Bob Author-X-Name-Last: Hall Title: Shots per casualty: an indicator of combat efficiency for the first Australian task force in South Vietnam Abstract: In combat, the ratio of shots fired per casualty inflicted can provide a measure of the combat effectiveness of a force. The shots per casualty ratio achieved by the 1st Australian Task Force in Vietnam is shown to change according to factors including marksmanship, tactics and combat type. While, over the course of the campaign, 1ATF fired an increasing number of shots to achieve a casualty, this is explained by improvements in the quality of Viet Cong and People’s Army small arms. Australian Task Force and US Army shots per casualty ratios are briefly compared.. Journal: Defense & Security Analysis Pages: 410-423 Issue: 4 Volume: 34 Year: 2018 Month: 10 X-DOI: 10.1080/14751798.2018.1529080 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529080 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:410-423 Template-Type: ReDIF-Article 1.0 Author-Name: David Lonsdale Author-X-Name-First: David Author-X-Name-Last: Lonsdale Title: Theory of strategy Journal: Defense & Security Analysis Pages: 424-426 Issue: 4 Volume: 34 Year: 2018 Month: 10 X-DOI: 10.1080/14751798.2018.1529069 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529069 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:424-426 Template-Type: ReDIF-Article 1.0 Author-Name: Kevin Rowlands Author-X-Name-First: Kevin Author-X-Name-Last: Rowlands Title: Naval Advising and Assisting: History Challenges and Analysis Journal: Defense & Security Analysis Pages: 426-427 Issue: 4 Volume: 34 Year: 2018 Month: 10 X-DOI: 10.1080/14751798.2018.1529073 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529073 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:426-427 Template-Type: ReDIF-Article 1.0 Author-Name: Bence Németh Author-X-Name-First: Bence Author-X-Name-Last: Németh Title: Allies that count: junior partners in coalition warfare Journal: Defense & Security Analysis Pages: 427-429 Issue: 4 Volume: 34 Year: 2018 Month: 10 X-DOI: 10.1080/14751798.2018.1529075 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529075 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:427-429 Template-Type: ReDIF-Article 1.0 Author-Name: Donald Stoker Author-X-Name-First: Donald Author-X-Name-Last: Stoker Title: Mavericks of war: the unconventional, unorthodox innovators and thinkers, scholars, and outsiders who mastered the art of war Journal: Defense & Security Analysis Pages: 429-430 Issue: 4 Volume: 34 Year: 2018 Month: 10 X-DOI: 10.1080/14751798.2018.1529078 File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529078 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:429-430 Template-Type: ReDIF-Article 1.0 Author-Name: William T. Johnsen Author-X-Name-First: William T. Author-X-Name-Last: Johnsen Title: Land power in the age of joint interdependence: toward a theory of land power for the twenty-first century Abstract: This essay outlines a theory of land power. After explaining the absence of such a theory, the article establishes the modern context for such a theory, specifically within the concept of joint interdependence. The analysis defines key terms and premises behind the theory, to include a definition of land power. The argument then outlines the national elements of power that contribute to a theory of land power. The analysis next applies the theory to the fundamental purposes of military power: defeat, deter, compel, assure, shape and support to the nation. The analysis then tests key definitions, supporting premises, and utility of the theory. The essay argues that historical experience validates the applicability and utility of the theory, and offers a solid basis for extrapolating the validity of the theory into the near future. Journal: Defense & Security Analysis Pages: 223-240 Issue: 3 Volume: 35 Year: 2019 Month: 7 X-DOI: 10.1080/14751798.2019.1640417 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640417 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:223-240 Template-Type: ReDIF-Article 1.0 Author-Name: Lawrence E. Cline Author-X-Name-First: Lawrence E. Author-X-Name-Last: Cline Title: Sharing the load: factors in supporting local armed groups in insurgencies Abstract: Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities. Journal: Defense & Security Analysis Pages: 241-260 Issue: 3 Volume: 35 Year: 2019 Month: 7 X-DOI: 10.1080/14751798.2019.1640418 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640418 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:241-260 Template-Type: ReDIF-Article 1.0 Author-Name: Amadeo Watkins Author-X-Name-First: Amadeo Author-X-Name-Last: Watkins Title: Fighter aircraft acquisition in Croatia: failure of policy delivery Abstract: The possibility for Croatia to obtain new fighter aircraft is not new, as this option has been publicly debated for at least a decade. A sudden decision to advance the acquisition of a limited number of fighter aircraft was made in 2017 with an international tendering process concluding in early 2018. Through open source material, this paper will look at this procurement process by examining the relationship between policy and strategic thinking on the one side, and policy delivery on the other, and evaluate why the tendering process failed in achieving envisaged results. The paper concludes that the problems facing the Croatian aircraft acquisition process stem from at least two interrelated factors: firstly, at the operational level, the failure of the procurement was the direct result of mismanaged tendering procedures linked to the wider public administration reform process; and secondly, at the strategic level, inherently complex civil-military relations and related cultural aspects which have not been adequately addressed over the past decades. The result was a failure to deliver on government policy, something which this paper argues will need to be addressed over the medium to long term. Journal: Defense & Security Analysis Pages: 261-282 Issue: 3 Volume: 35 Year: 2019 Month: 7 X-DOI: 10.1080/14751798.2019.1640419 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640419 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:261-282 Template-Type: ReDIF-Article 1.0 Author-Name: Zsolt Lazar Author-X-Name-First: Zsolt Author-X-Name-Last: Lazar Title: Success and failures of the Gripen offsets in the Visegrad Group countries Abstract: The Soviet-led Council for Mutual Economic Assistance member, Central European countries found themselves in a difficult political and economic situation after the collapse of the Soviet Union. Three post-Eastern Bloc countries formed the Visegrad Group to strengthen their ties to the West, but the need for foreign investment, job creation and technology transfer was urgent.This is when military modernisation also came into the picture and the counter-trade—as known as offset—as a tool to help these economies. A trade practice which was meant to energise these economies via defence acquisitions linked economic programmes.Two Visegrad Group member countries, Hungary and the Czech Republic decided to sign offset agreement with the defence firm SAAB to license Gripen fighter aircrafts. This study intends to analyse if these deals were able to help governments to reach their objectives or the two countries were unable to take advantage of the offset programmes. Journal: Defense & Security Analysis Pages: 283-307 Issue: 3 Volume: 35 Year: 2019 Month: 7 X-DOI: 10.1080/14751798.2019.1640423 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640423 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:283-307 Template-Type: ReDIF-Article 1.0 Author-Name: Sandor Fabian Author-X-Name-First: Sandor Author-X-Name-Last: Fabian Title: The Russian hybrid warfare strategy – neither Russian nor strategy Abstract: Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts. Journal: Defense & Security Analysis Pages: 308-325 Issue: 3 Volume: 35 Year: 2019 Month: 7 X-DOI: 10.1080/14751798.2019.1640424 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640424 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:308-325 Template-Type: ReDIF-Article 1.0 Author-Name: Jomana Amara Author-X-Name-First: Jomana Author-X-Name-Last: Amara Title: Revisiting the justification for an all-volunteer force Abstract: In 1968, President Nixon established the Commission on an All-Volunteer Armed Force, or the Gates Commission, which served as the impetus and justification for an All-Volunteer Force (AVF). At the end of its deliberations, the commission recommended abolishing the draft and transforming the U.S. military into a force of volunteers beginning in 1973. Interestingly, the debate regarding the merits of both systems appeared to be largely economic – with cost–benefit analysis playing the primary role. Lately, we are beginning to see a new, politically-motivated impetus for returning to a “system of national service.” The ideas spurring this debate are many: the need to reaffirm the nation state, the commitment of citizens to the state, political ownership and oversight of the forces, the need for social equity in serving the nation, limiting the support for armed conflict by burden-sharing among citizens, and equitably spreading the personal cost of war. Journal: Defense & Security Analysis Pages: 326-342 Issue: 3 Volume: 35 Year: 2019 Month: 7 X-DOI: 10.1080/14751798.2019.1640425 File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640425 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:326-342 Template-Type: ReDIF-Article 1.0 Author-Name: Branden Little Author-X-Name-First: Branden Author-X-Name-Last: Little Title: Tarnishing victory? Contested histories & civil–military discord in the U.S. Navy, 1919–24 Abstract: As the First World War came to an end, the U.S. Navy's leadership engaged in a bitter fight over the “lessons” of the war. Admiral William S. Sims and Secretary of the Navy Josephus Daniels fought against each other's irreconcilable positions. Sims argued that the Navy Department's inexpert civilian secretary had hamstrung mobilisation, impeded the anti-submarine campaign, and ostracised capable officers in favour of friends upon whom he bestowed medals. Daniels countered that his administration had masterfully responded to the crisis of war. The Navy's record, Daniels insisted, could best be summarised as “a great job greatly done.” Only disloyal nit-pickers could find fault in its accomplishments. The Sims-Daniels controversy raged in congressional hearings, the press, and in partisan histories written by the protagonists. The heart of the dispute and its uncertain resolution rested in radically different understandings of American civil–military relations, naval heroism, and the determinants of victory. Journal: Defense & Security Analysis Pages: 1-29 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712021 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712021 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:1-29 Template-Type: ReDIF-Article 1.0 Author-Name: Steve Wills Author-X-Name-First: Steve Author-X-Name-Last: Wills Title: “These aren’t the SLOC’s you’re looking for”: mirror-imaging battles of the Atlantic won’t solve current Atlantic security needs Abstract: Discussion surrounding the announcement of a new NATO Maritime Command for the North Atlantic seems to have settled on the assumption that there is again a vital “sea-line of communication” (SLOC) between North America and Europe as there was supposed to be during the Cold War. The Soviet Union had a large fleet of nuclear and conventional submarines and it seemed very clear that Soviet admirals intended to fight a third “Battle of the Atlantic” in the event of war to prevent Western resupply of NATO. However, this scenario bore no resemblance to what the Soviet Navy actually intended to do in case of war. Changes in technology, notably in submarine propulsion, antisubmarine warfare (ASW), and ballistic missile range and accuracy were the real drivers of the Cold War in the Atlantic. Cruise missile-armed submarines that can attack shore-based economic infrastructure are the real threat from the Russian submarine force. Journal: Defense & Security Analysis Pages: 30-41 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712029 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712029 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:30-41 Template-Type: ReDIF-Article 1.0 Author-Name: Montgomery McFate Author-X-Name-First: Montgomery Author-X-Name-Last: McFate Title: Being there: US Navy organisational culture and the forward presence debate Abstract: This article argues that the US Navy’s roles (which have historically been bifurcated between warfighting and political use of force) manifest in its organisational culture as two different concepts of war: the US Navy as diplomatic actor and the US Navy as warfighting force. The conflict between these different concepts of war can be seen in the current debate about the definition and function of presence. The debate about presence is not just theoretical, but represents a deep and enduring conflict within the Navy as an organisation about its concept of war. Since the end of WWII, the Navy has been designing its fleet architecture according to a Mahanian concept of war, despite the preponderance of non-lethal missions and activities. The result is a mismatch between platforms and tasks. Journal: Defense & Security Analysis Pages: 42-64 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712024 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712024 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:42-64 Template-Type: ReDIF-Article 1.0 Author-Name: Steven Paget Author-X-Name-First: Steven Author-X-Name-Last: Paget Title: Mind over matter? Multinational naval interoperability during Operation Iraqi Freedom Abstract: The increasing frequency of multinational operations has heightened the importance of interoperability. While human and cultural factors are only two pieces of the interoperability jigsaw they are of enduring significance. The cohesiveness of the relationship amongst the Royal Australian Navy, the Royal Navy and the United States Navy during the 2003 Iraq War was underpinned by high levels of perceptive interoperability, which manifested itself in effective working relationships. That conflict demonstrated that while historical ties provided a foundation for cooperation, a number of multinational initiatives were undertaken to further enhance interoperability. This article addresses how such a high level of perceptive interoperability was achieved by examining the conduct of multinational exercises, the importance of personnel exchanges and the role of liaison officers, before considering the effect it had on the conduct of operations. The Iraq War demonstrated that cultural factors are at least as important as other facets of interoperability. Journal: Defense & Security Analysis Pages: 65-87 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712025 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712025 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:65-87 Template-Type: ReDIF-Article 1.0 Author-Name: James J. Wirtz Author-X-Name-First: James J. Author-X-Name-Last: Wirtz Title: Innovation for seapower: U.S. Navy strategy in an age of acceleration Abstract: A call for innovation as a means to outpace the acceleration of technological change and to bolster capabilities quickly is a central theme of contemporary U.S. Naval Strategy. The need for innovation is accepted, but the integration of readily available technologies into the Fleet is slow. Innovation unfolds according to “Navy-Time,” a cycle lasting between a long-decade and thirty-years. To accelerate the innovation process in the U.S. Navy, the article offers a Concept of Operations for Innovation that outlines how a deliberate process of analysis, weaponisation and integration can move new ideas and weapons into the Fleet in a strategically relevant time-frame. Journal: Defense & Security Analysis Pages: 88-100 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712026 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712026 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:88-100 Template-Type: ReDIF-Article 1.0 Author-Name: Peter Haynes Author-X-Name-First: Peter Author-X-Name-Last: Haynes Title: What U.S. Navy strategists and defense planners should think about in the era of maritime great power competition Abstract: For the first time in a generation, the US Navy finds itself in an era of great power competition. As US naval strategists and defense planners begin to organise materially and conceptually to confront the strategic and operational-level challenges posed by China and Russia, what should they keep in mind? What should frame their thinking? Absorbed with the day-to-day tasks associated with managing how the fleet is being built, operated, and rationalised, these busy officers and civilians seldom can step back and gain some perspective on fundamental aspects of the security environment and relate those to naval purpose. To that end, this article provides a primer on what to keep in mind and how to think in an era of maritime great power competition. Journal: Defense & Security Analysis Pages: 101-108 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712027 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712027 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:101-108 Template-Type: ReDIF-Article 1.0 Author-Name: Colin D. Robinson Author-X-Name-First: Colin D. Author-X-Name-Last: Robinson Title: The U.S. Navy's task forces: 1–199 Abstract: Grouping warships for combat has evolved greatly over the centuries. In the early 1940s, the United States Navy began to group its warships for combat in much more flexible task forces than the previous single-type-of-warship formations. This system has evolved and spread to naval forces ashore but remains fundamentally unchanged. It now covers numbers between 1 to over 1000, of which the most prominent is the first 100 or so which U.S. Navy combat forces use. The numbered fleets worldwide utilize the series covering 20-79; 1-19 and 90-99 appear to be reserved for special allocations and Commander, Pacific Fleet; numbers over 80 to the Atlantic; 100-119 for Northern Europe and briefly Tenth Fleet; the 120 series for Second Fleet as a Joint Task Force leader; the 150 series for Naval Forces Central Command; and the 180 series for Atlantic Fleet and now-Fleet Forces Command. Journal: Defense & Security Analysis Pages: 109-122 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712028 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712028 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:109-122 Template-Type: ReDIF-Article 1.0 Author-Name: James Russell Author-X-Name-First: James Author-X-Name-Last: Russell Title: Asia’s naval expansion: an arms race in the making? Journal: Defense & Security Analysis Pages: 123-124 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712030 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712030 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:123-124 Template-Type: ReDIF-Article 1.0 Author-Name: Branden Little Author-X-Name-First: Branden Author-X-Name-Last: Little Title: Progressives in Navy Blue: maritime strategy, American empire, and the transformation of U.S. naval identity, 1873-1898 Journal: Defense & Security Analysis Pages: 124-125 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712031 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712031 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:124-125 Template-Type: ReDIF-Article 1.0 Author-Name: Corbin Williamson Author-X-Name-First: Corbin Author-X-Name-Last: Williamson Title: The War for the Seas: a maritime history of World War II Journal: Defense & Security Analysis Pages: 126-127 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712032 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712032 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:126-127 Template-Type: ReDIF-Article 1.0 Author-Name: Márton Péri Author-X-Name-First: Márton Author-X-Name-Last: Péri Title: US Naval Strategy and national security: the evolution of American maritime power Journal: Defense & Security Analysis Pages: 127-128 Issue: 1 Volume: 36 Year: 2020 Month: 1 X-DOI: 10.1080/14751798.2020.1712036 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712036 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:127-128 Template-Type: ReDIF-Article 1.0 Author-Name: Mitja Kleczka Author-X-Name-First: Mitja Author-X-Name-Last: Kleczka Author-Name: Caroline Buts Author-X-Name-First: Caroline Author-X-Name-Last: Buts Author-Name: Marc Jegers Author-X-Name-First: Marc Author-X-Name-Last: Jegers Title: Addressing the “headwinds” faced by the European arms industry Abstract: The European arms industry is challenged by several adverse “headwinds.” Fragmentation leads to costly duplications and, in conjunction with stagnating budgets and sharply increasing costs, prevents firms from exploiting economies of scale and learning. This is exacerbated by size differentials vis-a-vis the leading US arms manufacturers and competition from emerging producers. As some “headwinds” are self-enforcing, far-reaching industrial and policy responses are required to improve the industry's outlook. As exports may not indefinitely compensate for low domestic demand, there is an economic imperative for further cross-border collaboration and consolidation. Despite various EU policy initiatives, progresses regarding the European Defence Equipment Market and strengthening the European Defence Technological Industrial Base have been relatively slow. It remains to be seen whether the European Defence Fund will be the proclaimed “game-changer,” raising competitiveness of the European arms industry. At the same time, the UK's withdrawal from the EU adds uncertainties. Journal: Defense & Security Analysis Pages: 129-160 Issue: 2 Volume: 36 Year: 2020 Month: 4 X-DOI: 10.1080/14751798.2020.1750178 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750178 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:129-160 Template-Type: ReDIF-Article 1.0 Author-Name: Caroline Batka Author-X-Name-First: Caroline Author-X-Name-Last: Batka Author-Name: Molly Dunigan Author-X-Name-First: Molly Author-X-Name-Last: Dunigan Author-Name: Rachel Burns Author-X-Name-First: Rachel Author-X-Name-Last: Burns Title: Private military contractors’ financial experiences and incentives Abstract: This article analyses findings from an original survey of 187 private military contractors on their incentives for working in the industry. Perceptions of contractors as “greedy, ruthless, and unscrupulous mercenaries” shape both public and military opinions of outsourcing and may impact U.S. military effectiveness, civil–military relations, and contractor identity. We find that contractors are motivated by a range of factors and that their financial experiences are not clearly more positive than that of state military troops. We recommend broad education of military and defense officials and the public in the U.S. and other relevant nations, regarding the true incentives of modern-day, Western contractors, in an effort to dispel misperceptions, increase effective utilisation of contractors, and beneficially shape PMC-military coordination. DoD may consider integrating such training into its current efforts to improve outsourcing, including its Joint OCS Planning and Execution Course, pre-deployment fora, and curricula of advanced military studies schools. Journal: Defense & Security Analysis Pages: 161-179 Issue: 2 Volume: 36 Year: 2020 Month: 4 X-DOI: 10.1080/14751798.2020.1750180 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750180 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:161-179 Template-Type: ReDIF-Article 1.0 Author-Name: Charles W. Mahoney Author-X-Name-First: Charles W. Author-X-Name-Last: Mahoney Title: United States defence contractors and the future of military operations Abstract: The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare. Journal: Defense & Security Analysis Pages: 180-200 Issue: 2 Volume: 36 Year: 2020 Month: 4 X-DOI: 10.1080/14751798.2020.1750182 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750182 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:180-200 Template-Type: ReDIF-Article 1.0 Author-Name: Robert Czulda Author-X-Name-First: Robert Author-X-Name-Last: Czulda Title: Defence industry in Iran – between needs and real capabilities Abstract: The paper’s goal is to analyses the potential of the Iranian defence industry, including both research-and-development and production capabilities. It is argued that, despite official statements about the great power and sophistication of the Iranian defence industry, in reality its capabilities are very limited and cannot meet the operational needs of the Iranian armed forces. At the same time, it is argued that many official releases, which are abundantly available in the Iranian press and often unthinkingly repeated by the Western media, do not present the real and value of military products, but are rather a tool for deception and propaganda. Journal: Defense & Security Analysis Pages: 201-217 Issue: 2 Volume: 36 Year: 2020 Month: 4 X-DOI: 10.1080/14751798.2020.1750184 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750184 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:201-217 Template-Type: ReDIF-Article 1.0 Author-Name: C. Peeters Author-X-Name-First: C. Author-X-Name-Last: Peeters Author-Name: R. Pilon Author-X-Name-First: R. Author-X-Name-Last: Pilon Title: Clustering in defence-related procurement: the case of a Belgian naval construction cluster Abstract: This paper examines the importance of closer co-operation in defence-related procurement. Led by the decision that Belgium will lead the procurement of 12 Mine CounterMeasures Vessels (MCMV), the case of a potential Belgian naval construction cluster is discussed. The feasibility of a potential cluster is investigated by looking at key elements of a successful naval construction cluster, the Dutch naval construction cluster, and comparing those key elements to the current Belgian situation. Forming a sustainable Belgian naval construction cluster will be difficult. Most of the procurement process of the MCMVs is set on a European tender. In the long run, due to the absence of both a launching customer and leader firms, no party is able to carry the cluster with investments and knowledge spill-overs. In order to keep public support for large defence-related investments, clustering around the MCMV integration system and proactive cluster support is recommended. Journal: Defense & Security Analysis Pages: 218-233 Issue: 2 Volume: 36 Year: 2020 Month: 4 X-DOI: 10.1080/14751798.2020.1750185 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750185 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:218-233 Template-Type: ReDIF-Article 1.0 Author-Name: Bohuslav Pernica Author-X-Name-First: Bohuslav Author-X-Name-Last: Pernica Title: The Czech defence and security industry: taking the pulse to an ailing man Abstract: The paper summarises the evolution of the iron triangle of the mutual relationships amongst the ministry of defence, defence industry, and the political elite in the post-communist Czech Republic in 1990-2020. The essay stresses the oddness of this relationship. On the one hand, the government is bound by a partnership to the Defence and Security Industry Association of the Czech Republic (DSIA), a lobbying group of more than 100 organisations that conduct business in defence and security sector in Czechia. Yet, since its creation in 2000, this assemblage of industries within DSIA's market position is falling, in fact. Neither political parties in power, nor the governments have been able to support national defence industry through the small military. Just a few DSIA national members are able to compete internationally with their cutting-edge products. Others have evolved into middlemen trading intime-expired Czechoslovak equipment retired from the Czech Armed Forces. Journal: Defense & Security Analysis Pages: 234-244 Issue: 2 Volume: 36 Year: 2020 Month: 4 X-DOI: 10.1080/14751798.2020.1750186 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750186 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:234-244 Template-Type: ReDIF-Article 1.0 Author-Name: Zsolt Lazar Author-X-Name-First: Zsolt Author-X-Name-Last: Lazar Title: Technology Offsets in International Defence Procurement Journal: Defense & Security Analysis Pages: 245-247 Issue: 2 Volume: 36 Year: 2020 Month: 4 X-DOI: 10.1080/14751798.2020.1750188 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750188 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:245-247 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen Blank Author-X-Name-First: Stephen Author-X-Name-Last: Blank Title: The Un-Holy Russo-Chinese alliance Abstract: This essay argues that a Sino-Russian alliance has come into being over many years of the two states’ evolutionary policies. Although Vladimir Putin has emphasised that this is a multi-faceted relationship, this essay focuses exclusively on its military dimension. It comprises extensive inter-ministerial and inter-governmental cooperation, arms sales, joint exercises, and shared political orientation. While it may not be a formal alliance like NATO research, e.g. by Alexander Korolev, indicates that in general experts argue that what they have achieved is even better than an alliance. Journal: Defense & Security Analysis Pages: 249-274 Issue: 3 Volume: 36 Year: 2020 Month: 7 X-DOI: 10.1080/14751798.2020.1790805 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790805 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:249-274 Template-Type: ReDIF-Article 1.0 Author-Name: Muhamad Haripin Author-X-Name-First: Muhamad Author-X-Name-Last: Haripin Author-Name: Chaula Rininta Anindya Author-X-Name-First: Chaula Rininta Author-X-Name-Last: Anindya Author-Name: Adhi Priamarizki Author-X-Name-First: Adhi Author-X-Name-Last: Priamarizki Title: The politics of counter-terrorism in post-authoritarian states: Indonesia’s experience, 1998–2018 Abstract: The separation of the Indonesian national police (POLRI) from the military (ABRI), now named the TNI, in 1999 led to transfer of domestic security role from the armed forces to POLRI. On one hand, POLRI has a greater role in internal security, particularly in countering terrorism. On the other hand, TNI continually attempts to reassert its dominance in the field of counter-terrorism. Previous studies on the subject place the issue in the context of the early days of democratisation. This paper aims to contribute by counting latest developments, notably the rise of new terrorist groups and recent counter-terrorism legislations. We argue that institutional rivalries between the POLRI and the TNI, and the military's determination to reclaim a greater role in domestic security have become an impediment to achieving successful counterterrorism efforts. This article also examines the development of military reform against the backdrop of the military's disproportionate and growing influence. Journal: Defense & Security Analysis Pages: 275-299 Issue: 3 Volume: 36 Year: 2020 Month: 7 X-DOI: 10.1080/14751798.2020.1790807 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790807 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:275-299 Template-Type: ReDIF-Article 1.0 Author-Name: Lukas Milevski Author-X-Name-First: Lukas Author-X-Name-Last: Milevski Title: Modern liberal wars, illiberal allies, and peace as the failure of policy Abstract: The post-Cold War period nearly up to the present has been characterised as the age of liberal wars, yet key facets of the liberal guidance of war remain under appreciated. This article seeks to address this wider gap with regard to the particular concern of war termination and the fulfilment or failure of policy. First, it develops characterisations of liberal wars based on the existing literature, identifying three broad types through consideration of context—defensive versus offensive—and of political and strategic agency, particularly regarding the motives for and intents of action. Three types of liberal wars result: defensive liberal wars, offensive liberal wars with humanitarian motive and geopolitical intent, and offensive liberal wars with geopolitical motive and humanitarian intent. The article then presents one exemplary case for each liberal war with an emphasis on how liberal strategy required an illiberal ally and that ally's effect on the subsequent peace. Journal: Defense & Security Analysis Pages: 300-313 Issue: 3 Volume: 36 Year: 2020 Month: 7 X-DOI: 10.1080/14751798.2020.1790808 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790808 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:300-313 Template-Type: ReDIF-Article 1.0 Author-Name: Diego Esparza Author-X-Name-First: Diego Author-X-Name-Last: Esparza Author-Name: Santiago Arca Henon Author-X-Name-First: Santiago Arca Author-X-Name-Last: Henon Author-Name: Hope Dewell Gentry Author-X-Name-First: Hope Dewell Author-X-Name-Last: Gentry Title: Peacekeeping and civil–military relations in Uruguay Abstract: There have been over 90,000 UN peacekeepers deployed around the world to 78 peacekeeping operations (PKOs) in over 125 countries since 1948. Some scholars have made the case that these missions have had a positive impact on the relationship between the military and the civilians they work for. However, other scholars have identified a negative impact on civil military relations (CMR). This paper contributes to this debate by investigating how peacekeeping has impacted civil-military relations in Latin America's most prolific contributor to peacekeeping: Uruguay. This paper finds that PKOs in Uruguay have facilitated post-transitions attempts by civilians to build first-generation control, but not second-generation control. Further, PKOs have marginally improved military effectiveness, but we find that they do not improve societal trust in the armed forces. Journal: Defense & Security Analysis Pages: 314-334 Issue: 3 Volume: 36 Year: 2020 Month: 7 X-DOI: 10.1080/14751798.2020.1790809 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790809 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:314-334 Template-Type: ReDIF-Article 1.0 Author-Name: Kristýna Pavlíčková Author-X-Name-First: Kristýna Author-X-Name-Last: Pavlíčková Author-Name: Monika Gabriela Bartoszewicz Author-X-Name-First: Monika Gabriela Author-X-Name-Last: Bartoszewicz Title: To free or not to free (ride): a comparative analysis of the NATO burden-sharing in the Czech Republic and Lithuania Abstract: The recent rise in the defence budgets among the NATO members reawakens the free-riding dilemma. This article provides an analysis of the defence spending of two new member states, the Czech Republic and Lithuania. Based on the free-riding theory, we explain why some of the new NATO members decide to increase their defence budgets (Lithuania), and others do not (Czech Republic). In contrast to the majority of works which focus either on the US as the biggest spender or on the “old” members of the Alliance, we explain under what circumstances some of the small European states who became new NATO members started to increase their defence budgets even though they do not have to, and the literature suggests that free-riding is easier. In the process, we identify three crucial factors that influence the decision-making process in this regard: the level of threat perception, economic situation, and the US pressure. Journal: Defense & Security Analysis Pages: 335-351 Issue: 3 Volume: 36 Year: 2020 Month: 7 X-DOI: 10.1080/14751798.2020.1790810 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790810 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:335-351 Template-Type: ReDIF-Article 1.0 Author-Name: Doreen Horschig Author-X-Name-First: Doreen Author-X-Name-Last: Horschig Title: Cyber-weapons in nuclear counter-proliferation Abstract: Under what conditions are cyber-weapons effective in nuclear counter-proliferation? With continued interest in nuclear proliferation professed by Iran, North Korea, and Saudi Arabia, a discussion of the effectiveness of counter-proliferation measures remains relevant. Cyber-attacks as military option in a state-on-state conflict still requires additional corroborating evidence to make conclusions about its long-term effectiveness. This work analyses the general applicability of cyber-weapons and their usefulness in nuclear counter-proliferation. Through a comparative case study of Operation Orchard, Stuxnet, and recent “Left-of-Launch” operations against North Korea, the essay finds that cyber-operations are not particularly effective against nuclear programmes that are in the later stages of their development. They can disrupt and delay a nuclear programme temporarily, if the attack remains clandestine, but cannot halt nuclear proliferation all together. However, effectiveness increases if they are used in combination with conventional weapons. The article addresses a topic of interest to national-level decision-makers: whether cyber-operations can and should play a role in nuclear counter-proliferation. Journal: Defense & Security Analysis Pages: 352-371 Issue: 3 Volume: 36 Year: 2020 Month: 7 X-DOI: 10.1080/14751798.2020.1790811 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790811 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:352-371 Template-Type: ReDIF-Article 1.0 Author-Name: Greg Kennedy Author-X-Name-First: Greg Author-X-Name-Last: Kennedy Title: World War II at sea: a global history Journal: Defense & Security Analysis Pages: 372-373 Issue: 3 Volume: 36 Year: 2020 Month: 7 X-DOI: 10.1080/14751798.2020.1790812 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790812 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:372-373 Template-Type: ReDIF-Article 1.0 Author-Name: Viljar Veebel Author-X-Name-First: Viljar Author-X-Name-Last: Veebel Title: Strategic challenges in the Baltic Sea region: Russia, deterrence, and reassurance Journal: Defense & Security Analysis Pages: 373-375 Issue: 3 Volume: 36 Year: 2020 Month: 7 X-DOI: 10.1080/14751798.2020.1790814 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790814 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:373-375 Template-Type: ReDIF-Article 1.0 Author-Name: Manseok Lee Author-X-Name-First: Manseok Author-X-Name-Last: Lee Author-Name: Sangmin Lee Author-X-Name-First: Sangmin Author-X-Name-Last: Lee Title: North Korea’s choice of a nuclear strategy: a dynamic approach Abstract: This study presents an analytical framework for predicting the conditions under which North Korea would choose a particular nuclear strategy. Based on the assessment of North Korea’s strategic environment, which involves its national identity and interests, strategic goals, relations with allies, and military capabilities, the nuclear strategy choice model presented in this study explains how North Korea’s beliefs about its relative capabilities vis-à-vis the US and South Korea determine its strategy regarding the employment of nuclear weapons. As such, this study represents a necessary extension of the prior literature, which has focused on static theories concerning North Korea’s nuclear strategy. This study concludes by offering policy recommendations for dealing with a nuclear-armed North Korea. Journal: Defense & Security Analysis Pages: 377-397 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1858536 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1858536 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:377-397 Template-Type: ReDIF-Article 1.0 Author-Name: Heather Kearney Author-X-Name-First: Heather Author-X-Name-Last: Kearney Author-Name: Michelle Black Author-X-Name-First: Michelle Author-X-Name-Last: Black Title: Identifying leader’s intent: an analysis of Kim Jong-Un Abstract: One of the most challenging tasks for a deterrence planner is assessing a leader's intent, which requires having an in-depth level of subject-matter expertise. This article investigates this challenge and offers answers to the following question “how can we identify a leader’s intent” to aid deterrence planners, operators, and policymakers? To examine this question, we used a multi-method approach by performing several qualitative analyses on Kim Jong-Un’s New Year’s Eve speeches (2013–2018). We focused on techniques that assessed the underlying facets of intent (e.g. cognitive beliefs and goals). These speeches served as a viable secondary source that identified objective markers to which we applied a coding scheme to extract the adversary’s “intent” to perform a particular action. This article argues that identifying intent can help policy-makers and planners understand if an adversary has plans to perform specific operations. Journal: Defense & Security Analysis Pages: 398-421 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1857910 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857910 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:398-421 Template-Type: ReDIF-Article 1.0 Author-Name: James Johnson Author-X-Name-First: James Author-X-Name-Last: Johnson Title: Deterrence in the age of artificial intelligence & autonomy: a paradigm shift in nuclear deterrence theory and practice? Abstract: How might nuclear deterrence be affected by the proliferation of artificial intelligence (AI) and autonomous systems? How might the introduction of intelligent machines affect human-to-human (and human-to-machine) deterrence? Are existing theories of deterrence still applicable in the age of AI and autonomy? The article builds on the rich body of work on nuclear deterrence theory and practice and highlights some of the variegated and contradictory – especially human cognitive psychological – effects of AI and autonomy for nuclear deterrence. It argues that existing theories of deterrence are not applicable in the age of AI and autonomy and introducing intelligent machines into the nuclear enterprise will affect nuclear deterrence in unexpected ways with fundamentally destabilising outcomes. The article speaks to a growing consensus calling for conceptual innovation and novel approaches to nuclear deterrence, building on nascent post-classical deterrence theorising that considers the implications of introducing non-human agents into human strategic interactions. Journal: Defense & Security Analysis Pages: 422-448 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1857911 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857911 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:422-448 Template-Type: ReDIF-Article 1.0 Author-Name: Zsolt Lazar Author-X-Name-First: Zsolt Author-X-Name-Last: Lazar Title: Debate opener: where is the European defence industry heading? European defence industrial cooperation is at crossroads Journal: Defense & Security Analysis Pages: 449-449 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1857912 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857912 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:449-449 Template-Type: ReDIF-Article 1.0 Author-Name: Julia Muravska Author-X-Name-First: Julia Author-X-Name-Last: Muravska Title: How can the European Commission help Europe’s defence industry? By making the most out of what it is already doing Abstract: The European Commission's proposal for the €13 bn European Defence Fund (EDF) to incentivise collaborative defence research and capability development projects with EU funding was an ambitious statement of policy intent to drive forward European defence cooperation. However, the summer 2020 EU budget negotiations left it with only about 60% of that amount over the 2021-2027 period. This debate contribution argues that despite this curtailment in resource and ambition, the European Commission can still maximise the EDF's impact to benefit European defence industry by ensuring that the various defence industrial policy activities it is already leading are achieving their full potential, incentivising EU governments to acquire and use the capabilities developed through the Fund, and maintaining coherence amongst existing research projects, capability development projects, and joint capability requirements. Journal: Defense & Security Analysis Pages: 450-452 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1857913 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857913 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:450-452 Template-Type: ReDIF-Article 1.0 Author-Name: Ron Matthews Author-X-Name-First: Ron Author-X-Name-Last: Matthews Author-Name: Jonata Anicetti Author-X-Name-First: Jonata Author-X-Name-Last: Anicetti Title: Death spiral of European offset? Abstract: This paper is concerned with evaluating the impact of the Procurement Directive, 2009/81/EC, on defence offset in Europe. The aim of the Directive was to reduce the extent of Article 346 derogations based on offset. Indirect offset has disappeared, and while the evidence is patchy, direct offset appears to be declining. This gradual demise of offset is in line with the global trend, especially among advanced countries. Offset is increasingly becoming a developing country phenomenon. Journal: Defense & Security Analysis Pages: 453-454 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1857917 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857917 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:453-454 Template-Type: ReDIF-Article 1.0 Author-Name: Mitja Kleczka Author-X-Name-First: Mitja Author-X-Name-Last: Kleczka Title: Between Europeanisation and domestic favouritism: recent progresses of defence-industrial restructuring in Germany Abstract: Germany’s export-oriented defence industry, like most other “large” European producers, aims to maintain its “key” capabilities whilst the scope for national approaches narrows further. Given the rising economic and security challenges, it appears likely that Europeanisation will gradually proceed. Journal: Defense & Security Analysis Pages: 455-457 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1857918 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857918 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:455-457 Template-Type: ReDIF-Article 1.0 Author-Name: Kogila Balakrishnan Author-X-Name-First: Kogila Author-X-Name-Last: Balakrishnan Title: Future of the European Defence Industrial and Technological Base (EDTIB) post Brexit: Nationalism versus integration? Journal: Defense & Security Analysis Pages: 458-459 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1857919 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857919 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:458-459 Template-Type: ReDIF-Article 1.0 Author-Name: Jocelyn Mawdsley Author-X-Name-First: Jocelyn Author-X-Name-Last: Mawdsley Title: The impact of Brexit on European defence industry Abstract: This contribution to the discussion forum considers the impact of Brexit on European defence industry. It argues that while in the short term there is unlikely to be an institutionalised defence relationship between the UK and the EU, that the size of the UK defence budget and technological strength, coupled with NATO membership make it hard to cut the UK out of European armaments cooperation. The contribution suggests however that the uncertainty surrounding both the success of PESCO and the EDF and the outcome of the UK’s Integrated Review makes the future difficult to predict. Journal: Defense & Security Analysis Pages: 460-462 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1857920 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857920 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:460-462 Template-Type: ReDIF-Article 1.0 Author-Name: Robert Czulda Author-X-Name-First: Robert Author-X-Name-Last: Czulda Title: A Polish perspective on the European defence industry Journal: Defense & Security Analysis Pages: 463-464 Issue: 4 Volume: 36 Year: 2020 Month: 10 X-DOI: 10.1080/14751798.2020.1857921 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857921 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:463-464 Template-Type: ReDIF-Article 1.0 Author-Name: Tamás Csiki Varga Author-X-Name-First: Tamás Csiki Author-X-Name-Last: Varga Title: Security perception and security policy in Central Europe, 1989–2019 Journal: Defense & Security Analysis Pages: 1-8 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831224 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831224 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:1-8 Template-Type: ReDIF-Article 1.0 Author-Name: Ádám Budai Author-X-Name-First: Ádám Author-X-Name-Last: Budai Title: The security perception and security policy of Hungary, 1989–2018 Abstract: Between 1989 and 2018, the basic characteristics of the security perception of the Hungarian society remained constant, but significant changes occurred in the realm of security policy. The security perception of the Hungarian society retained its multidimensional character, while non-military dimensions became increasingly predominant. As a consequence of the changing strategic environment and the country's accession to NATO, Hungary became a more active actor in international security policy, albeit with strict limitations on the use of force. The changes in Hungary's foreign policy orientation after the end of the Cold War can be best described as a gradual and consistent shift towards Euro-Atlantic integration, facilitated by both external and internal factors. Furthermore, the Hungarian Defence Forces began their transformation from a Soviet-type mass army into a Western-type of expeditionary model of armed forces, that has been further accelerated by a new large-scale modernisation programme since 2016. Journal: Defense & Security Analysis Pages: 9-22 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831225 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831225 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:9-22 Template-Type: ReDIF-Article 1.0 Author-Name: Tomáš Čižik Author-X-Name-First: Tomáš Author-X-Name-Last: Čižik Title: Security perception and security policy of the Slovak Republic, 1993–2018 Abstract: The development of Slovak and security policy faced many challenges throughout last few decades. Slovakia, since its independence in 1993, was trying to find its geopolitical orientation - from the “bridge” between West and East, through the “black-hole” of Europe to the fully-fledged member of the EU and NATO. The main aim of this article is to provide a short, but detailed, description of the changes in Slovak security perceptions and development of the Slovak security policy and also to reveal how these changes influenced the opinion and perceptions of Slovak citizens. Journal: Defense & Security Analysis Pages: 23-37 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831228 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831228 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:23-37 Template-Type: ReDIF-Article 1.0 Author-Name: Zdeněk Kříž Author-X-Name-First: Zdeněk Author-X-Name-Last: Kříž Title: The security perception and security policy of the Czech Republic, 1993–2018 Abstract: All Czech strategic security documents since the end of the Cold War have been based on the argument that the risk of any direct military aggression against the territory of the Czech Republic is virtually nil. The 2015 Security Strategy responded to the changes of international security environment, especially to the Russian aggressive policy in Ukraine, hybrid war waged by Russia against the West, escalation of conflict in Syria against the background of the Arab Spring and the refugee crisis directly related to it. The 2015 Strategy continuously develops the ties to the transatlantic security partnership (NATO) and building up the security dimension of the European integration process. However, it is very likely that the Czech Republic can be expected to become a passive actor, meeting its allies' expectations only to an extent that is strictly necessary. Journal: Defense & Security Analysis Pages: 38-52 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831231 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831231 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:38-52 Template-Type: ReDIF-Article 1.0 Author-Name: Hennadiy Maksak Author-X-Name-First: Hennadiy Author-X-Name-Last: Maksak Title: The security perception and security policy of Ukraine, 1991–2018 Journal: Defense & Security Analysis Pages: 53-65 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831232 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831232 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:53-65 Template-Type: ReDIF-Article 1.0 Author-Name: Tamás Levente Molnár Author-X-Name-First: Tamás Levente Author-X-Name-Last: Molnár Title: The security perception and security policy of Austria, 1989–2017 Abstract: Austria's security architecture has changed significantly following the end of the Cold War. The fall of the Berlin Wall in 1989, the country's accession to the EU in 1995, and the Yugoslav Wars in the 1990s led to a re-calibration of the Austrian understanding of foreign and security policy. As a result, Austria became more engaged in international peace-keeping operations and was interacting more with international organisations (EU, NATO-PfP). Austria became more and more engaged with EU CSDP, which de-facto undermined the country's neutrality, even if the neutrality issue keeps coming up at the level of political discourses. The public assessment of perceived threats is shifted from more traditional threat categories (e.g. crime) towards new security challenges (e.g. immigration), but in general, Austrians feel extraordinarily safe in comparison with other European nations. Journal: Defense & Security Analysis Pages: 66-79 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831234 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831234 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:66-79 Template-Type: ReDIF-Article 1.0 Author-Name: Milena Palczewska Author-X-Name-First: Milena Author-X-Name-Last: Palczewska Title: The security perception and security policy of Poland, 1989–2017 Abstract: Article is an attempt to answer the question about the state of Poland's security in years 1989-2017, what are its determinants, what kind of challenges Poland faces and which of them may turn into a threat and which into an opportunity, or what Polish potential is and which of its components determine its position on the international arena. It is achieved through a detailed analysis of actions undertaken by Poland in the international arena to strengthen its international position as well as the level of its security. Thus, the aim is to identify those determinants which may contribute to establish a stronger position and which can create problems and become a formidable challenge in the context of various aspects of security, and even develop into a threat. Journal: Defense & Security Analysis Pages: 80-95 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831237 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831237 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:80-95 Template-Type: ReDIF-Article 1.0 Author-Name: Alexandra Sarcinschi Author-X-Name-First: Alexandra Author-X-Name-Last: Sarcinschi Title: Security perception and security policy in Romania since the 1989 Revolution Abstract: This paper argues that the security perception in Romania has been oriented in the following 30 years after the 1989 Revolution towards a gradually implemented multidimensional approach that can be identified both in the subsequent security strategies and in the national or European public opinion polls. The case study focuses on the perception of the risks and threats affecting both the Romanian society and other countries, the identification of specific patterns, the way in which the security sector has changed over time, and the pace of adapting the security policy to the dynamics of the security environment. Journal: Defense & Security Analysis Pages: 96-113 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831239 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831239 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:96-113 Template-Type: ReDIF-Article 1.0 Author-Name: László Szerencsés Author-X-Name-First: László Author-X-Name-Last: Szerencsés Title: Security perception in Croatia since the declaration of independence Abstract: Croatia's security environment went through a gradual change since the declaration of independence in 1991. The changing environment is reflected on in the National Security Strategy and also in the security perception of the population. This period was marked with a solid transition of foreign policy by joining NATO and EU, and by later on fulfilling the responsibilities coming with the membership. These responsibilities include the participation in an increased number of peace support operations, and contribution to the common responses of the EU to the security threats of today. To live up to these challenges Croatia needs to develop its military capabilities, which Croatia has begun with the acquisition of air force equipment. Journal: Defense & Security Analysis Pages: 114-128 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831241 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831241 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:114-128 Template-Type: ReDIF-Article 1.0 Author-Name: Aleksandar Vanchoski Author-X-Name-First: Aleksandar Author-X-Name-Last: Vanchoski Title: The security perception and security policy of Serbia Abstract: Serbia has important role in the regional peace and stability in South Eastern Europe. Over the last three decades Serbian security policies have been directly shaped by numerous turbulent political, social, and economic circumstances. In order the better to understand what determines the patterns of development and perceptions of Serbian security strategy and defence policies, a comprehensive overview of the legislative and institutional mechanisms of Serbian security and foreign policy in combination with content analysis of the key strategic security documents and analysis of the socio-political developments in Serbian society were conducted. After a period of confrontational discourse and abuse of the security system, the democratic changes in Serbia in the beginning of 2000s resulted with reforms in the security system as well. However, many of them were not undertaken systematically. Serbian security and foreign policy priorities are mainly determined by the EU accession process and the status of Kosovo. Journal: Defense & Security Analysis Pages: 129-143 Issue: 1 Volume: 37 Year: 2021 Month: 01 X-DOI: 10.1080/14751798.2020.1831243 File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831243 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:129-143 Template-Type: ReDIF-Article 1.0 Author-Name: Tommi Koivula Author-X-Name-First: Tommi Author-X-Name-Last: Koivula Title: Carry that weight: assessing continuity and change in NATO’s burden-sharing disputes Abstract: This article proposes Stephen Jay Gould’s concepts of time’s arrow and time’s cycle as a conceptual tool to analyse NATO’s burden-sharing disputes. It argues that the controversies on burden-sharing in NATO can be assessed in terms of their cyclic or arrow kind nature, rendering some disputes more likely to recur than others and providing different kinds of starting points for their forecasting. The study identifies four cyclic categories in which burden-sharing has transformed into a political debate among NATO members during the post-Cold War era: geopolitical change related to Russia; periods of US foreign political retrenchment or renewal; the passivity or activism of European NATO members; and during NATO or allied out-of-area operations. Moreover, the study suggests an arrow kind of direction in burden-sharing disputes, indicating an expansion of disputes to cover comprehensive security, resilience, security co-operation and diplomacy, and to engulf also NATO partner countries. Journal: Defense & Security Analysis Pages: 145-163 Issue: 2 Volume: 37 Year: 2021 Month: 04 X-DOI: 10.1080/14751798.2021.1920092 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1920092 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:145-163 Template-Type: ReDIF-Article 1.0 Author-Name: Christopher Kinsey Author-X-Name-First: Christopher Author-X-Name-Last: Kinsey Author-Name: Andreas Krieg Author-X-Name-First: Andreas Author-X-Name-Last: Krieg Title: Assembling a Force to Defeat Boko Haram: How Nigeria Integrated the Market into its Counterinsurgency Strategy Abstract: In the context of an increased use of commercial soldiers in high-end conflict, this article investigates how the Nigerian government's reliance on the global market for force has helped its efforts to counter Boko Haram. The article shows, through a case study of Nigeria's counterinsurgency campaign against jihadist insurgents, that states in the developing world can augment their ability to provide effective public security by creating security assemblages. Moving beyond the normative debate about Private Military Companies (PMCs), this article highlights that public-private security arrangements can support the state in the developing world to live up to its role as a communal security provider. Nigeria's employment of the South African PMC Special Tasks, Training, Equipment and Protection Ltd. (STTEP), helped it build an effective public-commercial partnership, thus providing the Nigerian Armed Forces (NAF) with capacity, capability and norms that were essential in their counterinsurgency struggle. Journal: Defense & Security Analysis Pages: 232-249 Issue: 2 Volume: 37 Year: 2021 Month: 04 X-DOI: 10.1080/14751798.2021.1919356 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919356 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:232-249 Template-Type: ReDIF-Article 1.0 Author-Name: David Pion Berlin Author-X-Name-First: David Author-X-Name-Last: Pion Berlin Author-Name: Andrew Ivey Author-X-Name-First: Andrew Author-X-Name-Last: Ivey Title: Military dissent in the United States: are there lessons from Latin america? Abstract: The civil–military relations of the Trump Presidency became increasingly troubled. The President attempted not only to involve the military in partisan politics, but also in counter-protest operations in the face of nationwide demonstrations. Such operations increase the likelihood of human rights abuses by the military, which prides itself on professionalism and public approval. How can officers resist a commander-in-chief pulling them into partisan politics, particularly when this endangers military professionalism and quite possibly democracy itself? This article finds that U.S. military commanders might turn to their counterparts across Latin America for examples and lessons. Commanders in Chile, Ecuador, Colombia and Brazil have found innovative waves to resist unwise Presidential orders and potentially save lives in the process. Critically, we find that these instances of justifiable dissent did not result in an erosion of civilian control. Journal: Defense & Security Analysis Pages: 193-211 Issue: 2 Volume: 37 Year: 2021 Month: 04 X-DOI: 10.1080/14751798.2021.1919354 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919354 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:193-211 Template-Type: ReDIF-Article 1.0 Author-Name: Kristýna Pavlíčková Author-X-Name-First: Kristýna Author-X-Name-Last: Pavlíčková Author-Name: Monika Gabriela Bartoszewicz Author-X-Name-First: Monika Author-X-Name-Last: Gabriela Bartoszewicz Title: Beyond bare numbers: the qualitative subtleties of free-riding on NATO’s engagement in the Middle East Abstract: This paper closely scrutinises NATO engagement, particularly the The Eastern Flank countries in the Middle East. Our main argument is that the quantitative approach to free riding is useful only when it comes to black-and-white policy choices and either-or policy decisions. Simultaneously, it fails when we are faced with more complex situations in which evaluations go beyond the very simple numerical markers, such as the 2% threshold of defence spending. By bringing together a unique regional focus (the European East and the Middle East), theoretical dilemmas (free-riding) and policy issues (NATO's multilateral framework of co-operation understood in terms of strategic interests and practical engagement), we are able to show that Romania is a subtle free rider, which cannot be verified by merely looking at numbers alone, but can be ascertained by a careful qualitative analysis which reveals a discrepancy between the country's strategic interests and its level of engagement. Journal: Defense & Security Analysis Pages: 177-192 Issue: 2 Volume: 37 Year: 2021 Month: 04 X-DOI: 10.1080/14751798.2021.1919353 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919353 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:177-192 Template-Type: ReDIF-Article 1.0 Author-Name: Shang-su Wu Author-X-Name-First: Shang-su Author-X-Name-Last: Wu Title: Military modernisation in Southeast Asia in the Indo-Pacific strategic context Journal: Defense & Security Analysis Pages: 212-231 Issue: 2 Volume: 37 Year: 2021 Month: 04 X-DOI: 10.1080/14751798.2021.1919355 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919355 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:212-231 Template-Type: ReDIF-Article 1.0 Author-Name: Jaroslav Dvorak Author-X-Name-First: Jaroslav Author-X-Name-Last: Dvorak Author-Name: Bohuslav Pernica Author-X-Name-First: Bohuslav Author-X-Name-Last: Pernica Title: To free or not to free (ride): a comparative analysis of the NATO burden-sharing in the Czech Republic and Lithuania – another insight into the issues of military performance in the Central and Eastern Europe Abstract: In this paper we argue that free riding within NATO should be assessed from a microeconomic point of view. In particular, nations with a communist background should be appraised in a much broader perspective than the 2% GDP spending target, or number of soldiers on deployment. In comparison with post-Soviet countries such as Lithuania, wealthy post-communist country such as Czechia where defence institution experienced an extensive militarisation of society and economy in the Soviet style, continues to fail in reducing their military-administrative complexes, as well as maintaining an excessive structure of militarised civilian activities; e.g., sport clubs, folkloric choirs, medical and educational facilities, established for purpose of autonomy from civil society. Hence, increasing defence spending to 2% GDP can have the effect of strengthening this structure when weak defence institutions are not able to manage their entire defence budget to achieve military modernisation, as has happened in Czechia. Journal: Defense & Security Analysis Pages: 164-176 Issue: 2 Volume: 37 Year: 2021 Month: 04 X-DOI: 10.1080/14751798.2021.1919345 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919345 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:164-176 Template-Type: ReDIF-Article 1.0 Author-Name: Marius Kristiansen Author-X-Name-First: Marius Author-X-Name-Last: Kristiansen Author-Name: Njål Hoem Author-X-Name-First: Njål Author-X-Name-Last: Hoem Title: Strategic utility of security sector assistance, from a small state perspective Abstract: In a world of global interdependent security, the West is increasingly involved in the stability of all regions that could directly or indirectly influence national interests. To this end, security sector assistance (SSA), with its’ perceived favourable effect-to-resource-ratio, has become somewhat of a panacea. For small states, coalition SSA has become the way to pursue own ambitions with military means internationally. But SSA is a difficult task, especially for miniscule contributors with scarce resources. We therefore ask: How can small states achieve the highest yield from their SSA-efforts? From a Norwegian perspective, and focusing on the SOF component, this article provides a practitioner’s view on how to increase the military contribution to strategic utility. Through understanding the wicked problem SSA represents, and adhering to the principles of long-term commitment, vertical implementation, and specialised skillsets, we argue small states might gain a disproportionate advantage allowing them to punch above own weight. Journal: Defense & Security Analysis Pages: 295-327 Issue: 3 Volume: 37 Year: 2021 Month: 07 X-DOI: 10.1080/14751798.2021.1961069 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1961069 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:295-327 Template-Type: ReDIF-Article 1.0 Author-Name: Cameran Ashraf Author-X-Name-First: Cameran Author-X-Name-Last: Ashraf Title: Defining cyberwar: towards a definitional framework Abstract: For nearly thirty years scholars have offered changing definitions of cyberwar. The continued ambiguity demonstrates that efforts at establishing definitional clarity have not been successful. As a result, there are many different and contradictory definitions, ranging from cyberwar’s non-existence to cyberwar as an imminent threat. Ongoing definitional ambiguity makes interdisciplinary research and policy communications challenging in this diverse field. Instead of offering a new definition, this paper proposes that cyberwar can be understood through a fluid framework anchored in three themes and five variables identified in a broad interdisciplinary survey of literature. This framework's applicability is demonstrated by constructing an example definition of cyberwar utilising these themes and variables. Journal: Defense & Security Analysis Pages: 274-294 Issue: 3 Volume: 37 Year: 2021 Month: 07 X-DOI: 10.1080/14751798.2021.1959141 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959141 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:274-294 Template-Type: ReDIF-Article 1.0 Author-Name: Sebastián Briones Razeto Author-X-Name-First: Sebastián Briones Author-X-Name-Last: Razeto Author-Name: Nicole Jenne Author-X-Name-First: Nicole Author-X-Name-Last: Jenne Title: Security and defence policy documents: a new dataset Abstract: Security and defence policy documents have sparked academic interest since their publication has become a common international practice in the 1990s. Yet, broad comparisons across time and countries have been scarce. This article presents information from a new dataset on security and defence documents published by OECD countries. Specifically, we analyse what type of documents were published by each country between 1990 and 2019, which security concerns they identify, and what level of importance is given to different agendas of security and defence. The dataset reveals an unexpected level of diversity, including an apparent lack of a common framework even among countries belonging to NATO or the European Union. In terms of content, there was a recent recurrence of traditional security topics, along with the prominence of some newer ones. Overall, the documents reveal a surprising lack of consistency and completeness with regards to provisions for policy execution. Journal: Defense & Security Analysis Pages: 346-363 Issue: 3 Volume: 37 Year: 2021 Month: 07 X-DOI: 10.1080/14751798.2021.1959730 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959730 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:346-363 Template-Type: ReDIF-Article 1.0 Author-Name: Oscar L. Larsson Author-X-Name-First: Oscar L. Author-X-Name-Last: Larsson Title: The maritime turn in EU foreign and security policies – aims, actors, and mechanisms of integration Journal: Defense & Security Analysis Pages: 381-383 Issue: 3 Volume: 37 Year: 2021 Month: 07 X-DOI: 10.1080/14751798.2021.1959741 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959741 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:381-383 Template-Type: ReDIF-Article 1.0 Author-Name: Ron Matthews Author-X-Name-First: Ron Author-X-Name-Last: Matthews Author-Name: Collin Koh Author-X-Name-First: Collin Author-X-Name-Last: Koh Title: The decline of South Africa’s defence industry Abstract: The growth of South Africa’s apartheid era defence industry was propelled by international isolation following the 1984 UN arms embargo and revealed military technology deficiencies during the border war. Weapons innovation became an imperative, fostering development of frontier technologies and upgrades of legacy platforms that drove expansion in arms exports. However, this golden era was not to last. The 1994 election of the country’s first democratic government switched resources from military to human security. The resultant defence-industrial stagnation continues to this day, exacerbated by corruption, unethical sales, and government mismanagement. The industry’s survival into the 2020s cannot be assured. Journal: Defense & Security Analysis Pages: 251-273 Issue: 3 Volume: 37 Year: 2021 Month: 07 X-DOI: 10.1080/14751798.2021.1961070 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1961070 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:251-273 Template-Type: ReDIF-Article 1.0 Author-Name: Won-June Hwang Author-X-Name-First: Won-June Author-X-Name-Last: Hwang Title: How are drones being flown over the gray zone? Abstract: Drones have been affecting many areas since their advent, including conflicts between states. Used as a coercive measure, how they are flown by measured or limited revisionists can be understood in terms of the gray zone strategy. The concept of the gray zone is somewhere between peace and war, and the gray zone strategy enables revisionists to gradually alter the status quo without triggering war or overt conflict. Both theoretically and empirically, drones could be a useful tool in gray zone conflicts. This paper attempts to specify and organise such operations according to the question: “How are drones being flown over the gray zone?” Revisionist states fly drones based on the salami tactic, or feigned innocence, or by putting them in the hands of proxy forces to expand gradually their interests and destabilise troubled regions; therefore, understanding drone strategy and considering counter-measures are indispensable for securing stability in such regions. Journal: Defense & Security Analysis Pages: 328-345 Issue: 3 Volume: 37 Year: 2021 Month: 07 X-DOI: 10.1080/14751798.2021.1959734 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959734 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:328-345 Template-Type: ReDIF-Article 1.0 Author-Name: Mauro Mantovani Author-X-Name-First: Mauro Author-X-Name-Last: Mantovani Author-Name: Ralf Müllhaupt Author-X-Name-First: Ralf Author-X-Name-Last: Müllhaupt Title: Analysing armed forces transformation: methodology and visualisation Abstract: There is scant research on models for visualising strategies retrospectively. The authors present a new analytical, visual methodology for assessing the transformation of armed forces, which is usually considered to be the “second dimension” of strategy. It is novel and generally applicable to armed forces, and additionally provides several benefits, in particular with regard to its synoptic character. The methodology translates a sociological approach into strategic studies, a discipline which has not really developed its own yet. It is exemplified by means of the (airborne part of the) Swiss Air Force's transformation since the end of the Cold War. Journal: Defense & Security Analysis Pages: 364-380 Issue: 3 Volume: 37 Year: 2021 Month: 07 X-DOI: 10.1080/14751798.2021.1959731 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959731 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:364-380 Template-Type: ReDIF-Article 1.0 Author-Name: Sarah Perret Author-X-Name-First: Sarah Author-X-Name-Last: Perret Title: Border Frictions: Gender, Generation and Technology on the Frontline Journal: Defense & Security Analysis Pages: 383-385 Issue: 3 Volume: 37 Year: 2021 Month: 07 X-DOI: 10.1080/14751798.2021.1976088 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1976088 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:383-385 Template-Type: ReDIF-Article 1.0 Author-Name: Kogila Balakrishnan Author-X-Name-First: Kogila Author-X-Name-Last: Balakrishnan Title: How to measure value from defence spending? The Malaysian case study Abstract: Nations and their citizens now demand clear evidence as to the benefits of defence spending. The opportunity cost of defence expenditure against other sectors is constantly queried. It is economically challenging to find consensus amongst traditional economists, and policy-makers, on how to measure value in the context of defence. This article offers solutions by using the case study of Malaysia. Primary data sources include open-ended and semi structured interviews to produce a thematic discussion, as well as secondary resources. The author argues that it is hard to appraise defence value, as measurements are case-specific. Rather, the paper will use a novel ‘Triple-Defence Value Framework’, to argue that value can be measured by dividing the role of defence into a primary level: for protection and safety; a secondary level: for socio-economic prosperity; and a tertiary level: for soft power projection. The paper concludes by using the framework to measure the value derived from the Malaysian defence sector. Journal: Defense & Security Analysis Pages: 387-413 Issue: 4 Volume: 37 Year: 2021 Month: 10 X-DOI: 10.1080/14751798.2021.1995966 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995966 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:387-413 Template-Type: ReDIF-Article 1.0 Author-Name: Alessandro Arduino Author-X-Name-First: Alessandro Author-X-Name-Last: Arduino Author-Name: Asif Shuja Author-X-Name-First: Asif Author-X-Name-Last: Shuja Title: Russia’s scalable soft power: leveraging defense diplomacy through the transfer of S-400 triumph Abstract: Military hardware and technology transfer is increasingly becoming a crucial factor in international relations. This is especially so when the military hardware transfer involves sophisticated weapon's platforms that need specialised training and maintenance, resulting in a long-term relationship that strengthens the geopolitical relationship between the contracting parties. Driven by the re-emergence of great power rivalry, the S-400 Triumph air defence missile system deployment appears to be fast becoming a core component of Russia's military diplomacy. The agreed S-400 export contracts include Turkey, China and India with a long list of interested Middle Eastern countries. The transfer of S-400 well encompasses all the dimensions of the Russian defense diplomacy and could be considered as a primary example of scalable soft power, as it underlines the evolving pattern of high-technology arms transfers that is going to be constant in an increasingly complex multilateral world. Journal: Defense & Security Analysis Pages: 435-452 Issue: 4 Volume: 37 Year: 2021 Month: 10 X-DOI: 10.1080/14751798.2021.1995963 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995963 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:435-452 Template-Type: ReDIF-Article 1.0 Author-Name: Stephen Blank Author-X-Name-First: Stephen Author-X-Name-Last: Blank Author-Name: Younkyoo Kim Author-X-Name-First: Younkyoo Author-X-Name-Last: Kim Title: The Mediterranean Eskadra and Russia’s military-political strategy in the Mediterranean Basin Abstract: Russia seeks to convert the Black Sea into a Russian lake. This entails projecting power well into the Mediterranean Sea. Since 2013 Moscow has reinforced the missile, air defence, and submarine component of its Mediterranean Eskadra (Squadron) to deny NATO access to the Eastern Mediterranean and Black Seas. This article explains how and why Russia's Mediterranean Eskadra has become a major arm of Russia's military-political strategy in these waters. By analysing its missions, roles, and activities the article shows how Moscow conducts innovative, sophisticated, yet simultaneously traditional military-political operations to maximise and enhance its global standing in accordance with its own strategy. The article further argues that the Eskadra's creation and deployment corresponds not just to the revival of Russian military capability in 2013, but also to a much broader Russian perspective on contemporary war, and analyzes Russia's political considerations in the deployment of major military forces in the Mediterranean Basin. Journal: Defense & Security Analysis Pages: 453-471 Issue: 4 Volume: 37 Year: 2021 Month: 10 X-DOI: 10.1080/14751798.2021.1995969 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995969 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:453-471 Template-Type: ReDIF-Article 1.0 Author-Name: Jakub Pražák Author-X-Name-First: Jakub Author-X-Name-Last: Pražák Title: Planetary defence systems – threat to survival? Abstract: The article explains why Weaponisation of outer space may soon be inevitable and that development of space weapons is a serious issue, especially in regard to dealing with sensitive dual-use technology. At the same time, the Earth may be threatened by incoming asteroids and comets, which may endanger humankind’s existence. Hence, it is advisable to develop effective planetary defence systems. However, the article claims that discussed planetary defence technology – kinetic impactor, nuclear explosion, gravity tractor and space tug, laser, and solar collector – have far-reaching dual-use consequences with potential for their weaponisation. Thus, the article argues in favour of greater transparency and surveillance mechanisms for dual-use and arms control. Moreover, the private sector should be involved in discussion since it may be contributing to negotiation processes and can ensure secure research and development, as well as operability of sensitive planetary defence systems. Journal: Defense & Security Analysis Pages: 492-508 Issue: 4 Volume: 37 Year: 2021 Month: 10 X-DOI: 10.1080/14751798.2021.1995979 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995979 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:492-508 Template-Type: ReDIF-Article 1.0 Author-Name: Zsolt Lazar Author-X-Name-First: Zsolt Author-X-Name-Last: Lazar Title: Joint by Design Journal: Defense & Security Analysis Pages: 509-511 Issue: 4 Volume: 37 Year: 2021 Month: 10 X-DOI: 10.1080/14751798.2021.1996097 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1996097 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:509-511 Template-Type: ReDIF-Article 1.0 Author-Name: Lukasz Stach Author-X-Name-First: Lukasz Author-X-Name-Last: Stach Title: The Philippines maritime forces and its maritime military power projection capabilities: unfulfilled ambitions? Abstract: The Philippine Navy is among the weakest of the naval forces in the Southeast Asia region, and its power projection capabilities are very limited. It is surprising how the Philippines, an archipelago country involved in maritime territorial disputes, could ignore the development of its maritime forces. As a result, the position of the Philippines in regional territorial disputes is weak. This study analyses the factors which have led to this situation, the PN modernisation process, and Filipino maritime power projection capabilities. The text is divided into three parts. The first defines the term “power projection” (or “force projection”). The second analyses the Philippines’ security challenges. Later, the potential and modernisation of the Philippine Navy, as well as its maritime power projection prospects, is analysed. The study concludes with findings. This study employs descriptive methodology and uses data from readily accessible sources to assess critically the conditions of this naval force. Journal: Defense & Security Analysis Pages: 414-434 Issue: 4 Volume: 37 Year: 2021 Month: 10 X-DOI: 10.1080/14751798.2021.1996096 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1996096 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:414-434 Template-Type: ReDIF-Article 1.0 Author-Name: Alastair Finlan Author-X-Name-First: Alastair Author-X-Name-Last: Finlan Title: The shape of warfare to come: a Swedish perspective 2020–2045 Abstract: This research explores the shape of warfare to come over the next twenty-five years from a Swedish perspective. It is evident that change in the practice of warfare is apparent in international relations today due to the use of innovative new technologies. These developments raise profound practical and conceptual questions for armed forces as to what do these new systems mean for the prosecution of warfare and the intellectual ideas/knowledge base that underpin the contemporary application of force. This research offers a tentative exploration of three aspects (artificial intelligence, autonomous platforms and the future battlefield: the soldier level) framed in the context of the traditional environments of air, land and sea to interrogate their meaning for Sweden and future warfare. Journal: Defense & Security Analysis Pages: 472-491 Issue: 4 Volume: 37 Year: 2021 Month: 10 X-DOI: 10.1080/14751798.2021.1995976 File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995976 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:472-491 Template-Type: ReDIF-Article 1.0 Author-Name: Christopher Spearin Author-X-Name-First: Christopher Author-X-Name-Last: Spearin Title: UN peacekeeping and Chinese Private Security Companies: assessing demand factors for China Abstract: Using China’s UN peacekeeping as a foil, the article explores the demand factors that inform the usage of Chinese Private Security Companies (PSCs) to protect Chinese economic interests and nationals abroad. The article makes three assertions. First, compared to Chinese peacekeepers, PSCs can offer a more focused and responsive presence overseas, a presence that is increasingly demanded by the Chinese leadership and citizenry. Second, Chinese PSCs can provide a less prominent footprint for when Chinese agendas and approaches, despite the desire to maintain a policy of non-interference, inevitably clash with local political dynamics and actors. Third, when considering Chinese peacekeepers that increasingly face the pressure to apply lethal violence, Chinese policy regarding the PSC employment of firearms constrains more robust PSC responses to security challenges that might further inflame sensitive matters regarding non-interference. Journal: Defense & Security Analysis Pages: 91-105 Issue: 1 Volume: 38 Year: 2022 Month: 01 X-DOI: 10.1080/14751798.2022.2030917 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2030917 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:91-105 Template-Type: ReDIF-Article 1.0 Author-Name: Glen Segell Author-X-Name-First: Glen Author-X-Name-Last: Segell Title: Israel’s Intelligence gathering and analysis for the target assassination of Baha Abu al-Ata (2019) Abstract: On 12 November 2019 Baha Abu al-Ata, a leader of the Palestinian Islamic Jihad in Gaza was targeted assassinated by Israel. Intelligence was the driver of the operation – information and data were the components of intelligence gathering enabling informed decision-making via defence and security analysis. There was effective co-ordination and co-operation between the civilian government, the Israel Defense Force’s Units Skylark, Moran, 504, 8200 and 9900, and the Israel Security Agency. Policy and technicalities were integrated through civil–military relations. The methodology used six sets of different types of intelligence gathering, analysis and risk assessment that were separate yet simultaneously were asking: why, who, when, where, how (what weapon), and assessing repercussions. Journal: Defense & Security Analysis Pages: 53-73 Issue: 1 Volume: 38 Year: 2022 Month: 01 X-DOI: 10.1080/14751798.2022.2030914 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2030914 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:53-73 Template-Type: ReDIF-Article 1.0 Author-Name: James Horncastle Author-X-Name-First: James Author-X-Name-Last: Horncastle Title: The unsettled foundation: self-management and its implications for Yugoslavia’s policy of Total National Defence Abstract: Whilst scholars have examined the long-term political, social, and cultural dynamics with regards to Yugoslavia’s collapse, the military has largely escaped similar scrutiny. This paper explores the League of Communists of Yugoslavia’s attempt to solve the nationalist problems of Yugoslavia through the ideology of self-management, and how the failure to do so affected the strategy of Total National Defence. The republics were able to construct their own armed forces due to Total National Defence’s devolution of powers and self-management making changes to the policy extremely difficult for the federal government and Yugoslav People’s Army. Journal: Defense & Security Analysis Pages: 106-121 Issue: 1 Volume: 38 Year: 2022 Month: 01 X-DOI: 10.1080/14751798.2022.2030919 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2030919 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:106-121 Template-Type: ReDIF-Article 1.0 Author-Name: Lawrence E. Cline Author-X-Name-First: Lawrence E. Author-X-Name-Last: Cline Title: Terrorism futures: evolving technology and TTPs use Journal: Defense & Security Analysis Pages: 122-123 Issue: 1 Volume: 38 Year: 2022 Month: 01 X-DOI: 10.1080/14751798.2022.2031716 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2031716 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:122-123 Template-Type: ReDIF-Article 1.0 Author-Name: Paul Lushenko Author-X-Name-First: Paul Author-X-Name-Last: Lushenko Title: U.S. Presidents’ use of drone warfare Abstract: Scholars often reduce America's use of drones to a bureaucratic process. While this enables them to recognise shifts in America's use of strikes since 2002, they cannot adequately explain such change over time. Rather, I argue that America's use of strikes is a function of presidents' decisions. Presidents adopt strategic and legal-normative cognitive frames that shape their decisions to use strikes. I use this typology to study crucial and pathway cases during the Obama and Trump administrations. I show that presidents' decisions to use drones are made to achieve state and social goals. The balance between these aims is informed by, and constitutive of, presidents' strategic and legal-normative frames. Understanding America's use of drones as a leader-driven practice suggests that the legitimacy of strikes may relate more to their impact on the relationship between norms and interests, and not the military or political nature of targets, as some ethicists claim. Journal: Defense & Security Analysis Pages: 31-52 Issue: 1 Volume: 38 Year: 2022 Month: 01 X-DOI: 10.1080/14751798.2022.2031708 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2031708 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:31-52 Template-Type: ReDIF-Article 1.0 Author-Name: Steven I. Davis Author-X-Name-First: Steven I. Author-X-Name-Last: Davis Title: Artificial intelligence at the operational level of war Abstract: Artificial intelligence (AI) is an emerging technology with widespread applications. The National Defense Strategy highlights the importance of AI to military operations for the United States to retain an advantage against its near-peer competitors. To fully realise this advantage, it will be necessary to integrate AI not only at the tactical level but also at the operational level of war. AI can be integrated into the complex task of operational planning most efficiently by subdividing it into its component operational functions, which can be processed by narrow AI. This organisation reduces problems to a size that can be parsed by an AI and maintains human oversight over machine supported decision-making. Journal: Defense & Security Analysis Pages: 74-90 Issue: 1 Volume: 38 Year: 2022 Month: 01 X-DOI: 10.1080/14751798.2022.2031692 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2031692 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:74-90 Template-Type: ReDIF-Article 1.0 Author-Name: Mark L. Bailey Author-X-Name-First: Mark L. Author-X-Name-Last: Bailey Title: The mismatch: Royal Australian Navy maritime constabulary 1955–2020 Abstract: Large-scale illegal fishing commenced in Australian coastal reefs 1970. Since, the Royal Australian Navy (RAN) has been “out of synch” with matching its Tier 2 constabulary vessels to their mission. The pattern is that “mission goalposts” shift post-acquisition, reflecting changes to UNCLOS. Post-WWII, the RAN employed wartime escorts in patrol roles, and wartime launches for littoral constabulary. The RAN has recreated this mix in the twentyfirst century. This paper traces this process and associated problems. Minimum resources are assigned to constabulary functions in peacetime, yet the units involved are arguably the most operational and politically sensitive. Vessel unsuitability has consistently meant personnel problems, over-use of constabulary vessels, and high maintenance costs. Australia's strategic situation is deteriorating towards a point where the rising risk demands mobilisation responses. This would include rapid acquisition of large numbers of Tier 2 assets to meet existing and conflict low-mix roles. Journal: Defense & Security Analysis Pages: 1-30 Issue: 1 Volume: 38 Year: 2022 Month: 01 X-DOI: 10.1080/14751798.2022.2030904 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2030904 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:1-30 Template-Type: ReDIF-Article 1.0 Author-Name: John P. Cann Author-X-Name-First: John P. Author-X-Name-Last: Cann Title: Sangonhá: a PAIGC “liberated zone” gone awry, January 1969 Abstract: Portugal, in an attempt to retain its colonial possession of Guiné, fought a war there between 1961 and 1974. The opposition nationalist movement, known by its acronym PAIGC, sought to establish “liberated zones” within the difficult terrain of the more remote regions of the colony and service these from its immediate neighbour Guinea-Conakry, which had given it sanctuary. The PAIGC hosted its aid donors on carefully staged visits to these zones in an attempt to provide a picture of success in its “people's war.” The Swedish government, its primary non-military donor, decided to create a propaganda film featuring “heroic PAIGC freedom fighters” in action in one of these zones. This is the story of a well-intentioned yet naïve Swedish government effort at film-making and its largely misplaced aid in the face of the serious Portuguese air threat to PAIGC liberated zones. Journal: Defense & Security Analysis Pages: 146-168 Issue: 2 Volume: 38 Year: 2022 Month: 04 X-DOI: 10.1080/14751798.2022.2060475 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2060475 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:146-168 Template-Type: ReDIF-Article 1.0 Author-Name: Michael Kluth Author-X-Name-First: Michael Author-X-Name-Last: Kluth Title: Make or buy? Explaining diverging frigate procurement approaches in Denmark and Norway Abstract: Why did Denmark and Norway opt for respectively a domestic “make” and a “buy” abroad approach when acquiring comparable major surface combatants given both host a capable shipbuilding industry? Three explanations are examined: (1) Balancing concerns inch small states towards “buy” abroad decisions, if requirements are deemed urgent and if junior alliance partners fear abandonment by senior partners. Junior partners by contrast prefer “make at home” if entanglement is a greater concern. (2) National innovation systems can be biased towards large projects, such as complex warship programmes, or have a knowledge diffusion focus emphasising niche capabilities. The former point to a “make” decision whereas the latter is inclined towards “buy.” (3) Domestic defence industry advocate “make” decisions with the qualification that weaker firms favour “buy” with offset arrangements. Political executives balance job creation with military capability, but recent adverse domestic procurement experiences may prompt governments to favour “buy.” Journal: Defense & Security Analysis Pages: 190-209 Issue: 2 Volume: 38 Year: 2022 Month: 04 X-DOI: 10.1080/14751798.2022.2063995 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2063995 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:190-209 Template-Type: ReDIF-Article 1.0 Author-Name: Droff Josselin Author-X-Name-First: Droff Author-X-Name-Last: Josselin Title: European cooperation in maintaining defence equipment in operational condition: an analytical framework derived from economic geography Abstract: Based on economic geography concepts, this article proposes an original analytical framework to understand co-operation between countries in the Maintenance in Operational Condition (MOC) of defence equipment in Europe. European countries are facing problems of MOC cost growth under strong budgetary and usage constraints. A possible solution is to share costs to benefit from economies of scale. However, as the number of participating countries increases, the “distances” (geographical, normative, political) multiply and generate new costs. These costs are likely to weigh on the choices made by countries and therefore constitute a brake on pooling and sharing initiatives. This article proposes to understand the mutualisation of MOC in Europe through a set of centripetal forces (all the advantages offered by mutualisation) and centrifugal forces (all the costs generated by mutualisation). Such a reading grid makes it possible to consider the multidimensional trade-offs underlying the organisation of MOC in Europe. Journal: Defense & Security Analysis Pages: 169-189 Issue: 2 Volume: 38 Year: 2022 Month: 04 X-DOI: 10.1080/14751798.2022.2062886 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2062886 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:169-189 Template-Type: ReDIF-Article 1.0 Author-Name: Ash Rossiter Author-X-Name-First: Ash Author-X-Name-Last: Rossiter Author-Name: Brendon J. Cannon Author-X-Name-First: Brendon J. Author-X-Name-Last: Cannon Title: Turkey's rise as a drone power: trial by fire Abstract: Turkey's production and operational use of its own armed drones has grabbed much media attention and caused consternation in some regional capitals. Not only has Turkey emerged as one of the world's most prolific users of largely indigenously built armed drones but it has also become a major exporter of these systems. Analyses put Turkey's position as a major drone power down to long-term strategic calculation. Whilst Ankara's emergence as a serious drone player is certainly no accident – it is the output of a concerted state effort – this article emphasises how Turkish political-military leaders have absorbed military and political lessons from early forays into armed drone usage and adjusted foreign policy and military tactics accordingly. Such a non-linear evolution of its drone strategy suggests future change in how Turkey seeks to derive benefits from this niche capability. Journal: Defense & Security Analysis Pages: 210-229 Issue: 2 Volume: 38 Year: 2022 Month: 04 X-DOI: 10.1080/14751798.2022.2068562 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2068562 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:210-229 Template-Type: ReDIF-Article 1.0 Author-Name: Sebastian Bruns Author-X-Name-First: Sebastian Author-X-Name-Last: Bruns Title: Of high tides and of perfect storms: US Navy strategic planning, 1970s–1990s Journal: Defense & Security Analysis Pages: 238-241 Issue: 2 Volume: 38 Year: 2022 Month: 04 X-DOI: 10.1080/14751798.2022.2068230 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2068230 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:238-241 Template-Type: ReDIF-Article 1.0 Author-Name: James A. Russell Author-X-Name-First: James A. Author-X-Name-Last: Russell Title: Maritime strategy and naval power in the 21st century – dissembling the Rubik’s cube Journal: Defense & Security Analysis Pages: 230-237 Issue: 2 Volume: 38 Year: 2022 Month: 04 X-DOI: 10.1080/14751798.2022.2066963 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2066963 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:230-237 Template-Type: ReDIF-Article 1.0 Author-Name: Urszula Staśkiewicz Author-X-Name-First: Urszula Author-X-Name-Last: Staśkiewicz Title: Non-governmental pro-defence organisations in Poland – untapped potential for enhancing Polish defence capabilities? Abstract: The article’s purpose is to indicate the hypothesis that non-governmental organisations, specialised in pro-defence and paramilitary activities, have untapped potential defence capabilities in Poland. Therefore, in order to validate the thesis, the article highlights the impact of non-governmental organisations that were operating in Poland between the two world wars and during the time of the Polish People’s Republic. Moreover, conclusions from the abovementioned subject matter are compared with the Estonian law concerning cooperation with defence NGOs within the Estonian defence system. Finally, the article provides conclusions on the Polish government’s financial support for the pro-defence and paramilitary non-governmental organisations and also evaluates existing legal provisions that are covered by such support. Journal: Defense & Security Analysis Pages: 125-145 Issue: 2 Volume: 38 Year: 2022 Month: 04 X-DOI: 10.1080/14751798.2022.2059049 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2059049 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:125-145 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2085538_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Ava Avila Author-X-Name-First: Ava Author-X-Name-Last: Avila Author-Name: Ron Matthews Author-X-Name-First: Ron Author-X-Name-Last: Matthews Title: The Philippine defence-development-disaster security paradigm Abstract: The Philippines suffers from three threats to its national security. Firstly, unlike advanced states, it faces both external and internal assaults on its political and territorial sovereignty. Secondly, self-sustaining economic security remains elusive, with the country failing to emulate the economic successes of its ASEAN neighbours, Singapore and Malaysia. Thirdly, the archipelago must constantly contend with the destabilising effects of natural disasters, including volcanic eruptions, typhoons, and earthquakes. Manila's policy responses to these three disparate, but interlinked threats, have been conditioned by four centuries of Spanish, American, and Japanese occupation. The Philippine government remains a work in progress as diverse efforts to build institutional capacity have produced uneven results. Nevertheless, recent innovative policy approaches are instructive. These are framed around what might be termed a D3 (Defence-Development-Disaster) security paradigm, covering external military security, internal security and non-traditional security, including the Duterte administration's “drug war” Journal: Defense & Security Analysis Pages: 269-283 Issue: 3 Volume: 38 Year: 2022 Month: 07 X-DOI: 10.1080/14751798.2022.2085538 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2085538 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:269-283 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2093433_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: James J. Wirtz Author-X-Name-First: James J. Author-X-Name-Last: Wirtz Title: Imagining maritime conflict in the Indo-Pacific: can analogies substitute for strategy? Abstract: Historical analogies are sometimes used to imagine the scope and nature of a potential conflict in the Indo-Pacific. Using analogies, scenarios, and “images” of future war, instead of strategy, however, can produce an inadequate assessment of future material, operational, and tactical requirements that will be encountered by the U.S. Navy in the maritime domain. Without a long-term strategy to set force development and guide operational requirements, the U.S. Navy will suffer from a “strategy deficit” when it comes to dealing with deterrence, coercion, and escalation in the Indo-Pacific. As planning guidance, the use of analogies is no substitute for strategy. Journal: Defense & Security Analysis Pages: 349-368 Issue: 3 Volume: 38 Year: 2022 Month: 07 X-DOI: 10.1080/14751798.2022.2093433 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2093433 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:349-368 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2085537_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Luke Hally Author-X-Name-First: Luke Author-X-Name-Last: Hally Title: The Politicisation of Archaeology in Border Demarcation Conflict in the Asia Pacific Region Abstract: Within contemporary developments of Asian regional security, a core undertone of conflict catalysts and motivations for territorial claims is directly motivated through archaeological findings. These findings include artefacts and settlements, which are utilised to justify political and territorial claims in the region. This overlooked factor will be analysed using three regional case studies through an archaeological and security studies lens. The research aims to further understand Asia Pacific regional security and political disputes and reflect conflict motivation undertones of each interacting nation-state. The article assesses core case studies of Chinese claims in the South China Sea, Japanese and Korean island claims, and Thai-Cambodian temple disputes. The research will analyse how site evidence becomes politicised to justify territorial claims in Asia- Pacific. Through interdisciplinary research, the article will conclude with a greater understanding of assessing conflict development and motivations between state actors in the Asia Pacific region. Journal: Defense & Security Analysis Pages: 258-268 Issue: 3 Volume: 38 Year: 2022 Month: 07 X-DOI: 10.1080/14751798.2022.2085537 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2085537 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:258-268 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2093460_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Kogila Balakrishnan Author-X-Name-First: Kogila Author-X-Name-Last: Balakrishnan Author-Name: Zsolt Lazar Author-X-Name-First: Zsolt Author-X-Name-Last: Lazar Title: The challenges in buyer-supplier relationship for technological absorption capability in international defence acquisition: the case of Southeast Asia Abstract: Transfer of technology (TOT) is a contentious issue in the international defence trade. In 2019 it was estimated to form at least 40%, or $123 billion USD, of total international defence trade. Whilst purchasing nations set requirements for TOT within their industrial participation (IP) policies, there is often a mismatch between the scale and type of technology suppliers can offer and the buyer’s technological absorption capability (TAC). This persistent tension between ambition and reality frequently strains the buyer-supplier relationship. Thus, understanding how TAC can be enhanced is of vital importance. This paper defines TAC in the international defence acquisition and offsets context and determines the factors for successful TAC. The paper focusses on the potential challenges for successful TAC and offers recommendations on how to enhance TAC. This research is limited to the context of Southeast Asia. The respondents consist of industry, government and academics who operate in the Southeast Asian defence and security sector. Journal: Defense & Security Analysis Pages: 317-335 Issue: 3 Volume: 38 Year: 2022 Month: 07 X-DOI: 10.1080/14751798.2022.2093460 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2093460 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:317-335 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2088331_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Haneol Lee Author-X-Name-First: Haneol Author-X-Name-Last: Lee Title: Evaluating civil-military relationship for effective procurement decision-making: the case of two fighter jet procurements of the Republic of Korea Abstract: Overseas procurement aims not only to acquire the most high-end weapons systems, but also to enhance their technological expertise. However, the degree to which a procuring state succeeds in these dual objectives varies. Sometimes, a state acquires nearly the most advanced weapon systems in a timely manner with significant terms of technology transfer. At other times, a state’s procurement is fraught with a series of disadvantageous decisions on technology transfer, maintenance, and timeliness. From where does this variation in effectiveness emanate? This article argues that the key to explaining these variations is civil–military co-ordination. States can secure effectiveness when a civilian chief executive proactively capitalises on appointment authority and/or when proactive civil–military consultations transpire. For these causations, this article studies two major fighter jet procurement activities of the Republic of Korea (ROK), the Korea Fighter Project (KFP) and the Fighter eXperimental-I (FX-I) programme. Journal: Defense & Security Analysis Pages: 296-316 Issue: 3 Volume: 38 Year: 2022 Month: 07 X-DOI: 10.1080/14751798.2022.2088331 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2088331 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:296-316 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2084816_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Richard A. Bitzinger Author-X-Name-First: Richard A. Author-X-Name-Last: Bitzinger Title: The security environment in the Asia-Pacific: the context for arming Abstract: Countries in the Asia-Pacific have many reasons for acquiring new defense hardware and improving national military capabilities. The region is clearly one of constantly shifting security dynamics, with rising great powers, new threats and security challenges, and new military commitments. All of these require new capabilities for power projection, mobility, firepower, intelligence and surveillance, and joint operations, thereby driving regional military modernisation. Consequently, some of the most modern and most advanced armaments are finding their way into the inventories of Asian militaries. Many regional militaries have experienced a significant, if not unprecedented, build-up in terms of both quantity and quality, over the past several years. Recent acquisitions by regional armed forces constitute something more than mere modernisation; rather, the new types of armaments being procured and deployed promise to significantly expand regional maritime and airborne warfighting capabilities. Journal: Defense & Security Analysis Pages: 247-257 Issue: 3 Volume: 38 Year: 2022 Month: 07 X-DOI: 10.1080/14751798.2022.2084816 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2084816 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:247-257 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2084815_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Laxman Kumar Behera Author-X-Name-First: Laxman Kumar Author-X-Name-Last: Behera Title: Made in India: an aspiring brand in global arms bazaar Abstract: With INR 107.45 billion ($1.54 billion) worth of arms exports and export authorisations in 2018–2019, India realised its biggest annual defence export ambition to date. Breaking into the world’s top 25 defence exporters for the first time, India has set its goal even higher, with a target of INR 300 billion ($5 billion) in defence exports by 2025. Can India achieve the goal and join the ranks of major arms exporting countries? What would it take for India to realise its defence export goal? And what has India done to achieve it? The paper examines India’s recent defence export performance and, in so doing, it probes various reform initiatives taken by the Indian government to promote international arms sales. The article argues that India has a significant domestic arms manufacturing capability, which, if harnessed properly, could propel the country as a significant player in the global arms bazaar. Journal: Defense & Security Analysis Pages: 336-348 Issue: 3 Volume: 38 Year: 2022 Month: 07 X-DOI: 10.1080/14751798.2022.2084815 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2084815 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:336-348 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2085109_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Pascal Lottaz Author-X-Name-First: Pascal Author-X-Name-Last: Lottaz Author-Name: Heinz Gärtner Author-X-Name-First: Heinz Author-X-Name-Last: Gärtner Title: Dual-neutrality for the Koreas: a two-pronged approach toward reunification Abstract: This article builds a novel argument for the unification of the two Korean states by way of a dual neutralisation process. After reviewing the neutralisation concept and the history of neutrality ideas for the peninsula, the authors introduce two historical models that would fit the security needs of both Koreas and their respective security partners. Using a realist framework, it is argued that the “Finlandisation” of the DPRK on the one hand; and the “Austriasation” of the ROK on the other, would not change the de facto security relationships with their patrons, but would create the structural underpinning for future foreign policy compatibility. Assuming other factors remain equal and a solution to internal political division could be brokered, the article proposes a security framework for both states aimed at separately creating the structures for a future unified neutral Korea. Journal: Defense & Security Analysis Pages: 284-295 Issue: 3 Volume: 38 Year: 2022 Month: 07 X-DOI: 10.1080/14751798.2022.2085109 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2085109 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:284-295 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2094857_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Zsolt Lazar Author-X-Name-First: Zsolt Author-X-Name-Last: Lazar Author-Name: Kogila Balakrishnan Author-X-Name-First: Kogila Author-X-Name-Last: Balakrishnan Title: Asia-Pacific special edition – introduction Journal: Defense & Security Analysis Pages: 243-246 Issue: 3 Volume: 38 Year: 2022 Month: 07 X-DOI: 10.1080/14751798.2022.2094857 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2094857 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:243-246 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2076343_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Colonel Ronald Ti Author-X-Name-First: Colonel Ronald Author-X-Name-Last: Ti Title: The strategic vulnerability of NATO blood supply logistics: a case study of Estonian national defence Abstract: If an event triggers Article V and NATO is drawn into defensive combat operations, there could well be more dead and wounded than the West has encountered before. Most casualties will result from combat trauma and require both surgery and blood transfusion to survive. Under NATO’s split “collective-individual” responsibility system, should national blood logistic systems be unable to deliver; and with NATO unable to exercise overall coordination, serious consequences for individual morale, the will to fight, and overall combat capability will occur, producing dire strategic outcomes. This article focusses on NATO blood supply logistics and highlights current deficiencies, using Estonian Defence Force blood supply logistics as its working example. The article’s principal argument is that blood supply logistics has “tactical-level” effects which have critical flow-on strategic effects on issues such as force preservation and morale. Blood supply logistics is a complex issue urgently requiring concerted NATO, multinational, and national attention. Journal: Defense & Security Analysis Pages: 369-388 Issue: 4 Volume: 38 Year: 2022 Month: 10 X-DOI: 10.1080/14751798.2022.2076343 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2076343 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:369-388 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2122204_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Stephen Blank Author-X-Name-First: Stephen Author-X-Name-Last: Blank Title: Gunboat diplomacy à la Russe: Russia’s naval base in Sudan and its implications Abstract: In 2020 Russia acquired a new naval base or logistic support centre off Sudan’s coast in Port Sudan. This base represents the culmination to date of Moscow’s quest for bases in and around the Mediterranean, Horn of Africa, and even the Indian Ocean. While the politics of obtaining and developing this base pertain largely to Moscow’s Africa policy; this paper focuses upon Russia’s overall naval strategy and its linked power projection programme. These strategies have hitherto been insufficiently appreciated abroad and it is hoped that this assessment will galvanise greater attention to them. Journal: Defense & Security Analysis Pages: 470-489 Issue: 4 Volume: 38 Year: 2022 Month: 10 X-DOI: 10.1080/14751798.2022.2122204 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2122204 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:470-489 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2110701_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Col (ret) Gerhard M. Louw Author-X-Name-First: Col (ret) Gerhard M. Author-X-Name-Last: Louw Author-Name: Abel Esterhuyse Author-X-Name-First: Abel Author-X-Name-Last: Esterhuyse Title: South African defence decision-making: analysing dysfunctional approaches Abstract: Defence planning in South Africa has gradually declined to the point of collapse; for reasons that are both complex and largely unexplained. While South Africa is not alone in this situation, the paucity of universal theories to explain the ineffectiveness of defence planning currently limits the theoretical validity of analyses that seek to address the phenomenon. Generating a substantive hypothesis that explains not only the causes of South Africa's current defence predicament, but also those of other countries in similar circumstances, became the paper's primary purpose. By abstracting from theories in management sciences and security studies, the paper concludes that top management's approaches to defence planning are the primary mechanisms that bring about success or failure in defence decision-making. The authors subsequently integrate relevant critical, contextual, and functional approaches to defence planning in a theoretical framework, using empirical evidence from the South African defence environment to substantiate their arguments throughout. Journal: Defense & Security Analysis Pages: 389-409 Issue: 4 Volume: 38 Year: 2022 Month: 10 X-DOI: 10.1080/14751798.2022.2110701 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2110701 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:389-409 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2125708_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Kenneth Boutin Author-X-Name-First: Kenneth Author-X-Name-Last: Boutin Title: Transnational industry and national security: China and American industrial security Abstract: Concern over the national security implications of transnational industrial integration is growing in the United States. Direct and indirect Sino-American integration in high-technology industrial sectors is regarded as a threat to American industrial security in terms of the National Technology and Industrial Base and technological primacy. The American government has launched a number of national and international initiatives to strengthen the resilience of American defence supply chains and limit China’s capacity to derive defence-industrial benefits from industrial ties. The emerging industrial security framework supports the functional requirements of American defence firms, but threatens American arms programmes through its potential impact on the affordability of arms, the flexibility of arms production arrangements, the scale and time frame of arms production, and the development of arms over the long-term, as restrictions on offshore collaboration threaten industrial processes that are central to high-technology production and development. Journal: Defense & Security Analysis Pages: 431-452 Issue: 4 Volume: 38 Year: 2022 Month: 10 X-DOI: 10.1080/14751798.2022.2125708 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2125708 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:431-452 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2117285_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Andrew Dowse Author-X-Name-First: Andrew Author-X-Name-Last: Dowse Author-Name: Sascha Dov Bachmann Author-X-Name-First: Sascha Dov Author-X-Name-Last: Bachmann Title: Information warfare: methods to counter disinformation Abstract: The information age has transformed society by allowing people to interact digitally, yet it enables motivated actors to use mass influence to further their political objectives. The struggle against disinformation requires an appreciation of how a disinformation effect can be achieved in order to counter it. We consider the nature of disinformation and its use in the hybrid warfare domain, before examining the problem through frames of planning approach, truth theory, systems thinking, and military strategy. These approaches are informative in developing counter-strategies and we specifically identify the concept of kill chains as a useful framework to assist in the disinformation challenge. Journal: Defense & Security Analysis Pages: 453-469 Issue: 4 Volume: 38 Year: 2022 Month: 10 X-DOI: 10.1080/14751798.2022.2117285 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2117285 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:453-469 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2114582_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949 Author-Name: Guillermo López-Rodríguez Author-X-Name-First: Guillermo Author-X-Name-Last: López-Rodríguez Title: Building military expeditionary culture: Spanish Army after international operations Abstract: This article analyses the Spanish experience in military operations abroad, studying the functions it carried out in order to demonstrate how expeditionary experience has shaped military change processes. Using a database built from the Spanish Army’s online missions register, as well as from 23 personal interviews conducted with Spanish servicemen, this research focuses on how the Spanish Army has changed through its overseas deployments and how its organisational culture has evolved. The results obtained show a tangible transformation, which has modified procedures, military equipment, and operational functions. There have also been intangible transformations, reflected in the mentality and awareness of military personnel, readying them for deployment anywhere and anytime. Journal: Defense & Security Analysis Pages: 410-430 Issue: 4 Volume: 38 Year: 2022 Month: 10 X-DOI: 10.1080/14751798.2022.2114582 File-URL: http://hdl.handle.net/10.1080/14751798.2022.2114582 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:410-430 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2146052_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Uğur Ermiş Author-X-Name-First: Uğur Author-X-Name-Last: Ermiş Author-Name: Günseli Gümüşel Author-X-Name-First: Günseli Author-X-Name-Last: Gümüşel Title: Why the Turkish defense industry between 1919 and 1950 failed? Abstract: This study seeks to answer why Turkey could not reach its defense industry targets despite the efforts between 1919-1950. Defense industry was significant for the government's foreign policies and efficiency. The problems in defense industrial infrastructure and absence of a private industrial sector were significant reasons for falling of the empire. During Turkish Independence War and in early Republican Era, lack of national defense industry remained as a crucial problem. Thus the government considered the establishment of indigenous defense industry as a strategic target and invested limited resources. Despite, by the end of the World War II, Turkish Republic still failed to fulfil military requirements. This failure led Turkey to join NATO due to security requirements against USSR. It led to dependency on Western military assistance. Turkey's failure was due to lack of corporate planning, inadequate investment financing, and the difference between current human resources and strategic target requirements. Journal: Defense & Security Analysis Pages: 1-14 Issue: 1 Volume: 39 Year: 2023 Month: 01 X-DOI: 10.1080/14751798.2023.2146052 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2146052 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:1-14 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2159103_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Matthew Powell Author-X-Name-First: Matthew Author-X-Name-Last: Powell Title: Defence procurement in perspective: what the history of the aircraft industry can tell us about UK defence procurement Abstract: Defence procurement in the UK has drawn a large degree of political and academic attention due to large-scale projects regularly being delayed and costing significantly more than the original estimate. The focus on contemporary defence procurement, however, suffers from one major drawback: a lack of historical contexualistation. This article redresses this imbalance between the focus on contemporary defence procurement and the problems faced purchasing military equipment in the past. The defence industry most representative of the contemporary procurement environment is the British aircraft industry in the inter-war period. This was an industry that was not publicly owned and presented dynamics that are comparable to today. This article explores the problems associated with twenty-first century defence procurement through this historical lens, demonstrating that many of the problems faced, and solutions proposed are not necessarily as new or innovative as has been claimed. Journal: Defense & Security Analysis Pages: 15-33 Issue: 1 Volume: 39 Year: 2023 Month: 01 X-DOI: 10.1080/14751798.2023.2159103 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2159103 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:15-33 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2166520_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Gershon Adela Author-X-Name-First: Gershon Author-X-Name-Last: Adela Title: Institutional counterinsurgency frameworks in the Lake Chad Basin: the case of the Multinational Joint Task Force against Boko Haram Abstract: The Multinational Joint Task Force (MNJTF) is engaged in active combat operations against Boko Haram in the Lake Chad Basin, but the latter remains very resilient and continues to launch lethal attacks. Yet, scholarship has failed to examine the institutional circumstances that account for the lack of success by the MNJTF. This article explores the influence of the counterinsurgency frameworks of the Organization of African Unity (OAU)/African Union (AU), Economic Community of West Africa States (ECOWAS), and the Economic Community of Central African States (ECCAS) on the operations of the MNJTF. It takes a critical look at how the MNJTF’s states’ affiliation to separate sub-regional blocs influences military and intelligence cooperation among them. The article argues that the AU, ECOWAS, and ECCAS institutional counterinsurgency frameworks severely limit military and intelligence collaboration among its member nations, therefore impeding the MNJTF’s operations. Journal: Defense & Security Analysis Pages: 91-110 Issue: 1 Volume: 39 Year: 2023 Month: 01 X-DOI: 10.1080/14751798.2023.2166520 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2166520 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:91-110 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2157942_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marcin Lasoń Author-X-Name-First: Marcin Author-X-Name-Last: Lasoń Title: The position of the special operations forces soldiers on the so-called global war on terrorism. A survey report Abstract: Operations involving special operations forces are veiled in mystery, and public opinion is usually not well informed. The period of the last twenty years, beginning with the terrorist attacks of 09/11, has been no exception. But occasionally, official reports and the results of investigative journalism are published, very often criticising the actions of special operations forces soldiers. Given the secretive nature of special operations forces, researching these groups is challenging. The paper provides Special operations forces soldiers' views on the so-called global war on terrorism based on their views, observations, and experiences. There are individual opinions present in published testimonies of special operations forces members around the world. However, the research that includes a vast sample of seasoned, Polish special operations forces soldiers is an initial and original attempt to fill the gaps in the academic knowledge of the subject. Journal: Defense & Security Analysis Pages: 47-72 Issue: 1 Volume: 39 Year: 2023 Month: 01 X-DOI: 10.1080/14751798.2023.2157942 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2157942 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:47-72 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2163997_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zbigniew Galar Author-X-Name-First: Zbigniew Author-X-Name-Last: Galar Author-Name: Adam Sadowski Author-X-Name-First: Adam Author-X-Name-Last: Sadowski Title: Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks Abstract: Polish border guards can’t stop a few dozen fast-wheeled APCs and IFVs. If such a force would cross through any road at the eastern border of Poland, it would pass almost intact. Afterward, it would be an easy target, but only before it could hide in a dense urban area. Is eastern Poland prepared for such a surprise attack of under a hundred vehicles that could arrive in many city centres within an hour after the border crossing? If a Russian force arrives at even a medium-sized city centre, they could occupy and hold such a position for weeks and use local civilians as human shields. They could force political negotiations holding also precious city infrastructure hostage. Lack of fast and decisive decision-making which is highly likely (because any bombardment will mean a loss of life of civilians) will only make any attempt to regain the city more difficult. Journal: Defense & Security Analysis Pages: 111-117 Issue: 1 Volume: 39 Year: 2023 Month: 01 X-DOI: 10.1080/14751798.2023.2163997 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2163997 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:111-117 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2170515_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Reuben Steff Author-X-Name-First: Reuben Author-X-Name-Last: Steff Title: Artificial intelligence and the future of warfare: the USA, China and strategic stability Journal: Defense & Security Analysis Pages: 118-121 Issue: 1 Volume: 39 Year: 2023 Month: 01 X-DOI: 10.1080/14751798.2023.2170515 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2170515 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:118-121 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2147637_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Yoram Fried Author-X-Name-First: Yoram Author-X-Name-Last: Fried Title: Identifying and planning military potential and national power: the case of the Israeli civilian-military planning units Abstract: Research on the military potential/national power has focused on features such as numbers of soldiers, the military budget, population size, industrial production, technology, and others as underlying national power. The geopolitical situation of the State of Israel made the IDF General Staff the arbiter of any planning decision related to the development of the state economy, and responsible for planning and directing national security. Because the asymmetry between the military potential of the Arab countries and that of Israel was a reality on the ground that Israel’s national security concept had to take into consideration, and because modern warfare is between nations, their material forces and their mental capacities, the Israel Defence Forces [IDF] recommended setting up civil–military Planning Units based on military guidelines to identify, calculate and plan specific areas of national potential such as administration and regime, morale and education, static defence, the economy in wartime, and manpower. Journal: Defense & Security Analysis Pages: 73-90 Issue: 1 Volume: 39 Year: 2023 Month: 01 X-DOI: 10.1080/14751798.2023.2147637 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2147637 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:73-90 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2162140_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Spyridon Plakoudas Author-X-Name-First: Spyridon Author-X-Name-Last: Plakoudas Title: The Greek defence industry: from crisis to equilibrium Abstract: Greece was never internationally renowned for its defence industry; in fact, its state-owned industries were usually a source of headaches rather than income for Athens. The Debt Crisis (2008-18) compounded the chronic ills of the Greek defence ecosystem which appeared to decline irreversibly. And yet, in recent years they rebounded and reached new heights. How can this surprising turnaround be explained? And what does it indicate for the future of the Greek defence industry? This paper aspires to examine how the Greek defence ecosystem (state- and private-owned) evolved from a stage of stagnation and decline into a phase of stabilisation. Journal: Defense & Security Analysis Pages: 34-46 Issue: 1 Volume: 39 Year: 2023 Month: 01 X-DOI: 10.1080/14751798.2023.2162140 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2162140 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:34-46 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2178519_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: James Rogers Author-X-Name-First: James Author-X-Name-Last: Rogers Title: The Second Drone Age: defining war in the 2020s Journal: Defense & Security Analysis Pages: 256-259 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2178519 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178519 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:256-259 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2178071_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ilan Shklarsky Author-X-Name-First: Ilan Author-X-Name-Last: Shklarsky Author-Name: Eitan Shamir Author-X-Name-First: Eitan Author-X-Name-Last: Shamir Title: Driving innovation in air power: the cold war’s four generations of fighter jets Abstract: The aim of this article is to add an air power perspective to the innovation field, with emphasis on the development of jet fighters. Contemporary theory has not adequately addressed air power-related significant innovation, a shortcoming this article addresses. Using in-depth qualitive research methodology with eight diverse case-studies in the Cold War period, we show that innovation of jet fighters was typically initiated in response to hegemonic tensions, immediate threats and organsational factors such as civil–military relations, bureaucratic politics, and air force innovation culture. Moreover, through a comparative analysis we argue that significant and successful air power innovation is achieved through proficiency and knowledge gained by constant learning of air power theory and bottom-up innovation mechanisms. Looking forward, this study may be significant for assisting military professionals in making better-informed decisions about the use of fifth-generation air power by implementing past lessons learned into contemporary theory and future plans. Journal: Defense & Security Analysis Pages: 146-170 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2178071 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178071 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:146-170 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2178541_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Antonio Calcara Author-X-Name-First: Antonio Author-X-Name-Last: Calcara Author-Name: Ivan Zaccagnini Author-X-Name-First: Ivan Author-X-Name-Last: Zaccagnini Author-Name: Mauro Gilli Author-X-Name-First: Mauro Author-X-Name-Last: Gilli Author-Name: Andrea Gilli Author-X-Name-First: Andrea Author-X-Name-Last: Gilli Title: Military drones, air defence, and the hider-finder competition in air warfare Journal: Defense & Security Analysis Pages: 260-262 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2178541 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178541 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:260-262 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2191809_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Thomas C. Bruneau Author-X-Name-First: Thomas C. Author-X-Name-Last: Bruneau Title: American Defense Reform: Lessons from Failure and Success in Navy History Journal: Defense & Security Analysis Pages: 275-277 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2191809 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2191809 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:275-277 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2178069_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Tahir Mahmood Azad Author-X-Name-First: Tahir Mahmood Author-X-Name-Last: Azad Author-Name: Karl Dewey Author-X-Name-First: Karl Author-X-Name-Last: Dewey Title: Assessing the security of Pakistan’s nuclear weapon programme Abstract: Although the broad outlines of Pakistan's nuclear weapons' programme are well documented, significant gaps remain in the understanding of the country's nuclear security regime. Nuclear security remains a highly politicised topic, with little robust information available regarding the steps taken to secure the country's nuclear assets. To help “fill the gaps”, this paper places official Pakistani documents, statements, and other open source information, into an analytical framework based on international standards of physical security. Although gaps in understanding remain, this paper finds that, in general, Pakistan has enacted robust security measures to protect its nuclear weapons and nuclear-weapons related infrastructure. Nonetheless, the prevailing perception of Pakistan's nuclear security remains dominated by embarrassing episodes that emphasise the importance of effective nuclear security culture. Based on its findings, this paper also offers policy recommendations which may offer additional confidence about the rigours of the country's nuclear security regime. Journal: Defense & Security Analysis Pages: 123-145 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2178069 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178069 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:123-145 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2210368_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Carl Gibson Author-X-Name-First: Carl Author-X-Name-Last: Gibson Title: Islamic state’s online propaganda: a comparative analysis Journal: Defense & Security Analysis Pages: 277-278 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2210368 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2210368 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:277-278 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2185947_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: SeyedMilad KashefiPour Dezfuli Author-X-Name-First: SeyedMilad KashefiPour Author-X-Name-Last: Dezfuli Title: Targeted killings and the erosion of international norm against assassination Abstract: In recent years State-sponsored assassination, reframed as “targeted killing” in the context of the war on terrorism, is undergoing a normalisation process due to the hybrid and asymmetrical threat of international terrorism. A more recent concern is the extension of the practice to the realm of inter-state relations, as exemplified by the assassination of the Iranian General Soleimani in January 2020. This paper argues that normative transformations in our understanding of concepts such as state sovereignty, alongside the persistence of inclusion/exclusion criteria in international relations, have facilitated the application of techniques and practices developed in response to non-state military threats in inter-state relations. Journal: Defense & Security Analysis Pages: 191-206 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2185947 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2185947 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:191-206 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2182479_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Wayne Stephen Coetzee Author-X-Name-First: Wayne Stephen Author-X-Name-Last: Coetzee Author-Name: Joakim Berndtsson Author-X-Name-First: Joakim Author-X-Name-Last: Berndtsson Title: Understanding Sweden’s security economy Abstract: This article aims to map out and analyse how Sweden’s security economy is shaped and sustained through security policies, political decisions, and personal connections amongst commercial and state elites. We treat the arms and security service industries as two sides of the same coin. In doing so, we address a shortcoming in the security literature that often analyses these two fields as separate areas of study with their own set of logic, research questions, theories, and methodologies. By bringing these two areas together, our study contributes to knowledge of the relationship between commercial defence and security actors and the state and a deeper understanding of Sweden’s security economy. Journal: Defense & Security Analysis Pages: 171-190 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2182479 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2182479 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:171-190 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2178571_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Marc R. DeVore Author-X-Name-First: Marc R. Author-X-Name-Last: DeVore Title: “No end of a lesson:” observations from the first high-intensity drone war Journal: Defense & Security Analysis Pages: 263-266 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2178571 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178571 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:263-266 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2210367_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Lance Y. Hunter Author-X-Name-First: Lance Y. Author-X-Name-Last: Hunter Author-Name: Craig D. Albert Author-X-Name-First: Craig D. Author-X-Name-Last: Albert Author-Name: Christopher Henningan Author-X-Name-First: Christopher Author-X-Name-Last: Henningan Author-Name: Josh Rutland Author-X-Name-First: Josh Author-X-Name-Last: Rutland Title: The military application of artificial intelligence technology in the United States, China, and Russia and the implications for global security Abstract: A number of studies have considered the theoretical role that Artificial Intelligence (AI) may play in shaping the global balance of power in the future. While these studies are informative, we currently lack an understanding regarding the precise manner AI technologies are being applied and incorporated in militaries in major power states. Thus, in this study, we examine how AI technology is being applied in the militaries in the US, China, and Russia and analyse the implications for the future of AI, global military competition, and international security. We examine current research on the military application of AI technology in the US, China, and Russia and conduct expert interviews with leading AI experts in academia, think tanks, multinational technology companies, and the military to better understand how AI technology is being applied in the three major powers states and the implications for global security. Journal: Defense & Security Analysis Pages: 207-232 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2210367 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2210367 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:207-232 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2178500_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Ash Rossiter Author-X-Name-First: Ash Author-X-Name-Last: Rossiter Title: Military technology and revolutions in warfare: priming the drone debate Abstract: The collection of essays in the special debate tackle the claim that drones deserve their acquired status as a revolutionary technology that has indelibly recast warfare. It is a debate embedded within a long-running and contentious, broader discussion about the role technology plays an independent variable affecting the character and perhaps the nature of war. How far can the introduction of a new technology really alter ways of fighting or radically impact battlefield outcomes? The complexity of the issue is reflected in the diversity of positions and approaches taken by the debaters. The purpose of these papers is not to arrive at a conclusion through a dialectic process; rather, readers are left to form their own views after weighing up the strengths of the arguments presented. Journal: Defense & Security Analysis Pages: 253-255 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2178500 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178500 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:253-255 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2178577_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Brendon J. Cannon Author-X-Name-First: Brendon J. Author-X-Name-Last: Cannon Title: Out of Africa: the impact of drones in Sub-Saharan conflicts Journal: Defense & Security Analysis Pages: 267-270 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2178577 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178577 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:267-270 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2191807_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bryan T. Stinchfield Author-X-Name-First: Bryan T. Author-X-Name-Last: Stinchfield Title: The military and commercial development of brain–computer interfaces: international (in)security with brain-machine teaming Abstract: Brain-computer interfaces (BCIs) are an emerging dual-use technology that will affect international security in ways similar to other dual-use technologies such as artificial intelligence, autonomous weapons, and cyber tools and tactics. In this paper, I use open sources and network analyses to reveal the structure of the BCI research and development industry, which indicates that BCIs will soon be operational, and the technology will diffuse across many sectors and regions. As a result, I argue that the unique qualities of BCIs will provide incentives to engage in conflict and disrupt international security; therefore, militaries in liberal democracies should strive to achieve and maintain BCI technological superiority over authoritarian regimes and violent non-state actors. Journal: Defense & Security Analysis Pages: 233-252 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2191807 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2191807 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:233-252 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2178599_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Sarah Kreps Author-X-Name-First: Sarah Author-X-Name-Last: Kreps Author-Name: Paul Lushenko Author-X-Name-First: Paul Author-X-Name-Last: Lushenko Title: Drones in modern war: evolutionary, revolutionary, or both? Journal: Defense & Security Analysis Pages: 271-274 Issue: 2 Volume: 39 Year: 2023 Month: 04 X-DOI: 10.1080/14751798.2023.2178599 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178599 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:271-274 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2204595_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Stephen Blank Author-X-Name-First: Stephen Author-X-Name-Last: Blank Title: How Ukraine reveals Russian nuclear strategy Abstract: If we examine the role played by nuclear weapons in Russia's war against Ukraine, we find that they play an offensive role in Russian strategy. The deterrence mission is as much intended to free Russia's hands for conventional war on its periphery as it is intended to prevent a nuclear first strike from the West. Indeed, the evidence of exercises etc. strongly points to a readiness for attacking Western sea-lines of communication in the Atlantic were a Western response to come as a result of the attack on Ukraine. Similarly, the potential for nuclear threat exists in the vicinity of the Black Sea as shown by Russian exercises in advance of the war there and in the Eastern Mediterranean. Those exercises reveal that Moscow's power projection policy into the Levant and beyond is also part of its deterrence strategy and has amongst its objectives protecting the Black Sea as a Russian lake, an inherently offensive posture. Therefore Russia's nuclear strategy in this war and in general stand revealed as offensive ones which the West must reckon with. Journal: Defense & Security Analysis Pages: 353-368 Issue: 3 Volume: 39 Year: 2023 Month: 07 X-DOI: 10.1080/14751798.2023.2204595 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2204595 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:353-368 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2235139_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zdeněk Kříž Author-X-Name-First: Zdeněk Author-X-Name-Last: Kříž Title: Concluding remarks: Russian invasion - the dawn of a new world order without American hegemony? Journal: Defense & Security Analysis Pages: 407-408 Issue: 3 Volume: 39 Year: 2023 Month: 07 X-DOI: 10.1080/14751798.2023.2235139 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2235139 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:407-408 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2202035_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zdeněk Kříž Author-X-Name-First: Zdeněk Author-X-Name-Last: Kříž Title: The costly gamble: how Russia's invasion of Ukraine weakened its role as a balancing power Abstract: Russia is not a superpower, and it is not a conventional great power either. Russia is a balancing great power (balancer), which since 2007 has been purposefully offsetting western influence in the international system and attempting to resist Western (American) hegemony. The paper develops the argument that the failed aggression against Ukraine has very significantly limited Russia’s ability to use available balancing techniques. Ukraine has clearly opted for a Western orientation because Russia has entirely lost its appeal. Russian positions in Central Asia and the Caucasus are weakened. In both areas, Russia must confront the growing activities of the EU, the US, China, and Turkey. Russia’s ability to manage an equilibrium between China and India in Asia is diminishing as it can no longer export sophisticated weapons. Russia’s conventional military capabilities have been significantly reduced. All in all, Russia’s relative position among the other great powers has deteriorated significantly. Journal: Defense & Security Analysis Pages: 387-406 Issue: 3 Volume: 39 Year: 2023 Month: 07 X-DOI: 10.1080/14751798.2023.2202035 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2202035 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:387-406 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2204596_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Martin Chovančík Author-X-Name-First: Martin Author-X-Name-Last: Chovančík Author-Name: Oldřich Krpec Author-X-Name-First: Oldřich Author-X-Name-Last: Krpec Title: Cloaked disintegration – Ukraine war and European defence-industrial co-operation in Central and Eastern Europe Abstract: Progress made in European defence-industrial integration has been subjected to the hardest test with the 2022 Russian invasion of Ukraine. The conflict has had profound implications for European defence industries across the board and spurred on massive investment into the sector. Based on extensive analysis of procurements, adopted policies, and shifts in discourse, we argue that the practical steps undertaken by Central and Eastern European (CEE) defence industries in the wake of the conflict are disintegrational. This is contrary to many discernible indicators which align with European integrational initiatives in defence. Moreover, the paper argues that the pattern of decisions taken by Central and Eastern European countries reinforces structural barriers to potential future European defence-industrial integration. The findings are significant to EU-wide, regional, and bilateral defence-industrial co-operation as well as national defence industrial strategies in reaction to the ongoing war in Ukraine. Journal: Defense & Security Analysis Pages: 369-386 Issue: 3 Volume: 39 Year: 2023 Month: 07 X-DOI: 10.1080/14751798.2023.2204596 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2204596 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:369-386 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2235124_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zdeněk Kříž Author-X-Name-First: Zdeněk Author-X-Name-Last: Kříž Title: Introduction Journal: Defense & Security Analysis Pages: 279-280 Issue: 3 Volume: 39 Year: 2023 Month: 07 X-DOI: 10.1080/14751798.2023.2235124 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2235124 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:279-280 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2201017_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Deborah Sanders Author-X-Name-First: Deborah Author-X-Name-Last: Sanders Title: Ukraine’s third wave of military reform 2016–2022 – building a military able to defend Ukraine against the Russian invasion Abstract: This article explores an important and often overlooked element of Ukraine’s ability to defend itself against the Russian invasion in February 2022 – the adoption of a modified western transformational model of military reform – which has focused on mass and building a western style NATO interoperable and trained military. This article argues that Ukraine’s military reform since 2016, in particular the focus on Command and Control, the development of an NCO Corps and Special Forces as well as clear procurement priorities have created the enabling conditions for the development of a flexible and adaptable military force, able to limit Russia’s battlefield success and bring the fight to the enemy. Despite this progress, however, a recurring problem facing the Ukrainian military, that is likely to continue in the future, is how to balance the ongoing requirement for mass against the urgent need for military modernisation. Journal: Defense & Security Analysis Pages: 312-328 Issue: 3 Volume: 39 Year: 2023 Month: 07 X-DOI: 10.1080/14751798.2023.2201017 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2201017 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:312-328 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2235121_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Nicholas Marsh Author-X-Name-First: Nicholas Author-X-Name-Last: Marsh Title: Responding to needs: military aid to Ukraine during the first year after the 2022 invasion Abstract: The article analyses the provision of military aid to Ukraine during the first year after the 2022 Russian invasion and explains why it was more effective compared to other examples. It discusses the impact of material and intangible military assistance. The article examines tensions arising from principal-agent relationships between Ukraine and the states that provided support that may have affected what was provided and when it was delivered. It is notable that providers of assistance emphasised equipment rather than training, a choice that could be made because Ukraine had already built up a high level of combat skills and military organisation. The article argues that the distinctive aspects of military assistance to Ukraine that led to its impact were the quality and quantity of equipment provided, good communication and co-ordination between Ukraine and those states providing assistance, and that Ukrainian defence and government institutions could manage the aid provided. Journal: Defense & Security Analysis Pages: 329-352 Issue: 3 Volume: 39 Year: 2023 Month: 07 X-DOI: 10.1080/14751798.2023.2235121 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2235121 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:329-352 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2201018_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Kateřina Fridrichová Author-X-Name-First: Kateřina Author-X-Name-Last: Fridrichová Title: Mugged by reality: Russia's strategic narratives and the war in Ukraine Abstract: This article discusses the surprising lack of preparedness in Russian propaganda preceding the invasion of Ukraine on February 24, 2022. Despite previous successes in developing strategic narratives during the annexation of Crimea, Russia underestimated the need for unique communication strategies for the conflict in Ukraine. The article argues that Russia's miscalculation was due to the assumption that it already had a set of strategic narratives in place, from the international order to specific issues, and viewed the conflict as a continuation of the story it had already told. However, increased scrutiny from Western media and academia led to a reexamination of assumptions and attitudes towards the region. Instead of Russia adapting its strategic narrative for a Western audience, it fell back on the existing one, further alienating the audience. This chapter highlights the importance of strategic narrative in international conflicts and its complex relationship with audience perception. Journal: Defense & Security Analysis Pages: 281-295 Issue: 3 Volume: 39 Year: 2023 Month: 07 X-DOI: 10.1080/14751798.2023.2201018 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2201018 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:281-295 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2232188_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Richard Stojar Author-X-Name-First: Richard Author-X-Name-Last: Stojar Title: The Russian invasion and its failure in the first days Abstract: In February 2022, Russia launched a large-scale military operation to take full control of the Ukrainian state. The invasion achieved virtually none of Russia's originally stated goals and instead of demonstrating Russian military power and effectiveness, it showed the exact opposite. Ambitious goals that were supposed to be achieved within a few days, turned out to be completely unrealistic. The war has become a long-term conflict of high intensity, instead of a flash military operation. The author argues that the cause of the Russian failure was not only the erroneous intelligence evaluation of the adversary by the Russian intelligence services and numerous mistakes of Russian units at the tactical and operational level. Rather, failure has also been due the structural weaknesses and shortcomings of the Russian army as institution. These long-term shortcomings were identified during the previous combat deployment of Russian forces in local conflicts and have never been resolved. Journal: Defense & Security Analysis Pages: 296-311 Issue: 3 Volume: 39 Year: 2023 Month: 07 X-DOI: 10.1080/14751798.2023.2232188 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2232188 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:296-311 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2254079_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Maria Constantinescu Author-X-Name-First: Maria Author-X-Name-Last: Constantinescu Title: Using the concept of mission command in defence resources management – the case of Romania Abstract: Elements of mission command can be found in successful styles of leadership both in military and in business environments, as it is based on empowering subordinates or employees to make decisions, encouraging their confidence and creativity to solve problems/achieve objectives. The purpose of this paper is to explore the potential advantages and drawbacks of applying this concept to the field of defence resources management, by analysing the common areas between these approaches. The research hypothesis is that the concept of mission command can be approached as a management process aimed at achieving clearly identified objectives, similar to the processes of project management, programme management, or defence resource management in general. The paper uses qualitative research methods, based on the analysis of existing specialised literature regarding the concept of mission-based command, the concept of defence resource management, and on an exploratory research, based on unstructured interviews with specialists in the two fields. Journal: Defense & Security Analysis Pages: 481-501 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2254079 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2254079 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:481-501 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2240654_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Frank Daumann Author-X-Name-First: Frank Author-X-Name-Last: Daumann Title: The client’s struggle to control private military companies effectively Abstract: Private military companies (PMC) offer combat and training services and can have considerable advantages for the client on the one hand, but on the other hand it is hard for the client to exercise effective external governance. Using tools of New Institutional Economics, we analyse the relationship between the PMC and the client and show that effects like adverse selection, moral hazard and supply induced demand are detrimental to the client. We derive approaches from the theory to solve the identified problems. With the help of a comparative case study (Wagner Group in Syria and Gurkha Security Guards in Sierra Leone), the insights gained are tested and put into perspective. It turns out that there must be an effective military or economic threat potential in particular in order to achieve good behaviour on the part of the PMC. In this way, we expand the insights of successful monitoring private providers of military force from the client's point of view. Journal: Defense & Security Analysis Pages: 432-451 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2240654 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2240654 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:432-451 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2257485_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Bohuslav Pernica Author-X-Name-First: Bohuslav Author-X-Name-Last: Pernica Title: Military strategies of the new European allies. A comparative study. (Cass Military Studies) Journal: Defense & Security Analysis Pages: 565-567 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2257485 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2257485 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:565-567 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2257483_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Caroline Batka Author-X-Name-First: Caroline Author-X-Name-Last: Batka Title: What’s in a name? Confucian considerations for referring to U.S. military contractors Abstract: Stakeholders use a number of different terms to refer to the contractors supporting expeditionary military operations. Often, these terms are inconsistently-applied, stigmatising, and unclear. This analysis uses the U.S. Department of Defense (DoD) as a case study for exploring the efforts that the U.S. military has taken to improve contractor terminology. The study finds that DoD uses the terms contractor, contractor personnel, and contractor employee to refer to organisations, groups of employees, and individual employees providing outsourced expeditionary services. DoD also uses a number of more specific terms to refer to certain contractors and relationships. However, there are gaps and inconsistencies in DoD’s terminological scheme, and challenges remain in differentiating contractors from other actors in war and in reconciling terminology across the U.S. Government and the international community. By contextualising DoD contractor terminology within the framework of the Confucian Rectification of Names, this study offers insights regarding contractors’ normative roles. Journal: Defense & Security Analysis Pages: 452-480 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2257483 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2257483 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:452-480 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2244300_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Caroline Batka Author-X-Name-First: Caroline Author-X-Name-Last: Batka Title: Outsourcing national defense: why and how private contractors are providing public services Journal: Defense & Security Analysis Pages: 561-565 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2244300 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2244300 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:561-565 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2273632_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zsolt Lazar Author-X-Name-First: Zsolt Author-X-Name-Last: Lazar Title: In memoriam: Richard Bitzinger Scholar and Mentor Remembered Journal: Defense & Security Analysis Pages: 409-410 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2273632 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2273632 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:409-410 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2264070_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Michael Mayer Author-X-Name-First: Michael Author-X-Name-Last: Mayer Title: Trusting machine intelligence: artificial intelligence and human-autonomy teaming in military operations Abstract: Continuous advances in artificial intelligence has enabled higher levels of autonomy in military systems. As the role of machine-intelligence expands, effective co-operation between humans and autonomous systems will become an increasingly relevant aspect of future military operations. Successful human-autonomy teaming (HAT) requires establishing appropriate levels of trust in machine-intelligence, which can vary according to the context in which HAT occurs. The expansive body of literature on trust and automation, combined with newer contributions focused on autonomy in military systems, forms the basis of this study. Various aspects of trust within three general categories of machine intelligence applications are examined. These include data integration and analysis, autonomous systems in all domains, and decision-support applications. The issues related to appropriately calibrating trust levels varies within each category, as do the consequences of poorly aligned trust and potential mitigation measures. Journal: Defense & Security Analysis Pages: 521-538 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2264070 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2264070 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:521-538 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2270230_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zoltan Szenes Author-X-Name-First: Zoltan Author-X-Name-Last: Szenes Title: Reinforcing deterrence: assessing NATO’s 2022 Strategic Concept Abstract: At the June 29, 2022, NATO summit in Madrid the heads of state and government adopted a new strategic concept for the alliance. The eighth strategic concept is the official long-term vision of NATO, at the same time it is the second most important document after the North Atlantic Treaty. This document describes the security environment the alliance faces, reaffirms the purpose and principles of the organisation, as well as its core defence tasks for the coming decade. As a crucial NATO document, it has an impact on the security and defence policy of the alliance and its member states; and sooner or later its ideas, principles, and requirements described in the concept will be materialised in the form of different policies, priorities, and tasks. The article examines comprehensively NATO's 2022 Strategic Concept, compares it with the 2010 Strategic Concept and the NATO 2030 Report. Given that the new Concept was adopted in the wake of the Russian-Ukrainian war, the study primarily deals with the Alliance's new perception of deterrence and defence and its planned measures. The analysis concludes that the Strategic Concept represents a significant shift away from the previous one, although it is an evolutionary document, and it has brought NATO into a new era of great power competition. Journal: Defense & Security Analysis Pages: 539-560 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2270230 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2270230 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:539-560 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2255382_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Haim Yogev Author-X-Name-First: Haim Author-X-Name-Last: Yogev Author-Name: Ronen A. Cohen Author-X-Name-First: Ronen A. Author-X-Name-Last: Cohen Author-Name: Eyal Lewin Author-X-Name-First: Eyal Author-X-Name-Last: Lewin Title: The importance of war stratagem: the case study of the 1973 war Mount Hermon battles Abstract: This research empirically examines the common assumption in scholarly literature that a military stratagem leads to an advantage on battlefields. It focuses on three different forms of stratagem: (1) surprise, (2) deception, and (3) special tactics. We took the battles for the Mount Hermon outpost during the 1973 Arab-Israeli war as our case studies. Constructing an independent measures design, or a between-groups design, we treated the Golani Brigade (in a set of two battles), and the 317 Paratroopers Brigade (in another battle), as two separate groups of participants – one experiencing the use of stratagems and one avoiding this condition. Our analysis shows that stratagems prove to be highly effective; however, we also raise some reservations, calling for any generalisation to be taken with a grain of salt. This research can serve as a model for future examinations of other military campaigns throughout history. Journal: Defense & Security Analysis Pages: 502-520 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2255382 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2255382 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:502-520 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2245224_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Adam Shindler Author-X-Name-First: Adam Author-X-Name-Last: Shindler Title: Warfare under scrutiny: British public perspectives of soldiers, and tactical behaviours in operation HERRICK Abstract: The importance of civil society to the military is well documented in UK Defence and Army policy, doctrine, and concepts. Civilian and military analyses commonly focus on the policy dimensions of the relationship whereby British civil society is deemed important for the legitimacy of campaigns. This research paper draws together less-common references from across the literature about a more direct impact that societal perspectives can have on deployed land operations and extends them through new archival research. It uses the military’s experience in Helmand to propose a model of “societal operational influence.” In this model tactical behaviours across the conceptual, physical, and moral components of Task Force Helmand’s fighting power altered in response to the military’s interpretation of public opinion about soldiers, which arguably resulted in changes to its culture. Journal: Defense & Security Analysis Pages: 411-431 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2245224 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2245224 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:411-431 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2257484_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20 Author-Name: Zsolt Lazar Author-X-Name-First: Zsolt Author-X-Name-Last: Lazar Title: Subversion – the strategic weaponization of narratives Journal: Defense & Security Analysis Pages: 568-570 Issue: 4 Volume: 39 Year: 2023 Month: 10 X-DOI: 10.1080/14751798.2023.2257484 File-URL: http://hdl.handle.net/10.1080/14751798.2023.2257484 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:568-570 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2285139_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Thomas Bruneau Author-X-Name-First: Thomas Author-X-Name-Last: Bruneau Title: Outsourcing national defense: an impediment to the US strategy of great power competition Abstract: My goals in this paper are to elaborate further an approach to civil-military relations going beyond control to include effectiveness; and, to argue that outsourcing by the Department of Defense (DoD) results in opportunity costs making very difficult the implementation of the national security strategy of “great power competition.” The current acquisition authority for outsourcing impedes DoD accessing cutting-edge technology generated by “startups.” In an earlier era of strategic competition, the main US response was to create the National Aeronautics and Space Agency with a new acquisition authority – “other transaction authority” (OTA). In the National Defense Authorization Act of FY 2018 Congress stipulated that OTAs should be the preference for DoD in science and technology and prototyping, and education in OTAs be provided. This education has not been implemented. Consequently, a key element of the US great power competition strategy, which is the acquisition of new technology, goes wanting. Journal: Defense & Security Analysis Pages: 60-79 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2285139 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2285139 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:60-79 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2300889_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: William E. Lippert Author-X-Name-First: William E. Author-X-Name-Last: Lippert Title: How conventional arms control failures caused the Russo-Ukraine War Abstract: What role did conventional arms control (CAC) agreements failures play in Russia's decision to invade Ukraine? Using a process tracing and counterfactual mixed methodology analyzing Russia's invasion motivations, this article attempts to answer the question by assessing Russian strategic policies, proposals, and arms control agreements. These demonstrate that Russia, seeing its sense of “indivisible security” being violated, sought to adjust or establish new CAC agreements to address a growing conventional military imbalance between NATO and Russia. Having failed to establish a fixed and stable conventional military balance through CAC, and as Ukraine edged closer to NATO membership, Russia resorted to the use of force shortly after their December 2021 proposals were not accepted. The article concludes by suggesting that this case supports arms racing and arms-control related causes of war theories, and that dissonant perceptions of the actual or ideal military balance can lead to conflict. Journal: Defense & Security Analysis Pages: 138-160 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2300889 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2300889 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:138-160 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2308361_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Scott Woodruff Lyons Author-X-Name-First: Scott Woodruff Author-X-Name-Last: Lyons Title: Darfur peacekeepers: the African Union peacekeeping mission in Darfur (AMIS) from the perspective of a Hungarian military advisor Journal: Defense & Security Analysis Pages: 165-166 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2308361 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2308361 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:165-166 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2312676_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Tadeusz Pieciukiewicz Author-X-Name-First: Tadeusz Author-X-Name-Last: Pieciukiewicz Author-Name: Anna Brzozowska Author-X-Name-First: Anna Author-X-Name-Last: Brzozowska Author-Name: Jędrzej Kowalczewski Author-X-Name-First: Jędrzej Author-X-Name-Last: Kowalczewski Author-Name: Arkadiusz Kurkiewicz Author-X-Name-First: Arkadiusz Author-X-Name-Last: Kurkiewicz Author-Name: Tomasz Miedziński Author-X-Name-First: Tomasz Author-X-Name-Last: Miedziński Author-Name: Dariusz Płóciennik Author-X-Name-First: Dariusz Author-X-Name-Last: Płóciennik Author-Name: Krystian Zięć Author-X-Name-First: Krystian Author-X-Name-Last: Zięć Author-Name: Rafał Lipka Author-X-Name-First: Rafał Author-X-Name-Last: Lipka Title: The Polish Air Force in transition: lessons from the F-16 programme Abstract: The purpose of this article is to analyse the process of equipping the Polish Air Force with the F-16 aircraft. The Polish F-16 programme serves as an essential source of knowledge for avoiding errors that may occur when introducing new weapon systems in Poland, or other post-communist countries that are still reliant on Soviet-designed military technologies. Due to various external and internal factors, not all elements of the F-16 programme are suitable for replication in the acquisition of new weapon systems; however, some solutions have been applied in Poland’s F-35 and WISŁA air defence programmes. The authors examined selected aspects of the F-16 programme, including its historical background, legal and organisational framework, personnel training, infrastructure, logistics, and the economic implications of the offset agreement. Journal: Defense & Security Analysis Pages: 20-40 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2312676 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2312676 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:20-40 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2293341_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: John P. Cann Author-X-Name-First: John P. Author-X-Name-Last: Cann Title: The Bushmen of Angola Abstract: This is the story about the particular indigenous force of Bushmen known as flechas or “arrows” that was established by the Portuguese in Eastern Angola in 1966 in response to an intelligence gathering need there during its campaign to retain its African possessions. The mobilisation of this indigenous people with a natural instinct to live invisibly yielded striking results. Its relentless pursuit of the enemy on the eastern front helped significantly to defeat him militarily, and indeed, the flechas at one stage accounted for 60 percent of all enemy kills. While this offensive was the result of a unity of effort by all elements of the Portuguese Armed Forces, the flechas played a successful and unique role, so much so that its duplication in other theatres and other wars was attempted, but never with quite the success of Angola. Journal: Defense & Security Analysis Pages: 41-59 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2293341 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2293341 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:41-59 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2288717_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Ivor Wiltenburg Author-X-Name-First: Ivor Author-X-Name-Last: Wiltenburg Author-Name: Vibeke Gootzen Author-X-Name-First: Vibeke Author-X-Name-Last: Gootzen Title: Military adaptation to combat mentoring: Belgium’s Operational Mentoring and Liaison Team experience Abstract: This article investigates the Belgian Operational Mentoring and Liaison mission in Kunduz between 2009 and 2013 by applying military adaptation theory to the empirical data retrieved from interviews and archival research. The lessons learned by the Belgian OMLTs in Afghanistan, and its adaptation and emulation processes provide a useful template for upcoming Security Force Assistance operations. In addition, Belgian formal and informal procedures to disseminate lessons learned across the armed forces provide valuable insights for future operations. Journal: Defense & Security Analysis Pages: 1-19 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2288717 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2288717 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:1-19 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2295102_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Alies Jansen Author-X-Name-First: Alies Author-X-Name-Last: Jansen Title: Understanding security force assistance: a matter of control? Abstract: This article seeks to explain the historically poor performance of the US Department of Defence’s security force assistance (SFA) to state and non-state armed forces to counter terrorism. The article argues that the dominant understanding of SFA as a one-way, top-down relation between a principal (sponsor) and an agent (recipient) has neglected the socio-political dynamics and effects of the intervention. Studying the socio-political processes reveals the messy reality on the ground and how difficult, if not impossible, it is to fully control the operation and the participating recipients. Rather than controlling recipients, this article argues that SFA should be concerned with negotiating the multiple and diverse interests, needs, and priorities. This claim will be substantiated with an in-depth, qualitative case study of Operation Inherent Resolve in Iraq between 2014 and 2018. Journal: Defense & Security Analysis Pages: 80-96 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2295102 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2295102 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:80-96 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2322805_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Joseph A. Ledford Author-X-Name-First: Joseph A. Author-X-Name-Last: Ledford Title: Limited force and the fight for the just war tradition Journal: Defense & Security Analysis Pages: 162-164 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2322805 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2322805 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:162-164 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2302699_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Jeremy Julian Sarkin Author-X-Name-First: Jeremy Julian Author-X-Name-Last: Sarkin Author-Name: Saba Sotoudehfar Author-X-Name-First: Saba Author-X-Name-Last: Sotoudehfar Title: Artificial intelligence and arms races in the Middle East: the evolution of technology and its implications for regional and international security Abstract: Artificial Intelligence is now deeply connected to weapons systems. It therefore plays a critical role in matters concerning international peace and security. AI has also seen military competition take on a new dynamic. However, few studies have addressed the distinct dynamics of AI and its effects on Middle Eastern arms races. Given that these issues have the potential to fuel regional conflicts and jeopardise international security, it is contended that it is crucial to investigate their impact in both the medium and long-term. This article argues that the Middle East has had several arms races in past, which need to be understood to learn the lessons about what might happen in the future. It is also important to understand how a variety of international actors have negatively affected peace and stability in the region with their arms sales. The research argues that at present, there is a lack of understanding about the implications of AI and its economic, legal, security, and political consequences. The article makes a variety of recommendations on the implications of AI, including that states in the region should be coordinating, planning, and developing policy with respect to AI and arms matters. Journal: Defense & Security Analysis Pages: 97-119 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2302699 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2302699 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:97-119 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2322804_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Mark Bailey Author-X-Name-First: Mark Author-X-Name-Last: Bailey Title: The new age of naval power in the Indo-Pacific: strategy, order and regional security Journal: Defense & Security Analysis Pages: 161-162 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2322804 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2322804 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:161-162 Template-Type: ReDIF-Article 1.0 # input file: CDAN_A_2304424_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a Author-Name: Hanna Samir Kassab Author-X-Name-First: Hanna Samir Author-X-Name-Last: Kassab Title: Geographically small but not weak: comparing the national security policies of Israel and Singapore Abstract: This paper offers a comparative study of Israel and Singapore to understand the national security policies of geographically smaller states. These states are militarily powerful, geographically small, and in close proximity with much larger potential adversaries. These states are also different in terms of their relationship with that much larger state as well as their independence narratives. Israel remains in a state of conflict with Iran through Syria and through terrorist groups like Hamas and Hezbollah. Israel was created through war. On the other hand, Singapore has a complicated relationship with Malaysia based on suspicious cooperation. Malaysia also allowed Singapore independence given differences in the voting behavior of Singaporeans. Both states share a military strategy of preemption or prevention. Since these states are geographically small, striking first may offer Israel and Singapore a better chance at avoiding annihilation. Journal: Defense & Security Analysis Pages: 120-137 Issue: 1 Volume: 40 Year: 2024 Month: 01 X-DOI: 10.1080/14751798.2024.2304424 File-URL: http://hdl.handle.net/10.1080/14751798.2024.2304424 File-Format: text/html File-Restriction: Access to full text is restricted to subscribers. Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:120-137