Template-Type: ReDIF-Article 1.0
Author-Name: Robert C. Gray
Author-X-Name-First: Robert C.
Author-X-Name-Last: Gray
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-2
Issue: 1
Volume: 18
Year: 2002
Month: 3
X-DOI: 10.1080/07430170120113695
File-URL: http://hdl.handle.net/10.1080/07430170120113695
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:1-2
Template-Type: ReDIF-Article 1.0
Author-Name: Stacy Bergstrom Haldi
Author-X-Name-First: Stacy Bergstrom
Author-X-Name-Last: Haldi
Title: The Influence of Logistics on War Widening
Journal: Defense & Security Analysis
Pages: 3-14
Issue: 1
Volume: 18
Year: 2002
Month: 3
X-DOI: 10.1080/07430170120113703
File-URL: http://hdl.handle.net/10.1080/07430170120113703
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:3-14
Template-Type: ReDIF-Article 1.0
Author-Name: Avi Kober
Author-X-Name-First: Avi
Author-X-Name-Last: Kober
Title: Low-intensity Conflicts: Why the Gap Between Theory and Practise?
Journal: Defense & Security Analysis
Pages: 15-38
Issue: 1
Volume: 18
Year: 2002
Month: 3
X-DOI: 10.1080/07430170120113712
File-URL: http://hdl.handle.net/10.1080/07430170120113712
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:15-38
Template-Type: ReDIF-Article 1.0
Author-Name: Jonathan O. Gackle
Author-X-Name-First: Jonathan O.
Author-X-Name-Last: Gackle
Title: US-Australian Defense Cooperation: A Model for Twenty-first Century Security Arrangements
Journal: Defense & Security Analysis
Pages: 39-49
Issue: 1
Volume: 18
Year: 2002
Month: 3
X-DOI: 10.1080/07430170120113721
File-URL: http://hdl.handle.net/10.1080/07430170120113721
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:39-49
Template-Type: ReDIF-Article 1.0
Author-Name: David Detomasi
Author-X-Name-First: David
Author-X-Name-Last: Detomasi
Title: The New Public Management and Defense Departments: The Case of Canada
Journal: Defense & Security Analysis
Pages: 51-73
Issue: 1
Volume: 18
Year: 2002
Month: 3
X-DOI: 10.1080/07430170120113730
File-URL: http://hdl.handle.net/10.1080/07430170120113730
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:51-73
Template-Type: ReDIF-Article 1.0
Author-Name: Glen M. Segell
Author-X-Name-First: Glen M.
Author-X-Name-Last: Segell
Title: European Security and the Russian Duma
Journal: Defense & Security Analysis
Pages: 75-84
Issue: 1
Volume: 18
Year: 2002
Month: 3
X-DOI: 10.1080/07430170120113749
File-URL: http://hdl.handle.net/10.1080/07430170120113749
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:75-84
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas Schindlmayr
Author-X-Name-First: Thomas
Author-X-Name-Last: Schindlmayr
Title: Future Personnel: Where Will They Come From?
Journal: Defense & Security Analysis
Pages: 85-88
Issue: 1
Volume: 18
Year: 2002
Month: 3
X-DOI: 10.1080/07430170120113758
File-URL: http://hdl.handle.net/10.1080/07430170120113758
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:85-88
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Agüera
Author-X-Name-First: Martin
Author-X-Name-Last: Agüera
Title: What Future for Transatlantic Security Relations After 11 September?
Journal: Defense & Security Analysis
Pages: 89-91
Issue: 1
Volume: 18
Year: 2002
Month: 3
X-DOI: 10.1080/147517902753420229
File-URL: http://hdl.handle.net/10.1080/147517902753420229
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:89-91
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Landmark in Defense Literature
Journal: Defense & Security Analysis
Pages: 93-94
Issue: 1
Volume: 18
Year: 2002
Month: 3
X-DOI: 10.1080/07430170120113767
File-URL: http://hdl.handle.net/10.1080/07430170120113767
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:1:p:93-94
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Robert Gray
Author-X-Name-First: Robert
Author-X-Name-Last: Gray
Title: Editorial
Journal: Defense & Security Analysis
Pages: 105-106
Issue: 2
Volume: 18
Year: 2002
Month: 6
X-DOI: 10.1080/14751790220132529
File-URL: http://hdl.handle.net/10.1080/14751790220132529
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:105-106
Template-Type: ReDIF-Article 1.0
Author-Name: Derek Reveron
Author-X-Name-First: Derek
Author-X-Name-Last: Reveron
Title: Coalition warfare: The commander's role
Journal: Defense & Security Analysis
Pages: 107-121
Issue: 2
Volume: 18
Year: 2002
Month: 6
X-DOI: 10.1080/14751790220132538
File-URL: http://hdl.handle.net/10.1080/14751790220132538
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:107-121
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew James
Author-X-Name-First: Andrew
Author-X-Name-Last: James
Title: Comparing European responses to defense industry globalization
Journal: Defense & Security Analysis
Pages: 123-143
Issue: 2
Volume: 18
Year: 2002
Month: 6
X-DOI: 10.1080/14751790220132547
File-URL: http://hdl.handle.net/10.1080/14751790220132547
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:123-143
Template-Type: ReDIF-Article 1.0
Author-Name: Chiang Ren
Author-X-Name-First: Chiang
Author-X-Name-Last: Ren
Title: The dynamic limitations of the US defense acquisition process
Journal: Defense & Security Analysis
Pages: 145-155
Issue: 2
Volume: 18
Year: 2002
Month: 6
X-DOI: 10.1080/14751790220132556
File-URL: http://hdl.handle.net/10.1080/14751790220132556
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:145-155
Template-Type: ReDIF-Article 1.0
Author-Name: Daniel Nelson
Author-X-Name-First: Daniel
Author-X-Name-Last: Nelson
Title: Definition, diagnosis, therapy: A civil-military critique
Journal: Defense & Security Analysis
Pages: 157-170
Issue: 2
Volume: 18
Year: 2002
Month: 6
X-DOI: 10.1080/14751790220132565
File-URL: http://hdl.handle.net/10.1080/14751790220132565
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:157-170
Template-Type: ReDIF-Article 1.0
Author-Name: Asifa Hussain
Author-X-Name-First: Asifa
Author-X-Name-Last: Hussain
Author-Name: Mohammed Ishaq
Author-X-Name-First: Mohammed
Author-X-Name-Last: Ishaq
Title: British Sikhs' identification with the armed forces
Journal: Defense & Security Analysis
Pages: 171-183
Issue: 2
Volume: 18
Year: 2002
Month: 6
X-DOI: 10.1080/14751790220132574
File-URL: http://hdl.handle.net/10.1080/14751790220132574
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:171-183
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: On the psychology of military incompetence
Journal: Defense & Security Analysis
Pages: 185-187
Issue: 2
Volume: 18
Year: 2002
Month: 6
X-DOI: 10.1080/14751790220132583
File-URL: http://hdl.handle.net/10.1080/14751790220132583
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:185-187
Template-Type: ReDIF-Article 1.0
Author-Name: John Morrison
Author-X-Name-First: John
Author-X-Name-Last: Morrison
Title: American-British-Canadian intelligence relations 1939--2000
Journal: Defense & Security Analysis
Pages: 189-195
Issue: 2
Volume: 18
Year: 2002
Month: 6
X-DOI: 10.1080/14751790220132592
File-URL: http://hdl.handle.net/10.1080/14751790220132592
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:2:p:189-195
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 199-200
Issue: 3
Volume: 18
Year: 2002
Month: 9
X-DOI: 10.1080/14751790220002307
File-URL: http://hdl.handle.net/10.1080/14751790220002307
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:199-200
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen Cimbala
Author-X-Name-First: Stephen
Author-X-Name-Last: Cimbala
Title: Deterrence and friction: implications for missile defense
Journal: Defense & Security Analysis
Pages: 201-220
Issue: 3
Volume: 18
Year: 2002
Month: 9
X-DOI: 10.1080/14751790220002316
File-URL: http://hdl.handle.net/10.1080/14751790220002316
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:201-220
Template-Type: ReDIF-Article 1.0
Author-Name: Raymond Franck
Author-X-Name-First: Raymond
Author-X-Name-Last: Franck
Title: Expanding the framework for analyzing National Missile Defenses: a proposal for discussion
Journal: Defense & Security Analysis
Pages: 221-226
Issue: 3
Volume: 18
Year: 2002
Month: 9
X-DOI: 10.1080/14751790220002325
File-URL: http://hdl.handle.net/10.1080/14751790220002325
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:221-226
Template-Type: ReDIF-Article 1.0
Author-Name: Raymond Franck
Author-X-Name-First: Raymond
Author-X-Name-Last: Franck
Author-Name: Francois Melese
Author-X-Name-First: Francois
Author-X-Name-Last: Melese
Title: The access deterrence scenario: A new approach to assessing national missile defenses
Journal: Defense & Security Analysis
Pages: 227-238
Issue: 3
Volume: 18
Year: 2002
Month: 9
X-DOI: 10.1080/14751790220002334
File-URL: http://hdl.handle.net/10.1080/14751790220002334
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:227-238
Template-Type: ReDIF-Article 1.0
Author-Name: Lisbeth Gronlund
Author-X-Name-First: Lisbeth
Author-X-Name-Last: Gronlund
Author-Name: David Wright
Author-X-Name-First: David
Author-X-Name-Last: Wright
Author-Name: Stephen Young
Author-X-Name-First: Stephen
Author-X-Name-Last: Young
Title: An assessment of the intercept test program of the ground-based midcourse national missile defense system
Journal: Defense & Security Analysis
Pages: 239-260
Issue: 3
Volume: 18
Year: 2002
Month: 9
X-DOI: 10.1080/14751790220002343
File-URL: http://hdl.handle.net/10.1080/14751790220002343
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:239-260
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Ballistic missile defenses and the new triad
Journal: Defense & Security Analysis
Pages: 261-270
Issue: 3
Volume: 18
Year: 2002
Month: 9
X-DOI: 10.1080/14751790220002352
File-URL: http://hdl.handle.net/10.1080/14751790220002352
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:261-270
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Simon
Author-X-Name-First: Michael
Author-X-Name-Last: Simon
Title: Rogue state response to BMD: The regional context
Journal: Defense & Security Analysis
Pages: 271-292
Issue: 3
Volume: 18
Year: 2002
Month: 9
X-DOI: 10.1080/14751790220002361
File-URL: http://hdl.handle.net/10.1080/14751790220002361
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:271-292
Template-Type: ReDIF-Article 1.0
Author-Name: Clifford Singer
Author-X-Name-First: Clifford
Author-X-Name-Last: Singer
Title: How can national missile defense best enhance security?
Journal: Defense & Security Analysis
Pages: 293-302
Issue: 3
Volume: 18
Year: 2002
Month: 9
X-DOI: 10.1080/14751790220002370
File-URL: http://hdl.handle.net/10.1080/14751790220002370
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:3:p:293-302
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew Dorman
Author-X-Name-First: Andrew
Author-X-Name-Last: Dorman
Author-Name: Thomas-Durell Young
Author-X-Name-First: Thomas-Durell
Author-X-Name-Last: Young
Title: Editorial
Journal: Defense & Security Analysis
Pages: 303-305
Issue: 4
Volume: 18
Year: 2002
Month: 12
X-DOI: 10.1080/1475179022000024439
File-URL: http://hdl.handle.net/10.1080/1475179022000024439
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:303-305
Template-Type: ReDIF-Article 1.0
Author-Name: Eric Grove
Author-X-Name-First: Eric
Author-X-Name-Last: Grove
Title: The Falklands War and British defense policy
Journal: Defense & Security Analysis
Pages: 307-317
Issue: 4
Volume: 18
Year: 2002
Month: 12
X-DOI: 10.1080/1475179022000024448
File-URL: http://hdl.handle.net/10.1080/1475179022000024448
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:307-317
Template-Type: ReDIF-Article 1.0
Author-Name: Alastair Finlan
Author-X-Name-First: Alastair
Author-X-Name-Last: Finlan
Title: British Special Forces and the Falklands conflict: Twenty years on
Journal: Defense & Security Analysis
Pages: 319-332
Issue: 4
Volume: 18
Year: 2002
Month: 12
X-DOI: 10.1080/1475179022000024457
File-URL: http://hdl.handle.net/10.1080/1475179022000024457
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:319-332
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen Prince
Author-X-Name-First: Stephen
Author-X-Name-Last: Prince
Title: British command and control in the Falklands Campaign
Journal: Defense & Security Analysis
Pages: 333-349
Issue: 4
Volume: 18
Year: 2002
Month: 12
X-DOI: 10.1080/1475179022000024466
File-URL: http://hdl.handle.net/10.1080/1475179022000024466
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:333-349
Template-Type: ReDIF-Article 1.0
Author-Name: John Arquilla
Author-X-Name-First: John
Author-X-Name-Last: Arquilla
Author-Name: María Moyano Rasmussen
Author-X-Name-First: María Moyano
Author-X-Name-Last: Rasmussen
Title: Twenty years after: Argentina in the wake of the South Atlantic War
Journal: Defense & Security Analysis
Pages: 351-362
Issue: 4
Volume: 18
Year: 2002
Month: 12
X-DOI: 10.1080/1475179022000024475
File-URL: http://hdl.handle.net/10.1080/1475179022000024475
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:351-362
Template-Type: ReDIF-Article 1.0
Author-Name: Ian Speller
Author-X-Name-First: Ian
Author-X-Name-Last: Speller
Title: Delayed reaction: UK maritime expeditionary capabilities and the lessons of the Falklands conflict
Journal: Defense & Security Analysis
Pages: 363-378
Issue: 4
Volume: 18
Year: 2002
Month: 12
X-DOI: 10.1080/1475179022000024484
File-URL: http://hdl.handle.net/10.1080/1475179022000024484
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:363-378
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: A message from the Falklands: The life and gallant death of David Tinker Lieutenant RN
Journal: Defense & Security Analysis
Pages: 379-381
Issue: 4
Volume: 18
Year: 2002
Month: 12
X-DOI: 10.1080/1475179022000024493
File-URL: http://hdl.handle.net/10.1080/1475179022000024493
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:379-381
Template-Type: ReDIF-Article 1.0
Author-Name: Roderick Bailey
Author-X-Name-First: Roderick
Author-X-Name-Last: Bailey
Title: The hidden hand: Britain, America and Gold War secret itelligence
Journal: Defense & Security Analysis
Pages: 383-388
Issue: 4
Volume: 18
Year: 2002
Month: 12
X-DOI: 10.1080/1475179022000024501
File-URL: http://hdl.handle.net/10.1080/1475179022000024501
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:18:y:2002:i:4:p:383-388
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Robert Gray
Author-X-Name-First: Robert
Author-X-Name-Last: Gray
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-3
Issue: 1
Volume: 19
Year: 2003
Month: 3
X-DOI: 10.1080/1475179032000057982
File-URL: http://hdl.handle.net/10.1080/1475179032000057982
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:1-3
Template-Type: ReDIF-Article 1.0
Author-Name: Gawdat Bahgat
Author-X-Name-First: Gawdat
Author-X-Name-Last: Bahgat
Title: The United States, Iraq and weapons of mass destruction
Journal: Defense & Security Analysis
Pages: 5-14
Issue: 1
Volume: 19
Year: 2003
Month: 3
X-DOI: 10.1080/1475179032000057991
File-URL: http://hdl.handle.net/10.1080/1475179032000057991
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:5-14
Template-Type: ReDIF-Article 1.0
Author-Name: Adam Siegel
Author-X-Name-First: Adam
Author-X-Name-Last: Siegel
Title: Missile defense at the waterfront: Implications of the SCUD missile attack and Al Jubayl Port, 15--16 February 1991
Journal: Defense & Security Analysis
Pages: 15-33
Issue: 1
Volume: 19
Year: 2003
Month: 3
X-DOI: 10.1080/1475179032000058008
File-URL: http://hdl.handle.net/10.1080/1475179032000058008
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:15-33
Template-Type: ReDIF-Article 1.0
Author-Name: James Nathan
Author-X-Name-First: James
Author-X-Name-Last: Nathan
Author-Name: Charles Tien
Author-X-Name-First: Charles
Author-X-Name-Last: Tien
Title: The “China Threat”, National Missile Defense and American public opinion
Journal: Defense & Security Analysis
Pages: 35-54
Issue: 1
Volume: 19
Year: 2003
Month: 3
X-DOI: 10.1080/1475179032000058017
File-URL: http://hdl.handle.net/10.1080/1475179032000058017
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:35-54
Template-Type: ReDIF-Article 1.0
Author-Name: Sten Rynning
Author-X-Name-First: Sten
Author-X-Name-Last: Rynning
Title: Potent or paralyzing? nuclear weapons in contemporary French military strategyThe author would like to thank Peter Viggo Jakobsen and Jens Claus Hansen for their helpful comments as well as the University of Southern Denmark and the Copenhagen Peace Research Institute (COPRI) for generous research support.
Journal: Defense & Security Analysis
Pages: 55-68
Issue: 1
Volume: 19
Year: 2003
Month: 3
X-DOI: 10.1080/1475179032000058026
File-URL: http://hdl.handle.net/10.1080/1475179032000058026
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:55-68
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: “Dirty Bombs”: An analysis of radiological weapons
Journal: Defense & Security Analysis
Pages: 69-72
Issue: 1
Volume: 19
Year: 2003
Month: 3
X-DOI: 10.1080/1475179032000058035
File-URL: http://hdl.handle.net/10.1080/1475179032000058035
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:69-72
Template-Type: ReDIF-Article 1.0
Author-Name: J. J. Mulhern
Author-X-Name-First: J. J.
Author-X-Name-Last: Mulhern
Title: The next US defense investment cycle: Will experience improve it?
Journal: Defense & Security Analysis
Pages: 73-88
Issue: 1
Volume: 19
Year: 2003
Month: 3
X-DOI: 10.1080/1475179032000058044
File-URL: http://hdl.handle.net/10.1080/1475179032000058044
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:73-88
Template-Type: ReDIF-Article 1.0
Author-Name: Stanly Michalak
Author-X-Name-First: Stanly
Author-X-Name-Last: Michalak
Title: Terrorism
Journal: Defense & Security Analysis
Pages: 89-90
Issue: 1
Volume: 19
Year: 2003
Month: 3
X-DOI: 10.1080/1475179032000058053
File-URL: http://hdl.handle.net/10.1080/1475179032000058053
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:1:p:89-90
Template-Type: ReDIF-Article 1.0
Author-Name: Robert Gray
Author-X-Name-First: Robert
Author-X-Name-Last: Gray
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 97-99
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083325
File-URL: http://hdl.handle.net/10.1080/1475179032000083325
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:97-99
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen Wrage
Author-X-Name-First: Stephen
Author-X-Name-Last: Wrage
Title: Prospects for precision air power
Journal: Defense & Security Analysis
Pages: 101-109
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083334
File-URL: http://hdl.handle.net/10.1080/1475179032000083334
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:101-109
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas-Durell Young
Author-X-Name-First: Thomas-Durell
Author-X-Name-Last: Young
Title: The revolution in military affairs and coalition operations: Problem areas and solutions
Journal: Defense & Security Analysis
Pages: 111-130
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083343
File-URL: http://hdl.handle.net/10.1080/1475179032000083343
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:111-130
Template-Type: ReDIF-Article 1.0
Author-Name: Bruce Newsome
Author-X-Name-First: Bruce
Author-X-Name-Last: Newsome
Title: Don't get your mass kicked: A management theory of military capability
Journal: Defense & Security Analysis
Pages: 131-148
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083352
File-URL: http://hdl.handle.net/10.1080/1475179032000083352
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:131-148
Template-Type: ReDIF-Article 1.0
Author-Name: Tara Lavallee
Author-X-Name-First: Tara
Author-X-Name-Last: Lavallee
Title: Globalizing the iron triangle: Policy-making within the US defense industrial sector
Journal: Defense & Security Analysis
Pages: 149-164
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083361
File-URL: http://hdl.handle.net/10.1080/1475179032000083361
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:149-164
Template-Type: ReDIF-Article 1.0
Author-Name: Joelien Pretorius
Author-X-Name-First: Joelien
Author-X-Name-Last: Pretorius
Title: Ethics and international security in the information age
Journal: Defense & Security Analysis
Pages: 165-175
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083370
File-URL: http://hdl.handle.net/10.1080/1475179032000083370
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:165-175
Template-Type: ReDIF-Article 1.0
Author-Name: Geoff Shaw
Author-X-Name-First: Geoff
Author-X-Name-Last: Shaw
Author-Name: David Spencer
Author-X-Name-First: David
Author-X-Name-Last: Spencer
Title: Fighting in Afghanistan: Lessons from the Soviet intervention, 1979--89
Journal: Defense & Security Analysis
Pages: 177-188
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083389
File-URL: http://hdl.handle.net/10.1080/1475179032000083389
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:177-188
Template-Type: ReDIF-Article 1.0
Author-Name: Simon King
Author-X-Name-First: Simon
Author-X-Name-Last: King
Title: Strategic corporal or tactical colonel? Anchoring the right variable
Journal: Defense & Security Analysis
Pages: 189-190
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083398
File-URL: http://hdl.handle.net/10.1080/1475179032000083398
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:189-190
Template-Type: ReDIF-Article 1.0
Author-Name: Steven Main
Author-X-Name-First: Steven
Author-X-Name-Last: Main
Title: The Soviet high command, 1918--1941. A military-political history
Journal: Defense & Security Analysis
Pages: 191-192
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083406
File-URL: http://hdl.handle.net/10.1080/1475179032000083406
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:191-192
Template-Type: ReDIF-Article 1.0
Author-Name: Tim Benbow
Author-X-Name-First: Tim
Author-X-Name-Last: Benbow
Title: Masters of war: Classical strategic thought-third, revised and expanded edition
Journal: Defense & Security Analysis
Pages: 193-196
Issue: 2
Volume: 19
Year: 2003
Month: 6
X-DOI: 10.1080/1475179032000083415
File-URL: http://hdl.handle.net/10.1080/1475179032000083415
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:2:p:193-196
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 199-202
Issue: 3
Volume: 19
Year: 2003
Month: 9
X-DOI: 10.1080/1475179032000118786
File-URL: http://hdl.handle.net/10.1080/1475179032000118786
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:199-202
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Fitzsimmons
Author-X-Name-First: Michael
Author-X-Name-Last: Fitzsimmons
Title: The importance of being special: Planning for the future of US special operations forces
Journal: Defense & Security Analysis
Pages: 203-218
Issue: 3
Volume: 19
Year: 2003
Month: 9
X-DOI: 10.1080/1475179032000118795
File-URL: http://hdl.handle.net/10.1080/1475179032000118795
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:203-218
Template-Type: ReDIF-Article 1.0
Author-Name: Christopher Flaherty
Author-X-Name-First: Christopher
Author-X-Name-Last: Flaherty
Title: The relevance of the US transformation paradigm for the Australian defense forces
Journal: Defense & Security Analysis
Pages: 219-240
Issue: 3
Volume: 19
Year: 2003
Month: 9
X-DOI: 10.1080/1475179032000118803
File-URL: http://hdl.handle.net/10.1080/1475179032000118803
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:219-240
Template-Type: ReDIF-Article 1.0
Author-Name: William Charlesworth
Author-X-Name-First: William
Author-X-Name-Last: Charlesworth
Title: Profiling terrorists: A taxonomy of evolutionary, developmental and situational causes of a terrorist actThanks go to Michael McGuire, MD, Neuropsychiatric Dept., UCLA, for commenting on the first draft of this paper and to Thomas Bouchard, PhD., James Butcher, PhD., and David Lykken, PhD., Dept of Psychology, University of Minnesota, for relevant reading material. Also, thanks to Jennifer Molina, Institute of Child Development, University of Minnesota, for helping in the preparation of this manuscript for publication.
Journal: Defense & Security Analysis
Pages: 241-264
Issue: 3
Volume: 19
Year: 2003
Month: 9
X-DOI: 10.1080/1475179032000118812
File-URL: http://hdl.handle.net/10.1080/1475179032000118812
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:241-264
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew Bouldin
Author-X-Name-First: Matthew
Author-X-Name-Last: Bouldin
Title: Keeper of the peace: Canada and security transition operations
Journal: Defense & Security Analysis
Pages: 265-276
Issue: 3
Volume: 19
Year: 2003
Month: 9
X-DOI: 10.1080/1475179032000118821
File-URL: http://hdl.handle.net/10.1080/1475179032000118821
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:265-276
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen Wrage
Author-X-Name-First: Stephen
Author-X-Name-Last: Wrage
Author-Name: Simon Baynham
Author-X-Name-First: Simon
Author-X-Name-Last: Baynham
Author-Name: Greg Mills
Author-X-Name-First: Greg
Author-X-Name-Last: Mills
Title: Profressional Notes
Journal: Defense & Security Analysis
Pages: 277-291
Issue: 3
Volume: 19
Year: 2003
Month: 9
X-DOI: 10.1080/1475179032000118830
File-URL: http://hdl.handle.net/10.1080/1475179032000118830
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:277-291
Template-Type: ReDIF-Article 1.0
Author-Name: James Hentz
Author-X-Name-First: James
Author-X-Name-Last: Hentz
Title: The paradox of instability and stability: United States “Primacy”, China, and the National Missile Defense (NMD) debate
Journal: Defense & Security Analysis
Pages: 293-299
Issue: 3
Volume: 19
Year: 2003
Month: 9
X-DOI: 10.1080/1475179032000118849
File-URL: http://hdl.handle.net/10.1080/1475179032000118849
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:293-299
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: The essentials of military knowledge
Journal: Defense & Security Analysis
Pages: 301-304
Issue: 3
Volume: 19
Year: 2003
Month: 9
X-DOI: 10.1080/1475179032000118867
File-URL: http://hdl.handle.net/10.1080/1475179032000118867
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:3:p:301-304
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 307-308
Issue: 4
Volume: 19
Year: 2003
Month: 12
X-DOI: 10.1080/1475179032000149386
File-URL: http://hdl.handle.net/10.1080/1475179032000149386
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:307-308
Template-Type: ReDIF-Article 1.0
Author-Name: Li Bin
Author-X-Name-First: Li
Author-X-Name-Last: Bin
Title: Absolute gains, relative gains, and US security policy on China This paper is translated from a Chinese version published at World Economics and International Politics, 11, 2002, pp. 17--21.
Journal: Defense & Security Analysis
Pages: 309-317
Issue: 4
Volume: 19
Year: 2003
Month: 12
X-DOI: 10.1080/1475179032000149395
File-URL: http://hdl.handle.net/10.1080/1475179032000149395
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:309-317
Template-Type: ReDIF-Article 1.0
Author-Name: Shen Dingli
Author-X-Name-First: Shen
Author-X-Name-Last: Dingli
Title: China's evaluation of the adjustment to US security policy since September 11, 2001
Journal: Defense & Security Analysis
Pages: 319-326
Issue: 4
Volume: 19
Year: 2003
Month: 12
X-DOI: 10.1080/1475179032000149403
File-URL: http://hdl.handle.net/10.1080/1475179032000149403
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:319-326
Template-Type: ReDIF-Article 1.0
Author-Name: Raymond Franck
Author-X-Name-First: Raymond
Author-X-Name-Last: Franck
Author-Name: Francois Melese
Author-X-Name-First: Francois
Author-X-Name-Last: Melese
Title: A game theory view of military conflict in the Taiwan strait
Journal: Defense & Security Analysis
Pages: 327-348
Issue: 4
Volume: 19
Year: 2003
Month: 12
X-DOI: 10.1080/1475179032000149412
File-URL: http://hdl.handle.net/10.1080/1475179032000149412
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:327-348
Template-Type: ReDIF-Article 1.0
Author-Name: Eric Nathaniel Heller
Author-X-Name-First: Eric
Author-X-Name-Last: Nathaniel Heller
Title: The prospect for power projections of the People's Republic of China
Journal: Defense & Security Analysis
Pages: 349-367
Issue: 4
Volume: 19
Year: 2003
Month: 12
X-DOI: 10.1080/1475179032000149421
File-URL: http://hdl.handle.net/10.1080/1475179032000149421
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:349-367
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: US ballistic missile defense and China
Journal: Defense & Security Analysis
Pages: 369-375
Issue: 4
Volume: 19
Year: 2003
Month: 12
X-DOI: 10.1080/1475179032000149430
File-URL: http://hdl.handle.net/10.1080/1475179032000149430
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:369-375
Template-Type: ReDIF-Article 1.0
Author-Name: T. S. Gopi Rethinaraj
Author-X-Name-First: T. S.
Author-X-Name-Last: Gopi Rethinaraj
Title: China's energy and regional security perspectives
Journal: Defense & Security Analysis
Pages: 377-388
Issue: 4
Volume: 19
Year: 2003
Month: 12
X-DOI: 10.1080/1475179032000149449
File-URL: http://hdl.handle.net/10.1080/1475179032000149449
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:377-388
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Sengupta
Author-X-Name-First: Martin
Author-X-Name-Last: Sengupta
Title: Is China the Next Superpower?
Journal: Defense & Security Analysis
Pages: 389-404
Issue: 4
Volume: 19
Year: 2003
Month: 12
X-DOI: 10.1080/1475179032000149458
File-URL: http://hdl.handle.net/10.1080/1475179032000149458
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:19:y:2003:i:4:p:389-404
Template-Type: ReDIF-Article 1.0
Author-Name: Robert Gray
Author-X-Name-First: Robert
Author-X-Name-Last: Gray
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-2
Issue: 1
Volume: 20
Year: 2004
Month: 1
X-DOI: 10.1080/1475179042000195465
File-URL: http://hdl.handle.net/10.1080/1475179042000195465
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:1-2
Template-Type: ReDIF-Article 1.0
Author-Name: Micah Zenko
Author-X-Name-First: Micah
Author-X-Name-Last: Zenko
Title: Saving lives with speed: Using rapidly deployable forces for genocide prevention
Journal: Defense & Security Analysis
Pages: 3-19
Issue: 1
Volume: 20
Year: 2004
Month: 1
X-DOI: 10.1080/1475179042000195474
File-URL: http://hdl.handle.net/10.1080/1475179042000195474
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:3-19
Template-Type: ReDIF-Article 1.0
Author-Name: Erik Männik
Author-X-Name-First: Erik
Author-X-Name-Last: Männik
Title: Small states: invited to NATO — able to contribute?
Journal: Defense & Security Analysis
Pages: 21-37
Issue: 1
Volume: 20
Year: 2004
Month: 1
X-DOI: 10.1080/1475179042000195483
File-URL: http://hdl.handle.net/10.1080/1475179042000195483
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:21-37
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Sheehan
Author-X-Name-First: Michael
Author-X-Name-Last: Sheehan
Title: Creating an arms control mechanism in North East Asia: the application of the European security co-operation regime
Journal: Defense & Security Analysis
Pages: 39-54
Issue: 1
Volume: 20
Year: 2004
Month: 1
X-DOI: 10.1080/1475179042000195492
File-URL: http://hdl.handle.net/10.1080/1475179042000195492
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:39-54
Template-Type: ReDIF-Article 1.0
Author-Name: James Hasik
Author-X-Name-First: James
Author-X-Name-Last: Hasik
Title: Dream teams and brilliant eyes: the SBIRS low program, Northrop Grumman's acquisition of TRW, and the implications for the structure of the military space industry
Journal: Defense & Security Analysis
Pages: 55-67
Issue: 1
Volume: 20
Year: 2004
Month: 1
X-DOI: 10.1080/1475179042000195500
File-URL: http://hdl.handle.net/10.1080/1475179042000195500
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:55-67
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: Fifty Years of British Army Officership 1960-2010
Journal: Defense & Security Analysis
Pages: 69-86
Issue: 1
Volume: 20
Year: 2004
Month: 1
X-DOI: 10.1080/1475179042000195519
File-URL: http://hdl.handle.net/10.1080/1475179042000195519
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:69-86
Template-Type: ReDIF-Article 1.0
Author-Name: Tim Ripley
Author-X-Name-First: Tim
Author-X-Name-Last: Ripley
Title: Landmark in Defense Literature
Journal: Defense & Security Analysis
Pages: 97-98
Issue: 1
Volume: 20
Year: 2004
Month: 1
X-DOI: 10.1080/1475179042000195537
File-URL: http://hdl.handle.net/10.1080/1475179042000195537
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:1:p:97-98
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Robert Gray
Author-X-Name-First: Robert
Author-X-Name-Last: Gray
Title: Editorial
Journal: Defense & Security Analysis
Pages: 109-111
Issue: 2
Volume: 20
Year: 2004
Month: 6
X-DOI: 10.1080/1475179042000219080
File-URL: http://hdl.handle.net/10.1080/1475179042000219080
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:109-111
Template-Type: ReDIF-Article 1.0
Author-Name: Tom Sauer
Author-X-Name-First: Tom
Author-X-Name-Last: Sauer
Title: The “Americanization” of EU nuclear non‐proliferation policy
Journal: Defense & Security Analysis
Pages: 113-131
Issue: 2
Volume: 20
Year: 2004
Month: 6
X-DOI: 10.1080/1475179042000219099
File-URL: http://hdl.handle.net/10.1080/1475179042000219099
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:113-131
Template-Type: ReDIF-Article 1.0
Author-Name: Richard Weitz
Author-X-Name-First: Richard
Author-X-Name-Last: Weitz
Title: Jointness and desert storm: a retrospective
Journal: Defense & Security Analysis
Pages: 133-152
Issue: 2
Volume: 20
Year: 2004
Month: 6
X-DOI: 10.1080/1475179042000219107
File-URL: http://hdl.handle.net/10.1080/1475179042000219107
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:133-152
Template-Type: ReDIF-Article 1.0
Author-Name: Dan Lindley
Author-X-Name-First: Dan
Author-X-Name-Last: Lindley
Title: UNDOF: operational analysis and lessons learned
Journal: Defense & Security Analysis
Pages: 153-164
Issue: 2
Volume: 20
Year: 2004
Month: 6
X-DOI: 10.1080/1475179042000219116
File-URL: http://hdl.handle.net/10.1080/1475179042000219116
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:153-164
Template-Type: ReDIF-Article 1.0
Author-Name: Trevor Taylor
Author-X-Name-First: Trevor
Author-X-Name-Last: Taylor
Author-Name: Derrick Neal
Author-X-Name-First: Derrick
Author-X-Name-Last: Neal
Title: The delineation of defense equipment projects in the UK ministry of defence
Journal: Defense & Security Analysis
Pages: 165-177
Issue: 2
Volume: 20
Year: 2004
Month: 6
X-DOI: 10.1080/1475179042000219125
File-URL: http://hdl.handle.net/10.1080/1475179042000219125
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:165-177
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: Fifty years of British army officership 1960--2010: Part II: Prospective
Journal: Defense & Security Analysis
Pages: 179-199
Issue: 2
Volume: 20
Year: 2004
Month: 6
X-DOI: 10.1080/1475179042000219134
File-URL: http://hdl.handle.net/10.1080/1475179042000219134
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:179-199
Template-Type: ReDIF-Article 1.0
Author-Name: Robert Bresler
Author-X-Name-First: Robert
Author-X-Name-Last: Bresler
Title: Diplomacy by Henry Kissinger
Journal: Defense & Security Analysis
Pages: 201-203
Issue: 2
Volume: 20
Year: 2004
Month: 6
X-DOI: 10.1080/1475179042000219143
File-URL: http://hdl.handle.net/10.1080/1475179042000219143
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:2:p:201-203
Template-Type: ReDIF-Article 1.0
Author-Name: Mark Nissen
Author-X-Name-First: Mark
Author-X-Name-Last: Nissen
Author-Name: Erik Jansen
Author-X-Name-First: Erik
Author-X-Name-Last: Jansen
Author-Name: Carl Jones
Author-X-Name-First: Carl
Author-X-Name-Last: Jones
Author-Name: Gail Thomas
Author-X-Name-First: Gail
Author-X-Name-Last: Thomas
Title: Contextual Criticality of Knowledge-Flow Dynamics: Understanding a US Tragedy of Friendly Fire
Journal: Defense & Security Analysis
Pages: 209-228
Issue: 3
Volume: 20
Year: 2004
Month: 9
X-DOI: 10.1080/1475179042000260651
File-URL: http://hdl.handle.net/10.1080/1475179042000260651
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:209-228
Template-Type: ReDIF-Article 1.0
Author-Name: David Sanders
Author-X-Name-First: David
Author-X-Name-Last: Sanders
Title: Knowledge management and potentially useful new hyperdidactic structures
Journal: Defense & Security Analysis
Pages: 229-243
Issue: 3
Volume: 20
Year: 2004
Month: 9
X-DOI: 10.1080/1475179042000260660
File-URL: http://hdl.handle.net/10.1080/1475179042000260660
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:229-243
Template-Type: ReDIF-Article 1.0
Author-Name: Robert McNab
Author-X-Name-First: Robert
Author-X-Name-Last: McNab
Title: Base realignment and closure: Guiding principles for Peru
Journal: Defense & Security Analysis
Pages: 245-259
Issue: 3
Volume: 20
Year: 2004
Month: 9
X-DOI: 10.1080/1475179042000260679
File-URL: http://hdl.handle.net/10.1080/1475179042000260679
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:245-259
Template-Type: ReDIF-Article 1.0
Author-Name: Sorin Lungu
Author-X-Name-First: Sorin
Author-X-Name-Last: Lungu
Title: Military modernization and political choice: Germany and the uspromoted military technological revolution during the 1990s
Abstract:
This paper focuses on the factors that impacted on the German
debate with regard to the US-promoted Revolution in Military Affairs (RMA)
during the 1990s.1 It suggests that domestic policy considerations and the
lack of farsighted defense and security strategic thinking, especially
with regard to “Bundeswehr's capabilities”, coupled with
bureaucratic politics inside the German Ministry of Defense (MoD), played
a significant role in shaping the German RMA-related response during the
1990s.
Journal: Defense & Security Analysis
Pages: 261-272
Issue: 3
Volume: 20
Year: 2004
Month: 9
X-DOI: 10.1080/1475179042000260688
File-URL: http://hdl.handle.net/10.1080/1475179042000260688
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:261-272
Template-Type: ReDIF-Article 1.0
Author-Name: William Gates
Author-X-Name-First: William
Author-X-Name-Last: Gates
Author-Name: Mitchell McCarthy
Author-X-Name-First: Mitchell
Author-X-Name-Last: McCarthy
Title: United states marine corps aerial refueling requirements: Queuing theory and simulation analysis
Journal: Defense & Security Analysis
Pages: 273-287
Issue: 3
Volume: 20
Year: 2004
Month: 9
X-DOI: 10.1080/1475179042000260697
File-URL: http://hdl.handle.net/10.1080/1475179042000260697
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:273-287
Template-Type: ReDIF-Article 1.0
Author-Name: Stewart Fraser
Author-X-Name-First: Stewart
Author-X-Name-Last: Fraser
Title: Landmark in defense literature
Abstract:
Some books which have fallen within Defense & Security
Analysis's fields of interest have paved the way for further studies,
either because they have opened up a new era for enquiry and research, or
because they have introduced new approaches and methodologies to existing
areas. Other volumes have had impact, but have, in their turn, owed an
intellectual debt to an earlier work. Again, there are many books and
studies on defense which have become forgotten or which were unappreciated
at the time of their publication, but which have immediate relevance to
today's problems. This section is designed to review books that fall
within these categories with a view to highlighting how and why they
deserve serious attention.
Journal: Defense & Security Analysis
Pages: 301-303
Issue: 3
Volume: 20
Year: 2004
Month: 9
X-DOI: 10.1080/1475179042000260714
File-URL: http://hdl.handle.net/10.1080/1475179042000260714
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:3:p:301-303
Template-Type: ReDIF-Article 1.0
Author-Name: Julian I. Palmore
Author-X-Name-First: Julian I.
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 311-312
Issue: 4
Volume: 20
Year: 2004
Month: 12
X-DOI: 10.1080/1475179042000305769
File-URL: http://hdl.handle.net/10.1080/1475179042000305769
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:311-312
Template-Type: ReDIF-Article 1.0
Author-Name: Audrey Kurth Cronin
Author-X-Name-First: Audrey Kurth
Author-X-Name-Last: Cronin
Title: Terrorist motivations for chemical and biological weapons use: Placing the threat in context*
Abstract:
*This
article is a reprint of CRS Report RL31831, dated 28 March 2003.
Journal: Defense & Security Analysis
Pages: 313-320
Issue: 4
Volume: 20
Year: 2004
Month: 12
X-DOI: 10.1080/1475179042000305778
File-URL: http://hdl.handle.net/10.1080/1475179042000305778
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:313-320
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: Nuclear proliferation and international systems
Abstract:
This
article includes some material from an earlier study of this topic, in
Stephen J. Cimbala, The Dead Volcano: The Background and effects
of Nuclear War Complacency (Praeger Publishers: 2002)
Journal: Defense & Security Analysis
Pages: 321-336
Issue: 4
Volume: 20
Year: 2004
Month: 12
X-DOI: 10.1080/1475179042000305787
File-URL: http://hdl.handle.net/10.1080/1475179042000305787
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:321-336
Template-Type: ReDIF-Article 1.0
Author-Name: Francois Melese
Author-X-Name-First: Francois
Author-X-Name-Last: Melese
Author-Name: Diana Angelis
Author-X-Name-First: Diana
Author-X-Name-Last: Angelis
Title: Deterring terrorists from using WMD: A brinkmanship strategy for the United Nations
Journal: Defense & Security Analysis
Pages: 337-341
Issue: 4
Volume: 20
Year: 2004
Month: 12
X-DOI: 10.1080/1475179042000305796
File-URL: http://hdl.handle.net/10.1080/1475179042000305796
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:337-341
Template-Type: ReDIF-Article 1.0
Author-Name: Glen Segell
Author-X-Name-First: Glen
Author-X-Name-Last: Segell
Title: Counter-proliferating the rogue states
Journal: Defense & Security Analysis
Pages: 343-354
Issue: 4
Volume: 20
Year: 2004
Month: 12
X-DOI: 10.1080/1475179042000305804
File-URL: http://hdl.handle.net/10.1080/1475179042000305804
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:343-354
Template-Type: ReDIF-Article 1.0
Author-Name: Raymond E. Franck
Author-X-Name-First: Raymond E.
Author-X-Name-Last: Franck
Author-Name: Francois Melese
Author-X-Name-First: Francois
Author-X-Name-Last: Melese
Title: Exploring the structure of terrorists' WMD decisions: A game theory approach
Journal: Defense & Security Analysis
Pages: 355-372
Issue: 4
Volume: 20
Year: 2004
Month: 12
X-DOI: 10.1080/1475179042000305813
File-URL: http://hdl.handle.net/10.1080/1475179042000305813
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:355-372
Template-Type: ReDIF-Article 1.0
Author-Name: M. D. Ginsberg
Author-X-Name-First: M. D.
Author-X-Name-Last: Ginsberg
Author-Name: V. F. Hock
Author-X-Name-First: V. F.
Author-X-Name-Last: Hock
Title: Terrorism and security of water distribution systems: A primer
Journal: Defense & Security Analysis
Pages: 373-380
Issue: 4
Volume: 20
Year: 2004
Month: 12
X-DOI: 10.1080/1475179042000305822
File-URL: http://hdl.handle.net/10.1080/1475179042000305822
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:373-380
Template-Type: ReDIF-Article 1.0
Author-Name: Julian I. Palmore
Author-X-Name-First: Julian I.
Author-X-Name-Last: Palmore
Title: Missile defense and Europe: WMD and terrorism
Journal: Defense & Security Analysis
Pages: 381-389
Issue: 4
Volume: 20
Year: 2004
Month: 12
X-DOI: 10.1080/1475179042000305831
File-URL: http://hdl.handle.net/10.1080/1475179042000305831
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:20:y:2004:i:4:p:381-389
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew James
Author-X-Name-First: Andrew
Author-X-Name-Last: James
Title: European Military Capabilities, the Defense Industry and the Future Shape of Armaments Co-operation
Journal: Defense & Security Analysis
Pages: 5-19
Issue: 1
Volume: 21
Year: 2005
Month: 3
X-DOI: 10.1080/1475179052000341470
File-URL: http://hdl.handle.net/10.1080/1475179052000341470
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:5-19
Template-Type: ReDIF-Article 1.0
Author-Name: Kerry Longhurst
Author-X-Name-First: Kerry
Author-X-Name-Last: Longhurst
Title: Endeavors to Restructure the Bundeswehr: The Reform of the German Armed Forces 1990--2003
Journal: Defense & Security Analysis
Pages: 21-35
Issue: 1
Volume: 21
Year: 2005
Month: 3
X-DOI: 10.1080/1475179052000341489
File-URL: http://hdl.handle.net/10.1080/1475179052000341489
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:21-35
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew Fuhrmann
Author-X-Name-First: Matthew
Author-X-Name-Last: Fuhrmann
Author-Name: Nathan Edwards
Author-X-Name-First: Nathan
Author-X-Name-Last: Edwards
Author-Name: Michael Salomone
Author-X-Name-First: Michael
Author-X-Name-Last: Salomone
Title: The German offensive of 1914: A new perspective
Journal: Defense & Security Analysis
Pages: 37-66
Issue: 1
Volume: 21
Year: 2005
Month: 3
X-DOI: 10.1080/1475179052000341498
File-URL: http://hdl.handle.net/10.1080/1475179052000341498
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:37-66
Template-Type: ReDIF-Article 1.0
Author-Name: Salvador Raza
Author-X-Name-First: Salvador
Author-X-Name-Last: Raza
Title: The security and defense matrix: Concepts matter in defense analysis?
Journal: Defense & Security Analysis
Pages: 67-78
Issue: 1
Volume: 21
Year: 2005
Month: 3
X-DOI: 10.1080/1475179052000341506
File-URL: http://hdl.handle.net/10.1080/1475179052000341506
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:67-78
Template-Type: ReDIF-Article 1.0
Author-Name: Asifa Hussain
Author-X-Name-First: Asifa
Author-X-Name-Last: Hussain
Author-Name: Mohammed Ishaq
Author-X-Name-First: Mohammed
Author-X-Name-Last: Ishaq
Title: Public attitudes towards a career in the British Armed Forces
Journal: Defense & Security Analysis
Pages: 79-95
Issue: 1
Volume: 21
Year: 2005
Month: 3
X-DOI: 10.1080/1475179052000341515
File-URL: http://hdl.handle.net/10.1080/1475179052000341515
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:79-95
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew Morgan
Author-X-Name-First: Matthew
Author-X-Name-Last: Morgan
Title: The art of war in operation Iraqi Freedom
Journal: Defense & Security Analysis
Pages: 97-104
Issue: 1
Volume: 21
Year: 2005
Month: 3
X-DOI: 10.1080/1475179052000341524
File-URL: http://hdl.handle.net/10.1080/1475179052000341524
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:97-104
Template-Type: ReDIF-Article 1.0
Author-Name: Simon Baynham
Author-X-Name-First: Simon
Author-X-Name-Last: Baynham
Title: Cross-straits relations and the 2004 Taiwanese Elections
Abstract:
Contributions of between 250 and 1,000 words which are
concerned with defense issues of the day, new source material, interesting
methodological approaches, novel interpretations of defense matters, or
comment and reaction to the subject matter and content of the Journal are
included in this section. None is refereed, and each submission is
included at the Editor's discretion. In the manner and style of similar
sections in scientific journals, the objective is to provide a forum for
quick response to current developments in defense affairs generally.
Journal: Defense & Security Analysis
Pages: 105-110
Issue: 1
Volume: 21
Year: 2005
Month: 3
X-DOI: 10.1080/1475179052000341533
File-URL: http://hdl.handle.net/10.1080/1475179052000341533
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:105-110
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Augustine's Laws: Norman Augustine
Abstract:
Some books which have fallen within Defense & Security
Analysis's fields of interest have paved the way for further studies,
either because they have opened up a new era for enquiry and research, or
because they have introduced new approaches and methodologies to existing
areas. Other volumes have had impact, but have, in their turn, owed an
intellectual debt to an earlier work. Again, there are many books and
studies on defense which have become forgotten or which were unappreciated
at the time of their publication, but which have immediate relevance to
today's problems. This section is designed to review books that fall
within these categories with a view to highlighting how and why they
deserve serious attention.
Journal: Defense & Security Analysis
Pages: 111-114
Issue: 1
Volume: 21
Year: 2005
Month: 3
X-DOI: 10.1080/1475179052000341542
File-URL: http://hdl.handle.net/10.1080/1475179052000341542
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:1:p:111-114
Template-Type: ReDIF-Article 1.0
Author-Name: Avi Kober
Author-X-Name-First: Avi
Author-X-Name-Last: Kober
Title: Does the Iraq war reflect a phase change in warfare?
Journal: Defense & Security Analysis
Pages: 121-142
Issue: 2
Volume: 21
Year: 2005
Month: 6
X-DOI: 10.1080/1475179052000343973
File-URL: http://hdl.handle.net/10.1080/1475179052000343973
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:121-142
Template-Type: ReDIF-Article 1.0
Author-Name: James Mckay
Author-X-Name-First: James
Author-X-Name-Last: Mckay
Title: Fear of the unknown: The coalition from operation desert fox to operation Iraqi freedom
Journal: Defense & Security Analysis
Pages: 143-158
Issue: 2
Volume: 21
Year: 2005
Month: 6
X-DOI: 10.1080/1475179052000343982
File-URL: http://hdl.handle.net/10.1080/1475179052000343982
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:143-158
Template-Type: ReDIF-Article 1.0
Author-Name: Valérie Merindol
Author-X-Name-First: Valérie
Author-X-Name-Last: Merindol
Title: Defense RDT&E and knowledge management: A new enquiry into public and public‐private coordination
Journal: Defense & Security Analysis
Pages: 159-177
Issue: 2
Volume: 21
Year: 2005
Month: 6
X-DOI: 10.1080/1475179052000343991
File-URL: http://hdl.handle.net/10.1080/1475179052000343991
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:159-177
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Radseck
Author-X-Name-First: Michael
Author-X-Name-Last: Radseck
Title: From casa militar to an instrument of political control: A functional analysis of the defense ministries in Argentina and Chile
Journal: Defense & Security Analysis
Pages: 179-199
Issue: 2
Volume: 21
Year: 2005
Month: 6
X-DOI: 10.1080/1475179052000344008
File-URL: http://hdl.handle.net/10.1080/1475179052000344008
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:179-199
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Mcnerney
Author-X-Name-First: Michael
Author-X-Name-Last: Mcnerney
Title: Military innovation during war: Paradox or paradigm?
Journal: Defense & Security Analysis
Pages: 201-212
Issue: 2
Volume: 21
Year: 2005
Month: 6
X-DOI: 10.1080/1475179052000344017
File-URL: http://hdl.handle.net/10.1080/1475179052000344017
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:201-212
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: Amateurs, conscripts, citizens, professionals: How do armed forces measure up?
Abstract:
Contributions of between 250 and 1,000 words which are
concerned with defense issues of the day, new source material, interesting
methodological approaches, novel interpretations of defense matters, or
comment and reaction to the subject matter and content of the Journal are
included in this section. None is refereed, and each submission is
included at the Editor's discretion. In the manner and style of similar
sections in scientific journals, the objective is to provide a forum for
quick response to current developments in defense affairs generally.
Journal: Defense & Security Analysis
Pages: 213-216
Issue: 2
Volume: 21
Year: 2005
Month: 6
X-DOI: 10.1080/1475179052000344026
File-URL: http://hdl.handle.net/10.1080/1475179052000344026
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:2:p:213-216
Template-Type: ReDIF-Article 1.0
Author-Name: Andrea Ellner
Author-X-Name-First: Andrea
Author-X-Name-Last: Ellner
Title: The European security strategy: Multilateral security with teeth?
Journal: Defense & Security Analysis
Pages: 223-242
Issue: 3
Volume: 21
Year: 2005
Month: 9
X-DOI: 10.1080/0743017052000344929
File-URL: http://hdl.handle.net/10.1080/0743017052000344929
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:223-242
Template-Type: ReDIF-Article 1.0
Author-Name: Stefan Markowski
Author-X-Name-First: Stefan
Author-X-Name-Last: Markowski
Author-Name: Massimiliano Tani
Author-X-Name-First: Massimiliano
Author-X-Name-Last: Tani
Title: Defense expenditure, spill-ins and threats in Asia-Pacific 1985--2001
Journal: Defense & Security Analysis
Pages: 243-265
Issue: 3
Volume: 21
Year: 2005
Month: 9
X-DOI: 10.1080/0743017052000344938
File-URL: http://hdl.handle.net/10.1080/0743017052000344938
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:243-265
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala*
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala*
Title: Nuclear weapons in the Twenty-first century: From simplicity to complexity
Abstract:
*The
author gratefully acknowledges the use of a model developed by Dr James
Scouras in preparing Charts 1 through 6. Dr Scouras is not responsible for
any of the analysis undertaken here, nor for any of the arguments or
conclusions.
Journal: Defense & Security Analysis
Pages: 267-281
Issue: 3
Volume: 21
Year: 2005
Month: 9
X-DOI: 10.1080/0743017052000344947
File-URL: http://hdl.handle.net/10.1080/0743017052000344947
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:267-281
Template-Type: ReDIF-Article 1.0
Author-Name: David Sanders
Author-X-Name-First: David
Author-X-Name-Last: Sanders
Title: Creation of new knowledge
Journal: Defense & Security Analysis
Pages: 283-302
Issue: 3
Volume: 21
Year: 2005
Month: 9
X-DOI: 10.1080/0743017052000344956
File-URL: http://hdl.handle.net/10.1080/0743017052000344956
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:283-302
Template-Type: ReDIF-Article 1.0
Author-Name: Jason Mead
Author-X-Name-First: Jason
Author-X-Name-Last: Mead
Title: Game theory and the Second Iraq War
Abstract:
Throughout the world, there is a large number of young, and
even not-so-young, scholars who are reading for higher degrees in
strategic, security and defense studies, or engaged in analytical research
in research institutes, think-tanks or consultancies; they bring to the
subject innovative and fresh perspectives often ignored or missed by more
established scholars. Most of these people have yet to make their mark in
the defense and security field. The Editors of Defense & Security Analysis
are resolved to tap this value source of information, observation,
analysis and critical study by offering a new section of the journal for
their views to be given an opportunity to be aired. Submissions of up to
3,000 words are encouraged from University Master's and Doctoral
candidates and post-doctoral researchers.
Journal: Defense & Security Analysis
Pages: 303-311
Issue: 3
Volume: 21
Year: 2005
Month: 9
X-DOI: 10.1080/0743017052000344955
File-URL: http://hdl.handle.net/10.1080/0743017052000344955
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:303-311
Template-Type: ReDIF-Article 1.0
Author-Name: Michael J. Lombardi
Author-X-Name-First: Michael J.
Author-X-Name-Last: Lombardi
Title: The decline of the American superpower
Journal: Defense & Security Analysis
Pages: 312-321
Issue: 3
Volume: 21
Year: 2005
Month: 9
X-DOI: 10.1080/0743017052000344965
File-URL: http://hdl.handle.net/10.1080/0743017052000344965
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:3:p:312-321
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 331-333
Issue: 4
Volume: 21
Year: 2005
Month: 12
X-DOI: 10.1080/1475179052000345395
File-URL: http://hdl.handle.net/10.1080/1475179052000345395
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:331-333
Template-Type: ReDIF-Article 1.0
Author-Name: Darryn J. Reid
Author-X-Name-First: Darryn J.
Author-X-Name-Last: Reid
Author-Name: Graham Goodman
Author-X-Name-First: Graham
Author-X-Name-Last: Goodman
Author-Name: Wayne Johnson
Author-X-Name-First: Wayne
Author-X-Name-Last: Johnson
Author-Name: Ralph E. Giffin
Author-X-Name-First: Ralph E.
Author-X-Name-Last: Giffin
Title: All that glisters: Is network-centric warfare really scientific?
Journal: Defense & Security Analysis
Pages: 335-367
Issue: 4
Volume: 21
Year: 2005
Month: 12
X-DOI: 10.1080/1475179052000345403
File-URL: http://hdl.handle.net/10.1080/1475179052000345403
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:335-367
Template-Type: ReDIF-Article 1.0
Author-Name: Matenia P. Sirseloudi
Author-X-Name-First: Matenia P.
Author-X-Name-Last: Sirseloudi
Title: How to predict the unpredictable: On the early detection of terrorist campaigns
Journal: Defense & Security Analysis
Pages: 369-386
Issue: 4
Volume: 21
Year: 2005
Month: 12
X-DOI: 10.1080/1475179052000345421
File-URL: http://hdl.handle.net/10.1080/1475179052000345421
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:369-386
Template-Type: ReDIF-Article 1.0
Author-Name: Fotios Moustakis
Author-X-Name-First: Fotios
Author-X-Name-Last: Moustakis
Author-Name: Rudra Chaudhuri
Author-X-Name-First: Rudra
Author-X-Name-Last: Chaudhuri
Title: The transatlantic alliance revisited: Does america still need “old Europe”?
Journal: Defense & Security Analysis
Pages: 387-398
Issue: 4
Volume: 21
Year: 2005
Month: 12
X-DOI: 10.1080/1475179052000345430
File-URL: http://hdl.handle.net/10.1080/1475179052000345430
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:387-398
Template-Type: ReDIF-Article 1.0
Author-Name: Siret Hürsoy
Author-X-Name-First: Siret
Author-X-Name-Last: Hürsoy
Title: A regional dimension to peace operations: European contributions to the UN and implications for Turkish co-operation and co-ordination
Journal: Defense & Security Analysis
Pages: 399-412
Issue: 4
Volume: 21
Year: 2005
Month: 12
X-DOI: 10.1080/1475179052000345449
File-URL: http://hdl.handle.net/10.1080/1475179052000345449
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:399-412
Template-Type: ReDIF-Article 1.0
Author-Name: Erica Lynn
Author-X-Name-First: Erica
Author-X-Name-Last: Lynn
Title: Analysis of the dispute over Taiwan using a game theory approach
Abstract:
Throughout the world, there is a large number of young, and
even not-so-young, scholars who are reading for higher degrees in
strategic, security and defense studies, or engaged in analytical research
in research institutes, think-tanks or consultancies; they bring to the
subject innovative and fresh perspectives often ignored or missed by more
established scholars. Most of these people have yet to make their mark in
the defense and security field. The Editors of Defense & Security Analysis
are resolved to tap this valuable source of information, observation,
analysis and critical study by offering a new section of the journal for
their views to be given an opportunity to be aired. Submissions of up to
3,000 words are encouraged from University Master's and Doctoral
candidates and post-doctoral researchers.
Journal: Defense & Security Analysis
Pages: 413-418
Issue: 4
Volume: 21
Year: 2005
Month: 12
X-DOI: 10.1080/1475179052000345458
File-URL: http://hdl.handle.net/10.1080/1475179052000345458
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:413-418
Template-Type: ReDIF-Article 1.0
Author-Name: Dingli Shen
Author-X-Name-First: Dingli
Author-X-Name-Last: Shen
Title: Nuclear deterrence in the 21st century
Abstract:
The purpose behind this section is to encourage, and
sometimes solicit, short commentary and/or comment on timely topics that
play a role in shaping current national and international defense and
security policies. There is no limit or constraint on what defense and
security topics are chosen, so long as they are timely and have policy
relevance. By way of guidance, the nearest equivalent would be feature
articles in the more reputable broadsheet press.
Journal: Defense & Security Analysis
Pages: 419-424
Issue: 4
Volume: 21
Year: 2005
Month: 12
X-DOI: 10.1080/1475179052000345467
File-URL: http://hdl.handle.net/10.1080/1475179052000345467
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:419-424
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Missile Defense and Europe: Strengthening Transatlantic Co-operation in an Evolving Setting
Journal: Defense & Security Analysis
Pages: 425-432
Issue: 4
Volume: 21
Year: 2005
Month: 12
X-DOI: 10.1080/1475179052000345476
File-URL: http://hdl.handle.net/10.1080/1475179052000345476
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:21:y:2005:i:4:p:425-432
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-4
Issue: 1
Volume: 22
Year: 2006
Month: 3
X-DOI: 10.1080/14751790600577058
File-URL: http://hdl.handle.net/10.1080/14751790600577058
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:1-4
Template-Type: ReDIF-Article 1.0
Author-Name: James Holmes
Author-X-Name-First: James
Author-X-Name-Last: Holmes
Author-Name: Toshi Yoshihara
Author-X-Name-First: Toshi
Author-X-Name-Last: Yoshihara
Author-Name: Andrew Winner
Author-X-Name-First: Andrew
Author-X-Name-Last: Winner
Title: Maritime Counter-proliferation with Chinese Characteristics*
Journal: Defense & Security Analysis
Pages: 5-21
Issue: 1
Volume: 22
Year: 2006
Month: 3
X-DOI: 10.1080/14751790600577074
File-URL: http://hdl.handle.net/10.1080/14751790600577074
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:5-21
Template-Type: ReDIF-Article 1.0
Author-Name: Andrea Ellner
Author-X-Name-First: Andrea
Author-X-Name-Last: Ellner
Title: Carrier Airpower in the Royal Navy during the Cold War: The International Strategic Context*
Journal: Defense & Security Analysis
Pages: 23-44
Issue: 1
Volume: 22
Year: 2006
Month: 3
X-DOI: 10.1080/14751790600577108
File-URL: http://hdl.handle.net/10.1080/14751790600577108
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:23-44
Template-Type: ReDIF-Article 1.0
Author-Name: Glen M. Segell
Author-X-Name-First: Glen M.
Author-X-Name-Last: Segell
Title: Terrorism on London Public Transport
Journal: Defense & Security Analysis
Pages: 45-59
Issue: 1
Volume: 22
Year: 2006
Month: 3
X-DOI: 10.1080/14751790600577132
File-URL: http://hdl.handle.net/10.1080/14751790600577132
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:45-59
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: Military Persuasion, Intelligence and the War on Terror
Journal: Defense & Security Analysis
Pages: 61-72
Issue: 1
Volume: 22
Year: 2006
Month: 3
X-DOI: 10.1080/14751790600577157
File-URL: http://hdl.handle.net/10.1080/14751790600577157
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:61-72
Template-Type: ReDIF-Article 1.0
Author-Name: Nadim Hasbani
Author-X-Name-First: Nadim
Author-X-Name-Last: Hasbani
Title: The Geopolitics of Weapons Procurement in the Gulf States
Journal: Defense & Security Analysis
Pages: 73-88
Issue: 1
Volume: 22
Year: 2006
Month: 3
X-DOI: 10.1080/14751790600577181
File-URL: http://hdl.handle.net/10.1080/14751790600577181
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:73-88
Template-Type: ReDIF-Article 1.0
Author-Name: Grant Kopec
Author-X-Name-First: Grant
Author-X-Name-Last: Kopec
Title: Technical Obstacles and Limitations to the Implementation of Effective Mid-course Ground-based Missile Defense
Journal: Defense & Security Analysis
Pages: 89-94
Issue: 1
Volume: 22
Year: 2006
Month: 3
X-DOI: 10.1080/14751790600577231
File-URL: http://hdl.handle.net/10.1080/14751790600577231
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:89-94
Template-Type: ReDIF-Article 1.0
Author-Name: Timothy Bradley
Author-X-Name-First: Timothy
Author-X-Name-Last: Bradley
Title: Why a Ballistic Missile Defense Program is the Wrong Path to US National Security
Journal: Defense & Security Analysis
Pages: 95-99
Issue: 1
Volume: 22
Year: 2006
Month: 3
X-DOI: 10.1080/14751790600577256
File-URL: http://hdl.handle.net/10.1080/14751790600577256
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:95-99
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: On Setting Priorities for International Security
Journal: Defense & Security Analysis
Pages: 101-102
Issue: 1
Volume: 22
Year: 2006
Month: 3
X-DOI: 10.1080/14751790600577272
File-URL: http://hdl.handle.net/10.1080/14751790600577272
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:1:p:101-102
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 105-110
Issue: 2
Volume: 22
Year: 2006
Month: 6
X-DOI: 10.1080/14751790600763963
File-URL: http://hdl.handle.net/10.1080/14751790600763963
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:105-110
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: A clear and present danger to international security: Highly Pathogenic Avian Influenza
Journal: Defense & Security Analysis
Pages: 111-121
Issue: 2
Volume: 22
Year: 2006
Month: 6
X-DOI: 10.1080/14751790600763989
File-URL: http://hdl.handle.net/10.1080/14751790600763989
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:111-121
Template-Type: ReDIF-Article 1.0
Author-Name: Raymond E. Franck
Author-X-Name-First: Raymond E.
Author-X-Name-Last: Franck
Author-Name: Terry C. Pierce
Author-X-Name-First: Terry C.
Author-X-Name-Last: Pierce
Title: Disruptive military innovation and the War on Terror: Some thoughts for perfect opponents
Journal: Defense & Security Analysis
Pages: 123-140
Issue: 2
Volume: 22
Year: 2006
Month: 6
X-DOI: 10.1080/14751790600763997
File-URL: http://hdl.handle.net/10.1080/14751790600763997
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:123-140
Template-Type: ReDIF-Article 1.0
Author-Name: James Devine
Author-X-Name-First: James
Author-X-Name-Last: Devine
Author-Name: Julian Schofield
Author-X-Name-First: Julian
Author-X-Name-Last: Schofield
Title: Coercive counter-proliferation and escalation: Assessing the Iran military option
Journal: Defense & Security Analysis
Pages: 141-157
Issue: 2
Volume: 22
Year: 2006
Month: 6
X-DOI: 10.1080/14751790600764029
File-URL: http://hdl.handle.net/10.1080/14751790600764029
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:141-157
Template-Type: ReDIF-Article 1.0
Author-Name: Vladimir Prebilič
Author-X-Name-First: Vladimir
Author-X-Name-Last: Prebilič
Title: Theoretical aspects of military logistics
Journal: Defense & Security Analysis
Pages: 159-177
Issue: 2
Volume: 22
Year: 2006
Month: 6
X-DOI: 10.1080/14751790600764037
File-URL: http://hdl.handle.net/10.1080/14751790600764037
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:159-177
Template-Type: ReDIF-Article 1.0
Author-Name: Francois Melese
Author-X-Name-First: Francois
Author-X-Name-Last: Melese
Author-Name: Jim Airola
Author-X-Name-First: Jim
Author-X-Name-Last: Airola
Title: Managing defense infrastructure: The case of military housing
Journal: Defense & Security Analysis
Pages: 179-189
Issue: 2
Volume: 22
Year: 2006
Month: 6
X-DOI: 10.1080/14751790600764052
File-URL: http://hdl.handle.net/10.1080/14751790600764052
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:179-189
Template-Type: ReDIF-Article 1.0
Author-Name: Wu Yue
Author-X-Name-First: Wu
Author-X-Name-Last: Yue
Title: US foreign and national security policies: An explanation based on theoretical approaches
Journal: Defense & Security Analysis
Pages: 191-196
Issue: 2
Volume: 22
Year: 2006
Month: 6
X-DOI: 10.1080/14751790600775462
File-URL: http://hdl.handle.net/10.1080/14751790600775462
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:191-196
Template-Type: ReDIF-Article 1.0
Author-Name: Caroline Croser
Author-X-Name-First: Caroline
Author-X-Name-Last: Croser
Title: Commanding the future: Command and control in a networked environment
Journal: Defense & Security Analysis
Pages: 197-202
Issue: 2
Volume: 22
Year: 2006
Month: 6
X-DOI: 10.1080/14751790600775470
File-URL: http://hdl.handle.net/10.1080/14751790600775470
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:197-202
Template-Type: ReDIF-Article 1.0
Author-Name: David Barchard
Author-X-Name-First: David
Author-X-Name-Last: Barchard
Title: Dipping a toe in the Black Sea
Journal: Defense & Security Analysis
Pages: 203-206
Issue: 2
Volume: 22
Year: 2006
Month: 6
X-DOI: 10.1080/14751790600775504
File-URL: http://hdl.handle.net/10.1080/14751790600775504
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:2:p:203-206
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 215-219
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600933814
File-URL: http://hdl.handle.net/10.1080/14751790600933814
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:215-219
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: Strategic Reassurance in a Proliferation-Permissive orld: American and Russian Options
Journal: Defense & Security Analysis
Pages: 221-239
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600933830
File-URL: http://hdl.handle.net/10.1080/14751790600933830
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:221-239
Template-Type: ReDIF-Article 1.0
Author-Name: Ta-Chen Cheng
Author-X-Name-First: Ta-Chen
Author-X-Name-Last: Cheng
Title: The Evolution of China's Strategic Nuclear Weapons
Journal: Defense & Security Analysis
Pages: 241-260
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600933863
File-URL: http://hdl.handle.net/10.1080/14751790600933863
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:241-260
Template-Type: ReDIF-Article 1.0
Author-Name: Nazery Khalid
Author-X-Name-First: Nazery
Author-X-Name-Last: Khalid
Title: Too Much of a Good Thing? Some Reflections on Increased Security and its Costs*
Abstract:
Security is like oxygen — you tend not to notice it
until you begin to lose it, but once that occurs there is nothing else you
will think about.
Journal: Defense & Security Analysis
Pages: 261-273
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600933871
File-URL: http://hdl.handle.net/10.1080/14751790600933871
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:261-273
Template-Type: ReDIF-Article 1.0
Author-Name: Michael A. Mcnerney
Author-X-Name-First: Michael A.
Author-X-Name-Last: Mcnerney
Author-Name: Marshall V. Ecklund
Author-X-Name-First: Marshall V.
Author-X-Name-Last: Ecklund
Title: Exploiting the Potential of Informal Networks in the Middle East for Conducting Non-conventional Assisted Recovery
Journal: Defense & Security Analysis
Pages: 275-299
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600933897
File-URL: http://hdl.handle.net/10.1080/14751790600933897
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:275-299
Template-Type: ReDIF-Article 1.0
Author-Name: Joseph R. Laracy
Author-X-Name-First: Joseph R.
Author-X-Name-Last: Laracy
Title: A Systems Theoretic Accident Model Applied to Biodefense
Journal: Defense & Security Analysis
Pages: 301-310
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600933905
File-URL: http://hdl.handle.net/10.1080/14751790600933905
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:301-310
Template-Type: ReDIF-Article 1.0
Author-Name: Owen Kopon
Author-X-Name-First: Owen
Author-X-Name-Last: Kopon
Title: Avian Influenza: Effects of an Epidemic
Journal: Defense & Security Analysis
Pages: 311-314
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600933921
File-URL: http://hdl.handle.net/10.1080/14751790600933921
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:311-314
Template-Type: ReDIF-Article 1.0
Author-Name: Jason Cooley
Author-X-Name-First: Jason
Author-X-Name-Last: Cooley
Title: The War on Terrorism and the Need for Altercasting
Journal: Defense & Security Analysis
Pages: 315-323
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600933939
File-URL: http://hdl.handle.net/10.1080/14751790600933939
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:315-323
Template-Type: ReDIF-Article 1.0
Author-Name: Scott Woods
Author-X-Name-First: Scott
Author-X-Name-Last: Woods
Title: Analysis of the US-India Nuclear Deal
Journal: Defense & Security Analysis
Pages: 325-328
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600933970
File-URL: http://hdl.handle.net/10.1080/14751790600933970
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:325-328
Template-Type: ReDIF-Article 1.0
Author-Name: Terence Mcnamee
Author-X-Name-First: Terence
Author-X-Name-Last: Mcnamee
Author-Name: Greg Mills
Author-X-Name-First: Greg
Author-X-Name-Last: Mills
Title: Denuclearizing a Regime: What South Africa's Nuclear Rollback Might Tell Us About Iran
Journal: Defense & Security Analysis
Pages: 329-335
Issue: 3
Volume: 22
Year: 2006
Month: 9
X-DOI: 10.1080/14751790600934002
File-URL: http://hdl.handle.net/10.1080/14751790600934002
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:3:p:329-335
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew Rosenstein
Author-X-Name-First: Matthew
Author-X-Name-Last: Rosenstein
Title: Editorial
Journal: Defense & Security Analysis
Pages: 345-351
Issue: 4
Volume: 22
Year: 2006
Month: 12
X-DOI: 10.1080/14751790601104159
File-URL: http://hdl.handle.net/10.1080/14751790601104159
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:345-351
Template-Type: ReDIF-Article 1.0
Author-Name: Anupam Srivastava
Author-X-Name-First: Anupam
Author-X-Name-Last: Srivastava
Author-Name: Seema Gahlaut
Author-X-Name-First: Seema
Author-X-Name-Last: Gahlaut
Title: The New Energy in the US--India Relationship
Journal: Defense & Security Analysis
Pages: 353-372
Issue: 4
Volume: 22
Year: 2006
Month: 12
X-DOI: 10.1080/14751790601104209
File-URL: http://hdl.handle.net/10.1080/14751790601104209
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:353-372
Template-Type: ReDIF-Article 1.0
Author-Name: Jeffrey S. Lantis
Author-X-Name-First: Jeffrey S.
Author-X-Name-Last: Lantis
Title: America's Nuclear Addiction
Journal: Defense & Security Analysis
Pages: 373-385
Issue: 4
Volume: 22
Year: 2006
Month: 12
X-DOI: 10.1080/14751790601104241
File-URL: http://hdl.handle.net/10.1080/14751790601104241
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:373-385
Template-Type: ReDIF-Article 1.0
Author-Name: Rizwan Zeb
Author-X-Name-First: Rizwan
Author-X-Name-Last: Zeb
Title: David Versus Goliath? Pakistan'sNuclear Doctrine: Motivations, Principles and Future*
Journal: Defense & Security Analysis
Pages: 387-408
Issue: 4
Volume: 22
Year: 2006
Month: 12
X-DOI: 10.1080/14751790601104316
File-URL: http://hdl.handle.net/10.1080/14751790601104316
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:387-408
Template-Type: ReDIF-Article 1.0
Author-Name: Rifaat Hussain
Author-X-Name-First: Rifaat
Author-X-Name-Last: Hussain
Title: The India--Pakistan Peace Process
Journal: Defense & Security Analysis
Pages: 409-419
Issue: 4
Volume: 22
Year: 2006
Month: 12
X-DOI: 10.1080/14751790601104357
File-URL: http://hdl.handle.net/10.1080/14751790601104357
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:409-419
Template-Type: ReDIF-Article 1.0
Author-Name: Jaideep Saikia
Author-X-Name-First: Jaideep
Author-X-Name-Last: Saikia
Title: Quest for a Chindian Arc: Leadership in the Asian Century
Journal: Defense & Security Analysis
Pages: 421-434
Issue: 4
Volume: 22
Year: 2006
Month: 12
X-DOI: 10.1080/14751790601104431
File-URL: http://hdl.handle.net/10.1080/14751790601104431
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:421-434
Template-Type: ReDIF-Article 1.0
Author-Name: P. V. Ramana
Author-X-Name-First: P. V.
Author-X-Name-Last: Ramana
Title: The Maoist Movement in India
Journal: Defense & Security Analysis
Pages: 435-449
Issue: 4
Volume: 22
Year: 2006
Month: 12
X-DOI: 10.1080/14751790601104464
File-URL: http://hdl.handle.net/10.1080/14751790601104464
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:435-449
Template-Type: ReDIF-Article 1.0
Author-Name: Swarna Rajagopalan
Author-X-Name-First: Swarna
Author-X-Name-Last: Rajagopalan
Title: Silver Linings: Natural Disasters, International Relations and Political Change in South Asia, 2004--5
Journal: Defense & Security Analysis
Pages: 451-468
Issue: 4
Volume: 22
Year: 2006
Month: 12
X-DOI: 10.1080/14751790601104506
File-URL: http://hdl.handle.net/10.1080/14751790601104506
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:22:y:2006:i:4:p:451-468
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-5
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254417
File-URL: http://hdl.handle.net/10.1080/14751790701254417
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:1-5
Template-Type: ReDIF-Article 1.0
Author-Name: Emma Sky
Author-X-Name-First: Emma
Author-X-Name-Last: Sky
Title: Increasing ISAF's Impact on Stability in Afghanistan
Journal: Defense & Security Analysis
Pages: 7-25
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254425
File-URL: http://hdl.handle.net/10.1080/14751790701254425
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:7-25
Template-Type: ReDIF-Article 1.0
Author-Name: J. Stone
Author-X-Name-First: J.
Author-X-Name-Last: Stone
Title: Technology and War: A Trinitarian Analysis
Journal: Defense & Security Analysis
Pages: 27-40
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254441
File-URL: http://hdl.handle.net/10.1080/14751790701254441
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:27-40
Template-Type: ReDIF-Article 1.0
Author-Name: Bill Park
Author-X-Name-First: Bill
Author-X-Name-Last: Park
Title: US—Turkish Relations: Can the Future Resemble the Past?
Journal: Defense & Security Analysis
Pages: 41-54
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254466
File-URL: http://hdl.handle.net/10.1080/14751790701254466
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:41-54
Template-Type: ReDIF-Article 1.0
Author-Name: Terry Moon
Author-X-Name-First: Terry
Author-X-Name-Last: Moon
Title: Net-centric or Networked Military Operations?
Journal: Defense & Security Analysis
Pages: 55-67
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254474
File-URL: http://hdl.handle.net/10.1080/14751790701254474
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:55-67
Template-Type: ReDIF-Article 1.0
Author-Name: Robert Daniel Wallace
Author-X-Name-First: Robert
Author-X-Name-Last: Daniel Wallace
Title: The Two-China Crisis: Background, Implications and Outcomes
Journal: Defense & Security Analysis
Pages: 69-85
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254482
File-URL: http://hdl.handle.net/10.1080/14751790701254482
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:69-85
Template-Type: ReDIF-Article 1.0
Author-Name: David R. Henderson
Author-X-Name-First: David R.
Author-X-Name-Last: Henderson
Title: The Economics of War and Foreign Policy: What's Missing?
Journal: Defense & Security Analysis
Pages: 87-100
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254524
File-URL: http://hdl.handle.net/10.1080/14751790701254524
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:87-100
Template-Type: ReDIF-Article 1.0
Author-Name: Greg Mills
Author-X-Name-First: Greg
Author-X-Name-Last: Mills
Author-Name: Terence Mcnamee
Author-X-Name-First: Terence
Author-X-Name-Last: Mcnamee
Title: God, History and Countering Insurgency
Journal: Defense & Security Analysis
Pages: 101-106
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254573
File-URL: http://hdl.handle.net/10.1080/14751790701254573
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:101-106
Template-Type: ReDIF-Article 1.0
Author-Name: Dan Fayutkin
Author-X-Name-First: Dan
Author-X-Name-Last: Fayutkin
Title: The Officer's Academic Training Options and His Preparation for Fighting in the Limited Conflict Area
Journal: Defense & Security Analysis
Pages: 107-114
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254607
File-URL: http://hdl.handle.net/10.1080/14751790701254607
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:107-114
Template-Type: ReDIF-Article 1.0
Author-Name: David R. Bowne
Author-X-Name-First: David R.
Author-X-Name-Last: Bowne
Title: Is the Insurgency Growing? A Novel Analysis of the Spatial and Temporal Dynamics of the Iraqi Insurgency
Journal: Defense & Security Analysis
Pages: 115-118
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254649
File-URL: http://hdl.handle.net/10.1080/14751790701254649
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:115-118
Template-Type: ReDIF-Article 1.0
Author-Name: Shima Keene
Author-X-Name-First: Shima
Author-X-Name-Last: Keene
Title: Book Review
Journal: Defense & Security Analysis
Pages: 119-122
Issue: 1
Volume: 23
Year: 2007
Month: 3
X-DOI: 10.1080/14751790701254664
File-URL: http://hdl.handle.net/10.1080/14751790701254664
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:1:p:119-122
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew Dorman
Author-X-Name-First: Andrew
Author-X-Name-Last: Dorman
Author-Name: Matthew Uttley
Author-X-Name-First: Matthew
Author-X-Name-Last: Uttley
Title: Editorial
Journal: Defense & Security Analysis
Pages: 125-126
Issue: 2
Volume: 23
Year: 2007
Month: 6
X-DOI: 10.1080/14751790701424689
File-URL: http://hdl.handle.net/10.1080/14751790701424689
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:125-126
Template-Type: ReDIF-Article 1.0
Author-Name: Colin McInnes
Author-X-Name-First: Colin
Author-X-Name-Last: McInnes
Title: The British Army's New Way in Warfare: A Doctrinal Misstep?
Journal: Defense & Security Analysis
Pages: 127-141
Issue: 2
Volume: 23
Year: 2007
Month: 6
X-DOI: 10.1080/14751790701424697
File-URL: http://hdl.handle.net/10.1080/14751790701424697
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:127-141
Template-Type: ReDIF-Article 1.0
Author-Name: Huw Bennett
Author-X-Name-First: Huw
Author-X-Name-Last: Bennett
Title: The Mau Mau Emergency as Part of the British Army's Post-War Counter-Insurgency Experience
Journal: Defense & Security Analysis
Pages: 143-163
Issue: 2
Volume: 23
Year: 2007
Month: 6
X-DOI: 10.1080/14751790701424705
File-URL: http://hdl.handle.net/10.1080/14751790701424705
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:143-163
Template-Type: ReDIF-Article 1.0
Author-Name: Christopher Tuck
Author-X-Name-First: Christopher
Author-X-Name-Last: Tuck
Title: Northern Ireland and the British Approach to Counter-Insurgency
Journal: Defense & Security Analysis
Pages: 165-183
Issue: 2
Volume: 23
Year: 2007
Month: 6
X-DOI: 10.1080/14751790701424721
File-URL: http://hdl.handle.net/10.1080/14751790701424721
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:165-183
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew Dorman
Author-X-Name-First: Andrew
Author-X-Name-Last: Dorman
Title: The British Experience of Low-Intensity Conflict in Sierra Leone
Journal: Defense & Security Analysis
Pages: 185-200
Issue: 2
Volume: 23
Year: 2007
Month: 6
X-DOI: 10.1080/14751790701424754
File-URL: http://hdl.handle.net/10.1080/14751790701424754
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:185-200
Template-Type: ReDIF-Article 1.0
Author-Name: Warren Chin
Author-X-Name-First: Warren
Author-X-Name-Last: Chin
Title: British Counter-Insurgency in Afghanistan
Journal: Defense & Security Analysis
Pages: 201-225
Issue: 2
Volume: 23
Year: 2007
Month: 6
X-DOI: 10.1080/14751790701424762
File-URL: http://hdl.handle.net/10.1080/14751790701424762
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:201-225
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas G. Mahnken
Author-X-Name-First: Thomas G.
Author-X-Name-Last: Mahnken
Title: The British Approach to Counter-Insurgency: An American View
Journal: Defense & Security Analysis
Pages: 227-232
Issue: 2
Volume: 23
Year: 2007
Month: 6
X-DOI: 10.1080/14751790701424770
File-URL: http://hdl.handle.net/10.1080/14751790701424770
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:2:p:227-232
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 233-235
Issue: 3
Volume: 23
Year: 2007
Month: 9
X-DOI: 10.1080/14751790701573840
File-URL: http://hdl.handle.net/10.1080/14751790701573840
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:233-235
Template-Type: ReDIF-Article 1.0
Author-Name: Edward Ifft
Author-X-Name-First: Edward
Author-X-Name-Last: Ifft
Title: Deterrence, Blackmail, Friendly Persuasion
Journal: Defense & Security Analysis
Pages: 237-256
Issue: 3
Volume: 23
Year: 2007
Month: 9
X-DOI: 10.1080/14751790701573865
File-URL: http://hdl.handle.net/10.1080/14751790701573865
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:237-256
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: Russia's Evolving Strategic Nuclear Deterrent
Journal: Defense & Security Analysis
Pages: 257-279
Issue: 3
Volume: 23
Year: 2007
Month: 9
X-DOI: 10.1080/14751790701573873
File-URL: http://hdl.handle.net/10.1080/14751790701573873
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:257-279
Template-Type: ReDIF-Article 1.0
Author-Name: James R. Holmes
Author-X-Name-First: James R.
Author-X-Name-Last: Holmes
Author-Name: Andrew C. Winner1
Author-X-Name-First: Andrew C.
Author-X-Name-Last: Winner1
Title: The Proliferation Security Initiative: A Global Prohibition Regime in the Making?
Journal: Defense & Security Analysis
Pages: 281-295
Issue: 3
Volume: 23
Year: 2007
Month: 9
X-DOI: 10.1080/14751790701573881
File-URL: http://hdl.handle.net/10.1080/14751790701573881
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:281-295
Template-Type: ReDIF-Article 1.0
Author-Name: Tiran Rothman
Author-X-Name-First: Tiran
Author-X-Name-Last: Rothman
Title: A State's Choice: Nuclear Policy in a Changing World Between Libya and North Korea
Journal: Defense & Security Analysis
Pages: 297-313
Issue: 3
Volume: 23
Year: 2007
Month: 9
X-DOI: 10.1080/14751790701573899
File-URL: http://hdl.handle.net/10.1080/14751790701573899
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:297-313
Template-Type: ReDIF-Article 1.0
Author-Name: Shaun Gregory
Author-X-Name-First: Shaun
Author-X-Name-Last: Gregory
Title: Nuclear Command and Control in Pakistan
Journal: Defense & Security Analysis
Pages: 315-330
Issue: 3
Volume: 23
Year: 2007
Month: 9
X-DOI: 10.1080/14751790701573907
File-URL: http://hdl.handle.net/10.1080/14751790701573907
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:315-330
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew S. Duchene
Author-X-Name-First: Matthew S.
Author-X-Name-Last: Duchene
Title: What If: A Perspective on the Iranian Nuclear Weapon
Journal: Defense & Security Analysis
Pages: 331-334
Issue: 3
Volume: 23
Year: 2007
Month: 9
X-DOI: 10.1080/14751790701573915
File-URL: http://hdl.handle.net/10.1080/14751790701573915
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:3:p:331-334
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 341-344
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752386
File-URL: http://hdl.handle.net/10.1080/14751790701752386
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:341-344
Template-Type: ReDIF-Article 1.0
Author-Name: Erica Chenoweth
Author-X-Name-First: Erica
Author-X-Name-Last: Chenoweth
Author-Name: Elizabeth Lowham
Author-X-Name-First: Elizabeth
Author-X-Name-Last: Lowham
Title: On Classifying Terrorism: A Potential Contribution of Cluster Analysis for Academics and Policy-makers
Journal: Defense & Security Analysis
Pages: 345-357
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752402
File-URL: http://hdl.handle.net/10.1080/14751790701752402
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:345-357
Template-Type: ReDIF-Article 1.0
Author-Name: Amy (Wenxuan) Ding
Author-X-Name-First: Amy (Wenxuan)
Author-X-Name-Last: Ding
Title: A Mathematical Approach to Limit Illegal Border-Crossings -- with Application in Protecting Critical Infrastructure
Abstract:
The grand aim of all science is to cover the greatest number of
empirical facts by logical deduction from the smallest number of
hypotheses or axioms. Albert Einstein
Current problem: Border Emergency
Solutions in response
US Congress's response: Set
immigration policies, a series of immigration reform bills and proposals.
Government's response:
Make an appropriation/budget for border issues: increase law enforcement
personnel and needed resources, pay officers overtime, and build fences
along the border.
Scientists' response: Describe this complex problem
mathematically and provide scientific solutions.
Journal: Defense & Security Analysis
Pages: 359-377
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752410
File-URL: http://hdl.handle.net/10.1080/14751790701752410
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:359-377
Template-Type: ReDIF-Article 1.0
Author-Name: Svetoslav Gaidow*
Author-X-Name-First: Svetoslav
Author-X-Name-Last: Gaidow*
Title: Quest for Credibility: Australian Defence Risk Management Framework
Journal: Defense & Security Analysis
Pages: 379-387
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752428
File-URL: http://hdl.handle.net/10.1080/14751790701752428
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:379-387
Template-Type: ReDIF-Article 1.0
Author-Name: Shih-Yueh Yang
Author-X-Name-First: Shih-Yueh
Author-X-Name-Last: Yang
Author-Name: William C. Vocke
Author-X-Name-First: William C.
Author-X-Name-Last: Vocke
Title: US Army Transformation: Where is the Future?
Journal: Defense & Security Analysis
Pages: 389-403
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752436
File-URL: http://hdl.handle.net/10.1080/14751790701752436
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:389-403
Template-Type: ReDIF-Article 1.0
Author-Name: Sean M. Maloney
Author-X-Name-First: Sean M.
Author-X-Name-Last: Maloney
Title: Blood on the Ground: Canada and the Southern Campaign in Afghanistan
Abstract:
For the Americans, it's no longer just “boots on the
ground”: it's blood on the ground that counts.
Joel J. Sokolsky
Journal: Defense & Security Analysis
Pages: 405-417
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752444
File-URL: http://hdl.handle.net/10.1080/14751790701752444
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:405-417
Template-Type: ReDIF-Article 1.0
Author-Name: Manjeet S. Pardesi
Author-X-Name-First: Manjeet S.
Author-X-Name-Last: Pardesi
Author-Name: Ron Matthews
Author-X-Name-First: Ron
Author-X-Name-Last: Matthews
Title: India's Tortuous Road to Defence-Industrial Self-Reliance
Abstract:
…Rapid indigenisation is the cornerstone of our policy of
self-reliance India MoD Annual Report
1978--9
Journal: Defense & Security Analysis
Pages: 419-438
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752451
File-URL: http://hdl.handle.net/10.1080/14751790701752451
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:419-438
Template-Type: ReDIF-Article 1.0
Author-Name: Dmitri Vertkin
Author-X-Name-First: Dmitri
Author-X-Name-Last: Vertkin
Title: Kazakhstan and Islam
Journal: Defense & Security Analysis
Pages: 439-440
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752469
File-URL: http://hdl.handle.net/10.1080/14751790701752469
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:439-440
Template-Type: ReDIF-Article 1.0
Author-Name: H. F. De Wet
Author-X-Name-First: H. F.
Author-X-Name-Last: De Wet
Title: Economics and Security Studies: Is the South African Military Academy Still on Track?
Journal: Defense & Security Analysis
Pages: 441-447
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752477
File-URL: http://hdl.handle.net/10.1080/14751790701752477
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:441-447
Template-Type: ReDIF-Article 1.0
Author-Name: Shima Keene
Author-X-Name-First: Shima
Author-X-Name-Last: Keene
Title: Book Review
Journal: Defense & Security Analysis
Pages: 449-453
Issue: 4
Volume: 23
Year: 2007
Month: 12
X-DOI: 10.1080/14751790701752485
File-URL: http://hdl.handle.net/10.1080/14751790701752485
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:23:y:2007:i:4:p:449-453
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-3
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903145
File-URL: http://hdl.handle.net/10.1080/14751790801903145
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:1-3
Template-Type: ReDIF-Article 1.0
Author-Name: Terry Moon
Author-X-Name-First: Terry
Author-X-Name-Last: Moon
Author-Name: Suzanne Fewell
Author-X-Name-First: Suzanne
Author-X-Name-Last: Fewell
Author-Name: Hayley Reynolds
Author-X-Name-First: Hayley
Author-X-Name-Last: Reynolds
Title: The What, Why, When and How of Interoperability
Journal: Defense & Security Analysis
Pages: 5-17
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903178
File-URL: http://hdl.handle.net/10.1080/14751790801903178
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:5-17
Template-Type: ReDIF-Article 1.0
Author-Name: David McCraw
Author-X-Name-First: David
Author-X-Name-Last: McCraw
Title: New Zealand's Defence Policy: From Realism to Idealism?
Journal: Defense & Security Analysis
Pages: 19-32
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903194
File-URL: http://hdl.handle.net/10.1080/14751790801903194
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:19-32
Template-Type: ReDIF-Article 1.0
Author-Name: Harsh V. Pant*
Author-X-Name-First: Harsh V.
Author-X-Name-Last: Pant*
Title: China in Africa: The Push Continues But All's Not Well
Journal: Defense & Security Analysis
Pages: 33-43
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903202
File-URL: http://hdl.handle.net/10.1080/14751790801903202
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:33-43
Template-Type: ReDIF-Article 1.0
Author-Name: Robert L. Feldman
Author-X-Name-First: Robert L.
Author-X-Name-Last: Feldman
Title: Why Uganda Has Failed to Defeat the Lord's Resistance Army
Journal: Defense & Security Analysis
Pages: 45-52
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903210
File-URL: http://hdl.handle.net/10.1080/14751790801903210
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:45-52
Template-Type: ReDIF-Article 1.0
Author-Name: Heinz Gärtner
Author-X-Name-First: Heinz
Author-X-Name-Last: Gärtner
Title: The Wassenaar Arrangement (WA): How it is Broken and Needs to be Fixed
Journal: Defense & Security Analysis
Pages: 53-60
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903236
File-URL: http://hdl.handle.net/10.1080/14751790801903236
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:53-60
Template-Type: ReDIF-Article 1.0
Author-Name: Jason E. Strakes
Author-X-Name-First: Jason E.
Author-X-Name-Last: Strakes
Title: Illicit Arms Transfers: Linking Weapons Characteristics and Strategic Applications
Journal: Defense & Security Analysis
Pages: 61-64
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903244
File-URL: http://hdl.handle.net/10.1080/14751790801903244
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:61-64
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew Kowalski
Author-X-Name-First: Matthew
Author-X-Name-Last: Kowalski
Title: Global Insurgency or Global Confrontation? Counter-insurgency Doctrine and the “‘Long’ War” on Terrorism
Journal: Defense & Security Analysis
Pages: 65-71
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903251
File-URL: http://hdl.handle.net/10.1080/14751790801903251
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:65-71
Template-Type: ReDIF-Article 1.0
Author-Name: Mark Fitzpatrick
Author-X-Name-First: Mark
Author-X-Name-Last: Fitzpatrick
Title: Non-Proliferation and Counter‐Proliferation: What is the Difference?*
Abstract:
* An
earlier version of this paper was presented at an April 26, 2007
international NATO advanced research workshop on “Priorities in
Nuclear Arms Control and Non-Proliferation: Comparing and Tuning
Approaches of Russia and the West” held at the International
Federation for Peace and Conciliation, Moscow.
Journal: Defense & Security Analysis
Pages: 73-79
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903327
File-URL: http://hdl.handle.net/10.1080/14751790801903327
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:73-79
Template-Type: ReDIF-Article 1.0
Author-Name: Group Captain Neville Parton
Author-X-Name-First:
Author-X-Name-Last: Group Captain Neville Parton
Title: In Defence of Doctrine…But Not Dogma
Journal: Defense & Security Analysis
Pages: 81-89
Issue: 1
Volume: 24
Year: 2008
Month: 3
X-DOI: 10.1080/14751790801903335
File-URL: http://hdl.handle.net/10.1080/14751790801903335
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:1:p:81-89
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 101-105
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802124915
File-URL: http://hdl.handle.net/10.1080/14751790802124915
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:101-105
Template-Type: ReDIF-Article 1.0
Author-Name: Raymond Franck
Author-X-Name-First: Raymond
Author-X-Name-Last: Franck
Author-Name: Francois Melese
Author-X-Name-First: Francois
Author-X-Name-Last: Melese
Title: Defense Acquisition: New Insights from Transaction Cost Economics*
Abstract:
* We are
grateful to the editors of this journal, participants at the RAND sessions
of theWestern Economic Association meetings, and colleagues at the Naval
Postgraduate School for many helpful comments and suggestions.We would
specifically like to thank our colleagues Dr Keith Snyder, John Dillard
and Admiral James Greene of the Graduate School of Business and Public
Policy for research sponsorship and for organizing a yearly Acquisition
Research Symposium where we were invited to present this work. The usual
disclaimers apply.
Journal: Defense & Security Analysis
Pages: 107-128
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802124931
File-URL: http://hdl.handle.net/10.1080/14751790802124931
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:107-128
Template-Type: ReDIF-Article 1.0
Author-Name: Simen A. Ellingsen
Author-X-Name-First: Simen A.
Author-X-Name-Last: Ellingsen
Title: Safeguards Against Nuclear Terrorism: HEU vs Plutonium
Journal: Defense & Security Analysis
Pages: 129-146
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802124949
File-URL: http://hdl.handle.net/10.1080/14751790802124949
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:129-146
Template-Type: ReDIF-Article 1.0
Author-Name: James Nathan
Author-X-Name-First: James
Author-X-Name-Last: Nathan
Title: The Retreat fromWestphalia: Iraq and the “Shadow of Power”
Journal: Defense & Security Analysis
Pages: 147-164
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802124956
File-URL: http://hdl.handle.net/10.1080/14751790802124956
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:147-164
Template-Type: ReDIF-Article 1.0
Author-Name: Christos Kassimeris
Author-X-Name-First: Christos
Author-X-Name-Last: Kassimeris
Title: NATO and the Aegean Disputes
Journal: Defense & Security Analysis
Pages: 165-179
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802124964
File-URL: http://hdl.handle.net/10.1080/14751790802124964
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:165-179
Template-Type: ReDIF-Article 1.0
Author-Name: Charles Kirke
Author-X-Name-First: Charles
Author-X-Name-Last: Kirke
Title: Issues in Integrating Territorial Army Soldiers into Regular British Units for Operations: A Regular View
Journal: Defense & Security Analysis
Pages: 181-195
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802124980
File-URL: http://hdl.handle.net/10.1080/14751790802124980
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:181-195
Template-Type: ReDIF-Article 1.0
Author-Name: Jacques Aben
Author-X-Name-First: Jacques
Author-X-Name-Last: Aben
Title: The New French Military Reserve and the Test of Overseas Operations
Journal: Defense & Security Analysis
Pages: 197-202
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802124998
File-URL: http://hdl.handle.net/10.1080/14751790802124998
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:197-202
Template-Type: ReDIF-Article 1.0
Author-Name: Victoria Samson
Author-X-Name-First: Victoria
Author-X-Name-Last: Samson
Title: Spiraling Out of Control: How Missile Defense's Acquisition Strategy is Setting a Dangerous Precedent
Journal: Defense & Security Analysis
Pages: 203-211
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802125011
File-URL: http://hdl.handle.net/10.1080/14751790802125011
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:203-211
Template-Type: ReDIF-Article 1.0
Author-Name: Dan Fayutkin
Author-X-Name-First: Dan
Author-X-Name-Last: Fayutkin
Title: The Second Lebanon War: A One‐Year Perspective
Journal: Defense & Security Analysis
Pages: 213-216
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802125029
File-URL: http://hdl.handle.net/10.1080/14751790802125029
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:213-216
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: More on Avian Influenza A/H5N1 Threats in Light of Recent Statistics
Journal: Defense & Security Analysis
Pages: 217-224
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802125037
File-URL: http://hdl.handle.net/10.1080/14751790802125037
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:217-224
Template-Type: ReDIF-Article 1.0
Author-Name: Simon Reay Atkinson
Author-X-Name-First: Simon Reay
Author-X-Name-Last: Atkinson
Author-Name: Jairo Lugo
Author-X-Name-First: Jairo
Author-X-Name-Last: Lugo
Title: Book Reviews
Journal: Defense & Security Analysis
Pages: 225-230
Issue: 2
Volume: 24
Year: 2008
Month: 6
X-DOI: 10.1080/14751790802125045
File-URL: http://hdl.handle.net/10.1080/14751790802125045
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:2:p:225-230
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 233-236
Issue: 3
Volume: 24
Year: 2008
Month: 9
X-DOI: 10.1080/14751790802320976
File-URL: http://hdl.handle.net/10.1080/14751790802320976
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:233-236
Template-Type: ReDIF-Article 1.0
Author-Name: Gawdat Bahgat
Author-X-Name-First: Gawdat
Author-X-Name-Last: Bahgat
Title: Security in the Persian Gulf: Two Conflicting Models
Journal: Defense & Security Analysis
Pages: 237-245
Issue: 3
Volume: 24
Year: 2008
Month: 9
X-DOI: 10.1080/14751790802321313
File-URL: http://hdl.handle.net/10.1080/14751790802321313
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:237-245
Template-Type: ReDIF-Article 1.0
Author-Name: Bao Nguyen
Author-X-Name-First: Bao
Author-X-Name-Last: Nguyen
Author-Name: David Hopkin
Author-X-Name-First: David
Author-X-Name-Last: Hopkin
Author-Name: Handson Yip
Author-X-Name-First: Handson
Author-X-Name-Last: Yip
Title: Autonomous Underwater Vehicles: A Transformation in Mine Counter‐Measure Operations
Journal: Defense & Security Analysis
Pages: 247-266
Issue: 3
Volume: 24
Year: 2008
Month: 9
X-DOI: 10.1080/14751790802321321
File-URL: http://hdl.handle.net/10.1080/14751790802321321
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:247-266
Template-Type: ReDIF-Article 1.0
Author-Name: Major Robert L. Feldman
Author-X-Name-First: Major Robert L.
Author-X-Name-Last: Feldman
Title: Problems Plaguing the African Union Peacekeeping Forces
Journal: Defense & Security Analysis
Pages: 267-279
Issue: 3
Volume: 24
Year: 2008
Month: 9
X-DOI: 10.1080/14751790802321388
File-URL: http://hdl.handle.net/10.1080/14751790802321388
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:267-279
Template-Type: ReDIF-Article 1.0
Author-Name: James Igoe Walsh
Author-X-Name-First: James Igoe
Author-X-Name-Last: Walsh
Title: Intelligence Sharing for Counter‐Insurgency
Journal: Defense & Security Analysis
Pages: 281-301
Issue: 3
Volume: 24
Year: 2008
Month: 9
X-DOI: 10.1080/14751790802321396
File-URL: http://hdl.handle.net/10.1080/14751790802321396
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:281-301
Template-Type: ReDIF-Article 1.0
Author-Name: Kieran Webb
Author-X-Name-First: Kieran
Author-X-Name-Last: Webb
Title: Strategic Bombardment and Kosovo: Evidence from the Boer War
Journal: Defense & Security Analysis
Pages: 303-315
Issue: 3
Volume: 24
Year: 2008
Month: 9
X-DOI: 10.1080/14751790802321412
File-URL: http://hdl.handle.net/10.1080/14751790802321412
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:303-315
Template-Type: ReDIF-Article 1.0
Author-Name: Jason Cooley
Author-X-Name-First: Jason
Author-X-Name-Last: Cooley
Title: Which Moderates are More Important?
Journal: Defense & Security Analysis
Pages: 317-324
Issue: 3
Volume: 24
Year: 2008
Month: 9
X-DOI: 10.1080/14751790802321420
File-URL: http://hdl.handle.net/10.1080/14751790802321420
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:317-324
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: On Setting Priorities for International Security II: Economic and Security Implications of Natural Disasters
Journal: Defense & Security Analysis
Pages: 325-327
Issue: 3
Volume: 24
Year: 2008
Month: 9
X-DOI: 10.1080/14751790802321446
File-URL: http://hdl.handle.net/10.1080/14751790802321446
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:3:p:325-327
Template-Type: ReDIF-Article 1.0
Author-Name: David Whetham
Author-X-Name-First: David
Author-X-Name-Last: Whetham
Title: Editorial
Journal: Defense & Security Analysis
Pages: 341-344
Issue: 4
Volume: 24
Year: 2008
Month: 12
X-DOI: 10.1080/14751790802569119
File-URL: http://hdl.handle.net/10.1080/14751790802569119
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:341-344
Template-Type: ReDIF-Article 1.0
Author-Name: John Kiszely
Author-X-Name-First: John
Author-X-Name-Last: Kiszely
Title: Introduction
Journal: Defense & Security Analysis
Pages: 345-347
Issue: 4
Volume: 24
Year: 2008
Month: 12
X-DOI: 10.1080/14751790802569127
File-URL: http://hdl.handle.net/10.1080/14751790802569127
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:345-347
Template-Type: ReDIF-Article 1.0
Author-Name: Martin L. Cook
Author-X-Name-First: Martin L.
Author-X-Name-Last: Cook
Title: A Force for (Relative) Good: An Augustinian Persepective
Journal: Defense & Security Analysis
Pages: 349-361
Issue: 4
Volume: 24
Year: 2008
Month: 12
X-DOI: 10.1080/14751790802569135
File-URL: http://hdl.handle.net/10.1080/14751790802569135
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:349-361
Template-Type: ReDIF-Article 1.0
Author-Name: Robert Wilton
Author-X-Name-First: Robert
Author-X-Name-Last: Wilton
Title: The Beginning and the End of Humanitarian Intervention: Kosovo 1999
Journal: Defense & Security Analysis
Pages: 363-380
Issue: 4
Volume: 24
Year: 2008
Month: 12
X-DOI: 10.1080/14751790802569150
File-URL: http://hdl.handle.net/10.1080/14751790802569150
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:363-380
Template-Type: ReDIF-Article 1.0
Author-Name: Paul Robinson
Author-X-Name-First: Paul
Author-X-Name-Last: Robinson
Title: Why it is Time to Stop Being a “Force for Good”
Journal: Defense & Security Analysis
Pages: 381-391
Issue: 4
Volume: 24
Year: 2008
Month: 12
X-DOI: 10.1080/14751790802569168
File-URL: http://hdl.handle.net/10.1080/14751790802569168
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:381-391
Template-Type: ReDIF-Article 1.0
Author-Name: Mervyn Frost
Author-X-Name-First: Mervyn
Author-X-Name-Last: Frost
Title: The Ethical Imperatives of Foreign and Defence Policy
Journal: Defense & Security Analysis
Pages: 393-400
Issue: 4
Volume: 24
Year: 2008
Month: 12
X-DOI: 10.1080/14751790802569184
File-URL: http://hdl.handle.net/10.1080/14751790802569184
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:393-400
Template-Type: ReDIF-Article 1.0
Author-Name: Rachel Kerr
Author-X-Name-First: Rachel
Author-X-Name-Last: Kerr
Title: A Force for Good? War, Crime and Legitimacy: The British Army in Iraq
Journal: Defense & Security Analysis
Pages: 401-419
Issue: 4
Volume: 24
Year: 2008
Month: 12
X-DOI: 10.1080/14751790802569200
File-URL: http://hdl.handle.net/10.1080/14751790802569200
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:24:y:2008:i:4:p:401-419
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-5
Issue: 1
Volume: 25
Year: 2009
Month: 3
X-DOI: 10.1080/14751790902749868
File-URL: http://hdl.handle.net/10.1080/14751790902749868
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:1-5
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Shubik
Author-X-Name-First: Martin
Author-X-Name-Last: Shubik
Author-Name: Aaron Zelinsky
Author-X-Name-First: Aaron
Author-X-Name-Last: Zelinsky
Title: Terrorism Damage Exchange Rates: Quantifying Defender Disadvantage
Journal: Defense & Security Analysis
Pages: 7-20
Issue: 1
Volume: 25
Year: 2009
Month: 3
X-DOI: 10.1080/14751790902749876
File-URL: http://hdl.handle.net/10.1080/14751790902749876
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:7-20
Template-Type: ReDIF-Article 1.0
Author-Name: Tim Benbow
Author-X-Name-First: Tim
Author-X-Name-Last: Benbow
Title: Irresistible Force or Immoveable Object? The “Revolution in Military Affairs” and Asymmetric Warfare
Journal: Defense & Security Analysis
Pages: 21-36
Issue: 1
Volume: 25
Year: 2009
Month: 3
X-DOI: 10.1080/14751790902749884
File-URL: http://hdl.handle.net/10.1080/14751790902749884
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:21-36
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen D. Unwin
Author-X-Name-First: Stephen D.
Author-X-Name-Last: Unwin
Author-Name: Barbara A. Fecht
Author-X-Name-First: Barbara A.
Author-X-Name-Last: Fecht
Title: Consumer Choice and Dempster-Shafer Models of Threat Prioritization for Emerging Dual-Use Technologies: Their Application to Synthetic Biology
Journal: Defense & Security Analysis
Pages: 37-52
Issue: 1
Volume: 25
Year: 2009
Month: 3
X-DOI: 10.1080/14751790902749892
File-URL: http://hdl.handle.net/10.1080/14751790902749892
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:37-52
Template-Type: ReDIF-Article 1.0
Author-Name: Yi Yue
Author-X-Name-First: Yi
Author-X-Name-Last: Yue
Author-Name: Michael Henshaw
Author-X-Name-First: Michael
Author-X-Name-Last: Henshaw
Title: An Holistic View of UK Military Capability Development☆
Journal: Defense & Security Analysis
Pages: 53-67
Issue: 1
Volume: 25
Year: 2009
Month: 3
X-DOI: 10.1080/14751790902749900
File-URL: http://hdl.handle.net/10.1080/14751790902749900
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:53-67
Template-Type: ReDIF-Article 1.0
Author-Name: Kevin Y.K. Ng
Author-X-Name-First: Kevin Y.K.
Author-X-Name-Last: Ng
Author-Name: M. Natalie Lam
Author-X-Name-First: M. Natalie
Author-X-Name-Last: Lam
Title: The Canadian Forces' Information and Intelligence Fusion Center: A Preliminary Capacity Planning Study-super-1
Journal: Defense & Security Analysis
Pages: 69-79
Issue: 1
Volume: 25
Year: 2009
Month: 3
X-DOI: 10.1080/14751790902749918
File-URL: http://hdl.handle.net/10.1080/14751790902749918
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:69-79
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: Moral Dynamics andMilitary Operations
Journal: Defense & Security Analysis
Pages: 81-88
Issue: 1
Volume: 25
Year: 2009
Month: 3
X-DOI: 10.1080/14751790902749926
File-URL: http://hdl.handle.net/10.1080/14751790902749926
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:81-88
Template-Type: ReDIF-Article 1.0
Author-Name: Hugo L. E. Meijer
Author-X-Name-First: Hugo L. E.
Author-X-Name-Last: Meijer
Title: Reflections on Politics, Strategy and Norms in Outer Space
Journal: Defense & Security Analysis
Pages: 89-98
Issue: 1
Volume: 25
Year: 2009
Month: 3
X-DOI: 10.1080/14751790902749942
File-URL: http://hdl.handle.net/10.1080/14751790902749942
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:1:p:89-98
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 99-104
Issue: 2
Volume: 25
Year: 2009
Month: 6
X-DOI: 10.1080/14751790902983582
File-URL: http://hdl.handle.net/10.1080/14751790902983582
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:99-104
Template-Type: ReDIF-Article 1.0
Author-Name: Claire Metelits
Author-X-Name-First: Claire
Author-X-Name-Last: Metelits
Title: The Logic of Change: Pushing the Boundaries of Insurgent Behavior Theory-super-1
Journal: Defense & Security Analysis
Pages: 105-118
Issue: 2
Volume: 25
Year: 2009
Month: 6
X-DOI: 10.1080/14751790902983590
File-URL: http://hdl.handle.net/10.1080/14751790902983590
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:105-118
Template-Type: ReDIF-Article 1.0
Author-Name: M. J.F. Healy
Author-X-Name-First: M. J.F.
Author-X-Name-Last: Healy
Author-Name: K. Weston
Author-X-Name-First: K.
Author-X-Name-Last: Weston
Author-Name: M. Romilly
Author-X-Name-First: M.
Author-X-Name-Last: Romilly
Author-Name: K. Arbuthnot
Author-X-Name-First: K.
Author-X-Name-Last: Arbuthnot
Title: A Model to Support CBRN Defence
Journal: Defense & Security Analysis
Pages: 119-135
Issue: 2
Volume: 25
Year: 2009
Month: 6
X-DOI: 10.1080/14751790902985157
File-URL: http://hdl.handle.net/10.1080/14751790902985157
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:119-135
Template-Type: ReDIF-Article 1.0
Author-Name: P. N. Ram Kumar
Author-X-Name-First: P. N.
Author-X-Name-Last: Ram Kumar
Author-Name: T. T. Narendran
Author-X-Name-First: T. T.
Author-X-Name-Last: Narendran
Title: A Mathematical Approach for Variable Speed Convoy Movement Problem(CMP)
Journal: Defense & Security Analysis
Pages: 137-155
Issue: 2
Volume: 25
Year: 2009
Month: 6
X-DOI: 10.1080/14751790902985165
File-URL: http://hdl.handle.net/10.1080/14751790902985165
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:137-155
Template-Type: ReDIF-Article 1.0
Author-Name: Gregory Levitin
Author-X-Name-First: Gregory
Author-X-Name-Last: Levitin
Author-Name: Kjell Hausken
Author-X-Name-First: Kjell
Author-X-Name-Last: Hausken
Title: Intelligence and Impact Contests in Systems with Fake Targets
Journal: Defense & Security Analysis
Pages: 157-173
Issue: 2
Volume: 25
Year: 2009
Month: 6
X-DOI: 10.1080/14751790902985181
File-URL: http://hdl.handle.net/10.1080/14751790902985181
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:157-173
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: US Strategic Nuclear Arms Control: Campaign Echoes and Obama's Options
Journal: Defense & Security Analysis
Pages: 175-192
Issue: 2
Volume: 25
Year: 2009
Month: 6
X-DOI: 10.1080/14751790902985207
File-URL: http://hdl.handle.net/10.1080/14751790902985207
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:175-192
Template-Type: ReDIF-Article 1.0
Author-Name: Lamont Colucci
Author-X-Name-First: Lamont
Author-X-Name-Last: Colucci
Title: The Bush Doctrine and the Anglo-American Special Relationship
Journal: Defense & Security Analysis
Pages: 193-200
Issue: 2
Volume: 25
Year: 2009
Month: 6
X-DOI: 10.1080/14751790902985215
File-URL: http://hdl.handle.net/10.1080/14751790902985215
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:193-200
Template-Type: ReDIF-Article 1.0
Author-Name: Dan Fayutkin
Author-X-Name-First: Dan
Author-X-Name-Last: Fayutkin
Title: The Second Lebanon War -- A Two-Year Perspective
Journal: Defense & Security Analysis
Pages: 201-204
Issue: 2
Volume: 25
Year: 2009
Month: 6
X-DOI: 10.1080/14751790902985231
File-URL: http://hdl.handle.net/10.1080/14751790902985231
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:201-204
Template-Type: ReDIF-Article 1.0
Author-Name: Daniel Rosenfield
Author-X-Name-First: Daniel
Author-X-Name-Last: Rosenfield
Title: National Missile Defense
Journal: Defense & Security Analysis
Pages: 205-213
Issue: 2
Volume: 25
Year: 2009
Month: 6
X-DOI: 10.1080/14751790902985256
File-URL: http://hdl.handle.net/10.1080/14751790902985256
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:2:p:205-213
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 217-222
Issue: 3
Volume: 25
Year: 2009
Month: 9
X-DOI: 10.1080/14751790903201372
File-URL: http://hdl.handle.net/10.1080/14751790903201372
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:217-222
Template-Type: ReDIF-Article 1.0
Author-Name: James Kraska
Author-X-Name-First: James
Author-X-Name-Last: Kraska
Author-Name: Brian Wilson
Author-X-Name-First: Brian
Author-X-Name-Last: Wilson
Title: The Global Maritime Partnership and Somali Piracy
Journal: Defense & Security Analysis
Pages: 223-234
Issue: 3
Volume: 25
Year: 2009
Month: 9
X-DOI: 10.1080/14751790903201380
File-URL: http://hdl.handle.net/10.1080/14751790903201380
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:223-234
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew J. Enterline
Author-X-Name-First: Andrew J.
Author-X-Name-Last: Enterline
Author-Name: J. Michael Greig
Author-X-Name-First: J. Michael
Author-X-Name-Last: Greig
Author-Name: Yoav Gortzak
Author-X-Name-First: Yoav
Author-X-Name-Last: Gortzak
Title: Testing Shinseki: Speed, Mass and Insurgency in Post-war Iraq
Journal: Defense & Security Analysis
Pages: 235-253
Issue: 3
Volume: 25
Year: 2009
Month: 9
X-DOI: 10.1080/14751790903201398
File-URL: http://hdl.handle.net/10.1080/14751790903201398
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:235-253
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas C. Bruneau
Author-X-Name-First: Thomas C.
Author-X-Name-Last: Bruneau
Author-Name: Florina Cristiana (Cris) Matei
Author-X-Name-First: Florina Cristiana (Cris)
Author-X-Name-Last: Matei
Author-Name: Sak Sakoda
Author-X-Name-First: Sak
Author-X-Name-Last: Sakoda
Title: National Security Councils: Their Potential Functions in Democratic Civil-Military Relations
Journal: Defense & Security Analysis
Pages: 255-269
Issue: 3
Volume: 25
Year: 2009
Month: 9
X-DOI: 10.1080/14751790903201406
File-URL: http://hdl.handle.net/10.1080/14751790903201406
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:255-269
Template-Type: ReDIF-Article 1.0
Author-Name: Benjamin Armstrong
Author-X-Name-First: Benjamin
Author-X-Name-Last: Armstrong
Title: Precision Approaches: Leadership Targeting and the Helicopter as a Strategic Strike Asset in Small Wars
Journal: Defense & Security Analysis
Pages: 271-284
Issue: 3
Volume: 25
Year: 2009
Month: 9
X-DOI: 10.1080/14751790903201414
File-URL: http://hdl.handle.net/10.1080/14751790903201414
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:271-284
Template-Type: ReDIF-Article 1.0
Author-Name: Jomana Amara
Author-X-Name-First: Jomana
Author-X-Name-Last: Amara
Author-Name: Ann Hendricks
Author-X-Name-First: Ann
Author-X-Name-Last: Hendricks
Title: Healthcare Issues of the Iraq and Afghan Wars: Short- and Long-term Impacts on US Veterans' Healthcare -super-1
Journal: Defense & Security Analysis
Pages: 285-298
Issue: 3
Volume: 25
Year: 2009
Month: 9
X-DOI: 10.1080/14751790903201422
File-URL: http://hdl.handle.net/10.1080/14751790903201422
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:285-298
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Pandemic Scope and Severity of Novel Influenza A/H1N1 (Swine Flu)
Journal: Defense & Security Analysis
Pages: 299-304
Issue: 3
Volume: 25
Year: 2009
Month: 9
X-DOI: 10.1080/14751790903201430
File-URL: http://hdl.handle.net/10.1080/14751790903201430
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:299-304
Template-Type: ReDIF-Article 1.0
Author-Name: David Mugridge
Author-X-Name-First: David
Author-X-Name-Last: Mugridge
Title: Malaise or Farce - The International Failure of Maritime Security
Journal: Defense & Security Analysis
Pages: 305-311
Issue: 3
Volume: 25
Year: 2009
Month: 9
X-DOI: 10.1080/14751790903201448
File-URL: http://hdl.handle.net/10.1080/14751790903201448
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:305-311
Template-Type: ReDIF-Article 1.0
Author-Name: James Dingley
Author-X-Name-First: James
Author-X-Name-Last: Dingley
Author-Name: Shima Keene
Author-X-Name-First: Shima
Author-X-Name-Last: Keene
Author-Name: Michael Smith
Author-X-Name-First: Michael
Author-X-Name-Last: Smith
Author-Name: David Pinder
Author-X-Name-First: David
Author-X-Name-Last: Pinder
Title: Book Reviews
Journal: Defense & Security Analysis
Pages: 313-320
Issue: 3
Volume: 25
Year: 2009
Month: 9
X-DOI: 10.1080/14751790903201455
File-URL: http://hdl.handle.net/10.1080/14751790903201455
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:3:p:313-320
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 325-329
Issue: 4
Volume: 25
Year: 2009
Month: 12
X-DOI: 10.1080/14751790903416681
File-URL: http://hdl.handle.net/10.1080/14751790903416681
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:325-329
Template-Type: ReDIF-Article 1.0
Author-Name: James A. Nathan
Author-X-Name-First: James A.
Author-X-Name-Last: Nathan
Title: Poppy Blues: The Collapse of Poppy Eradication and the Road Ahead in Afghanistan
Journal: Defense & Security Analysis
Pages: 331-353
Issue: 4
Volume: 25
Year: 2009
Month: 12
X-DOI: 10.1080/14751790903416699
File-URL: http://hdl.handle.net/10.1080/14751790903416699
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:331-353
Template-Type: ReDIF-Article 1.0
Author-Name: Robert L. Feldman
Author-X-Name-First: Robert L.
Author-X-Name-Last: Feldman
Title: The Root Causes of Terrorism: Why Parts of Africa Might Never Be at Peace
Journal: Defense & Security Analysis
Pages: 355-372
Issue: 4
Volume: 25
Year: 2009
Month: 12
X-DOI: 10.1080/14751790903416707
File-URL: http://hdl.handle.net/10.1080/14751790903416707
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:355-372
Template-Type: ReDIF-Article 1.0
Author-Name: Nicholas Kerton-Johnson
Author-X-Name-First: Nicholas
Author-X-Name-Last: Kerton-Johnson
Title: Justifying War in the Post-Cold War Era: Shifting Norms of International Society?
Journal: Defense & Security Analysis
Pages: 373-392
Issue: 4
Volume: 25
Year: 2009
Month: 12
X-DOI: 10.1080/14751790903416715
File-URL: http://hdl.handle.net/10.1080/14751790903416715
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:373-392
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: North Korea and Nuclear Danger: Context and Policy Options
Journal: Defense & Security Analysis
Pages: 393-412
Issue: 4
Volume: 25
Year: 2009
Month: 12
X-DOI: 10.1080/14751790903416723
File-URL: http://hdl.handle.net/10.1080/14751790903416723
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:393-412
Template-Type: ReDIF-Article 1.0
Author-Name: P. K. Gautam
Author-X-Name-First: P. K.
Author-X-Name-Last: Gautam
Title: Ways of Warfare and Strategic Culture
Journal: Defense & Security Analysis
Pages: 413-423
Issue: 4
Volume: 25
Year: 2009
Month: 12
X-DOI: 10.1080/14751790903416731
File-URL: http://hdl.handle.net/10.1080/14751790903416731
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:413-423
Template-Type: ReDIF-Article 1.0
Author-Name: Loro Horta
Author-X-Name-First: Loro
Author-X-Name-Last: Horta
Title: A Brave New World: China Embraces the Caribbean
Journal: Defense & Security Analysis
Pages: 425-432
Issue: 4
Volume: 25
Year: 2009
Month: 12
X-DOI: 10.1080/14751790903416749
File-URL: http://hdl.handle.net/10.1080/14751790903416749
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:425-432
Template-Type: ReDIF-Article 1.0
Author-Name: Bart R. Smedts
Author-X-Name-First: Bart R.
Author-X-Name-Last: Smedts
Title: The Sword of Damocles: An Everlasting Bio-Threat?
Journal: Defense & Security Analysis
Pages: 433-442
Issue: 4
Volume: 25
Year: 2009
Month: 12
X-DOI: 10.1080/14751790903416756
File-URL: http://hdl.handle.net/10.1080/14751790903416756
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:25:y:2009:i:4:p:433-442
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-10
Issue: 1
Volume: 26
Year: 2010
Month: 3
X-DOI: 10.1080/14751791003658552
File-URL: http://hdl.handle.net/10.1080/14751791003658552
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:1-10
Template-Type: ReDIF-Article 1.0
Author-Name: John A. Gentry
Author-X-Name-First: John A.
Author-X-Name-Last: Gentry
Title: Norms as Weapons of War
Journal: Defense & Security Analysis
Pages: 11-30
Issue: 1
Volume: 26
Year: 2010
Month: 3
X-DOI: 10.1080/14751791003658560
File-URL: http://hdl.handle.net/10.1080/14751791003658560
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:11-30
Template-Type: ReDIF-Article 1.0
Author-Name: Charles-Philippe David
Author-X-Name-First: Charles-Philippe
Author-X-Name-Last: David
Title: How Not to do Post-invasion: Lessons Learned from US Decision-making in Iraq (2002--2008)
Journal: Defense & Security Analysis
Pages: 31-63
Issue: 1
Volume: 26
Year: 2010
Month: 3
X-DOI: 10.1080/14751791003658578
File-URL: http://hdl.handle.net/10.1080/14751791003658578
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:31-63
Template-Type: ReDIF-Article 1.0
Author-Name: Jomana Amara
Author-X-Name-First: Jomana
Author-X-Name-Last: Amara
Author-Name: Robert M. McNab
Author-X-Name-First: Robert M.
Author-X-Name-Last: McNab
Title: Is Iraq Different?: An Examination of Whether Civilian Fatalities Adhere to the “Law of War” in the 2003--2008 Iraq Conflict
Journal: Defense & Security Analysis
Pages: 65-80
Issue: 1
Volume: 26
Year: 2010
Month: 3
X-DOI: 10.1080/14751791003658586
File-URL: http://hdl.handle.net/10.1080/14751791003658586
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:65-80
Template-Type: ReDIF-Article 1.0
Author-Name: Travis Sharp
Author-X-Name-First: Travis
Author-X-Name-Last: Sharp
Title: The US Defense Acquisition Workforce Since the Cold War
Journal: Defense & Security Analysis
Pages: 81-98
Issue: 1
Volume: 26
Year: 2010
Month: 3
X-DOI: 10.1080/14751791003658594
File-URL: http://hdl.handle.net/10.1080/14751791003658594
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:81-98
Template-Type: ReDIF-Article 1.0
Author-Name: W. Brian Howieson
Author-X-Name-First: W. Brian
Author-X-Name-Last: Howieson
Title: The Leadership Behaviors of Senior Engineering Officers in the Royal Air Force
Journal: Defense & Security Analysis
Pages: 99-106
Issue: 1
Volume: 26
Year: 2010
Month: 3
X-DOI: 10.1080/14751791003658602
File-URL: http://hdl.handle.net/10.1080/14751791003658602
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:99-106
Template-Type: ReDIF-Article 1.0
Author-Name: David Mugridge
Author-X-Name-First: David
Author-X-Name-Last: Mugridge
Title: Canadian Maritime Hubris: The Absence of a Future Maritime Security Strategy (FMSS)
Journal: Defense & Security Analysis
Pages: 107-115
Issue: 1
Volume: 26
Year: 2010
Month: 3
X-DOI: 10.1080/14751791003658610
File-URL: http://hdl.handle.net/10.1080/14751791003658610
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:107-115
Template-Type: ReDIF-Article 1.0
Author-Name: Shima Keene
Author-X-Name-First: Shima
Author-X-Name-Last: Keene
Author-Name: Graham Edmonds
Author-X-Name-First: Graham
Author-X-Name-Last: Edmonds
Title: Book Reviews
Journal: Defense & Security Analysis
Pages: 117-120
Issue: 1
Volume: 26
Year: 2010
Month: 3
X-DOI: 10.1080/14751791003658628
File-URL: http://hdl.handle.net/10.1080/14751791003658628
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:1:p:117-120
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 125-128
Issue: 2
Volume: 26
Year: 2010
Month: 6
X-DOI: 10.1080/14751798.2010.488854
File-URL: http://hdl.handle.net/10.1080/14751798.2010.488854
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:125-128
Template-Type: ReDIF-Article 1.0
Author-Name: Gregory D. Foster
Author-X-Name-First: Gregory D.
Author-X-Name-Last: Foster
Title: Transforming US National Security: A Call for Strategic Idealism
Journal: Defense & Security Analysis
Pages: 129-142
Issue: 2
Volume: 26
Year: 2010
Month: 6
X-DOI: 10.1080/14751798.2010.488855
File-URL: http://hdl.handle.net/10.1080/14751798.2010.488855
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:129-142
Template-Type: ReDIF-Article 1.0
Author-Name: Charles Kirke
Author-X-Name-First: Charles
Author-X-Name-Last: Kirke
Title: Military Cohesion, Culture and Social Psychology
Journal: Defense & Security Analysis
Pages: 143-159
Issue: 2
Volume: 26
Year: 2010
Month: 6
X-DOI: 10.1080/14751798.2010.488856
File-URL: http://hdl.handle.net/10.1080/14751798.2010.488856
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:143-159
Template-Type: ReDIF-Article 1.0
Author-Name: Natalie J. Webb
Author-X-Name-First: Natalie J.
Author-X-Name-Last: Webb
Author-Name: Anke Richter
Author-X-Name-First: Anke
Author-X-Name-Last: Richter
Title: Strategy at the Crossroads: Medical Humanitarian Assistance Missions for Navy Hospital Ships
Journal: Defense & Security Analysis
Pages: 161-179
Issue: 2
Volume: 26
Year: 2010
Month: 6
X-DOI: 10.1080/14751798.2010.488857
File-URL: http://hdl.handle.net/10.1080/14751798.2010.488857
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:161-179
Template-Type: ReDIF-Article 1.0
Author-Name: Peter Berck
Author-X-Name-First: Peter
Author-X-Name-Last: Berck
Author-Name: Jonathan Lipow
Author-X-Name-First: Jonathan
Author-X-Name-Last: Lipow
Title: Did Monetary Forces Help Turn the Tide in Iraq?
Journal: Defense & Security Analysis
Pages: 181-188
Issue: 2
Volume: 26
Year: 2010
Month: 6
X-DOI: 10.1080/14751798.2010.503100
File-URL: http://hdl.handle.net/10.1080/14751798.2010.503100
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:181-188
Template-Type: ReDIF-Article 1.0
Author-Name: Amy Wenxuan Ding
Author-X-Name-First: Amy Wenxuan
Author-X-Name-Last: Ding
Title: A Tactical Campaign at the Horn of Africa: Deploy Unmanned Surface Vehicles for Maritime Security
Journal: Defense & Security Analysis
Pages: 189-211
Issue: 2
Volume: 26
Year: 2010
Month: 6
X-DOI: 10.1080/14751798.2010.488859
File-URL: http://hdl.handle.net/10.1080/14751798.2010.488859
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:189-211
Template-Type: ReDIF-Article 1.0
Author-Name: Erik Lin-Greenberg
Author-X-Name-First: Erik
Author-X-Name-Last: Lin-Greenberg
Title: Dragon Boats: Assessing China's Anti-Piracy Operations in the Gulf of Aden
Journal: Defense & Security Analysis
Pages: 213-230
Issue: 2
Volume: 26
Year: 2010
Month: 6
X-DOI: 10.1080/14751798.2010.488867
File-URL: http://hdl.handle.net/10.1080/14751798.2010.488867
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:213-230
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Author-Name: John G. Allen
Author-X-Name-First: John G.
Author-X-Name-Last: Allen
Author-Name: James Higgs
Author-X-Name-First: James
Author-X-Name-Last: Higgs
Title: Book Reviews
Journal: Defense & Security Analysis
Pages: 231-235
Issue: 2
Volume: 26
Year: 2010
Month: 6
X-DOI: 10.1080/14751798.2010.488868
File-URL: http://hdl.handle.net/10.1080/14751798.2010.488868
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:2:p:231-235
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 239-242
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516540
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516540
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:239-242
Template-Type: ReDIF-Article 1.0
Author-Name: Allan Orr
Author-X-Name-First: Allan
Author-X-Name-Last: Orr
Title: The Artful Dodger: On Pakistan, Reality Bites
Journal: Defense & Security Analysis
Pages: 243-260
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516541
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516541
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:243-260
Template-Type: ReDIF-Article 1.0
Author-Name: Peter J. Phillips
Author-X-Name-First: Peter J.
Author-X-Name-Last: Phillips
Title: The Randomization of Terrorist Attacks
Abstract:
The purpose of this article is to explore the economic
theoretical foundations of the idea that rational terrorist organizations
deliberately randomize their attacks (by type, timing, location, and
targets) to generate uncertainty and intimidation. A choice theoretic
framework is applied to the analysis of the terrorist organization's
behavior to determine whether welfare (utility) gains from the
randomization of terrorist attacks are plausible and feasible. The
randomization of attacks can appear to promise higher amounts of political
influence for each resource input but it turns out that randomization
cannot manufacture a situation where higher amounts of political influence
are obtained for each resource input.The results imply that, rather than
randomization and instability, the rational terrorist organization is more
likely to prefer stability. The findings and implications provide a
theoretical explanation for the non-randomness of terrorist
attacks.Thismay be one small step towards explaining the patterns --
non-randomness -- in the time-series of terrorist incidents.
Journal: Defense & Security Analysis
Pages: 261-272
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516542
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516542
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:261-272
Template-Type: ReDIF-Article 1.0
Author-Name: Jeffrey A. McNeil
Author-X-Name-First: Jeffrey A.
Author-X-Name-Last: McNeil
Title: A Cognitive Approach to COIN: Countering Dangerous Beliefs
Journal: Defense & Security Analysis
Pages: 273-288
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516543
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516543
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:273-288
Template-Type: ReDIF-Article 1.0
Author-Name: James A. Nathan
Author-X-Name-First: James A.
Author-X-Name-Last: Nathan
Author-Name: Charles Tien
Author-X-Name-First: Charles
Author-X-Name-Last: Tien
Title: Casualties and Threats: Conditions of Support for War
Journal: Defense & Security Analysis
Pages: 289-304
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516544
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516544
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:289-304
Template-Type: ReDIF-Article 1.0
Author-Name: Dmitry Shlapentokh
Author-X-Name-First: Dmitry
Author-X-Name-Last: Shlapentokh
Title: Gulf States/Saudi Arabia and Russia's Approach to Iran: Similarities and Differences
Journal: Defense & Security Analysis
Pages: 305-319
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516545
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516545
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:305-319
Template-Type: ReDIF-Article 1.0
Author-Name: Tamir Libel
Author-X-Name-First: Tamir
Author-X-Name-Last: Libel
Title: IDF Operational-Level Doctrine and Education During the 1990s
Journal: Defense & Security Analysis
Pages: 321-324
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516547
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516547
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:321-324
Template-Type: ReDIF-Article 1.0
Author-Name: Heinz Gärtner
Author-X-Name-First: Heinz
Author-X-Name-Last: Gärtner
Title: Non-Proliferation and Engagement: Iran and North Korea Should Not Let the Opportunity Slip By
Journal: Defense & Security Analysis
Pages: 325-330
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516548
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516548
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:325-330
Template-Type: ReDIF-Article 1.0
Author-Name: Cédric Laguerre
Author-X-Name-First: Cédric
Author-X-Name-Last: Laguerre
Author-Name: Marc De Vore
Author-X-Name-First: Marc
Author-X-Name-Last: De Vore
Title: F-35: Price and Prejudice
Journal: Defense & Security Analysis
Pages: 331-333
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516549
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516549
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:331-333
Template-Type: ReDIF-Article 1.0
Author-Name: Rick “Ozzie” Nelson
Author-X-Name-First: Rick
Author-X-Name-Last: “Ozzie” Nelson
Author-Name: Ben Bodurian
Author-X-Name-First: Ben
Author-X-Name-Last: Bodurian
Title: Academia and Policy: Enhancing Co-operation; Increasing Understanding
Journal: Defense & Security Analysis
Pages: 335-341
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516551
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516551
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:335-341
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: Book Reviews
Journal: Defense & Security Analysis
Pages: 343-345
Issue: 3
Volume: 26
Year: 2010
Month: 9
X-DOI: 10.1080/14751798.2010.516553
File-URL: http://hdl.handle.net/10.1080/14751798.2010.516553
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:3:p:343-345
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 349-351
Issue: 4
Volume: 26
Year: 2010
Month: 12
X-DOI: 10.1080/14751798.2010.534644
File-URL: http://hdl.handle.net/10.1080/14751798.2010.534644
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:349-351
Template-Type: ReDIF-Article 1.0
Author-Name: Simen A. Ellingsen
Author-X-Name-First: Simen A.
Author-X-Name-Last: Ellingsen
Title: Deliberations of a Nuclear Terrorist: Patience or Opportunism?
Journal: Defense & Security Analysis
Pages: 353-369
Issue: 4
Volume: 26
Year: 2010
Month: 12
X-DOI: 10.1080/14751798.2010.534645
File-URL: http://hdl.handle.net/10.1080/14751798.2010.534645
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:353-369
Template-Type: ReDIF-Article 1.0
Author-Name: Cathy Downes
Author-X-Name-First: Cathy
Author-X-Name-Last: Downes
Title: Unintentional Militarism: Over-reliance on Military Methods and Mindsets in US National Security and its Consequences
Journal: Defense & Security Analysis
Pages: 371-385
Issue: 4
Volume: 26
Year: 2010
Month: 12
X-DOI: 10.1080/14751798.2010.534646
File-URL: http://hdl.handle.net/10.1080/14751798.2010.534646
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:371-385
Template-Type: ReDIF-Article 1.0
Author-Name: Natalie J. Webb
Author-X-Name-First: Natalie J.
Author-X-Name-Last: Webb
Author-Name: Anke Richter
Author-X-Name-First: Anke
Author-X-Name-Last: Richter
Author-Name: Donald Bonsper
Author-X-Name-First: Donald
Author-X-Name-Last: Bonsper
Title: Linking Defense Planning and Resource Decisions: A Return to Systems Thinking
Journal: Defense & Security Analysis
Pages: 387-400
Issue: 4
Volume: 26
Year: 2010
Month: 12
X-DOI: 10.1080/14751798.2010.534647
File-URL: http://hdl.handle.net/10.1080/14751798.2010.534647
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:387-400
Template-Type: ReDIF-Article 1.0
Author-Name: Julien Malizard
Author-X-Name-First: Julien
Author-X-Name-Last: Malizard
Title: Causality Between Economic Growth and Military Expenditure: The Case of France
Journal: Defense & Security Analysis
Pages: 401-413
Issue: 4
Volume: 26
Year: 2010
Month: 12
X-DOI: 10.1080/14751798.2010.534648
File-URL: http://hdl.handle.net/10.1080/14751798.2010.534648
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:401-413
Template-Type: ReDIF-Article 1.0
Author-Name: Håkon Lunde Saxi
Author-X-Name-First: Håkon Lunde
Author-X-Name-Last: Saxi
Title: Defending Small States: Norwegian and Danish Defense Policies in the Post-Cold War Era
Journal: Defense & Security Analysis
Pages: 415-430
Issue: 4
Volume: 26
Year: 2010
Month: 12
X-DOI: 10.1080/14751798.2010.534649
File-URL: http://hdl.handle.net/10.1080/14751798.2010.534649
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:415-430
Template-Type: ReDIF-Article 1.0
Author-Name: Amitai Etzioni
Author-X-Name-First: Amitai
Author-X-Name-Last: Etzioni
Title: Rational Actors: Neither Mad nor M.A.D.: The Meanings of Rationality, Rogue States and Terrorists
Journal: Defense & Security Analysis
Pages: 431-438
Issue: 4
Volume: 26
Year: 2010
Month: 12
X-DOI: 10.1080/14751798.2010.534650
File-URL: http://hdl.handle.net/10.1080/14751798.2010.534650
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:431-438
Template-Type: ReDIF-Article 1.0
Author-Name: Simon Reay Atkinson
Author-X-Name-First: Simon Reay
Author-X-Name-Last: Atkinson
Title: Book Reviews
Journal: Defense & Security Analysis
Pages: 439-440
Issue: 4
Volume: 26
Year: 2010
Month: 12
X-DOI: 10.1080/14751798.2010.534651
File-URL: http://hdl.handle.net/10.1080/14751798.2010.534651
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:26:y:2010:i:4:p:439-440
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew Dorman
Author-X-Name-First: Andrew
Author-X-Name-Last: Dorman
Author-Name: David Hastings Dunn
Author-X-Name-First: David
Author-X-Name-Last: Hastings Dunn
Title: Introduction and Editorial
Journal: Defense & Security Analysis
Pages: 1-4
Issue: 1
Volume: 27
Year: 2011
Month: 3
X-DOI: 10.1080/14751798.2011.557208
File-URL: http://hdl.handle.net/10.1080/14751798.2011.557208
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:1-4
Template-Type: ReDIF-Article 1.0
Author-Name: David Hastings Dunn
Author-X-Name-First: David
Author-X-Name-Last: Hastings Dunn
Title: UK--US Relations After the Three Bs -- Blair, Brown and Bush
Journal: Defense & Security Analysis
Pages: 5-18
Issue: 1
Volume: 27
Year: 2011
Month: 3
X-DOI: 10.1080/14751798.2011.557210
File-URL: http://hdl.handle.net/10.1080/14751798.2011.557210
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:5-18
Template-Type: ReDIF-Article 1.0
Author-Name: Robert Dover
Author-X-Name-First: Robert
Author-X-Name-Last: Dover
Title: Britain, Europe and Defense in the Post-Industrial Age
Journal: Defense & Security Analysis
Pages: 19-30
Issue: 1
Volume: 27
Year: 2011
Month: 3
X-DOI: 10.1080/14751798.2011.557211
File-URL: http://hdl.handle.net/10.1080/14751798.2011.557211
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:19-30
Template-Type: ReDIF-Article 1.0
Author-Name: Wyn Rees
Author-X-Name-First: Wyn
Author-X-Name-Last: Rees
Title: Britain and the Wider World
Journal: Defense & Security Analysis
Pages: 31-41
Issue: 1
Volume: 27
Year: 2011
Month: 3
X-DOI: 10.1080/14751798.2011.557212
File-URL: http://hdl.handle.net/10.1080/14751798.2011.557212
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:31-41
Template-Type: ReDIF-Article 1.0
Author-Name: Helen McCartney
Author-X-Name-First: Helen
Author-X-Name-Last: McCartney
Title: Hero, Victimor Villain? The Public Image of the British Soldier and its Implications for Defense Policy
Journal: Defense & Security Analysis
Pages: 43-54
Issue: 1
Volume: 27
Year: 2011
Month: 3
X-DOI: 10.1080/14751798.2011.557213
File-URL: http://hdl.handle.net/10.1080/14751798.2011.557213
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:43-54
Template-Type: ReDIF-Article 1.0
Author-Name: Anthony Forster
Author-X-Name-First: Anthony
Author-X-Name-Last: Forster
Title: The Military, War and the State: Testing Authority, Jurisdiction, Allegiance and Obedience
Journal: Defense & Security Analysis
Pages: 55-64
Issue: 1
Volume: 27
Year: 2011
Month: 3
X-DOI: 10.1080/14751798.2011.557215
File-URL: http://hdl.handle.net/10.1080/14751798.2011.557215
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:55-64
Template-Type: ReDIF-Article 1.0
Author-Name: Warren Chin
Author-X-Name-First: Warren
Author-X-Name-Last: Chin
Title: British Defense Policy and the War in Iraq 2003--2009
Journal: Defense & Security Analysis
Pages: 65-76
Issue: 1
Volume: 27
Year: 2011
Month: 3
X-DOI: 10.1080/14751798.2011.557216
File-URL: http://hdl.handle.net/10.1080/14751798.2011.557216
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:65-76
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew M. Dorman
Author-X-Name-First: Andrew M.
Author-X-Name-Last: Dorman
Title: Making 2+2=5: The 2010 Strategic Defence and Security Review
Journal: Defense & Security Analysis
Pages: 77-87
Issue: 1
Volume: 27
Year: 2011
Month: 3
X-DOI: 10.1080/14751798.2011.557218
File-URL: http://hdl.handle.net/10.1080/14751798.2011.557218
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:77-87
Template-Type: ReDIF-Article 1.0
Author-Name: Christopher Clapham
Author-X-Name-First: Christopher
Author-X-Name-Last: Clapham
Author-Name: Mamun Ahmed
Author-X-Name-First: Mamun
Author-X-Name-Last: Ahmed
Author-Name: Michael Shrimpton
Author-X-Name-First: Michael
Author-X-Name-Last: Shrimpton
Title: Book Reviews
Journal: Defense & Security Analysis
Pages: 89-93
Issue: 1
Volume: 27
Year: 2011
Month: 3
X-DOI: 10.1080/14751798.2011.557219
File-URL: http://hdl.handle.net/10.1080/14751798.2011.557219
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:1:p:89-93
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 97-99
Issue: 2
Volume: 27
Year: 2011
Month: 6
X-DOI: 10.1080/14751798.2011.578714
File-URL: http://hdl.handle.net/10.1080/14751798.2011.578714
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:97-99
Template-Type: ReDIF-Article 1.0
Author-Name: Uzi Ben-Shalom
Author-X-Name-First: Uzi
Author-X-Name-Last: Ben-Shalom
Author-Name: Eitan Shamir
Author-X-Name-First: Eitan
Author-X-Name-Last: Shamir
Title: Mission Command Between Theory and Practice: The Case of the IDF
Journal: Defense & Security Analysis
Pages: 101-117
Issue: 2
Volume: 27
Year: 2011
Month: 6
X-DOI: 10.1080/14751798.2011.578715
File-URL: http://hdl.handle.net/10.1080/14751798.2011.578715
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:101-117
Template-Type: ReDIF-Article 1.0
Author-Name: Elena Irina Neaga
Author-X-Name-First: Elena Irina
Author-X-Name-Last: Neaga
Author-Name: Michael Henshaw
Author-X-Name-First: Michael
Author-X-Name-Last: Henshaw
Title: A Stakeholder-Based Analysis of the Benefits of Network Enabled Capability
Journal: Defense & Security Analysis
Pages: 119-134
Issue: 2
Volume: 27
Year: 2011
Month: 6
X-DOI: 10.1080/14751798.2011.578716
File-URL: http://hdl.handle.net/10.1080/14751798.2011.578716
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:119-134
Template-Type: ReDIF-Article 1.0
Author-Name: Lora Weiss
Author-X-Name-First: Lora
Author-X-Name-Last: Weiss
Author-Name: Elizabeth Whitaker
Author-X-Name-First: Elizabeth
Author-X-Name-Last: Whitaker
Author-Name: Erica Briscoe
Author-X-Name-First: Erica
Author-X-Name-Last: Briscoe
Author-Name: Ethan Trewhitt
Author-X-Name-First: Ethan
Author-X-Name-Last: Trewhitt
Title: Evaluating Counter-IED Strategies
Journal: Defense & Security Analysis
Pages: 135-147
Issue: 2
Volume: 27
Year: 2011
Month: 6
X-DOI: 10.1080/14751798.2011.578717
File-URL: http://hdl.handle.net/10.1080/14751798.2011.578717
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:135-147
Template-Type: ReDIF-Article 1.0
Author-Name: Jaïr van der Lijn
Author-X-Name-First: Jaïr
Author-X-Name-Last: van der Lijn
Title: Crystal Balling Future Threats 2020--2030: Security Foresights of “Actors” and “Drivers” in Perspective
Journal: Defense & Security Analysis
Pages: 149-167
Issue: 2
Volume: 27
Year: 2011
Month: 6
X-DOI: 10.1080/14751798.2011.578718
File-URL: http://hdl.handle.net/10.1080/14751798.2011.578718
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:149-167
Template-Type: ReDIF-Article 1.0
Author-Name: David Dawson
Author-X-Name-First: David
Author-X-Name-Last: Dawson
Title: Wiley Handbook of Science and Technology for Homeland Security
Journal: Defense & Security Analysis
Pages: 169-186
Issue: 2
Volume: 27
Year: 2011
Month: 6
X-DOI: 10.1080/14751798.2011.578719
File-URL: http://hdl.handle.net/10.1080/14751798.2011.578719
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:169-186
Template-Type: ReDIF-Article 1.0
Author-Name: Fiona McCallum
Author-X-Name-First: Fiona
Author-X-Name-Last: McCallum
Author-Name: Mark Baillie
Author-X-Name-First: Mark
Author-X-Name-Last: Baillie
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Jeffrey Mills
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Mills
Title: BOOK REVIEWS
Journal: Defense & Security Analysis
Pages: 187-193
Issue: 2
Volume: 27
Year: 2011
Month: 6
X-DOI: 10.1080/14751798.2011.578720
File-URL: http://hdl.handle.net/10.1080/14751798.2011.578720
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:2:p:187-193
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 199-202
Issue: 3
Volume: 27
Year: 2011
Month: 9
X-DOI: 10.1080/14751798.2011.604480
File-URL: http://hdl.handle.net/10.1080/14751798.2011.604480
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:199-202
Template-Type: ReDIF-Article 1.0
Author-Name: Jonathan Luminati
Author-X-Name-First: Jonathan
Author-X-Name-Last: Luminati
Title: Security Co-operation and 1206 Funding: More of the Same, a Dangerous Precedent, or a Model for the Future?
Journal: Defense & Security Analysis
Pages: 203-223
Issue: 3
Volume: 27
Year: 2011
Month: 9
X-DOI: 10.1080/14751798.2011.604481
File-URL: http://hdl.handle.net/10.1080/14751798.2011.604481
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:203-223
Template-Type: ReDIF-Article 1.0
Author-Name: Yael Brahms
Author-X-Name-First: Yael
Author-X-Name-Last: Brahms
Title: “Get Real” -- A Pragmatic Approach to a Philosophical Debate on the Changing Nature of War
Journal: Defense & Security Analysis
Pages: 225-235
Issue: 3
Volume: 27
Year: 2011
Month: 9
X-DOI: 10.1080/14751798.2011.604483
File-URL: http://hdl.handle.net/10.1080/14751798.2011.604483
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:225-235
Template-Type: ReDIF-Article 1.0
Author-Name: Alain De Neve
Author-X-Name-First: Alain
Author-X-Name-Last: De Neve
Author-Name: Christophe Wasinski
Author-X-Name-First: Christophe
Author-X-Name-Last: Wasinski
Title: Looking Beyond the J-UCAS's Demise
Journal: Defense & Security Analysis
Pages: 237-249
Issue: 3
Volume: 27
Year: 2011
Month: 9
X-DOI: 10.1080/14751798.2011.604484
File-URL: http://hdl.handle.net/10.1080/14751798.2011.604484
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:237-249
Template-Type: ReDIF-Article 1.0
Author-Name: Laxman Kumar Behera
Author-X-Name-First: Laxman Kumar
Author-X-Name-Last: Behera
Title: Enhancing Private Sector Participation in India's Defense Production
Journal: Defense & Security Analysis
Pages: 251-265
Issue: 3
Volume: 27
Year: 2011
Month: 9
X-DOI: 10.1080/14751798.2011.604485
File-URL: http://hdl.handle.net/10.1080/14751798.2011.604485
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:251-265
Template-Type: ReDIF-Article 1.0
Author-Name: Shannon O'Lear
Author-X-Name-First: Shannon
Author-X-Name-Last: O'Lear
Title: Borders in the South Caucasus
Journal: Defense & Security Analysis
Pages: 267-276
Issue: 3
Volume: 27
Year: 2011
Month: 9
X-DOI: 10.1080/14751798.2011.604486
File-URL: http://hdl.handle.net/10.1080/14751798.2011.604486
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:267-276
Template-Type: ReDIF-Article 1.0
Author-Name: Jonathan Lipow
Author-X-Name-First: Jonathan
Author-X-Name-Last: Lipow
Author-Name: Francois Melese
Author-X-Name-First: Francois
Author-X-Name-Last: Melese
Title: Economic and Security Implications of Afghanistan's Newly Discovered Mineral Wealth
Journal: Defense & Security Analysis
Pages: 277-282
Issue: 3
Volume: 27
Year: 2011
Month: 9
X-DOI: 10.1080/14751798.2011.604487
File-URL: http://hdl.handle.net/10.1080/14751798.2011.604487
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:277-282
Template-Type: ReDIF-Article 1.0
Author-Name: Hiro Lugo
Author-X-Name-First: Hiro
Author-X-Name-Last: Lugo
Author-Name: Lawrence James
Author-X-Name-First: Lawrence
Author-X-Name-Last: James
Author-Name: Tim Ripley
Author-X-Name-First: Tim
Author-X-Name-Last: Ripley
Title: Book Reviews
Journal: Defense & Security Analysis
Pages: 283-287
Issue: 3
Volume: 27
Year: 2011
Month: 9
X-DOI: 10.1080/14751798.2011.604488
File-URL: http://hdl.handle.net/10.1080/14751798.2011.604488
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:3:p:283-287
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 291-293
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632241
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632241
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:291-293
Template-Type: ReDIF-Article 1.0
Author-Name: Davina Miller
Author-X-Name-First: Davina
Author-X-Name-Last: Miller
Title: Who Knows About This? Western Policy Towards Iran: The Lockerbie Case
Journal: Defense & Security Analysis
Pages: 295-309
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632245
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632245
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:295-309
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Schofield
Author-X-Name-First: Julian
Author-X-Name-Last: Schofield
Author-Name: Michael Zekulin
Author-X-Name-First: Michael
Author-X-Name-Last: Zekulin
Title: Appraising the Threat of an Islamist Military Coup in Post-OBL Pakistan
Journal: Defense & Security Analysis
Pages: 311-324
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632247
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632247
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:311-324
Template-Type: ReDIF-Article 1.0
Author-Name: James Dingley
Author-X-Name-First: James
Author-X-Name-Last: Dingley
Title: Terrorism, Religion and Community
Journal: Defense & Security Analysis
Pages: 325-340
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632248
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632248
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:325-340
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew Moran
Author-X-Name-First: Matthew
Author-X-Name-Last: Moran
Author-Name: Matthew Cottee
Author-X-Name-First: Matthew
Author-X-Name-Last: Cottee
Title: Bound by History? Exploring Challenges to French Nuclear Disarmament
Journal: Defense & Security Analysis
Pages: 341-357
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632250
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632250
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:341-357
Template-Type: ReDIF-Article 1.0
Author-Name: Christopher M. Jones
Author-X-Name-First: Christopher M.
Author-X-Name-Last: Jones
Author-Name: Kevin P. Marsh
Author-X-Name-First: Kevin P.
Author-X-Name-Last: Marsh
Title: The Politics of Weapons Procurement:Why Some Programs Survive and Others Die
Journal: Defense & Security Analysis
Pages: 359-373
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632251
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632251
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:359-373
Template-Type: ReDIF-Article 1.0
Author-Name: Okon E. Eminue
Author-X-Name-First: Okon E.
Author-X-Name-Last: Eminue
Author-Name: Henry U. Ufomba
Author-X-Name-First: Henry U.
Author-X-Name-Last: Ufomba
Title: Modeling Terrorist Target Selection: Organski's Power Transition Theory
Journal: Defense & Security Analysis
Pages: 375-382
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632252
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632252
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:375-382
Template-Type: ReDIF-Article 1.0
Author-Name: Jonathan Lipow
Author-X-Name-First: Jonathan
Author-X-Name-Last: Lipow
Author-Name: Yakir Plessner
Author-X-Name-First: Yakir
Author-X-Name-Last: Plessner
Title: A Defense of Expensive Defense Systems
Journal: Defense & Security Analysis
Pages: 383-387
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632254
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632254
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:383-387
Template-Type: ReDIF-Article 1.0
Author-Name: Major David Berkland
Author-X-Name-First: Major David
Author-X-Name-Last: Berkland
Title: Douhet, Trenchard, Mitchell, and the Future of Airpower
Journal: Defense & Security Analysis
Pages: 389-393
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632256
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632256
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:389-393
Template-Type: ReDIF-Article 1.0
Author-Name: Emilian Kavalski
Author-X-Name-First: Emilian
Author-X-Name-Last: Kavalski
Author-Name: J. G. Allen
Author-X-Name-First: J. G.
Author-X-Name-Last: Allen
Author-Name: James Dingley
Author-X-Name-First: James
Author-X-Name-Last: Dingley
Author-Name: Marc Schelhase
Author-X-Name-First: Marc
Author-X-Name-Last: Schelhase
Title: Book Reviews
Journal: Defense & Security Analysis
Pages: 395-401
Issue: 4
Volume: 27
Year: 2011
Month: 12
X-DOI: 10.1080/14751798.2011.632258
File-URL: http://hdl.handle.net/10.1080/14751798.2011.632258
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:27:y:2011:i:4:p:395-401
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen Cimbala
Author-X-Name-First: Stephen
Author-X-Name-Last: Cimbala
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-2
Issue: 1
Volume: 28
Year: 2012
Month: 3
X-DOI: 10.1080/14751798.2012.651373
File-URL: http://hdl.handle.net/10.1080/14751798.2012.651373
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:1-2
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew Futter
Author-X-Name-First: Andrew
Author-X-Name-Last: Futter
Title: The elephant in the room: US ballistic missile defence under Barack Obama
Abstract:
Conventional wisdom seems to hold that under Barack Obama,
the US ballistic missile defence programme has been pushed aside to allow
for a refreshed domestic and international agenda. Proponents point to
Obama's campaign thinking and rhetoric, the ballistic missile defence
(BMD) budget cuts, the decision to end the Third Site in Europe, and the
reset relations with Russia through the New Strategic Arms Reduction
Treaty (New START) as evidence that the programme has undergone a
significant period of change, retraction and rationalisation. This article
argues instead that BMD has not fallen from prominence and that there is a
change in focus rather than retraction of its strategic goal.
Consequently, BMD continues to grow in importance as a component of US
national security strategy.
Journal: Defense & Security Analysis
Pages: 3-16
Issue: 1
Volume: 28
Year: 2012
Month: 3
X-DOI: 10.1080/14751798.2012.651374
File-URL: http://hdl.handle.net/10.1080/14751798.2012.651374
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:3-16
Template-Type: ReDIF-Article 1.0
Author-Name: Daniel Goure
Author-X-Name-First: Daniel
Author-X-Name-Last: Goure
Title: The Obama administration's phased-adaptive architecture: technological, operational and political issues
Abstract:
In 2009, the Obama administration announced a new missile
defense strategy, termed a phased-adaptive architecture (PAA) focused
primarily on countering the growing threat from theater ballistic
missiles. The success of this strategy is predicated on the rapid
development and fielding of successive increments of defensive capability
in a manner adapted to the specific requirements for missile defenses in
different regions of the world. The administration is committed to
building a European regional missile defense system, the European PAA or
EPAA between now and 2020. The first elements of the EPAA were deployed in
late 2011. However, much progress is still required in order to reach the
goals set for the PAA. This article addresses the technological,
operational and political issues confronting the Obama administration in
its efforts to make the PAA a reality.
Journal: Defense & Security Analysis
Pages: 17-35
Issue: 1
Volume: 28
Year: 2012
Month: 3
X-DOI: 10.1080/14751798.2012.651376
File-URL: http://hdl.handle.net/10.1080/14751798.2012.651376
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:17-35
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen Blank
Author-X-Name-First: Stephen
Author-X-Name-Last: Blank
Title: The Chinese and Asian impact on Russian nuclear policy
Abstract:
Asia, where nuclear powers already interact (including North
Korea), exerts a growing influence on the thinking and policy underlying
Russia's current and future nuclear (and overall defense) posture. China's
rise is forcing Russia into a greater reliance on strategic offensive
weapons and tactical nuclear weapons. These in turn will reinforce its
opposition to US missile defenses, not only in Europe but also in Asia.
Russia must now entertain the possibility of nuclear use in regional
conflicts that would otherwise remain purely conventional. It cannot be
postulated blindly that nuclear weapons serve no discernible purpose other
than to deter nuclear attacks by other nuclear powers. The strategic
equation in Asia and in the Russian Far East convincingly demonstrates the
falsity of this approach. Nuclear weapons will be the essential component
of Russia's regional defense policy if not of its overall policies -- and
this also includes contingencies in Europe.
Journal: Defense & Security Analysis
Pages: 36-54
Issue: 1
Volume: 28
Year: 2012
Month: 3
X-DOI: 10.1080/14751798.2012.651377
File-URL: http://hdl.handle.net/10.1080/14751798.2012.651377
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:36-54
Template-Type: ReDIF-Article 1.0
Author-Name: Mikhail Tsypkin
Author-X-Name-First: Mikhail
Author-X-Name-Last: Tsypkin
Title: Russia, America and missile defense
Abstract:
Russia has sharply objected to US plans for ballistic missile
defense. The Russian official explanation is that the real purpose of the
US missile defense plan is to make it impossible for Russia to retaliate
against a US nuclear (or massive conventional) attack, thus making Russia
subject to military blackmail by the US. The Russian response has been the
result of a sum total of various factors, mostly political and cultural,
while the technical capabilities of the proposed system have played a
secondary role.
Journal: Defense & Security Analysis
Pages: 55-64
Issue: 1
Volume: 28
Year: 2012
Month: 3
X-DOI: 10.1080/14751798.2012.651379
File-URL: http://hdl.handle.net/10.1080/14751798.2012.651379
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:55-64
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: Minimum deterrence and missile defenses: what's new, what's true, what's arguable
Abstract:
Minimum deterrence is a compromise, or halfway house, between
nuclear abolition or nearly zero and assured destruction, the dominant
paradigm for strategic nuclear arms control during and after the cold war.
Minimum deterrence as applied to the current relationship between the
United States and Russia would require downsizing the numbers of
operationally deployed long-range nuclear weapons to 1000, or fewer, on
each side. More drastic bilateral Russian--American reductions would
require the cooperation of other nuclear weapons states in making
proportional reductions in their own arsenals. In addition, US plans for
European-based and global missile defenses cause considerable angst in
Russia and threaten to derail the Obama “reset” in
Russian--American relations, despite the uncertainties about current and
plausible future performances of missile defense technologies.
Journal: Defense & Security Analysis
Pages: 65-80
Issue: 1
Volume: 28
Year: 2012
Month: 3
X-DOI: 10.1080/14751798.2012.651380
File-URL: http://hdl.handle.net/10.1080/14751798.2012.651380
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:65-80
Template-Type: ReDIF-Article 1.0
Author-Name: Ian Bellany
Author-X-Name-First: Ian
Author-X-Name-Last: Bellany
Title: Outflanking missile defences: the Nuclear Non-proliferation Treaty, nuclear weapons and terrorism
Abstract:
Ian Bellany, an Emeritus Professor of Politics at Lancaster
University, died in July 2011 at the age of 70, after a long and painful
struggle with myelofibrosis, a rare and invariably terminal blood cancer.
Between early 2009 and August 2010, under contract to Hurst & Co., he
worked intermittently on a book about nuclear terrorism, which he
provisionally entitled Before the Storm. The editor and I
are grateful to Michael Dwyer at Hurst & Co. for releasing the draft. What
is published here is an edited version of that draft. It may seem
presumptuous to speak for Ian, but I am sure he would also have liked to
thank the doctors and nurses of the NHS Morecambe Bay Universities
Hospital Trust, whose skill, knowledge, and flair for improvisation kept
him alive and writing for much longer than anyone expected. Alastair
Bellany, Rutgers University, New Jersey, USA. In the past, terrorists have
tended to eschew acts of extreme violence for fear of alienating those
whom they wish to persuade and attract to their cause. The first to
discard this philosophy was the Aum group in Japan, which sought to use
anthrax and acquire a nuclear weapon. Since then, attitudes have changed,
spurred on by the impact on public perception of the successful Al Qaeda
9/11 attack on New York and Washington. By crossing the line between
moderation and extreme violence, terrorist groups retain one valuable
capability: they are much less easily deterred and have few inhibitions.
This article considers the three nuclear options open to terrorists --
produce a radiological contaminant bomb; build a nuclear bomb; or steal or
get given a nuclear device. It examines the possibilities and
probabilities of each option and considers how the implementation of the
Nuclear Non-proliferation Treaty (NPT) provisions might impose some
constraints on terrorists’ nuclear ambitions. By examining the
doubtful nuclear security practices of different states and providing
statistical evidence of an increase in levels of international terrorist
violence, this article points to determined terrorists in time acquiring
the means to acquire one or other variants of a nuclear weapon. It
concludes that it is not a matter of “if” but
“when.”
Journal: Defense & Security Analysis
Pages: 81-96
Issue: 1
Volume: 28
Year: 2012
Month: 3
X-DOI: 10.1080/14751798.2012.651381
File-URL: http://hdl.handle.net/10.1080/14751798.2012.651381
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:1:p:81-96
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 97-99
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678144
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678144
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:97-99
Template-Type: ReDIF-Article 1.0
Author-Name: Eric Gons
Author-X-Name-First: Eric
Author-X-Name-Last: Gons
Author-Name: Jonathan Schroden
Author-X-Name-First: Jonathan
Author-X-Name-Last: Schroden
Author-Name: Ryan McAlinden
Author-X-Name-First: Ryan
Author-X-Name-Last: McAlinden
Author-Name: Marcus Gaul
Author-X-Name-First: Marcus
Author-X-Name-Last: Gaul
Author-Name: Bret Van Poppel
Author-X-Name-First: Bret
Author-X-Name-Last: Van Poppel
Title: Challenges of measuring progress in Afghanistan using violence trends: the effects of aggregation, military operations, seasonality, weather, and other causal factors
Abstract:
Measuring nationwide progress of counterinsurgency operations
in Afghanistan using violence trends is difficult due to several factors:
aggregation of data to the national level may obfuscate disparate local
trends; the observed seasonality in violence makes comparisons difficult
and may obscure progress; and short-term spikes or troughs -- attributable
to weather, military operations and tempo, or holiday periods -- heavily
influence simple averaging schemes. Despite these challenges, proper
understanding of violence statistics is critical to estimating the
effectiveness of military forces added during a surge or redeployed as
part of transition. This article explores methods for analyzing observed
violence trends to identify causal factors, to provide a comparable
baseline, and to inform assessments at appropriate levels of aggregation.
One methodology for seasonal adjustment of violence data is discussed and
shown to provide a logical baseline for examining trends. An ordinary
least squares regression model is developed and implemented using
time-series violence data.
Journal: Defense & Security Analysis
Pages: 100-113
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678164
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678164
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:100-113
Template-Type: ReDIF-Article 1.0
Author-Name: Sjef Orbons
Author-X-Name-First: Sjef
Author-X-Name-Last: Orbons
Title: Are non‐lethal weapons a viable military option to strengthen the hearts and minds approach in Afghanistan?
Abstract:
Commanders of the International Security Assistance Force
(ISAF) have repeatedly stressed the hearts and minds approach in
Afghanistan, in saying that the human terrain is decisive for a successful
outcome of the mission. Avoidance of civilian casualties is considered of
strategic importance, and by nature highly dependent on the management of
tactical level Escalation of Force (EoF) situations. Non‐lethal
weapons (NLWs) are expected to enable tactical commanders to avoid
innocent civilian casualties in such situations. This article considers a
selected NLW on its potential to accomplish this requirement. It uses a
defence technology assessment approach to analyse EoF situations
experienced by Dutch ISAF forces in which the NLW is inserted. The
analysis demonstrates that a range of contextual factors in the
Afghanistan high‐risk environment tend to narrow down the window of
opportunity for the NLW to help defuse the risk of unintended civil
casualties.
Journal: Defense & Security Analysis
Pages: 114-130
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678163
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678163
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:114-130
Template-Type: ReDIF-Article 1.0
Author-Name: Mark Clegg
Author-X-Name-First: Mark
Author-X-Name-Last: Clegg
Title: Force protection and society
Abstract:
Wars have long been fought with a firm focus upon armies'
domestic contexts. These socio-political foundations have underpinned
decisions regarding embarking upon war as well the conduct of war
itself. Of particular importance among liberal democracies is the emphasis
which is now placed upon force protection; broadly conceived as the range
of measures employed to ensure the protection of servicemen and women on
operations. Decisions surrounding protective equipment, deployed locations
and wartime activities all face detailed scrutiny in contemporary
operating environments. The attitudes of the government, the military and
the civilian population combine to create a complex and dynamic backdrop
of harmony and tension to this most sensitive characteristic of modern
wars.
Journal: Defense & Security Analysis
Pages: 131-139
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678150
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678150
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:131-139
Template-Type: ReDIF-Article 1.0
Author-Name: Peter Jones
Author-X-Name-First: Peter
Author-X-Name-Last: Jones
Author-Name: Philippe Lagassé
Author-X-Name-First: Philippe
Author-X-Name-Last: Lagassé
Title: Rhetoric versus reality: Canadian defence planning in a time of austerity
Abstract:
As Canada's military mission in Afghanistan winds down and
the country faces several years of fiscal austerity, all of Canada's major
political parties are agreed that Canadian defence budgets must stay level
or be cut. This comes at a time when the defence department is slated to
replace the Canadian Forces’ (CF) major equipment fleets. Canada's
defence establishment thus faces some critical decisions. One option is to
try to maintain its expeditionary capabilities across all three services:
army, navy and air force. Absent substantial new infusions of funds,
however, this approach is likely to lead to an overall and largely chaotic
reduction of capabilities. Another option is to make some difficult
choices as to which expeditionary capabilities to maintain as part of a
strategic review of Canada's future military needs. Such an option would
ensure that Canada has at least some military capacities which can
reliably be devoted to the most demanding international operations, while
maintaining those capabilities required for domestic duties and North
American defence. Pursuing this option would accord with the new North
Atlantic Treaty Organization Strategic Concept and the call for
“Smart Defense” within the Alliance. This article assesses
the arguments for and against the option of specialising Canada's future
defence capabilities and explores scenarios as to what a future CF may
look like.
Journal: Defense & Security Analysis
Pages: 140-151
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678160
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678160
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:140-151
Template-Type: ReDIF-Article 1.0
Author-Name: Ron Matthews
Author-X-Name-First: Ron
Author-X-Name-Last: Matthews
Author-Name: Alma Lozano
Author-X-Name-First: Alma
Author-X-Name-Last: Lozano
Title: The mercurial development of Russia's United Aircraft Corporation
Abstract:
Russia's 2006 renationalisation of its aerospace industry
heralded a new era in industrial policy. Symbolising a return to the
importance of securing sovereignty over the Federation's strategic assets,
it also posits, powerfully, that sectors like aerospace and shipbuilding
are too important to be left to the market. In what now appears a reversal
of this policy approach, Moscow is promoting partial privatisation and
encouraging partnership with Western aerospace companies. Foreign infusion
of capital and technology is viewed as the catalyst for Russian dominance
in the global military and commercial aerospace industries.
Journal: Defense & Security Analysis
Pages: 152-162
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678158
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678158
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:152-162
Template-Type: ReDIF-Article 1.0
Author-Name: Björn Hagelin
Author-X-Name-First: Björn
Author-X-Name-Last: Hagelin
Title: Into the black box? Technology sharing in major arms transfers and beyond
Abstract:
From the recipients’ perspective, arms transfers have,
through the use of offsets, technology transfers, and industrial
participation, become an opportunity to receive not only advanced weapons,
but also technologies not otherwise available. How important are friendly
relations for securing a military export order? To what extent do buyers
demand advanced military or commercial technology and how are these
demands accepted by the supplier? How does this influence smaller
producers in relation to major producers? These questions are addressed by
studying (a) the Joint Strike Fighter/F-35 by Lockheed Martin, USA, and
the JAS-39 Gripen aircraft by Saab, Sweden, (b) the Medium Multi-Role
Combat Aircraft competition in India for 126 combat aircraft, and (c) the
Indian offset policy. In the final section, some long-term consequences
are discussed.
Journal: Defense & Security Analysis
Pages: 163-175
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678146
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678146
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:163-175
Template-Type: ReDIF-Article 1.0
Author-Name: Henry Philippens
Author-X-Name-First: Henry
Author-X-Name-Last: Philippens
Title: The Shi Lang, a vehicle for regional change?
Abstract:
In a succession of disclosures over the summer of 2011, the
People's Republic of China acknowledged the near completion of its first
aircraft carrier and the initiation of a carrier building program. These
revelations have come at a time of increased tension in the South China
Sea on top of the wider worries in the region concerning China's overly
assertive stance and the pace of its military modernization. This
perspective will examine why the status of the vessel and the program have
now been made public, in addition to surveying the wider implications this
upgrade to Chinese maritime capabilities will have on the stability of the
region over the coming years. However, this paper concludes that there is,
at present, no reason for the sensationalism nor the
threat‐mongering seen in many media outlets, of late. Hastily drawn
conclusions based primarily on realpolitik fail to
understand the nuances of this issue.
Journal: Defense & Security Analysis
Pages: 176-184
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678165
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678165
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:176-184
Template-Type: ReDIF-Article 1.0
Author-Name: Ehud Eilam
Author-X-Name-First: Ehud
Author-X-Name-Last: Eilam
Title: Egypt: new government, old challenges
Abstract:
The new government in Egypt will have to deal with the
following challenges in its foreign policy: the Palestinians, Sinai, the
arms race between Israel and Egypt, the nuclear issue, the Suez Canal, and
the Tiran Straits. Egypt has to decide what its approach would be toward
these issues and as to how to maneuver between its own interests and those
of other states such as Israel and the USA. All the sides have to consider
their steps carefully in order to avoid an unnecessary crisis.
Journal: Defense & Security Analysis
Pages: 185-191
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678166
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678166
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:185-191
Template-Type: ReDIF-Article 1.0
Author-Name: Cdr Ken Jay
Author-X-Name-First: Cdr Ken
Author-X-Name-Last: Jay
Title: British naval aviation -- the first 100 years
Journal: Defense & Security Analysis
Pages: 192-193
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678168
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678168
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:192-193
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew R.H. Uttley
Author-X-Name-First: Matthew R.H.
Author-X-Name-Last: Uttley
Title: Democracy's arsenal: creating a twenty-first-century defense industry
Journal: Defense & Security Analysis
Pages: 194-195
Issue: 2
Volume: 28
Year: 2012
Month: 6
X-DOI: 10.1080/14751798.2012.678169
File-URL: http://hdl.handle.net/10.1080/14751798.2012.678169
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:2:p:194-195
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 199-201
Issue: 3
Volume: 28
Year: 2012
Month: 9
X-DOI: 10.1080/14751798.2012.708592
File-URL: http://hdl.handle.net/10.1080/14751798.2012.708592
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:199-201
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew Moran
Author-X-Name-First: Matthew
Author-X-Name-Last: Moran
Author-Name: Christopher Hobbs
Author-X-Name-First: Christopher
Author-X-Name-Last: Hobbs
Title: The Iranian nuclear dilemma: light at the end of the tunnel?
Abstract:
In February 2012, Iran announced its willingness to resume
negotiations with the Western powers. This statement followed in the wake
of a damning report by the International Atomic Energy Agency (IAEA) Board
of Governors and the imposition of additional sanctions by the
international community on an Iranian economy already under pressure.
Tehran's announcement also coincided with increased speculation regarding
an Israeli military strike on Iranian nuclear facilities. At the same
time, however, this seemingly positive step appeared to be undermined by
Iran's concomitant announcement that “huge” technical
progress has been made on Iran's nuclear programme. This article will
explore the significance of the recent political, diplomatic and technical
developments in the Iranian nuclear affair and situate them in the broader
context of Tehran's nuclear strategy. The analysis will assess the
potential for this latest phase in the Iranian nuclear crisis to reverse
Iran's current trajectory and initiate a rapprochement between Iran and
Western powers.
Journal: Defense & Security Analysis
Pages: 202-212
Issue: 3
Volume: 28
Year: 2012
Month: 9
X-DOI: 10.1080/14751798.2012.703463
File-URL: http://hdl.handle.net/10.1080/14751798.2012.703463
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:202-212
Template-Type: ReDIF-Article 1.0
Author-Name: Bart Smedts
Author-X-Name-First: Bart
Author-X-Name-Last: Smedts
Title: Iran's nuclear programme: civil and/or military goals?
Abstract:
The ultimate goal of Iran's nuclear programme remains
uncertain. While the nuclear reactor of Bushehr has finally been connected
to the power grid, the nuclear fuel enrichment activities and their
location cause concern to the international community. Thirty years of
nuclear investments demonstrate a negative cost--benefit analysis:
technical constraints and economic and infrastructural requirements
constitute a burden on the implementation of a nuclear programme. This
article analyses the economic, legal, technical and political aspects of
the Iranian programme in order to uncover its civil and/or military
finality.
Journal: Defense & Security Analysis
Pages: 213-225
Issue: 3
Volume: 28
Year: 2012
Month: 9
X-DOI: 10.1080/14751798.2012.708593
File-URL: http://hdl.handle.net/10.1080/14751798.2012.708593
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:213-225
Template-Type: ReDIF-Article 1.0
Author-Name: Jonathan Lipow
Author-X-Name-First: Jonathan
Author-X-Name-Last: Lipow
Title: Can NATO survive an accident prone Euro?
Abstract:
The European Monetary Union (EMU) is inherently unstable, and
will be prone to repeated financial and fiscal crises. These crises pose a
clear threat to NATO security and the political institutions of Alliance
member states. There is no definitive way to eliminate the risks posed by
monetary union, but straightforward reforms in EMU sovereign debt
management represent a low-cost near-term means of mitigating these risks.
With EMU nations facing a seeming leadership vacuum, it is well within
NATO purview to press for adoption of such reforms.
Journal: Defense & Security Analysis
Pages: 226-233
Issue: 3
Volume: 28
Year: 2012
Month: 9
X-DOI: 10.1080/14751798.2012.708594
File-URL: http://hdl.handle.net/10.1080/14751798.2012.708594
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:226-233
Template-Type: ReDIF-Article 1.0
Author-Name: Adam D.M. Svendsen
Author-X-Name-First: Adam D.M.
Author-X-Name-Last: Svendsen
Title: “Flectas non frangas”: revisiting early twenty-first century UK--US defense relations (2000--2005) after five years
Abstract:
Adopting the analytical framework of the established
interpretive “schools” of Anglo-American relations, this
article offers several reflections on UK--US defense relations as they
occurred over the significant years of 2000--2005. During those years,
trajectories were established on which UK--US defense relations continue
to travel today and outcomes emerged which are still being navigated. This
article concludes that the Latin phrase, “Flectas Non
Frangas” (essentially translated as: “Bend not
Break”), is the most appropriate to adopt to characterize the
developments undergone in recent UK--US defense relations. Many historical
and strategic lessons with contemporary relevance are drawn.
Journal: Defense & Security Analysis
Pages: 234-246
Issue: 3
Volume: 28
Year: 2012
Month: 9
X-DOI: 10.1080/14751798.2012.708595
File-URL: http://hdl.handle.net/10.1080/14751798.2012.708595
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:234-246
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew H. Wahlert
Author-X-Name-First: Matthew H.
Author-X-Name-Last: Wahlert
Title: The “motivated bias” dilemma in warfare and intelligence
Abstract:
The goal of this article is to challenge the assumption of
rationality in the behavior of decision-making units involved in security,
defense, intelligence and warfare and to consider the influence of
“motivated bias” in such instances. A review of motivational
literature within international politics and a discussion of literature
applying “motivated biases” to warfare and strategic
surprise will offer an alternative view of the primacy of rationality in
such decisions.
Journal: Defense & Security Analysis
Pages: 247-259
Issue: 3
Volume: 28
Year: 2012
Month: 9
X-DOI: 10.1080/14751798.2012.708596
File-URL: http://hdl.handle.net/10.1080/14751798.2012.708596
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:247-259
Template-Type: ReDIF-Article 1.0
Author-Name: Ehud Eilam
Author-X-Name-First: Ehud
Author-X-Name-Last: Eilam
Title: Operational aspects of a future war between Egypt and Israel
Abstract:
The peace treaty between Israel and Egypt has survived since
1979. Even so, following the events in Egypt, there is a growing tension
between the two states, particularly surrounding the Sinai, which could
cause a crisis and even a war. In such a case, the main battlefield would
be in Sinai, and there would be several dominant aspects. Some of them
would appear for the first time, compared with previous wars, such as a
collision between Israeli and Egyptian units of around corps size. Other
aspects would be more familiar, such as the ratio between the size of the
forces to that of the battlefield, the “fog of war,” night
fighting, “friendly fire” and deception.
Journal: Defense & Security Analysis
Pages: 260-267
Issue: 3
Volume: 28
Year: 2012
Month: 9
X-DOI: 10.1080/14751798.2012.708597
File-URL: http://hdl.handle.net/10.1080/14751798.2012.708597
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:260-267
Template-Type: ReDIF-Article 1.0
Author-Name: Steven Jermy
Author-X-Name-First: Steven
Author-X-Name-Last: Jermy
Title: Land based air power or aircraft carriers? A case study of the British debate about maritime air power in the 1960s
Journal: Defense & Security Analysis
Pages: 268-269
Issue: 3
Volume: 28
Year: 2012
Month: 9
X-DOI: 10.1080/14751798.2012.709048
File-URL: http://hdl.handle.net/10.1080/14751798.2012.709048
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:268-269
Template-Type: ReDIF-Article 1.0
Author-Name: Bernard Jenkin
Author-X-Name-First: Bernard
Author-X-Name-Last: Jenkin
Title: Strategy for action: using force wisely in the twenty-first century
Journal: Defense & Security Analysis
Pages: 270-271
Issue: 3
Volume: 28
Year: 2012
Month: 9
X-DOI: 10.1080/14751798.2012.708619
File-URL: http://hdl.handle.net/10.1080/14751798.2012.708619
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:3:p:270-271
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 273-274
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.731849
File-URL: http://hdl.handle.net/10.1080/14751798.2012.731849
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:273-274
Template-Type: ReDIF-Article 1.0
Author-Name: Leo J. Blanken
Author-X-Name-First: Leo J.
Author-X-Name-Last: Blanken
Title: Reconciling strategic studies … with itself: a common framework for choosing among strategies
Abstract:
Three distinct, and seemingly irreconcilable, schools of
thought are identified within the strategic studies literature. One which
searches for “universal principles of war,” a second,
“context-dependent,” approach that seeks to embed each
instance of warfare within its concurrent social, political, technological
milieu and, finally a “paradoxical logic” school, which
equates strategy with the generation of uncertainty. The author offers
some intuitive concepts from non-cooperative game theory to develop a
“dominate-mix” approach to strategy choice. In doing so, he
helps to reconcile these disparate approaches and provides a simple
framework to assist researchers in framing military decisions as well as
to assist planners in choosing among strategies.
Journal: Defense & Security Analysis
Pages: 275-287
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730723
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730723
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:275-287
Template-Type: ReDIF-Article 1.0
Author-Name: Louise Stanton
Author-X-Name-First: Louise
Author-X-Name-Last: Stanton
Title: The national defense function and federalism: the importance of the 2008 National Defense Authorization Act
Abstract:
Countries with a federalist system of government have
different arrangements for providing national security. US national
security is provided by national and State defense forces. The
quintessential national function -- national defense -- experienced
some changes that enhanced the role of the States. Policy changes in the
National Defense Authorization Act of 2008 (2008 NDAA) introduced new
roles for the Governors and the State defense forces, or the National
Guard. This article explores how the interests of Congress and States
aligned in the 2008 NDAA such that the national defense function changed.
This article finds that the national government continues to have the
central coordinating role, but that the politics and provisions of the
2008 NDAA changed the national--State relationship in mission,
decision-making, and command and control so that US federalism in the
national defense function is evolving in unexpected ways.
Journal: Defense & Security Analysis
Pages: 288-302
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730724
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730724
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:288-302
Template-Type: ReDIF-Article 1.0
Author-Name: Robert R. Tomes
Author-X-Name-First: Robert R.
Author-X-Name-Last: Tomes
Title: An historical review of US defense strategy from Vietnam to operation Iraqi freedom
Abstract:
Facing nearly half a billion dollars in spending cuts over
the next five years, US defense planners and strategists must
simultaneously rebuild a war-weary Army weakened from over a decade of
war, build new sea and air capabilities for the Pacific theater, and
reduce manpower, procurement, and contractor budgets while promoting
innovation. The US defense department is embarking on what may be the most
sweeping period of defense transformation in recent memory. This article
reviews the history of American defense transformation, focusing on an
important but largely overlooked period of military innovation that began
in the shadow of Vietnam and ended with troops fighting through blinding
sandstorms at night on the road to Baghdad. The multifaceted
transformation strategy conceived in the 1970s paved the way for a
military revolution in the 1990s and enabled unprecedented battlefield
adaptation in the 2000s. After reviewing the revolutionary changes that
led to American dominance in conventional warfare in the 1990s, the
article examines US transformation policies in the 2000s to inform defense
strategy and planning efforts in the 2010s.
Journal: Defense & Security Analysis
Pages: 303-315
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730722
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730722
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:303-315
Template-Type: ReDIF-Article 1.0
Author-Name: Jonathan Lipow
Author-X-Name-First: Jonathan
Author-X-Name-Last: Lipow
Author-Name: Francois Melese
Author-X-Name-First: Francois
Author-X-Name-Last: Melese
Title: Can Afghanistan avoid the Natural Resource Curse?
Abstract:
Recent discoveries of significant mineral deposits offer
Afghanistan the opportunity to attain a level of economic development
sufficient to stabilize that country's volatile security situation while
providing Afghans with a reasonable standard of living. Much, however,
depends on whether Afghanistan can avoid the “Natural Resource
Curse,” an inter-related set of economic and social pathologies
that often bedevil resource-endowed countries. In this article, the
authors describe the Natural Resource Curse, evaluate the obstacles it
raises for Afghan economic development, and offer a strategy to minimize
the risks Afghanistan faces in its efforts to exploit its mineral wealth
for the benefit of the population.
Journal: Defense & Security Analysis
Pages: 316-325
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730725
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730725
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:316-325
Template-Type: ReDIF-Article 1.0
Author-Name: Leo J. Blanken
Author-X-Name-First: Leo J.
Author-X-Name-Last: Blanken
Author-Name: Jason J. Lepore
Author-X-Name-First: Jason J.
Author-X-Name-Last: Lepore
Title: Unpacking the various meanings of redundancy: from refining the concept to military planning
Abstract:
The authors engage in the debate over waste in military force
structure planning by rigorously deconstructing the concept of
“redundancy.” First, a typology of redundancy is constructed
that provides a common framework for identifying variety among redundant
structures. These are labeled “true redundancy,”
“expanded capacity,” “portfolio
diversification,” and “mission overlap.” Further, a
number of mechanisms are identified that produce these types of
structures, and show the conditions under which planners may utilize
redundant structure in the search for optimization. In sum, the article
provides refined concepts for analysts and planners to identify when
redundancy is deleterious or beneficial.
Journal: Defense & Security Analysis
Pages: 326-342
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730721
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730721
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:326-342
Template-Type: ReDIF-Article 1.0
Author-Name: Steven J. Childs
Author-X-Name-First: Steven J.
Author-X-Name-Last: Childs
Title: Small world, big guns: globalization, interstate security networks and conventional weapons imports
Abstract:
With the burgeoning influence of emerging markets in Asia, a
tectonic shift is taking place in the global security landscape. Asian
states are concomitantly arming as their economic clout grows. In light of
these developments, security analysts would benefit from a formal means of
placing these arms acquisitions in a structural context. Are arms
acquisitions on par with the expectations of Asian states, given their
structural dispositions, or are recent acquisitions beyond anticipated
levels? By using a dynamic panel regression of 187 states from 1950 to
2011, this research predicts arms import volume using the degree of
interstate arms linkages, the size of a state's military, and its level of
economic development. The technique offers analysts a formal means of
distinguishing orthodox behavior in importing conventional weapons from
extraneous security motivations. The article concludes by generating
near-term forecasts of Asian arms imports and discussing the implications
of the technique.
Journal: Defense & Security Analysis
Pages: 343-359
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730726
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730726
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:343-359
Template-Type: ReDIF-Article 1.0
Author-Name: Henry U. Ufomba
Author-X-Name-First: Henry U.
Author-X-Name-Last: Ufomba
Title: Involving the elephant: technical isolation and the role of India in a possible solution to the Iranian nuclear crisis
Abstract:
Apart from North Korea, no state's nuclear program in the
twenty-first century has raised more concern to international security
than Iran's. While Iran insists that its nuclear program is strictly for
civilian purpose in line with Article IV of non-proliferation treaty, the
USA and its allies insist that Iran has military intentions and called for
sanctions. The failure of sanctions to deter Iran from its nuclear agenda
had made many scholars and policy-makers call for a preemptive attack on
Iranian nuclear facilities. Situated within this debate, this paper
positions itself as an antagonist to the preemptive airstrike option and
argues that involving India in a possible nuclear “iron
curtain” against Iran -- a move known as technical isolation --
remains the best option to the current nuclear crises.
Journal: Defense & Security Analysis
Pages: 360-367
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730727
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730727
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:360-367
Template-Type: ReDIF-Article 1.0
Author-Name: John G. Allen
Author-X-Name-First: John G.
Author-X-Name-Last: Allen
Title: Underground structures of the Cold War: the world below
Journal: Defense & Security Analysis
Pages: 368-369
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730719
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730719
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:368-369
Template-Type: ReDIF-Article 1.0
Author-Name: John G. Allen
Author-X-Name-First: John G.
Author-X-Name-Last: Allen
Title: Nomonhan 1939: the Red Army's victory that shaped World War II
Journal: Defense & Security Analysis
Pages: 369-371
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730720
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730720
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:369-371
Template-Type: ReDIF-Article 1.0
Author-Name: Eric Grove
Author-X-Name-First: Eric
Author-X-Name-Last: Grove
Title: Theorist of maritime strategy: Sir Julian Corbett and his contribution to military and naval thought
Journal: Defense & Security Analysis
Pages: 371-372
Issue: 4
Volume: 28
Year: 2012
Month: 12
X-DOI: 10.1080/14751798.2012.730718
File-URL: http://hdl.handle.net/10.1080/14751798.2012.730718
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:28:y:2012:i:4:p:371-372
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-2
Issue: 1
Volume: 29
Year: 2013
Month: 3
X-DOI: 10.1080/14751798.2013.764047
File-URL: http://hdl.handle.net/10.1080/14751798.2013.764047
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:1-2
Template-Type: ReDIF-Article 1.0
Author-Name: Jorge Battaglino
Author-X-Name-First: Jorge
Author-X-Name-Last: Battaglino
Title: The politics of defense revival in Argentina
Abstract:
In marked contrast with previous decades, defense issues in
Argentina have started to receive increasing political attention over the
last few years. The main goal of this article is to account for this new
found interest in defense policy. The article contends that this revival
could be accounted for by both the implementation of a
neo-developmentalist strategy and a type of control that emphasizes
civilian oversight over the armed forces. Both factors have promoted the
implementation of policies that favored an increase in the military
budget, the reconstruction of the defense industry and the establishment
of a new military doctrine. This article evaluates the impact of factors
that have not been previously considered by the literature on defense
attention in South America.
Journal: Defense & Security Analysis
Pages: 3-15
Issue: 1
Volume: 29
Year: 2013
Month: 3
X-DOI: 10.1080/14751798.2013.760251
File-URL: http://hdl.handle.net/10.1080/14751798.2013.760251
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:3-15
Template-Type: ReDIF-Article 1.0
Author-Name: Simon Haddad
Author-X-Name-First: Simon
Author-X-Name-Last: Haddad
Title: Explaining Lebanese Shii adherence to Hezbollah: alienation, religiosity and welfare provision
Abstract:
Data from a cross-sectional survey of 176 Lebanese Shiis
living in Metropolitan Beirut have been used to investigate the
relationship between social and religious variables and attitudes toward
Lebanon's “Party of God” (Hezbollah). The results indicate
that Islamic religiosity, political discontent, and access to social
welfare are positively associated with endorsement of the party. The
implications of these findings for the party's future in light of recent
political developments are discussed.
Journal: Defense & Security Analysis
Pages: 16-29
Issue: 1
Volume: 29
Year: 2013
Month: 3
X-DOI: 10.1080/14751798.2013.760250
File-URL: http://hdl.handle.net/10.1080/14751798.2013.760250
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:16-29
Template-Type: ReDIF-Article 1.0
Author-Name: Zafar Khan
Author-X-Name-First: Zafar
Author-X-Name-Last: Khan
Title: Pakistan's policy on minimum deterrence: why minimum is not the minimum?
Abstract:
This article focuses on Pakistan's policy option of
“minimum deterrence” (MD) post-1998 nuclearization of South
Asia and explores why “minimum” in reality is not the
minimum. It states that the term “minimum” has not been
fully defined yet due to which MD stays ambiguous. In addition, it
endeavors to elaborate the rudimentary factors responsible for the
non-existence of an MD, which, in turn, keeps the Pakistani stance on MD
dynamic and evolving.
Journal: Defense & Security Analysis
Pages: 30-41
Issue: 1
Volume: 29
Year: 2013
Month: 3
X-DOI: 10.1080/14751798.2013.760247
File-URL: http://hdl.handle.net/10.1080/14751798.2013.760247
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:30-41
Template-Type: ReDIF-Article 1.0
Author-Name: Spencer Willardson
Author-X-Name-First: Spencer
Author-X-Name-Last: Willardson
Title: Strategic intelligence during coin detention operations -- relational data and understanding latent terror networks
Abstract:
One aspect of the global “War on Terror” that
has received limited coverage in the academic literature is the problem of
detained persons as it relates to intelligence. This is a surprising
oversight, given the number of detainees that the USA has been responsible
for (over 25,000 were in custody in Iraq alone at one time during its
peak). The detention environment offers a prime strategic intelligence
opportunity for the US intelligence community to study the tactics and
organizations of individuals who have been removed from the overall
conflict. In this article an easily implemented collection program is
recommended to be deployed in US/coalition detention centers. The primary
recommendation is to gather relational data on detainee communication,
both authorized and illicit, and to use these data to perform network
analyses of terrorist groups and their individual members.
Journal: Defense & Security Analysis
Pages: 42-53
Issue: 1
Volume: 29
Year: 2013
Month: 3
X-DOI: 10.1080/14751798.2013.760249
File-URL: http://hdl.handle.net/10.1080/14751798.2013.760249
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:42-53
Template-Type: ReDIF-Article 1.0
Author-Name: Daniel Uiterwijk
Author-X-Name-First: Daniel
Author-X-Name-Last: Uiterwijk
Author-Name: Joseph Soeters
Author-X-Name-First: Joseph
Author-X-Name-Last: Soeters
Author-Name: Paul van Fenema
Author-X-Name-First: Paul
Author-X-Name-Last: van Fenema
Title: Aligning national “logics” in a European military helicopter program
Abstract:
This article analyzes the public side of the NH90 network
consisting of four participating countries (Germany, France, Italy, and
the Netherlands) and their industrial partners. Comparable to observations
in earlier international projects in the defense sector, the development
and production of the NH90 defense helicopter did not match original plans
and costs estimates. On the basis of four mechanisms that were intended to
facilitate the cooperation between the partnering countries (the General
Memorandum of Understanding; coalition formation; the role of the central
agency; and the process of vertical escalation) the question is posed
whether or not there was a true alignment of national interests and
“logics.” The lack of standardization, as well as program
delays and issues concerning the division of the work-share, lead to the
emerging alignment being characterized as “quasi-alignment”
at best.
Journal: Defense & Security Analysis
Pages: 54-67
Issue: 1
Volume: 29
Year: 2013
Month: 3
X-DOI: 10.1080/14751798.2013.760248
File-URL: http://hdl.handle.net/10.1080/14751798.2013.760248
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:54-67
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Steinberg
Author-X-Name-First: Michael
Author-X-Name-Last: Steinberg
Title: Reforming the notion of national sovereignty by external intervention
Abstract:
In principle, national sovereignty is the right of a nation
to govern its internal affairs without foreign interference. In practice,
it is defined by one's interpretation of international law, which may
permit legal external intervention under some circumstances, ultimately
removing a nation's sovereignty. This paper will examine the current
system of international law outlined by the United Nations, analyse the
ambiguities contained within its Charter and elaborate on how external
intervention can be justified. The case-study of recent developments
related to Libya will demonstrate that the manner in which international
law is interpreted is changing the notion of principles of sovereignty.
Journal: Defense & Security Analysis
Pages: 68-75
Issue: 1
Volume: 29
Year: 2013
Month: 3
X-DOI: 10.1080/14751798.2013.768015
File-URL: http://hdl.handle.net/10.1080/14751798.2013.768015
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:68-75
Template-Type: ReDIF-Article 1.0
Author-Name: Terry Moon
Author-X-Name-First: Terry
Author-X-Name-Last: Moon
Author-Name: Paul Whitbread
Author-X-Name-First: Paul
Author-X-Name-Last: Whitbread
Author-Name: Peter Dortmans
Author-X-Name-First: Peter
Author-X-Name-Last: Dortmans
Title: Portfolio analysis for defense: taking account of networking
Abstract:
To manage their assets at an enterprise level, defense
organizations have turned to portfolio theory for the planning, analysis
and management of their military forces and materiel. Despite being well
established in the commercial sector, the application of portfolio
approaches in defense is problematic. The vexatious question for defense
of how to define and measure benefits arising is complicated by the
increased utility and effectiveness achieved through networking of
military forces and the equipment they use. The authors discuss the
challenges for defense in using a portfolio approach and propose a
conceptual model for dealing with the effects arising from networking with
information and communications technologies.
Journal: Defense & Security Analysis
Pages: 76-84
Issue: 1
Volume: 29
Year: 2013
Month: 3
X-DOI: 10.1080/14751798.2013.760246
File-URL: http://hdl.handle.net/10.1080/14751798.2013.760246
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:1:p:76-84
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 87-88
Issue: 2
Volume: 29
Year: 2013
Month: 6
X-DOI: 10.1080/14751798.2013.787787
File-URL: http://hdl.handle.net/10.1080/14751798.2013.787787
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:87-88
Template-Type: ReDIF-Article 1.0
Author-Name: Scott Firsing
Author-X-Name-First: Scott
Author-X-Name-Last: Firsing
Author-Name: Ogi Williams
Author-X-Name-First: Ogi
Author-X-Name-Last: Williams
Title: Increased Chinese and American defence involvement in Africa
Abstract:
There is often a perception put forth of a fight for
supremacy between China and the USA. This is often the case when
discussing the continent of Africa. Both countries have recently increased
their involvement in Africa for a variety of reasons. In 2011, China
surpassed the USA as Africa's largest trading partner, with Africa
predicted to be Beijing's largest trading partner by 2017. As expected,
their bilateral and multilateral defence cooperation with strategic
countries and organisations has matured and expanded along with it.
Washington's own economic interests, al-Qa'ida and threats to maritime
security are some of the crucial elements behind the US's presence on the
continent. This article analyses both the USA and China's rising defence
involvement in Africa. It compares and contrasts their similarities and
differences, and argues that cooperation in certain areas can prove
beneficial for all parties involved.
Journal: Defense & Security Analysis
Pages: 89-103
Issue: 2
Volume: 29
Year: 2013
Month: 6
X-DOI: 10.1080/14751798.2013.787789
File-URL: http://hdl.handle.net/10.1080/14751798.2013.787789
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:89-103
Template-Type: ReDIF-Article 1.0
Author-Name: Majak D'Agoôt
Author-X-Name-First: Majak
Author-X-Name-Last: D'Agoôt
Title: Coping with traps of vulnerability: a review of the impact of post-colonial issues on the independence of South Sudan
Abstract:
In a world virtually free of slavery and colonialism and one
mainly driven by the sovereign state rationale, allusion to manifestations
or the existence of some form of these phenomena within a state is often
received with dumbfounding indifference or denial. However, a form of rule
that had continued in South Sudan long after the departure of the British
in 1956 was colonial both in its quintessence and flair in that it
disenfranchised its citizens and denied them the most basic freedoms,
services and development. Under this establishment, resistance against the
coercive vision of the state was brutally suppressed for many decades.
This state of affairs finally ended in July 2011. Nonetheless, there is a
miscellany of unresolved post-colonial issues between the two countries
that warrant attention. These include security and the demarcation of
borders, the issue of ludicrous transit fees for South Sudan's oil
exportation through Sudan, citizenship, external debt repayment, etc.
These issues are part of traps inherited from the anti-colonial struggle,
which have now supplanted the old ensemble of North--South conflict
paroxysm. As a matter of urgency, the two countries will have to wrap up
the incomplete process of negotiation on these substantive issues. The
talks should be approached with a new mindset based on the new reality of
two sovereign states. To the extent that it is widely established that
South Sudan and Sudan must coexist peacefully in order to develop into
viable entities, such mutual dependency must be based on equality and
respect.
Journal: Defense & Security Analysis
Pages: 104-116
Issue: 2
Volume: 29
Year: 2013
Month: 6
X-DOI: 10.1080/14751798.2013.787791
File-URL: http://hdl.handle.net/10.1080/14751798.2013.787791
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:104-116
Template-Type: ReDIF-Article 1.0
Author-Name: Nina Wilén
Author-X-Name-First: Nina
Author-X-Name-Last: Wilén
Title: Identifying the spoilers in the security sector reform -- disarmament demobilisation and reintegration process in the Congo
Abstract:
The Congolese security sector reform -- disarmament
demobilisation and reintegration (SSR-DDR) process has suffered from
setbacks in its military sector during the last 10 years, such as
insufficient funding, lack of coordination and domestic reluctance to
major changes, with as a result, a very fragile and disjointed Army. These
problems have deepened as officers have defected from the Army and caused
new instability in the East of the Congo. This article aims to analyse the
recent mutinies and the reaction by the Congolese government by applying a
capabilities-based approach in combination with a typology of spoilers.
The objective is to identify and classify the spoilers and answer the
questions of why they emerge now and how they are dealt with on a national
level. From the analysis, the author suggests that there are several
spoilers involved in the current situation -- the most powerful being the
Congolese and the Rwandan governments, prompting the question of whether
an international involvement is necessary to solve the problem.
Journal: Defense & Security Analysis
Pages: 117-127
Issue: 2
Volume: 29
Year: 2013
Month: 6
X-DOI: 10.1080/14751798.2013.787792
File-URL: http://hdl.handle.net/10.1080/14751798.2013.787792
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:117-127
Template-Type: ReDIF-Article 1.0
Author-Name: Chiara Ruffa
Author-X-Name-First: Chiara
Author-X-Name-Last: Ruffa
Title: The long and winding road … to success? Unit peace operation effectiveness and its effect on mission success
Abstract:
Why does peacekeeping sometimes fail? How can effective
peacekeepers increase the likelihood of success of a mission? The two main
flaws in the current evaluations of peace operations are that they mainly
rely on already concluded missions and that they make use of indicators
that do not reveal micro-level dynamics. This article introduces an
analytical framework relating the effectiveness of soldiers to their
actual impact in their area of operation in a peace operation. The
framework is called “unit peace operation effectiveness”
(UPOE). Focusing on soldiers in peace operations, this article shows that:
different units behave differently; emphasize different aspects of the
mandate; and are effective in different ways. Ultimately, this has an
actual impact on the end-state of the mission. It relies on and adapts
classic security studies works to theoretically enrich the peacekeeping
literature. The model is tested in an illustrative case study based on
ethnographic work on French and Italian units in Afghanistan between 2008
and 2010.
Journal: Defense & Security Analysis
Pages: 128-140
Issue: 2
Volume: 29
Year: 2013
Month: 6
X-DOI: 10.1080/14751798.2013.787793
File-URL: http://hdl.handle.net/10.1080/14751798.2013.787793
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:128-140
Template-Type: ReDIF-Article 1.0
Author-Name: Jordan Cohen
Author-X-Name-First: Jordan
Author-X-Name-Last: Cohen
Author-Name: Johnny Quilenderino
Author-X-Name-First: Johnny
Author-X-Name-Last: Quilenderino
Author-Name: Joseph Bubulka
Author-X-Name-First: Joseph
Author-X-Name-Last: Bubulka
Author-Name: Eugene P. Paulo
Author-X-Name-First: Eugene P.
Author-X-Name-Last: Paulo
Title: Linking a throughput simulation to a systems dynamics simulation to assess the utility of a US Navy foreign humanitarian aid mission
Abstract:
The success of any humanitarian aid mission is generally
measured by the timeliness of critical supplies that are delivered to the
affected area. However, a more interesting analysis may be to determine
the effect of the aid on the overall satisfaction of the local population.
The authors' research focused on the delivery of humanitarian aid to a
notional region that was decimated by flooding with ships, landing craft
and security personnel provided by the US Navy and Marines. While the
research effort addressed naval force structure, the focus of the research
was: (1) to assess different delivery methods for the aid; and (2) to
determine how the aid delivery impacted the overall satisfaction of the
local population. To examine both concerns, two simulation models were
developed, with one examining the throughput of aid delivered during the
operation, and the other the satisfaction of the population based on the
humanitarian aid effort.
Journal: Defense & Security Analysis
Pages: 141-155
Issue: 2
Volume: 29
Year: 2013
Month: 6
X-DOI: 10.1080/14751798.2013.787795
File-URL: http://hdl.handle.net/10.1080/14751798.2013.787795
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:141-155
Template-Type: ReDIF-Article 1.0
Author-Name: Mark Ginsberg
Author-X-Name-First: Mark
Author-X-Name-Last: Ginsberg
Author-Name: Jeff Schiano
Author-X-Name-First: Jeff
Author-X-Name-Last: Schiano
Author-Name: Megan Kramer
Author-X-Name-First: Megan
Author-X-Name-Last: Kramer
Author-Name: Marianne Alleyne
Author-X-Name-First: Marianne
Author-X-Name-Last: Alleyne
Title: A case study in bio-inspired engineering design: defense applications of exoskeletal sensors
Abstract:
As part of a bio-inspired design process, the authors examine
exoskeletal sensors found in insects and their potential application to
armor and hardened buildings. In this way, the outer hardening of a
structure or vehicle would not limit the ability of occupants to arrive at
an actionable picture of the outer environment. To this end, various
sensor modalities employed by insects are compared and contrasted with
their current human-engineered equivalents. In several sensing modalities,
biosensors perform better, are smaller, and more energy efficient than
human-engineered equivalents. They note that biological designs tend to
employ non-linear response to signal amplitude and respond with heightened
sensitivity over a greater dynamic range of signals than human-engineered
sensors. The insect biological sensors have structural and mechanical
innovations that preserve the protective capacity of the exoskeleton.
Journal: Defense & Security Analysis
Pages: 156-169
Issue: 2
Volume: 29
Year: 2013
Month: 6
X-DOI: 10.1080/14751798.2013.787798
File-URL: http://hdl.handle.net/10.1080/14751798.2013.787798
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:156-169
Template-Type: ReDIF-Article 1.0
Author-Name: M. J. Williams
Author-X-Name-First: M. J.
Author-X-Name-Last: Williams
Title: Contractors at war: the transformation of US expeditionary operations
Journal: Defense & Security Analysis
Pages: 170-171
Issue: 2
Volume: 29
Year: 2013
Month: 6
X-DOI: 10.1080/14751798.2013.787799
File-URL: http://hdl.handle.net/10.1080/14751798.2013.787799
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:170-171
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Levi
Author-X-Name-First: Michael
Author-X-Name-Last: Levi
Title: Threat finance: disconnecting the lifeline of organised crime and terrorism
Journal: Defense & Security Analysis
Pages: 172-173
Issue: 2
Volume: 29
Year: 2013
Month: 6
X-DOI: 10.1080/14751798.2013.788770
File-URL: http://hdl.handle.net/10.1080/14751798.2013.788770
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:2:p:172-173
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 175-176
Issue: 3
Volume: 29
Year: 2013
Month: 9
X-DOI: 10.1080/14751798.2013.820607
File-URL: http://hdl.handle.net/10.1080/14751798.2013.820607
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:175-176
Template-Type: ReDIF-Article 1.0
Author-Name: Allan Orr
Author-X-Name-First: Allan
Author-X-Name-Last: Orr
Title: Terrorism: a philosophical discourse
Abstract:
Though it is nigh on 12 years since 9/11, there is still no
agreed definition of terrorism. Indeed, the original nations of the
“Coalition of the Willing,” who previously pursued a
“War on Terror” so vigorously (Australia, Britain and the
USA) have come full circle now to disown entirely the very notion of a
“War on Terror.” A key stumbling point towards a definition
remains whether terrorism should be classified as an act of crime or of
war. The two conceptualisations are philosophically and fundamentally
opposed and inevitably from each flows entirely different strategic
prescriptions to counter the phenomenon. If policy is to be guided
adequately, let alone optimally, the philosophical arguments of each camp
must be thrown headlong into one another, with the last philosophy
standing the victor and then claiming the policy spoils.
Journal: Defense & Security Analysis
Pages: 177-187
Issue: 3
Volume: 29
Year: 2013
Month: 9
X-DOI: 10.1080/14751798.2013.820608
File-URL: http://hdl.handle.net/10.1080/14751798.2013.820608
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:177-187
Template-Type: ReDIF-Article 1.0
Author-Name: Alastair Finlan
Author-X-Name-First: Alastair
Author-X-Name-Last: Finlan
Title: The perils of special approaches to counterterrorism: the shooting of Jean Charles de Menezes in 2005
Abstract:
The death of Jean Charles de Menezes on the London
Underground in 2005 remains a horrifying example of what happens when
counterterrorism goes wrong. One of the extraordinary features of the
shooting was the remarkable number of special elements, police units,
military Special Forces, and unusual procedures and tactics involved in
the incident. This article attempts to assess the causal significance of
the special dimension in the horrific chain of circumstances. It does so
by interrogating numerous explanations for the tragedy and highlighting
the role of the special factor. The Stockwell shooting remains very
important today because it casts a sharp and somewhat harsh spotlight on
the particular pitfalls of special responses, measures and units to the
multitudinous threats posed by international terrorism in the twenty-first
century.
Journal: Defense & Security Analysis
Pages: 188-202
Issue: 3
Volume: 29
Year: 2013
Month: 9
X-DOI: 10.1080/14751798.2013.820967
File-URL: http://hdl.handle.net/10.1080/14751798.2013.820967
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:188-202
Template-Type: ReDIF-Article 1.0
Author-Name: James Hasik
Author-X-Name-First: James
Author-X-Name-Last: Hasik
Title: Learning in counterinsurgency: what do we really know?
Abstract:
Since the publication in 2002 of John Nagl's Learning
to Eat Soup with a Knife, organizational learning has been widely
presumed an important ingredient for success in counterinsurgency. But
sampling the literature from before and after this time shows remarkably
little analytical treatment of the issue of learning and even confusion
over what it may mean. This article considers the theories, hypotheses,
research strategies, threats to validity, methods of measurement,
treatments of time, and general lack of statistical analysis in the work
to date and recommends a course for future research.
Journal: Defense & Security Analysis
Pages: 203-217
Issue: 3
Volume: 29
Year: 2013
Month: 9
X-DOI: 10.1080/14751798.2013.820964
File-URL: http://hdl.handle.net/10.1080/14751798.2013.820964
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:203-217
Template-Type: ReDIF-Article 1.0
Author-Name: Orlandrew E. Danzell
Author-X-Name-First: Orlandrew E.
Author-X-Name-Last: Danzell
Author-Name: Steve Zidek
Author-X-Name-First: Steve
Author-X-Name-Last: Zidek
Title: Does counterterrorism spending reduce the incidence and lethality of terrorism? A quantitative analysis of 34 countries
Abstract:
Following the 11 September 2001 attacks, the US government
increased its counterterrorism (CT) funding and created several Federal
Agencies such as the Department of Homeland Security; Transportation
Security Administration; and National Counterterrorism Center. Similarly,
the 7 July 2005, London bombings also compelled the British government to
increase its CT funding. These examples illustrate a phenomenon that when
states experience terrorism, they dramatically increase public safety
spending in order to reduce or eliminate the incidents of and casualties
resulting from acts of terror. Using statistical data collected from 34
countries covering nine years, this article examines recent CT spending
increases. Critically, the authors explore whether recent public safety
expenditures can measurably reduce the number of domestic and
international terrorist attacks. The implications of their findings should
be salient for policy-makers’ assessments of their
countries’ current CT strategies and policies concerning their
respective Intelligence and Security Communities.
Journal: Defense & Security Analysis
Pages: 218-233
Issue: 3
Volume: 29
Year: 2013
Month: 9
X-DOI: 10.1080/14751798.2013.820970
File-URL: http://hdl.handle.net/10.1080/14751798.2013.820970
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:218-233
Template-Type: ReDIF-Article 1.0
Author-Name: Shireen K. Burki
Author-X-Name-First: Shireen K.
Author-X-Name-Last: Burki
Title: Jihad or qatal? Examining Al Qaeda's modus operandi
Abstract:
There is widespread acknowledgment that the modus operandi of
jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on
brutal terror-inducing tactics which, more often than not, target Muslim
and non-Muslim non-combatants. This article comparatively analyzes the
AQAM modus operandi within the traditional stipulations of Islamic
precepts with respect to waging jihad al saghir. The purpose is to glean
whether or not such tactics such as suicide bombings, declaring fellow
Muslim apostates in order to kill them, use of IEDs and EFPs to target
civilians, constitute legitimate rules of engagement in jihad al saghir.
Journal: Defense & Security Analysis
Pages: 234-252
Issue: 3
Volume: 29
Year: 2013
Month: 9
X-DOI: 10.1080/14751798.2013.820965
File-URL: http://hdl.handle.net/10.1080/14751798.2013.820965
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:234-252
Template-Type: ReDIF-Article 1.0
Author-Name: Samuel Oyewole
Author-X-Name-First: Samuel
Author-X-Name-Last: Oyewole
Title: Boko Haram and the challenges of Nigeria's war on terror
Abstract:
Boko Haram terrorism has been recognized by Nigerian
President Jonathan as the most threatening and complex security issue in
Nigeria since independence. In response, the Federal Government of Nigeria
has committed itself to different counterterrorism measures, which are
largely dominated by “hard politics” and military
mobilization. Spending heavily on defense to upgrade military hardware and
train personnel in a counterterrorism role, Nigeria has also boosted its
strategic importance in the “Global War on Terror”. However,
this attempt has become unpopular as it has failed to contain Boko Haram
within a short time frame and has made insufficient headway against
unabated terror, with human rights costs among the host communities and
amidst a surge of stakeholders' discordance. As a matter of concern, this
article seeks to assess Boko Haram as an opponent in Nigeria's war on
terror (WOT) and to ascertain the challenges the country faces, the
alternative measures open to it, and possible ways forward.
Journal: Defense & Security Analysis
Pages: 253-262
Issue: 3
Volume: 29
Year: 2013
Month: 9
X-DOI: 10.1080/14751798.2013.820968
File-URL: http://hdl.handle.net/10.1080/14751798.2013.820968
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:3:p:253-262
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 263-265
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.845413
File-URL: http://hdl.handle.net/10.1080/14751798.2013.845413
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:263-265
Template-Type: ReDIF-Article 1.0
Author-Name: Susan M. Jellissen
Author-X-Name-First: Susan M.
Author-X-Name-Last: Jellissen
Author-Name: Fred M. Gottheil
Author-X-Name-First: Fred M.
Author-X-Name-Last: Gottheil
Title: On the utility of security fences along international borders
Abstract:
States confronting cross-border intrusions of terrorism, illegal
immigration, and/or drug trafficking weigh the costs of such intrusions
against the costs of imposing barriers to prevent or curb the intrusions.
In such situations, the degree of national security afforded a state
depends, in large measure, upon the degree of border openness the state
chooses. Depending upon the intensity and frequency of the intrusions --
expressed in terms of opportunity-cost functions -- a state might have
little choice but to pursue a border policy of zero openness. It is this
relationship of border openness to national security that explains why
many states choose to construct security fences. In the 49 cases of
security fences examined, many -- among them Israel vis-à-vis the
West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in
Cyprus -- the construction of security fences becomes more complicated by
their placement on lands whose sovereignties are disputed.
Journal: Defense & Security Analysis
Pages: 266-279
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842707
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842707
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:266-279
Template-Type: ReDIF-Article 1.0
Author-Name: Tamir Libel
Author-X-Name-First: Tamir
Author-X-Name-Last: Libel
Title: From the people's army to the Jewish people's army: the IDF's force structure between professionalization and militarization
Abstract:
The article discusses processes of “religionization” within
the institutional identity and ethos of the Israel Defense Forces (IDF)
and the connection of these processes with the significant structural
changes the IDF has undergone in recent decades. The main argument
presented is that since the late 1980s, the IDF has been in a culture
conflict, torn between soldiers and civilians who advocate turning the IDF
into a professional army “military professionalization,” and
others who wish to preserve, and even strengthen, the “people's
army” model. The present article shows that the meaning of the term
“people” in this phrase has shifted to refer strictly to the
Jewish people, and that a national-ethnic perception strongly influenced
by religious-national ideology has been adopted.
Journal: Defense & Security Analysis
Pages: 280-292
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842708
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842708
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:280-292
Template-Type: ReDIF-Article 1.0
Author-Name: Leonard C. Sebastian
Author-X-Name-First: Leonard C.
Author-X-Name-Last: Sebastian
Author-Name: Iis Gindarsah
Author-X-Name-First: Iis
Author-X-Name-Last: Gindarsah
Title: Assessing military reform in Indonesia
Abstract:
This article seeks to assess the magnitude of military reform in Indonesia
and its impact in establishing greater levels of professionalism within
the armed forces. To this end, the authors will offer some reflections on
the studies of civil-military relations and military transformation for
inculcating a higher degree of military professionalism; analyse to what
extent the process of military reform in Indonesia has reshaped the
institutional role of the armed forces; and discern three major strategic
gaps in Indonesia's military reform, namely the “legal loopholes
and regulation vacuum,” the “shortcomings of democratic
civilian control,” and the “defence-economic gap.”
This article asserts that military professionalism will grow more
substantially depending on the ability of civilian elites to exercise
effective control over the military and the capacity of the government to
transform the military establishment keeping pace with strategic
challenges and operational requirements.
Journal: Defense & Security Analysis
Pages: 293-307
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842709
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842709
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:293-307
Template-Type: ReDIF-Article 1.0
Author-Name: Jason E. Strakes
Author-X-Name-First: Jason E.
Author-X-Name-Last: Strakes
Title: Political opposition, external threats, and elite responses: analyzing domestic security policy in post-Rose Revolution Georgia
Abstract:
In the years since the 2003 Rose Revolution, the popularly elected
leadership of the Republic of Georgia has responded to organized protests
with a variety of repressive tactics. These reactions suggest that former
challengers to authoritarian elites may utilize similar methods of
retaining power during crisis periods. Yet, the alleged involvement of
agencies of the Russian Federation in fomenting domestic instability has
also occupied a central position in the national security policies of the
outgoing Saakashvili government. These conditions both preceded and were
reinforced by the South Ossetia War of August 2008. This article proposes
a theoretical model that represents the intervening effect of interstate
conflicts on state--society relations in Georgia from 2003 to present. It
presents several hypotheses and possible indicators, data sources, and
techniques for analyzing the interaction between characteristics of
opposition groups, external threats, and the domestic security practices
of contemporary Georgian political elites.
Journal: Defense & Security Analysis
Pages: 308-322
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842710
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842710
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:308-322
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas Overhage
Author-X-Name-First: Thomas
Author-X-Name-Last: Overhage
Title: Pool it, share it, or lose it: an economical view on pooling and sharing of European military capabilities
Abstract:
In a general and economical view, this article analyzes methods and
mechanisms for the pooling and sharing of military forces and weapons
inside the European Union (EU) in times of scarcity. Pooling and sharing
could improve the EU military capabilities significantly if differences in
location factors were taken into account and all states would focus on
their respective strengths. More competition and less concentration are
the keys to ensuring guaranteed access to military assets. Pooling and
sharing are likely to be successful only if large states enhance their
emphasis on collective defense by mutual aid and self-help, and reduce
particularistic and parochial interests of local gain. The realm of
personnel has the most potential for improvement but any change is likely
to generate policy implications.
Journal: Defense & Security Analysis
Pages: 323-341
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842712
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842712
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:323-341
Template-Type: ReDIF-Article 1.0
Author-Name: Hans Mouritzen
Author-X-Name-First: Hans
Author-X-Name-Last: Mouritzen
Title: In spite of reform: NATO HQ still in the grips of nations
Abstract:
Security Intergovernmental Organizations, here illustrated by NATO,
persist in a “permitted interval” of internationalization,
i.e. permitted by its member-states. On the one hand, they are seldom or
never permitted to vanish due to member-states' vested interests in
retaining them as tools of statecraft, even if their original purposes
have become redundant. On the other hand, there is an internationalization
ceiling that they must respect: they should not become too autonomous and
thereby no longer be suitable as member-state tools. In spite of post-Cold
War reform, interviews carried out at NATO Headquarters (HQ) in the late
1980s compared to interviews in 2012 display that a continuous pulling and
hauling of forces of internationalization and renationalization have taken
place around NATO HQ. The only instance of clear internationalization can
be observed in the proactive diplomacy of Secretary General Fogh
Rasmussen. There is stiff opposition to the internationalization of
abolishing the Military Committee/International Military Staff among minor
and South European states, and there is no waning in states' attempts to
micro-manage the International Staff. Only external shocks can overcome
resistance to internationalizing reform.
Journal: Defense & Security Analysis
Pages: 342-355
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.843833
File-URL: http://hdl.handle.net/10.1080/14751798.2013.843833
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:342-355
Template-Type: ReDIF-Article 1.0
Author-Name: Andrei Makarychev
Author-X-Name-First: Andrei
Author-X-Name-Last: Makarychev
Author-Name: Alexander Sergunin
Author-X-Name-First: Alexander
Author-X-Name-Last: Sergunin
Title: Russian military reform: institutional, political and security implications
Abstract:
This critical comment examines the incentives, major priorities,
difficulties and first results of the Russian military reform that is
being implemented since 2008. The authors conclude that despite numerous
drawbacks and barriers to the reformist efforts certain successes can be
identified. Particularly, there is a clear shift from the old-fashioned,
Soviet-type army to a more compact, mobile, better equipped and
combat-ready armed forces that are capable to cope with today's challenges
to Russian national security.
Journal: Defense & Security Analysis
Pages: 356-364
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842711
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842711
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:356-364
Template-Type: ReDIF-Article 1.0
Author-Name: Katherine E. Brown
Author-X-Name-First: Katherine E.
Author-X-Name-Last: Brown
Title: The Ashgate research companion to political violence
Journal: Defense & Security Analysis
Pages: 365-366
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842713
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842713
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:365-366
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Anthony Steinberg
Author-X-Name-First: Michael Anthony
Author-X-Name-Last: Steinberg
Title: European Security: the roles of regional organisations
Journal: Defense & Security Analysis
Pages: 367-368
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842714
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842714
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:367-368
Template-Type: ReDIF-Article 1.0
Author-Name: John Allen
Author-X-Name-First: John
Author-X-Name-Last: Allen
Title: Soldier at heart -- from private to general
Journal: Defense & Security Analysis
Pages: 368-370
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842721
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842721
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:368-370
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Anthony Steinberg
Author-X-Name-First: Michael Anthony
Author-X-Name-Last: Steinberg
Title: NATO: the power of partnershipsPursuing strategy: NATO operations from the Gulf War to Gaddafi
Journal: Defense & Security Analysis
Pages: 370-372
Issue: 4
Volume: 29
Year: 2013
Month: 12
X-DOI: 10.1080/14751798.2013.842722
File-URL: http://hdl.handle.net/10.1080/14751798.2013.842722
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:29:y:2013:i:4:p:370-372
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-3
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2014.874093
File-URL: http://hdl.handle.net/10.1080/14751798.2014.874093
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:1-3
Template-Type: ReDIF-Article 1.0
Author-Name: Bao U. Nguyen
Author-X-Name-First: Bao U.
Author-X-Name-Last: Nguyen
Title: Assessment of a Ballistic Missile Defense System
Abstract:
This article presents a complete and self-contained analysis that assesses
the effectiveness of a Ballistic Missile Defense System (BMDS). It does
that by applying several techniques such as the properties of stochastic
processes, the use of dynamical programing, the concept of generating
functions and the applications of orbital mechanics. A step-by-step
description starting from the computation of the number of engagement
opportunities to the calculation of the probability of raid negation to
the evaluation of the probability of integrated system effectiveness is
introduced. The analysis also compares firing tactics in terms of
effectiveness and inventory savings, assesses their contributions and
limitations, as well as determines the driving parameters of a BMDS. New
and optimal firing tactics based on more than one category of engagement
opportunity are also described. The concept of redundancy and the
possibility of boost-phase engagement are also explored in order to
evaluate their impacts on the effectiveness of a BMDS.
Journal: Defense & Security Analysis
Pages: 4-16
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2013.864870
File-URL: http://hdl.handle.net/10.1080/14751798.2013.864870
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:4-16
Template-Type: ReDIF-Article 1.0
Author-Name: Nicholas Khoo
Author-X-Name-First: Nicholas
Author-X-Name-Last: Khoo
Author-Name: Reuben Steff
Author-X-Name-First: Reuben
Author-X-Name-Last: Steff
Title: “This program will not be a threat to them”: Ballistic Missile Defense and US relations with Russia and China
Abstract:
Although the Obama Administration has differed from its predecessor in a
number of respects, on the specific issue of Ballistic Missile Defense
(BMD), there is a striking continuity. The Obama Administration has
remained committed to the BMD project, even as it has modified the
schedule of deployments and prioritized different systems from the Bush
Administration. Significantly, this has led to Chinese and Russian
balancing in the nuclear sphere. As a result, there is evidence of a
security dilemma-type dynamics in US relations with China and Russia. At
present, there is no study that analyzes Russian and Chinese hard internal
balancing against the USA in the sphere of missile defense during the
Obama Administration. This article fills this gap.
Journal: Defense & Security Analysis
Pages: 17-28
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2013.864869
File-URL: http://hdl.handle.net/10.1080/14751798.2013.864869
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:17-28
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: Strategic “defensivism” and post-reset blues: US--Russian nuclear arms reductions, missile defenses and minimum deterrence
Abstract:
US nuclear deterrence and arms control policy may be moving, by design and
by inadvertence, toward a posture of strategic
“defensivism”. Strategic “defensivism”
emphasizes the overlapping and reinforcing impact of: (1) reductions in
US, Russian and possibly other strategic nuclear forces, possibly down to
the level of “minimum deterrence,” (2) deployment of
improved strategic and/or theater antimissile defenses for the US, NATO
allies and other partners; and (3) additional reliance on conventional
military forces for some missions hitherto preferentially assigned to
nuclear weapons. This article deals with the first two of these aspects
only: the interaction between missile defenses and offensive force
reductions in US--Russian strategy and policy. The findings are that
stable deterrence as between the USA and Russia is possible at lower than
New Strategic Arms Reduction Treaty levels, but reductions below 1000
deployed long-range weapons for each state, toward a true minimum
deterrent posture, will require multilateral as opposed to bilateral
coordination of arms limitations. Missile defenses might provide some
denial capability against light attacks by states with small arsenals, but
they still fall short of meaningful damage limitation as between powers
capable of massive nuclear strikes.
Journal: Defense & Security Analysis
Pages: 29-43
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2013.864871
File-URL: http://hdl.handle.net/10.1080/14751798.2013.864871
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:29-43
Template-Type: ReDIF-Article 1.0
Author-Name: Kunal Mukherjee
Author-X-Name-First: Kunal
Author-X-Name-Last: Mukherjee
Title: The Kashmir conflict in South Asia: voices from Srinagar
Abstract:
This article looks at the Kashmir conflict in South Asia, which has been
going on since 1947, when India and Pakistan became independent from
British colonial rule. After looking at some historical background, the
article looks at both the external dimension as well as the internal
dimension of the conflict. The external dimension tends to focus on
Indo-Pak relations over Kashmir and the internal dimension looks at
India's repressive state policies within the state of Kashmir. This
article uses Mary Kaldor's “New War” thesis as a theoretical
framework to understand the situation and pays special attention to the
conflict's very complex and multifaceted nature. The article argues that
although the levels of violence have differed from time to time in the
region since 1947, today the conflict seems to have less to do with
Indo-Pak relations or the external side of things and has more to do with
the internal dimension and India's undemocratic ways within Kashmir.
Today, Kashmir is one of the most militarised conflict zones in the world.
The stationing of the Indian military and paramilitary forces in the
region has only exacerbated the situation since it is the security
personnel who cause much of the problem. The Armed Forces Special Powers
Act gives these security forces extraordinary powers in the region, which
they often abuse. The armed forces have no real understanding of the local
culture or sympathy for local religious sentiments. Poverty, corruption,
administrative failure, police brutality, identity politics and human
rights abuses are some of the key features associated with this conflict.
Methodologically, a number of interviews were carried out with the local
people in the region recently. From the data gathered through the
interviews, it is very obvious that the people still feel very oppressed
and that the situation is still very volatile, fraught with uncertainty.
Finally, after making an assessment of the situation, the article tries to
suggest methods of peaceful building and conflict management as the way
forward.
Journal: Defense & Security Analysis
Pages: 44-54
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2013.864868
File-URL: http://hdl.handle.net/10.1080/14751798.2013.864868
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:44-54
Template-Type: ReDIF-Article 1.0
Author-Name: Michel Ben Arrous
Author-X-Name-First: Michel Ben
Author-X-Name-Last: Arrous
Author-Name: Robert Feldman
Author-X-Name-First: Robert
Author-X-Name-Last: Feldman
Title: Understanding contemporary conflicts in Africa: a state of affairs and current knowledge
Abstract:
Understanding contemporary conflicts in Africa remains directly dependent
on the approaches employed to decipher or interpret them. This article
first examines the bias of conventional approaches (inherited from the
Cold War) and then those of a series of supposedly “newer”
approaches. Relying primarily on West African examples, it offers a brief
overview of current knowledge, issues, and avenues for research, based on
three apparent characteristics of a “new generation” of
conflicts: the regionalization of wars, the privatization of violence and
security, and the recourse to extreme forms of brutality. These three
major trends bear witness to a rapid transformation of war and armed
violence over the past 20 years, but they are not sufficient to establish
a radical historical break between “old” and
“new” conflicts in Africa. By concealing elements of
continuity a priori, the most influential “new” approaches
actually make it impossible to ponder their own limits. To that end,
fashionability and struggles for influence within the Africanist field
play a major role in perpetuating dominant, sensationalistic, or
simplistic (and invariably incorrect) portrayals of African conflicts.
Journal: Defense & Security Analysis
Pages: 55-66
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2013.864865
File-URL: http://hdl.handle.net/10.1080/14751798.2013.864865
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:55-66
Template-Type: ReDIF-Article 1.0
Author-Name: Yu Wang
Author-X-Name-First: Yu
Author-X-Name-Last: Wang
Title: Guns--butter tradeoff in contemporary China
Abstract:
This study offers an investigation of the relationship between defense and
social spending in the People's Republic of China. In particular, three
consecutive questions are answered here. Does a warfare--welfare tradeoff
exist in China's budgetary allocation? Is it positive or negative? What is
the causal direction involved? By applying a vector autoregression
analysis for the period of 1952--2006, this study finds a unidirectional
crowd-out effect going from defense to social spending.
Journal: Defense & Security Analysis
Pages: 67-75
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2013.864867
File-URL: http://hdl.handle.net/10.1080/14751798.2013.864867
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:67-75
Template-Type: ReDIF-Article 1.0
Author-Name: Alexei Filinkov
Author-X-Name-First: Alexei
Author-X-Name-Last: Filinkov
Author-Name: Peter J. Dortmans
Author-X-Name-First: Peter J.
Author-X-Name-Last: Dortmans
Title: An enterprise portfolio approach for defence capability planning
Abstract:
Capability-based planning (CBP) is considered by many defence
organisations to be the best practice for enterprise-level planning,
analysis and management. This approach, loosely based around investment
portfolio theory, is premised on balancing the cost, benefit and risk of
capability options across the defence enterprise. However a number of
authors have recently noted limitations of its current applications. The
authors propose a more general, insurance-based approach, which can
support the evolutionary improvement of the current CBP approach. This
approach is implemented as hedging-based planning and aims to better
reflect the enterprise nature of defence organisations, capturing both
force structure and force generation aspects of military systems.
Journal: Defense & Security Analysis
Pages: 76-82
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2013.864866
File-URL: http://hdl.handle.net/10.1080/14751798.2013.864866
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:76-82
Template-Type: ReDIF-Article 1.0
Author-Name: Tamir Libel
Author-X-Name-First: Tamir
Author-X-Name-Last: Libel
Title: Divine service? Judaism and Israel's armed forces
Journal: Defense & Security Analysis
Pages: 83-84
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2014.872325
File-URL: http://hdl.handle.net/10.1080/14751798.2014.872325
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:83-84
Template-Type: ReDIF-Article 1.0
Author-Name: Richard Connaughton
Author-X-Name-First: Richard
Author-X-Name-Last: Connaughton
Title: British generals in Blair's wars
Journal: Defense & Security Analysis
Pages: 85-86
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2014.874693
File-URL: http://hdl.handle.net/10.1080/14751798.2014.874693
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:85-86
Template-Type: ReDIF-Article 1.0
Author-Name: Kunal Mukherjee
Author-X-Name-First: Kunal
Author-X-Name-Last: Mukherjee
Title: The Islamist challenge in West Asia
Journal: Defense & Security Analysis
Pages: 86-87
Issue: 1
Volume: 30
Year: 2014
Month: 3
X-DOI: 10.1080/14751798.2014.875244
File-URL: http://hdl.handle.net/10.1080/14751798.2014.875244
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:1:p:86-87
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 89-91
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.897107
File-URL: http://hdl.handle.net/10.1080/14751798.2014.897107
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:89-91
Template-Type: ReDIF-Article 1.0
Author-Name: Olive Emil Wetter
Author-X-Name-First: Olive Emil
Author-X-Name-Last: Wetter
Title: Terrorism research: should we focus on the opponent or on our own people?
Abstract:
In terrorism research, three different sources of information and data
exist: the terrorists and their environment; the incidents; and the
population. This article discusses the strengths and weaknesses of
research that is concerned with, or relies on, any of the mentioned
sources. An in-depth understanding of the methodological issues that come
with these sources is important to correctly interpret results from
scientific studies. It is highlighted how the different scientific
approaches add to a holistic view of terrorism as a phenomenon.
Furthermore, the double-edged sword of information in the field of
terrorism is discussed. From these deliberations, guidance concerning the
future work of both scholars and decision-makers can be deducted.
Journal: Defense & Security Analysis
Pages: 92-105
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.894298
File-URL: http://hdl.handle.net/10.1080/14751798.2014.894298
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:92-105
Template-Type: ReDIF-Article 1.0
Author-Name: Yakov Ben-Haim
Author-X-Name-First: Yakov
Author-X-Name-Last: Ben-Haim
Title: Strategy selection: an info-gap methodology
Abstract:
The evaluation and selection of military strategy requires consideration
of myriad factors -- social, historical, political, geographical and
technological -- together with vast uncertainties encompassing all these
domains. Info-gap decision theory is a conceptual framework that can
support these deliberations and that has substantive implications for the
formulation, evaluation and selection of strategic goals and of the means
to attain them. In particular, while the analyst may desire to reliably
achieve the best possible outcome, info-gap theory provides a critique of,
and alternative to, the paradigm of optimizing the outcome of a decision.
In selecting between strategy alternatives, the analyst must sometimes
choose between one alternative that is purportedly better than another,
but also more uncertain. Such a choice is a dilemma whose resolution
requires the analyst to balance between the different predicted qualities
of each alternative and their different vulnerabilities to uncertainty.
The dilemma can be managed with the info-gap methodology of robustly
satisfying critical requirements.
Journal: Defense & Security Analysis
Pages: 106-119
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.894292
File-URL: http://hdl.handle.net/10.1080/14751798.2014.894292
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:106-119
Template-Type: ReDIF-Article 1.0
Author-Name: Kevin Marsh
Author-X-Name-First: Kevin
Author-X-Name-Last: Marsh
Title: “Leading from behind”: neoclassical realism and operation Odyssey Dawn
Abstract:
In March 2011, President Barack Obama ordered US air and naval forces to
commence Operation Odyssey Dawn in Libya to impose a no-fly zone. The
decision by the Obama Administration to intervene in a limited and
supporting role in Libya is an important development in US foreign policy.
Operation Odyssey Dawn presents scholars with a valuable opportunity to
analyze and explore how US foreign policy is made and what roles domestic
politics and elite perceptions play in decisions to use force. The author
argues that neoclassical realism is a useful and compelling theoretic
framework with which to analyze Operation Odyssey Dawn. While the
Administration intervened in response to perceived external-level threats
to US national interests, salient intervening domestic-level variables and
elite perceptions shaped and guided the tenor and scope of the operation.
Journal: Defense & Security Analysis
Pages: 120-132
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.894295
File-URL: http://hdl.handle.net/10.1080/14751798.2014.894295
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:120-132
Template-Type: ReDIF-Article 1.0
Author-Name: David R. Henderson
Author-X-Name-First: David R.
Author-X-Name-Last: Henderson
Author-Name: Chad W. Seagren
Author-X-Name-First: Chad W.
Author-X-Name-Last: Seagren
Title: Would conscription reduce support for war?
Abstract:
An increasingly popular justification for conscription is that it would
increase the probability that the “children” of politically
powerful people would serve in the military, thus giving them an incentive
to lobby against war. However, this argument neglects the fact that
avoiding war for a nation is a public good and is, therefore, subject to
the classic free-rider problem. Under-provision of anti-war agitation from
those seeking to avoid the draft is exacerbated by the fact that seeking a
deferment provides an alternative with a superior private payoff.
Empirical findings since World War II are consistent with our thesis.
Journal: Defense & Security Analysis
Pages: 133-147
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.894293
File-URL: http://hdl.handle.net/10.1080/14751798.2014.894293
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:133-147
Template-Type: ReDIF-Article 1.0
Author-Name: Stefan Markowski
Author-X-Name-First: Stefan
Author-X-Name-Last: Markowski
Author-Name: Peter Hall
Author-X-Name-First: Peter
Author-X-Name-Last: Hall
Title: Mandated defence offsets: can they ever deliver?
Abstract:
Defence offsets are elements of defence procurement deals
additional to the primary content. Offsets are usually
expected to yield technological or industrial benefits to the purchasing
country (e.g. countertrade, technology transfers, or additional jobs) and
military buyers often require suppliers to make offsets available
“cost-free.” The authors argued previously that such
strategies achieve little of value to buyers that lack market power and
are unnecessary otherwise, since purchasers with the market power to
extract more value for money from foreign suppliers can do so anyway. This
article also focuses on the supply side of offset deals. The USA is the
world's largest defence offsets supplier but the US government opposes
offsets demands as economically inefficient and trade distorting. Even if
offsets are inefficient and trade distorting, they may still benefit a
materiel-exporting country such as the USA as they may induce exports and
create associated benefits for the offsets provider.
Journal: Defense & Security Analysis
Pages: 148-162
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.894294
File-URL: http://hdl.handle.net/10.1080/14751798.2014.894294
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:148-162
Template-Type: ReDIF-Article 1.0
Author-Name: Dmitri Shlapentokh
Author-X-Name-First: Dmitri
Author-X-Name-Last: Shlapentokh
Title: Ukrainian and Belorussian dimensions of Turkmenistan foreign policy: small states in a multipolar world
Abstract:
As the USA continues to decline both in relative and absolute terms, the
global order emerges where no center of power exists. This creates a
complicated and instable geopolitical situation where small states could
act behind the back of the great powers. The relationship between
Turkmenistan and Ukraine is the example of this sort of relationship.
Whereas Ukraine wants to get cheap gas, Turkmenistan wants to find the way
to sell its gas to the West. It looks as though both countries pay little
attention to Russian objection and act without direct help from either the
USA or other great powers.
Journal: Defense & Security Analysis
Pages: 163-175
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.894297
File-URL: http://hdl.handle.net/10.1080/14751798.2014.894297
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:163-175
Template-Type: ReDIF-Article 1.0
Author-Name: Henry Prunckun
Author-X-Name-First: Henry
Author-X-Name-Last: Prunckun
Title: Covert radio communications: a viable tactic for international terrorists?
Abstract:
Covert operations by underground groups, such as transnational terrorists,
are not new and neither are the methods members of these groups use to
communicate in their shadowy world. In this regard, one of the enduring
myths is that the main means these covert operatives use to communicate
within their cell structure are telephones and emails in their various
manifestations. This article critically discusses the possible use of
wireless transmissions by transnational terrorists as a reliable form of
communications. To critically discuss this proposition, a force field
analysis was used to assess the theory that radio is a viable option.
Implications of this study's findings are considered in terms of the
ramifications they have for defence and security policy.
Journal: Defense & Security Analysis
Pages: 176-184
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.894296
File-URL: http://hdl.handle.net/10.1080/14751798.2014.894296
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:176-184
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: New wars, new books, new ethics
Journal: Defense & Security Analysis
Pages: 185-188
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.894291
File-URL: http://hdl.handle.net/10.1080/14751798.2014.894291
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:185-188
Template-Type: ReDIF-Article 1.0
Author-Name: John Allen
Author-X-Name-First: John
Author-X-Name-Last: Allen
Title: Diversionary war -- domestic unrest and international conflict
Journal: Defense & Security Analysis
Pages: 189-190
Issue: 2
Volume: 30
Year: 2014
Month: 6
X-DOI: 10.1080/14751798.2014.897109
File-URL: http://hdl.handle.net/10.1080/14751798.2014.897109
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:2:p:189-190
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 193-195
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.927670
File-URL: http://hdl.handle.net/10.1080/14751798.2014.927670
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:193-195
Template-Type: ReDIF-Article 1.0
Author-Name: Saroj Kumar Rath
Author-X-Name-First: Saroj Kumar
Author-X-Name-Last: Rath
Title: New terrorist threat to India's internal security: the danger from Pakistan's “Karachi Project”
Abstract:
The spectacular commando-style terrorist strike on Mumbai in November 2008
exposed India's lax internal security structure. As nearly all the
security apparatus broke down during the long spell of attacks, massive
public outrage flared up across the country calling for a firmer
government response. Shockingly, India has done little to prevent a
recurrence and a new security threat faces the country every single day
not merely before but even after the Mumbai attacks. In contrast,
Pakistan's Inter Services Intelligence and the Lashkar-e-Taiba have
successfully evaded pressures from both India and the international
community and continue their terror campaign against India under the
“Karachi Project” with the explicit intention to unsettle
South Asia. Classified documents indicated that India is at the forefront
of a cataclysmic “nuclear terrorism” threat from a
“combination of Pakistan-based terrorists and homegrown
radicals.” This article analyses the danger posed by the Indo-Pak
radical groups targeting India and India's lack of preparedness to the new
security threat from the “Karachi Project.”
Journal: Defense & Security Analysis
Pages: 196-208
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.924738
File-URL: http://hdl.handle.net/10.1080/14751798.2014.924738
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:196-208
Template-Type: ReDIF-Article 1.0
Author-Name: Luqman Saeed
Author-X-Name-First: Luqman
Author-X-Name-Last: Saeed
Author-Name: Shabib Haider Syed
Author-X-Name-First: Shabib Haider
Author-X-Name-Last: Syed
Author-Name: Roger P. Martin
Author-X-Name-First: Roger P.
Author-X-Name-Last: Martin
Title: Historical patterns of terrorism in Pakistan
Abstract:
This article presents a descriptive analysis of terrorism in Pakistan over
the past three decades. Using statistical tools, the authors disentangle
terrorist violence to expose underlying trends. Continuities and
discontinuities in the various types of terrorism are identified and
correlated with domestic and international events. The gravity of
terrorist violence is found to change from one region of the country to
another in response to geopolitical events. The Khyber Pakhtunkhwa share
of terrorist incidents during the last three decades fell from 45% to 5%
and then rebounded to 58%. Sindh's share of terrorist incidents followed
an opposite pattern over the three decades, increasing from 23% to 68% and
then decreasing again to just 9%. Terrorist incidents were most frequent
in the 1990s but most lethal in the 2000s. Overall, terrorist violence has
followed an increasing trend. The composition of terrorist attacks
(sectarian, ethnic, and non-sectarian religious) has changed over the past
three decades, with sectarian terrorism emerging as the more lethal,
causing almost six casualties per attack. Terrorist methods have also
changed over time, with bombings becoming less prominent in the 1990s but
much more common in the 2000s. The geographical distribution of terrorist
incidents has likewise changed over time -- national and provincial
capitals were targeted 64% of the time in the 1980s and just 25% of the
time today. Overall, the authors conclude that the methods and pattern of
terrorist incidents change logically in response to changes in the
geopolitical environment.
Journal: Defense & Security Analysis
Pages: 209-229
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.921450
File-URL: http://hdl.handle.net/10.1080/14751798.2014.921450
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:209-229
Template-Type: ReDIF-Article 1.0
Author-Name: Rizwan Zeb
Author-X-Name-First: Rizwan
Author-X-Name-Last: Zeb
Title: Pakistan’s nuclear weapons: how safe is safe enough? Transparency versus opacity
Abstract:
Due to expanding and increasing religious extremism and terrorism coupled
with political instability in Pakistan, most western observers believe
that Pakistan's nuclear weapons are not secure and could be taken over by
terrorists. This would have adverse implications for the region and for
global peace, especially for the security of USA and Europe. This article
argues that this perception is based on a flawed understanding and
knowledge of how Pakistan's command and control setup has evolved and
operates. Pakistan's nuclear weapons are as safe as any other state's
nuclear weapons. Pakistan has also been active in supporting and
participating in global efforts to improve nuclear safety and security.
Over the years, Pakistan has been quite open in sharing information
regarding how it is improving its command and control system with western
governments as well as scholars. This article argues that the steps
Pakistan has taken to secure its nuclear weapons are adequate and that
Pakistan would continue to further strengthen these measures; however, it
is the expanding religious extremism, terrorism and anti-Americanism in
the country which make the international perception of Pakistan extremely
negative and then seep into the perception of Pakistan's nuclear weapons
safety and security.
Journal: Defense & Security Analysis
Pages: 230-244
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.925640
File-URL: http://hdl.handle.net/10.1080/14751798.2014.925640
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:230-244
Template-Type: ReDIF-Article 1.0
Author-Name: Mahmood Ahmad
Author-X-Name-First: Mahmood
Author-X-Name-Last: Ahmad
Title: The legality of unmanned aerial vehicles outside the combat zone: a case study of the Federally Administered Tribal Areas of Pakistan
Abstract:
The drone is the latest tool to promote interests of a nation-state. It is
clear that USA as well as other major powers anticipate that robotics will
play a key role in future warfare. Today, more than 70 countries have
already acquired drone technology and many others are desperate to join
the ranks. This urge for drone technology will ultimately lead to a
“boundless and borderless war without end.” In the case of
Pakistan, the US drone campaign has raised some important issues regarding
how their use could, or should, be regulated in the future. This article
analyses the legal issues raised by the US's use of drone technology in
non-combat zones, such as Pakistan. It is argued that a reckless
disrespect of Pakistan's sovereignty has had adverse implications and
consequences for the legitimacy of the Pakistani government. Drone strikes
have prompted instinctive opposition among the Pakistani population, hurt
their feelings and estranged them from the government. This in turn has
added to Pakistan's instability and stimulated a ground-swell of animosity
toward the USA.
Journal: Defense & Security Analysis
Pages: 245-253
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.921448
File-URL: http://hdl.handle.net/10.1080/14751798.2014.921448
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:245-253
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew J. Webb
Author-X-Name-First: Matthew J.
Author-X-Name-Last: Webb
Title: Grievance and the Kashmiri diaspora
Abstract:
Grievance theories that emphasize injustice as the primary cause of
secessionist violence offer valuable insights into the motivations of
sponsors and participants. However, they face a difficulty in explaining
the participation and support of geographically dispersed populations of
co-ethnics (diaspora) that is not shared by rival theories that instead
emphasize self-interest. This article uses the Kashmiri diaspora in
Britain to examine how appeal to nationalist factors of shared identity,
mutual sympathy and common understandings might allow grievance theories
to effectively explain diaspora support. It concludes that, while a hybrid
grievance-nationalist model might offer a more accurate and nuanced
explanatory account of secessionist violence, it does so at the cost of
conceptual clarity. Finally, the article addresses the implications for
states and strategies to reduce the mobilization of diaspora in order to
deny secessionists’ valuable assistance.
Journal: Defense & Security Analysis
Pages: 254-265
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.921451
File-URL: http://hdl.handle.net/10.1080/14751798.2014.921451
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:254-265
Template-Type: ReDIF-Article 1.0
Author-Name: Zain Rafique
Author-X-Name-First: Zain
Author-X-Name-Last: Rafique
Author-Name: Muhammad Azfar Anwar
Author-X-Name-First: Muhammad Azfar
Author-X-Name-Last: Anwar
Title: Insurgency in Afghanistan: implications for Pakistan's internal and external security
Abstract:
In the aftermath of 9/11, the USA embarked on a massive global hunt for
terrorists and launched its “Operation Enduring Freedom” in
Afghanistan. Its failure to control insurgency in Afghanistan spilled over
into Pakistan, with disastrous consequences. The resurgence of the Taliban
with more formidable tactics and maneuvering skills has become more
troublesome for both Afghanistan and Pakistan and for the USA and its
allied forces. The fierce comeback of the insurgents has challenged the
political and territorial integrity of Pakistan, one that it cannot
tolerate. This article analyzes the current situation and its implications
for Pakistan's security. Moreover, it looks into the internal and external
security complexities that Pakistan faces and the possible implications of
the US exit strategy for Pakistan's security. It concludes that the
security situation in Pakistan is continuously deteriorating and no part
of her territory is immune from terrorists' attacks. To be successful,
Pakistan must pursue a broad-based strategy that encompasses military,
political, social, economic and informational domains aimed at
accomplishing four major objectives: (1) elimination of foreign terrorists
and their facilitators; (2) strengthening of the political and
administrative institutions in the Federally Administered Tribal Areas
(FATA); (3) establishing a safe and secure environment conducive for
sustained development and the realization of real socio-economic progress
and (4) integrating the FATA into the national mainstream. In the long
term, a strategy based on the concept of “Enlightened
Moderation” is the right solution, not only to the internal
problems of Pakistan but also for the Muslim world and the international
community.
Journal: Defense & Security Analysis
Pages: 266-282
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.921449
File-URL: http://hdl.handle.net/10.1080/14751798.2014.921449
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:266-282
Template-Type: ReDIF-Article 1.0
Author-Name: Steve Carpenter
Author-X-Name-First: Steve
Author-X-Name-Last: Carpenter
Title: Countering the Quetta Shura: a viable strategy to US policy in Afghanistan
Abstract:
The US strategy in Afghanistan has fallen short of neutralizing the
insurgency that threatens the future stability. The primary insurgency's
leadership council, the Quetta Shura, has effectively managed influence
through a shadow government and superior tactics in recruiting
marginalized tribal leaders, leading to a questionable outcome once
Coalition forces withdraw in 2014. This article summarizes the threat
posed by the Quetta Shura, coinciding with the deficiencies in the current
US policy, and recommends a more viable strategy conducive to the current
circumstances, based on historical and cultural precedence. Coalition
forces have put a great amount of time, money, and effort into
establishing a more stable Afghanistan. The USA needs a more aggressive
strategy to counter the aspirations of the insurgency, thereby giving the
Afghans the opportunity to further progress in the future. Under the
current circumstances and policies, a peaceful transition after the
Coalition withdrawal is becoming more unlikely.
Journal: Defense & Security Analysis
Pages: 283-295
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.921447
File-URL: http://hdl.handle.net/10.1080/14751798.2014.921447
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:283-295
Template-Type: ReDIF-Article 1.0
Author-Name: Steve Dobransky
Author-X-Name-First: Steve
Author-X-Name-Last: Dobransky
Title: The rise of China vs. the logic of strategy
Journal: Defense & Security Analysis
Pages: 296-298
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.924727
File-URL: http://hdl.handle.net/10.1080/14751798.2014.924727
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:296-298
Template-Type: ReDIF-Article 1.0
Author-Name: Peter Rowe
Author-X-Name-First: Peter
Author-X-Name-Last: Rowe
Title: The law of war
Journal: Defense & Security Analysis
Pages: 298-299
Issue: 3
Volume: 30
Year: 2014
Month: 9
X-DOI: 10.1080/14751798.2014.924728
File-URL: http://hdl.handle.net/10.1080/14751798.2014.924728
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:3:p:298-299
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 301-303
Issue: 4
Volume: 30
Year: 2014
Month: 12
X-DOI: 10.1080/14751798.2014.964913
File-URL: http://hdl.handle.net/10.1080/14751798.2014.964913
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:301-303
Template-Type: ReDIF-Article 1.0
Author-Name: Amitai Etzioni
Author-X-Name-First: Amitai
Author-X-Name-Last: Etzioni
Title: The United States' retreat from the Middle East and pivot to the Far East is likely to intensify
Abstract:
A combination of threat analysis and “subterranean forces”
(such as proclivities to fight conventional wars as compared to asymmetric
ones) leads the USA to prefer focusing on the threats from China rather
than those emanating from the Middle East.
Journal: Defense & Security Analysis
Pages: 304-310
Issue: 4
Volume: 30
Year: 2014
Month: 12
X-DOI: 10.1080/14751798.2014.964914
File-URL: http://hdl.handle.net/10.1080/14751798.2014.964914
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:304-310
Template-Type: ReDIF-Article 1.0
Author-Name: P.I. Kasatkin
Author-X-Name-First: P.I.
Author-X-Name-Last: Kasatkin
Author-Name: V.A. Avatkov
Author-X-Name-First: V.A.
Author-X-Name-Last: Avatkov
Title: The soft power of migration -- a hard task for the European union
Abstract:
The article studies the range of problems that have emerged due to the
growing immigration from Muslim countries into the European Union (EU).
While describing the functions of immigrants' communities, the authors
focus on their political role in the receiving states. The study of the
historical development of government--diaspora relations in three cases
(the UK, France, and Germany) shows that Muslim communities' political
influence does not reflect their economic and cultural role, which in the
future might threaten the EU security, unless these countries develop a
new approach to an “acculturation” policy.
Journal: Defense & Security Analysis
Pages: 311-322
Issue: 4
Volume: 30
Year: 2014
Month: 12
X-DOI: 10.1080/14751798.2014.948282
File-URL: http://hdl.handle.net/10.1080/14751798.2014.948282
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:311-322
Template-Type: ReDIF-Article 1.0
Author-Name: Valery Konyshev
Author-X-Name-First: Valery
Author-X-Name-Last: Konyshev
Author-Name: Alexander Sergunin
Author-X-Name-First: Alexander
Author-X-Name-Last: Sergunin
Title: Is Russia a revisionist military power in the Arctic?
Abstract:
In contrast with a widespread perception of Russia as an expansionist
power in the Arctic, this article argues that Moscow does not seek
military superiority in the region. Rather, Moscow's military strategies
in the Arctic pursue three major goals: first, to demonstrate and
ascertain Russia's sovereignty over its exclusive economic zone and
continental shelf in the region; second, to protect its economic interests
in the High North; and third, to demonstrate that Russia retains its great
power status and still has world-class military capabilities. The Russian
military modernization programs are quite modest and aim at upgrading the
Russian armed forces in the High North rather than providing them with
additional offensive capabilities or provoking a regional arms race. The
Russian ambitions in the Arctic may be high, but they are not necessarily
implying the intentions and proper capabilities to confront other regional
players by military means. On the contrary, Moscow opts for soft rather
than hard power strategy in the Arctic.
Journal: Defense & Security Analysis
Pages: 323-335
Issue: 4
Volume: 30
Year: 2014
Month: 12
X-DOI: 10.1080/14751798.2014.948276
File-URL: http://hdl.handle.net/10.1080/14751798.2014.948276
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:323-335
Template-Type: ReDIF-Article 1.0
Author-Name: Heinz Gaertner
Author-X-Name-First: Heinz
Author-X-Name-Last: Gaertner
Title: North Korea, deterrence, and engagement
Abstract:
The Democratic People's Republic of Korea (DPRK) justifies its nuclear
weapon arsenal with the concept of deterrence. It means that it will try
to miniaturize and modernize its warheads and missiles. This leads to a
first-use doctrine of nuclear weapons. Obama's policy of engagement does
not offer a solution to the North Korean nuclear issue as yet. In the
context of its policy of critical engagement with the DPRK, the European
Union has three key interests: regional peace and stability,
denuclearization, and human rights. The Conference on Security and
Cooperation (CSCE) could be a precedent. The CSCE process was based on
three “baskets”: security, economics, and humanitarian. The
multilateral Trans-Pacific Partnership is a step in this regard. This
article looks at three theoretical approaches: realism, liberal
institutionalism, and liberal internationalism. It concludes that a
political strategy to create a stable North Korean peninsula has to go
beyond nuclear deterrence that is based on the realist notion of balance
of power.
Journal: Defense & Security Analysis
Pages: 336-345
Issue: 4
Volume: 30
Year: 2014
Month: 12
X-DOI: 10.1080/14751798.2014.950464
File-URL: http://hdl.handle.net/10.1080/14751798.2014.950464
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:336-345
Template-Type: ReDIF-Article 1.0
Author-Name: Anke Richter
Author-X-Name-First: Anke
Author-X-Name-Last: Richter
Author-Name: Natalie J Webb
Author-X-Name-First: Natalie J
Author-X-Name-Last: Webb
Title: Can Smart Defense work? A suggested approach to increasing risk- and burden-sharing within NATO
Abstract:
“Smart Defense” is NATO's new approach to risk- and
burden-sharing, which has been a chronic problem within the alliance since
the 1950s. Numerous solutions have been proposed, but initiatives
resulting in more equitable burden-sharing have never been fully
implemented. There are two driving forces influencing a county's
willingness to support such initiatives -- the economic theory of
alliances and the risks posed by the implementation of capability sharing.
The authors examine each of these and propose that rather than aiming for
group consensus on the production of capabilities, NATO should focus on
interoperability through support functions. This approach provides the
most likely solution for connecting the forces, doctrine, procedures,
standards and other factors of joint capability production such that
country leaders find the risks of doing so to be politically and
militarily acceptable.
Journal: Defense & Security Analysis
Pages: 346-359
Issue: 4
Volume: 30
Year: 2014
Month: 12
X-DOI: 10.1080/14751798.2014.948279
File-URL: http://hdl.handle.net/10.1080/14751798.2014.948279
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:346-359
Template-Type: ReDIF-Article 1.0
Author-Name: Peter J. Coughlan
Author-X-Name-First: Peter J.
Author-X-Name-Last: Coughlan
Author-Name: William R. Gates
Author-X-Name-First: William R.
Author-X-Name-Last: Gates
Author-Name: Noah Myung
Author-X-Name-First: Noah
Author-X-Name-Last: Myung
Title: One size does not fit all: personalized incentives in military compensation
Abstract:
A critical element in implementing a compensation scheme including
nonmonetary incentives (NMIs) is recognizing that preferences vary widely
across Service members. There are at least three sources of variability:
across different population classes, across individuals within a
population class, and across NMI packages for a particular individual.
Surveys across different military communities, ranks, and years of Service
show the difficulty of identifying any NMI that has significant value for
even 50% of the active duty force. At the same time, approximately 80% of
the surveyed Service members expressed a significant positive value for at
least one NMI. Therefore, one-size-fits-all incentive packages will not be
nearly as effective as more personalized incentive packages. The authors
discuss variability in Service member NMI preferences and outline an
approach to implementing personalized NMI packages in military
compensation through a sealed-bid reverse auction, where Service members
select individual NMIs from a “cafeteria-style” menu of
options.
Journal: Defense & Security Analysis
Pages: 360-378
Issue: 4
Volume: 30
Year: 2014
Month: 12
X-DOI: 10.1080/14751798.2014.948283
File-URL: http://hdl.handle.net/10.1080/14751798.2014.948283
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:360-378
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: Tommy this an’ Tommy that. The Military Covenant; The Military Covenant. Its impact on civil--military relations in Britain
Journal: Defense & Security Analysis
Pages: 379-381
Issue: 4
Volume: 30
Year: 2014
Month: 12
X-DOI: 10.1080/14751798.2014.967942
File-URL: http://hdl.handle.net/10.1080/14751798.2014.967942
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:30:y:2014:i:4:p:379-381
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-3
Issue: 1
Volume: 31
Year: 2015
Month: 3
X-DOI: 10.1080/14751798.2014.1003458
File-URL: http://hdl.handle.net/10.1080/14751798.2014.1003458
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:1-3
Template-Type: ReDIF-Article 1.0
Author-Name: M.D. Ginsberg
Author-X-Name-First: M.D.
Author-X-Name-Last: Ginsberg
Author-Name: A.T. Bui
Author-X-Name-First: A.T.
Author-X-Name-Last: Bui
Title: Bioprotection of facilities
Abstract:
The anthrax attacks of 2001 energized research directed toward reducing
health consequences from airborne contaminants by augmenting current
heating ventilation and air-conditioning (HVAC) systems. Even during
peacetime, interest will continue in improving HVAC components to reduce
biocontaminants associated with sick building syndrome. Current HVAC
design uses numerical simulation methods of ordinary differential
equations to predict approximate performance. The authors show that
state-space Laplace Transform calculations actually solve the underlying
differential equations and yield algebraic expressions that provide new
insight. To sharpen the arguments in favor of this methodology, attention
is restricted to improving existing HVAC systems to increase protection
from an external release of hazardous particulates. By nearly eliminating
the need for dynamical simulation, the resulting methods can be applied to
far more complex HVAC designs with little additional computational effort.
The new methods reduce the time required for computation by three orders
of magnitude. These algebraic methods also can be extended to disparate
technical problems including internal particulate release, gas masks, and
designing new protective buildings.
Journal: Defense & Security Analysis
Pages: 4-21
Issue: 1
Volume: 31
Year: 2015
Month: 3
X-DOI: 10.1080/14751798.2014.995335
File-URL: http://hdl.handle.net/10.1080/14751798.2014.995335
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:4-21
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew J. Webb
Author-X-Name-First: Matthew J.
Author-X-Name-Last: Webb
Title: The importance of predecessor centers of sovereignty and processes of state formation in explaining secession
Abstract:
A range of theories have sought to explain and predict secession with
varying degrees of success. Arguing that a disproportionate focus upon the
seceding group as the unit of analysis has frustrated the development of a
comprehensive theoretical framework that is universally valid, this
article highlights the role of predecessor institutions of governance and
the failure of states to successfully incorporate these as an important,
but neglected, causal factor in the study of secession. The inclusion of
pre-state institutions of governance and processes of state formation not
only results in a more complete, and therefore accurate, explanatory
account of secession, but also explains why some regions have been more
prone to secession than others.
Journal: Defense & Security Analysis
Pages: 22-34
Issue: 1
Volume: 31
Year: 2015
Month: 3
X-DOI: 10.1080/14751798.2014.989711
File-URL: http://hdl.handle.net/10.1080/14751798.2014.989711
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:22-34
Template-Type: ReDIF-Article 1.0
Author-Name: Carol Atkinson
Author-X-Name-First: Carol
Author-X-Name-Last: Atkinson
Title: US strategic preferences in the early twenty-first century
Abstract:
This article investigates how US national security planners have
envisioned the emerging strategic environment during the early
twenty-first century and evaluates how their perceptions of this strategic
environment have changed during these years. This conceptual evolution can
be seen in how defense planners define threats, identify defense
priorities, and design security strategies. Five key strategic planning
documents serve as the basis for this analysis and illustrate significant
shifts in how the US government has envisioned its own security
requirements as well as the context within which its strategic vision will
need to be realized. These planning documents are: (1) Joint
Vision 2020, (2) the Bush Administration's 2002 National
Security Strategy of the United States, (3) the Obama
Administration's 2010 National Security Strategy, (4) US
Strategic Defense Guidance entitled Sustaining US Global
Leadership: Priorities for 21-super-st Century Defense, and (5)
the US Chairman of the Joint Chiefs of Staff's Capstone Concept
for Joint Operations: Joint Force 2020.
Journal: Defense & Security Analysis
Pages: 35-43
Issue: 1
Volume: 31
Year: 2015
Month: 3
X-DOI: 10.1080/14751798.2014.995334
File-URL: http://hdl.handle.net/10.1080/14751798.2014.995334
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:35-43
Template-Type: ReDIF-Article 1.0
Author-Name: Roger Handberg
Author-X-Name-First: Roger
Author-X-Name-Last: Handberg
Title: The symbolic politics of ballistic missile defense: seeking the perfect defense in an imperfect world
Abstract:
Ballistic missile defense (BMD) politics present an interesting evolution
in how the USA, especially Congress, has come to think about BMD both as
operational reality and as a symbolic policy. The argument here is that
BMD's operational reality is increasingly overshadowed by its symbolic
aspects. Such a status arose from rapidly changing international and
domestic politics. The end result is a situation in which BMD policy in a
sense floats above the question of its actual combat effectiveness. Its
primary mission in part is sustaining US capacity to remain a global power
and support its allies.
Journal: Defense & Security Analysis
Pages: 44-57
Issue: 1
Volume: 31
Year: 2015
Month: 3
X-DOI: 10.1080/14751798.2014.995336
File-URL: http://hdl.handle.net/10.1080/14751798.2014.995336
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:44-57
Template-Type: ReDIF-Article 1.0
Author-Name: Adam D.M. Svendsen
Author-X-Name-First: Adam D.M.
Author-X-Name-Last: Svendsen
Title: Advancing “Defence-in-depth”: intelligence and systems dynamics
Abstract:
This article aims to encourage the fostering of more systems thinking, and
its greater exploitation, within the domain of contemporary intelligence.
With particular focus on “micro systems thinking” and with
reference to key intelligence processes, such as intelligence analysis,
the utility of many systems dynamics within the intelligence context seeks
to be further revealed. Through their greater collective harnessing,
including up to “System of Systems” (“SoS”)
dynamics, and promoting all that they can offer, more sophisticated
overarching operational-to-strategic/policy “ends,” notably
that of “defence-in-depth,” can be viably further advanced
in a sustainable manner into the future. Arguably, a much-needed
transformative impact on contemporary intelligence can also be
increasingly realised through comprehensively engaging in and with more
systems and SoS thinking. Aiding civil protection tasks, crisis
management, emergency planners, and civil contingency practitioners
likewise gain.
Journal: Defense & Security Analysis
Pages: 58-73
Issue: 1
Volume: 31
Year: 2015
Month: 3
X-DOI: 10.1080/14751798.2014.995337
File-URL: http://hdl.handle.net/10.1080/14751798.2014.995337
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:58-73
Template-Type: ReDIF-Article 1.0
Author-Name: Charles Kirke
Author-X-Name-First: Charles
Author-X-Name-Last: Kirke
Title: “Respect” as a personal attribute in the British Army
Abstract:
This article describes the results of research into the social phenomenon
of “respect” as framed by junior members of the British
Army, as part of a wider study into the Values and Standards of the
British Army. This research was interview based, using qualitative
analysis software to detect, manage, and draw conclusions from the
qualitative data recorded in those interviews. The data indicated that the
primary situation in which “respect” was visualised by the
participants was the unit context, and that it comprised a combination of
three different strands: respect for rank or “hierarchical
respect,” “professional respect” for a person's
military competence, and “personal respect” for an
individual's character, personal behaviour, and attributes. The overall
respect that an individual is given arises from the combination of these
three areas. “Respect” as a concept was, in the
soldiers’ characterisation, something that had to be earned (except
for the “given” represented by rank) and was not stable: a
person's fund of respect could go up or down in social value. Respect was
also linked to trust: the more respect a person had, the more they could
be trusted. Although the unit context was the primary one for discussing
their framing of the concept of respect, many of the participants reported
a wider dimension in which every human being deserves a basic level of
respect simply for being human, and this level could not be forfeited.
Journal: Defense & Security Analysis
Pages: 74-82
Issue: 1
Volume: 31
Year: 2015
Month: 3
X-DOI: 10.1080/14751798.2015.1014156
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1014156
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:74-82
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: A Dorset parish remembers 1914--1918: Thankful and not so thankful: how the Great War changed three English villages forever
Journal: Defense & Security Analysis
Pages: 83-84
Issue: 1
Volume: 31
Year: 2015
Month: 3
X-DOI: 10.1080/14751798.2014.1003459
File-URL: http://hdl.handle.net/10.1080/14751798.2014.1003459
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:83-84
Template-Type: ReDIF-Article 1.0
Author-Name: Eric Grove
Author-X-Name-First: Eric
Author-X-Name-Last: Grove
Title: China's naval power: an offensive realist approach
Journal: Defense & Security Analysis
Pages: 84-86
Issue: 1
Volume: 31
Year: 2015
Month: 3
X-DOI: 10.1080/14751798.2014.1003460
File-URL: http://hdl.handle.net/10.1080/14751798.2014.1003460
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:1:p:84-86
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 87-89
Issue: 2
Volume: 31
Year: 2015
Month: 6
X-DOI: 10.1080/14751798.2015.1038451
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1038451
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:87-89
Template-Type: ReDIF-Article 1.0
Author-Name: Yoel Guzansky
Author-X-Name-First: Yoel
Author-X-Name-Last: Guzansky
Title: Lines in the sand: the use and misuse of red lines
Abstract:
This article explores series of “red lines” issued over the
years by the USA and Israel toward Iran and Syria. It argues that the
effectiveness of inflexible “red lines” in an environment
that is given to rapid change is doubtful. They provide an adversary with
the ability to determine when the deterring party will act and when they
will not, a situation that is often undesirable. Moreover, their
inflexible nature on the one hand opens the doors for circumvention while
technically staying within their parameters. On the other hand, a strategy
of more ambiguous “red lines” that allow flexibility in
choosing the time, intensity, and nature of the response could also
achieve a considerable deterrent effect, provided that they do not remain
mere bluffs.
Journal: Defense & Security Analysis
Pages: 90-98
Issue: 2
Volume: 31
Year: 2015
Month: 6
X-DOI: 10.1080/14751798.2015.1014158
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1014158
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:90-98
Template-Type: ReDIF-Article 1.0
Author-Name: Joseph T. Buontempo
Author-X-Name-First: Joseph T.
Author-X-Name-Last: Buontempo
Title: A trajectory for homeland ballistic missile defense
Abstract:
The Ground-based Midcourse Defense system is intended to protect the US
homeland against limited attacks from intermediate- and long-range
ballistic missiles. It has succeeded in intercepting target missiles and
can engage a threat launched from North Korea or the Middle East,
targeting any point in the USA. Nevertheless, high-profile struggles and
program changes related to homeland ballistic missile defense (BMD)
continue to make headlines. The most significant struggle has been a
string of three straight intercept test failures over five years, followed
by the recent successful intercept test in June 2014. This article first
briefly reviews the current threats of concern. It then examines homeland
BMD policy objectives, followed by the current major technical issues in
supporting these objectives and, then, the likelihood of negating a
warhead. Finally, it highlights major considerations that should be part
of the trajectory the US government takes moving forward.
Journal: Defense & Security Analysis
Pages: 99-109
Issue: 2
Volume: 31
Year: 2015
Month: 6
X-DOI: 10.1080/14751798.2015.1014157
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1014157
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:99-109
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Martindale
Author-X-Name-First: Michael
Author-X-Name-Last: Martindale
Title: Evaluating state willingness to pursue space weapons
Abstract:
Many studies exist which evaluate the domain of space from a political
perspective in order to advocate for a certain position regarding what
states ought to do or not do in space. Few studies exist which address how
states actually behave with regard to outer space. In an attempt to fill
this gap in the literature, the present study evaluates the determinants
of state space behavior. The results identify a blend of the realist
pursuit of power and liberal normative restrains acting on state space
behavior.
Journal: Defense & Security Analysis
Pages: 110-122
Issue: 2
Volume: 31
Year: 2015
Month: 6
X-DOI: 10.1080/14751798.2015.1014159
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1014159
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:110-122
Template-Type: ReDIF-Article 1.0
Author-Name: Caleb Slayton
Author-X-Name-First: Caleb
Author-X-Name-Last: Slayton
Title: Underselling Islamist extremism in Sub-Saharan Africa
Abstract:
Islamist extremism as an ideology has seemingly spread in influence in the
past few years. The violent Islamist threat may have a singular religious
dogma, but that does not mean that it will interact in the same fashion
within the various cultures it infests. The Sub-Saharan region is one
general context where Islamist extremism is both vividly active and
misunderstood. Africa's reaction to: Arabization; the adjustment to
post-colonial rule; the perception of secular government institutions; the
extent of cultural and religious pluralism; and the local character of
Muslim leadership and institutions are all very different from that of the
Middle East. Scores of terrorism analysts and even Arab populations only
too familiar with the Middle East context superimpose Middle East threats
over the Sub-Saharan African cultural landscape. Instead of generalizing
the Islamist threats, it might be better to ask why it is that violent
Islamist groups have traditionally been challenged to expand their
influence in Muslim Sub-Saharan Africa. The underestimated Islamist is
using ignorance to its advantage, recruiting through channels unnoticed by
its Arab counterparts while creatively catering its message by region.
Journal: Defense & Security Analysis
Pages: 123-136
Issue: 2
Volume: 31
Year: 2015
Month: 6
X-DOI: 10.1080/14751798.2015.1056933
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056933
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:123-136
Template-Type: ReDIF-Article 1.0
Author-Name: Raul Gouvea
Author-X-Name-First: Raul
Author-X-Name-Last: Gouvea
Title: Brazil's new defense paradigm
Abstract:
In 2015, Brazil has taken steps toward re-consolidating its domestic
defense industry. In the 1980s, Brazil built a dynamic and diversified
defense industry. The state-driven effort resulted in a tripod strategy,
where the state, state-run companies, and their private sector became the
pillars of Brazil's defense industry. Brazil developed an export-driven
defense industry; where close to 80--90% of its output was exported to
Latin American, African, Arab, and Asian nations. In the 1980s, Brazil
became the world's fifth largest exporter of defense products and
services, exporting to over 40 countries. In the 1990s and 2000s, Brazil's
defense industry suffered a dramatic reduction in size, diversification,
and momentum. Successions of domestic political and economic policies have
relegated Brazil's once emerging defense industry to a marginal position
in the global defense industry. This article analyzes future prospects,
challenges, and growth strategies for Brazil's defense industry.
Journal: Defense & Security Analysis
Pages: 137-151
Issue: 2
Volume: 31
Year: 2015
Month: 6
X-DOI: 10.1080/14751798.2015.1038452
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1038452
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:137-151
Template-Type: ReDIF-Article 1.0
Author-Name: Garrett Grochowski
Author-X-Name-First: Garrett
Author-X-Name-Last: Grochowski
Title: Planning for the next Takur Ghar
Abstract:
The USA is currently facing an increasingly diverse range of threats,
including non-state actors, particularly violent extremist organizations
attempting to do harm. The national leadership has made it clear that for
the near future it will employ Special Operations Forces (SOF) as the tool
of choice in short-duration, high-intensity operations that have more in
common with the battle of Takur Ghar, than those with a larger footprint.
It is critical then that the lessons of the past are learnt now and are
applied before employing SOF in the future. This becomes especially
important given the short lead-time in concert with the
short-duration/high-intensity tempo of their operations. In the Battle of
Takur Ghar, during Operation Anaconda, rigid adherence to the joint
functions, especially clearer and more robust Command and Control (C2) and
Intelligence, Surveillance, and Reconnaissance (ISR) in the planning and
execution of Operation Anaconda would have yielded a better operational
outcome and saved lives. With the benefit of hindsight, many things could
have been done differently, but several key issues stand out. The C2
structure must include all components from the outset to synchronize
effects and rapidly re-task ISR. There must be multiple communications
redundancies and adequate bandwidth. Finally, all SOF, conventional and
interagency capabilities must be synchronized under one task force
commander with a sufficiently robust C2 infrastructure to direct the
entire effort. As our nation calls on SOF at an ever-increasing rate, we
must take those lessons learned and apply them to future operations.
Journal: Defense & Security Analysis
Pages: 152-158
Issue: 2
Volume: 31
Year: 2015
Month: 6
X-DOI: 10.1080/14751798.2015.1069490
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1069490
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:152-158
Template-Type: ReDIF-Article 1.0
Author-Name: Francis C. Domingo
Author-X-Name-First: Francis C.
Author-X-Name-Last: Domingo
Title: The contexts of strategy as a guide for defense planning in the Philippines
Abstract:
Efforts toward developing an independent and credible Philippine defense
policy were revived when Benigno Simeon C. Aquino III was elected
President of the Philippines in 2010. President Aquino renewed the
military modernization program in 2012 and emphasized the necessity of a
“minimum credible defense posture.” Given the modernization
efforts of the government, this article aims to contribute to the
development of the concept of minimum credible defense posture by
exploring how theory contributes to defense planning. It argues that the
contexts of strategy are useful in planning for national defense because
these contexts can provide a conceptual framework for defense planners. It
proceeds in three parts: the opening section reviews the literature on
defense planning; the second surveys the context of developing strategies
as discussed in the General Theory of Strategy; and the last provides a
definition of minimum credible defense and applies the context of
developing strategies to the case of the Philippines.
Journal: Defense & Security Analysis
Pages: 159-167
Issue: 2
Volume: 31
Year: 2015
Month: 6
X-DOI: 10.1080/14751798.2015.1069109
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1069109
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:2:p:159-167
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 169-171
Issue: 3
Volume: 31
Year: 2015
Month: 9
X-DOI: 10.1080/14751798.2015.1058522
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1058522
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:169-171
Template-Type: ReDIF-Article 1.0
Author-Name: Peter J. Dortmans
Author-X-Name-First: Peter J.
Author-X-Name-Last: Dortmans
Author-Name: Nitin Thakur
Author-X-Name-First: Nitin
Author-X-Name-Last: Thakur
Author-Name: Anthony Ween
Author-X-Name-First: Anthony
Author-X-Name-Last: Ween
Title: Conjectures for framing cyberwarfare
Abstract:
Cyberspace has emerged as a potentially new (and unconventional) domain
for warfare. Much debate has focused on understanding cyber conflict. The
ability to critically analyse this phenomenon is important; however, the
nascent nature of cyberwarfare and the complexity of the systems involved
create challenges not met by conventional approaches. As a first step,
this requires an analytical construct to frame discussions in a way that
highlights distinct characteristics of the cyber domain. An approach
proposed is one of the postulating conjectures for debate as a way to
achieve this and to demonstrate its use, both at the strategic and
operational levels. It is suggested that such an approach provides one
component of a mature analytical framework for the analysis of cyber
across a range of warfare domains.
Journal: Defense & Security Analysis
Pages: 172-184
Issue: 3
Volume: 31
Year: 2015
Month: 9
X-DOI: 10.1080/14751798.2015.1056935
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056935
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:172-184
Template-Type: ReDIF-Article 1.0
Author-Name: Olive Emil Wetter
Author-X-Name-First: Olive Emil
Author-X-Name-Last: Wetter
Author-Name: Valentino Wüthrich
Author-X-Name-First: Valentino
Author-X-Name-Last: Wüthrich
Title: “What is dear to you?” Survey of beliefs regarding protection of critical infrastructure against terrorism
Abstract:
Up to the present, there is only very little research on how the
population perceives terrorism and its threats, even though support from
the population is crucial for effective counterterrorism. By eliciting
beliefs and subjecting them to content analyses, six factors were found
that determine the protection worthiness of a target in the people's view:
the potential damage to “people,” “symbolism,”
“economy,” “politics,” “nature,”
and “image/publicity.” These empirically found factors are
in line with factors specified by terrorist target selection models. They
differ in the strength of their cognitive representation among
participants and, thus, their subjective importance to the people. The
first three factors are shared among all participants, whereas the latter
ones could only be found in a part of the participant sample. People's
judgments of the targets' protection worthiness differ substantially from
their judgments of the targets' attractiveness to terrorists, even though
the same factors seem to be involved. This study offers an insight into
the people's mental model about protection worthiness of targets. Together
with classical risk analysis and knowledge about terrorists, these results
can form a basis for setting up a holistic scheme for critical
infrastructure protection.
Journal: Defense & Security Analysis
Pages: 185-198
Issue: 3
Volume: 31
Year: 2015
Month: 9
X-DOI: 10.1080/14751798.2015.1056941
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056941
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:185-198
Template-Type: ReDIF-Article 1.0
Author-Name: Robbie J. Totten
Author-X-Name-First: Robbie J.
Author-X-Name-Last: Totten
Title: Epidemics, national security, and US immigration policy
Abstract:
What are relationships between epidemics, national security, and US
immigration policy? This question is important because it sheds light on
transnational or nontraditional security areas, American immigration
policy, and a pressing issue for US leaders who have recently faced
epidemics such as the West Africa Ebola outbreak that began in 2013. This
article answers it and lays ground in the area by reviewing epidemics in
world history, using International Relations and Security Studies works to
specify dangers of contagions for states, and identifying three general
immigration measures that American leaders have utilized from the
seventeenth century to the present day to protect against contagions,
which are (1) policies restricting entrance of foreigners thought to carry
specified diseases, (2) the isolation or quarantining of immigrants with
contagious disease, and (3) delegating the President with authority to
stop immigration in the event of an epidemic abroad. This study has
implications for research and contemporary US immigration policy.
Journal: Defense & Security Analysis
Pages: 199-212
Issue: 3
Volume: 31
Year: 2015
Month: 9
X-DOI: 10.1080/14751798.2015.1056940
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056940
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:199-212
Template-Type: ReDIF-Article 1.0
Author-Name: Tamir Libel
Author-X-Name-First: Tamir
Author-X-Name-Last: Libel
Author-Name: Reuven Gal
Author-X-Name-First: Reuven
Author-X-Name-Last: Gal
Title: Between military--society and religion--military relations: different aspects of the growing religiosity in the Israeli defense forces
Abstract:
The growing religiosity in the Israel Defense Forces (IDF) in recent years
is discussed by employing the broader lens of changes to the
organization's overall manpower. First, the authors will indicate the
dynamic and changing make-up of those serving in the IDF, in terms of both
the socio-demographic characteristics of conscripted soldiers, and the
motivation of individuals enlisting in the IDF. Second, it is demonstrated
how a window has opened in the IDF, especially in combat units and command
roles, for a growth in religiosity as a result of the gradual increase in
the number of conscripts affiliated with the Zionist national-religious
population.
Journal: Defense & Security Analysis
Pages: 213-227
Issue: 3
Volume: 31
Year: 2015
Month: 9
X-DOI: 10.1080/14751798.2015.1056938
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056938
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:213-227
Template-Type: ReDIF-Article 1.0
Author-Name: Anna Antczak-Barzan
Author-X-Name-First: Anna
Author-X-Name-Last: Antczak-Barzan
Title: Poland's national potential and its international position within the European Union -- research remarks
Abstract:
This article examines Poland's national potential and its international
position within the European Union (EU) with respect to security issues.
It presents research results based on a comparison of Poland's national
potential as it relates to other EU countries, which is useful when
evaluating Poland's power within the EU. The article also evaluates
Poland's crisis potential, i.e. it identifies those factors that may
potentially be treated as threats to national and regional security.
Finally, it enables the identification of challenges to Poland's security
in the second decade of the twenty-first century. The research is
conducted according to a multidimensional comparative analysis, which is
perceived by the author as the best available to measure a country's power
despite its weaknesses.
Journal: Defense & Security Analysis
Pages: 228-245
Issue: 3
Volume: 31
Year: 2015
Month: 9
X-DOI: 10.1080/14751798.2015.1056934
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056934
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:228-245
Template-Type: ReDIF-Article 1.0
Author-Name: Kevin Marsh
Author-X-Name-First: Kevin
Author-X-Name-Last: Marsh
Author-Name: Christopher M. Jones
Author-X-Name-First: Christopher M.
Author-X-Name-Last: Jones
Title: From rivals to partners: AirSea Battle and the US air force--navy relationship
Abstract:
AirSea Battle (ASB) has generated significant publicity, controversy, and
debate among scholars, analysts, commentators, and observers of US defense
strategy. However, a research gap exists concerning formal analysis of the
impact of the operational concept on the relationship between the US Air
Force (USAF) and the US Navy (USN). The impact of the ASB operational
concept on the USAF--USN relationship is examined across the issue areas
of strategy, budgets, weapons procurement, and training. These four issue
areas represent important areas of historical conflict and competition
between the Air Force and Navy. The conclusion is that ASB is ushering in
a new era of Air Force--Navy partnership that advances the inter-service
dynamic from “jointness” toward integration. The emergent
USAF--USN partnership therefore represents a significant development in US
defense politics and defense strategy.
Journal: Defense & Security Analysis
Pages: 246-259
Issue: 3
Volume: 31
Year: 2015
Month: 9
X-DOI: 10.1080/14751798.2015.1056939
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056939
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:246-259
Template-Type: ReDIF-Article 1.0
Author-Name: Hassan M. Kamara
Author-X-Name-First: Hassan M.
Author-X-Name-Last: Kamara
Title: Making long-range planning work: the case of the US Army's 30-year strategic modernization plan
Abstract:
The extensive timespan of evolving assumptions about future adversaries,
US military engagements, and technology inherent in the US Army's 30-year
modernization strategy can overwhelm the management capacity of planners,
and misdirect acquisition investments. Some military scholars have argued
that long-range planning is futile due to the complexities of the global
security environment. So how can the US Army manage the evolving
assumptions inherent in its 30-year modernization strategy to ensure it
remains a superior global force? This study will answer the above question
by arguing that the US Army's 30-year modernization strategy, while
emulative of a similar modernization approach in the threat-based planning
environment of the Cold War, is viable if supported by a method and a tool
that manage investments and planning assumptions.
Journal: Defense & Security Analysis
Pages: 260-269
Issue: 3
Volume: 31
Year: 2015
Month: 9
X-DOI: 10.1080/14751798.2015.1056936
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056936
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:260-269
Template-Type: ReDIF-Article 1.0
Author-Name: Jesse Kirkpatrick
Author-X-Name-First: Jesse
Author-X-Name-Last: Kirkpatrick
Title: Drone wars: transforming conflict, law, and policy
Journal: Defense & Security Analysis
Pages: 270-272
Issue: 3
Volume: 31
Year: 2015
Month: 9
X-DOI: 10.1080/14751798.2015.1056937
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1056937
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:3:p:270-272
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 273-275
Issue: 4
Volume: 31
Year: 2015
Month: 12
X-DOI: 10.1080/14751798.2015.1101220
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1101220
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:273-275
Template-Type: ReDIF-Article 1.0
Author-Name: Glen Diehl
Author-X-Name-First: Glen
Author-X-Name-Last: Diehl
Author-Name: Solomon Major
Author-X-Name-First: Solomon
Author-X-Name-Last: Major
Title: White hull or white elephant? Soft power and the Chinese hospital ship, the Peace Ark
Abstract:
Although soft power is now seen as an indispensable foreign policy tool,
its efficacy has rarely been put to a rigorous empirical test. Using data
from HARMONIOUS MISSIONs 2010, 2011 and 2013, this article seeks to
examine the degree to which the soft power engagement missions of the
Chinese hospital ship, the Peace Ark, has advanced
Chinese interests. Although any conclusions drawn must be considered
preliminary, as so little time has passed between the ship's visits and
the current analysis, this research indicates that these missions’
impact on advancing Chinese interests was at best limited. Although
observations from a single set of cases are unlikely to settle the debate
between soft power advocates and detractors, it is hoped that this
research will serve as a catalyst to further empirically based research on
this topic.
Journal: Defense & Security Analysis
Pages: 276-292
Issue: 4
Volume: 31
Year: 2015
Month: 12
X-DOI: 10.1080/14751798.2015.1087101
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1087101
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:276-292
Template-Type: ReDIF-Article 1.0
Author-Name: Christo Odeyemi
Author-X-Name-First: Christo
Author-X-Name-Last: Odeyemi
Title: UNCLOS and maritime security: the “securitisation” of the South China Sea disputes
Abstract:
This Critical Comment seeks to situate the United Nations Convention on
the Law of the Sea (UNCLOS) within the context of South China Sea (SCS)
dispute. Bearing in mind that maritime actions of the main disputants --
China, Vietnam, and the Philippines -- increasingly
“securitise” these long-standing disputes and vice versa,
the study examines the concept of a maritime “regime
complex.” Whereas efforts have being made to examine UNCLOS and
indeed the dispute within the framework of a maritime “regime
complex,” the key finding shows that the increased
“securitisation” of the disputes makes it difficult to
envisage effective engagement of UNCLOS as a resolution mechanism. It will
also reveal that China's firmly established expansionist agenda in the SCS
region is indicative of Beijing's susceptibility to compromise a
diplomatic solution to these long-standing disputes. These discoveries are
structured around the knowledge that the spatial relation of the SCS
critically espouses not only its geo-strategic significance in terms of
natural resources endowment, but also the enduring maritime disputes
within the region.
Journal: Defense & Security Analysis
Pages: 293-302
Issue: 4
Volume: 31
Year: 2015
Month: 12
X-DOI: 10.1080/14751798.2015.1101186
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1101186
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:293-302
Template-Type: ReDIF-Article 1.0
Author-Name: Azeez Olaniyan
Author-X-Name-First: Azeez
Author-X-Name-Last: Olaniyan
Author-Name: Shola Omotola
Author-X-Name-First: Shola
Author-X-Name-Last: Omotola
Title: Ethnic crises and national security in Nigeria
Abstract:
The article focuses on the interface between ethnicity and national
security in Nigeria. It critically explores the negative mobilization of
ethnicity in Nigeria's fourth republic, and how this has been shaping (and
reshaping) the democratization process, particularly in the management of
cooperation and conflict over contestations for power and other resources.
The re-democratization of Nigeria in 1999 has been preceded with high
expectations of meaningful reductions in the high level of insecurity
witnessed under the long years of military suzerainty. However, this has
not been the case. Rather, what is obtained is an increase in national
insecurity on a much larger scale. This article argues that one of the
banes of national security in the Nigerian state is ethnic politics, which
continues to witness changes in context and character with grave
consequences for the future of democracy. The central argument is that
ethnicity has always been a major driver of politics and conflicts in
Nigeria and the trend is not likely to change anytime soon.
Journal: Defense & Security Analysis
Pages: 303-318
Issue: 4
Volume: 31
Year: 2015
Month: 12
X-DOI: 10.1080/14751798.2015.1087104
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1087104
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:303-318
Template-Type: ReDIF-Article 1.0
Author-Name: Surulola James Eke
Author-X-Name-First: Surulola James
Author-X-Name-Last: Eke
Title: How and why Boko Haram blossomed: examining the fatal consequences of treating a purposive terrorist organisation as less so
Abstract:
Boko Haram (BH) is an insurgent group that operates mainly in northeastern
Nigeria. Its stated aim is to establish an Islamic state, and it employs
terrorism as its strategy. Earlier interests of security analysts centred
on the drivers of BH uprising and the possibility of its
internationalisation. Today's concerns relate more to why the rebellion
has lasted this long. In toeing the same line, this article demonstrates
that BH is a purposive terror group against which the government has
evolved no viable strategy. It examines some gains of BH over the past six
years and how it benefitted from the government's underestimation of its
capacity and determination. It concludes that to effectively engage BH,
the Nigerian government must revaluate its threat and sincerely pursue an
expanded strategy beyond the current military-centric approach. To be
effective, government's response must be packaged in such a way as to
enhance human security in the region.
Journal: Defense & Security Analysis
Pages: 319-329
Issue: 4
Volume: 31
Year: 2015
Month: 12
X-DOI: 10.1080/14751798.2015.1087102
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1087102
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:319-329
Template-Type: ReDIF-Article 1.0
Author-Name: Nikolay I. Geraskin
Author-X-Name-First: Nikolay I.
Author-X-Name-Last: Geraskin
Author-Name: Andrey A. Krasnoborodko
Author-X-Name-First: Andrey A.
Author-X-Name-Last: Krasnoborodko
Author-Name: Vasily B. Glebov
Author-X-Name-First: Vasily B.
Author-X-Name-Last: Glebov
Author-Name: Taisia A. Piskureva
Author-X-Name-First: Taisia A.
Author-X-Name-Last: Piskureva
Title: Nuclear security culture enhancement: the role of culture coordinators at Russian nuclear sites
Abstract:
In 2002, a Nuclear Security Culture (NSC) Enhancement Program with the
mission to raise the level of the NSC at sites and facilities in Russia's
nuclear complex was launched under the guidance of the Russian State
Corporation “ROSATOM” and with support from the US
Department of Energy. A Joint Working Group for NSC with both Russian
Federation and US members was formed and charged with the design and
implementation of the program. The program was implemented at sites and
facilities on a pilot basis. Nine sites participated in the Pilot Project.
The key program component was an establishment of Culture Coordinators
(CCs) with the authority to coordinate and implement NSC enhancement
activities at sites and facilities. The CCs have served as the force that
has maintained the momentum of the Pilot Project and continuously steered
the site NSC enhancement efforts. The contribution of the CCs in achieving
the positive outcomes of the program cannot be overstated.
Journal: Defense & Security Analysis
Pages: 330-345
Issue: 4
Volume: 31
Year: 2015
Month: 12
X-DOI: 10.1080/14751798.2015.1087103
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1087103
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:330-345
Template-Type: ReDIF-Article 1.0
Author-Name: Andrea Ellner
Author-X-Name-First: Andrea
Author-X-Name-Last: Ellner
Title: Sicherheit, Sicherheitspolitik und Militär -- Deutschland seit der Vereinigung [Security, security policy and the military -- Germany since unification]
Journal: Defense & Security Analysis
Pages: 346-347
Issue: 4
Volume: 31
Year: 2015
Month: 12
X-DOI: 10.1080/14751798.2015.1101187
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1101187
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:346-347
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: Part 1 Human conflict and universal ethics
Journal: Defense & Security Analysis
Pages: 348-355
Issue: 4
Volume: 31
Year: 2015
Month: 12
X-DOI: 10.1080/14751798.2015.1101221
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1101221
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:31:y:2015:i:4:p:348-355
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Defence and security analysis
Journal: Defense & Security Analysis
Pages: 1-3
Issue: 1
Volume: 32
Year: 2016
Month: 3
X-DOI: 10.1080/14751798.2015.1133163
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1133163
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:1-3
Template-Type: ReDIF-Article 1.0
Author-Name: Darrell Driver
Author-X-Name-First: Darrell
Author-X-Name-Last: Driver
Title: Burden sharing and the future of NATO: wandering between two worlds
Abstract:
The US role in the North Atlantic Treaty Organization (NATO) Alliance is a
65-year history of retrenchment and renewal. When Washington has sought a
retrenchment from the world, it traditionally increased burden sharing
pressure on Europe to do more. During times of increased global ambition,
the USA reaffirmed its traditional leadership role in the Alliance and its
commitment to NATO effectiveness and relevance. This cycle of NATO
retrenchment and renewal, however, is halting. Though the USA will
continue to go through periods of relative increases and decreases in
security policy ambition, signs point to a permanent defense and security
retrenchment in Europe. Germany is the ally singularly capable of filling
the resulting security gap. If NATO is to avoid the drift toward
irrelevance many critics have predicted, Germany will need to cast off old
inhibitions toward security and defense leadership. These trends and their
implications for NATO's future are explored through historical case
studies and the shifting contemporary security environment.
Journal: Defense & Security Analysis
Pages: 4-18
Issue: 1
Volume: 32
Year: 2016
Month: 3
X-DOI: 10.1080/14751798.2015.1126970
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1126970
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:4-18
Template-Type: ReDIF-Article 1.0
Author-Name: Josselin Droff
Author-X-Name-First: Josselin
Author-X-Name-Last: Droff
Author-Name: Renaud Bellais
Author-X-Name-First: Renaud
Author-X-Name-Last: Bellais
Title: Fleet management in European integration: the case of military helicopter support
Abstract:
The article focuses on both economics and spatial issues related to
Maintenance Repair and Overhaul (MRO) of defence platforms in Europe.
Using facts and figures related to costs, trends and fleet sizes
evolution, the authors discuss the interest of a spatial reorganisation of
MRO production. Given the fiscal situation of the main European countries
with a modern army, the relevant scale to consider the reorganisation is
certainly Europe. Through the example of defence helicopters fleets of a
selection of European countries, the authors address the question of
cooperation of the MRO. A greater cooperation in the support of fleets
would lead to a spatial reorganisation of MRO. On one side economies can
be expected from this reorganisation, but, on the other hand, new problems
arise. Specifically, a number of costs associated with different forms of
“distances” -- geographical, operational and political
distances -- limit the potential savings that could be expected. This work
provides insights on these important issues for the construction of a
European defence, both in its political, military and industrial
dimensions.
Journal: Defense & Security Analysis
Pages: 19-35
Issue: 1
Volume: 32
Year: 2016
Month: 3
X-DOI: 10.1080/14751798.2015.1130315
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130315
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:19-35
Template-Type: ReDIF-Article 1.0
Author-Name: Asifa Maaria Hussain
Author-X-Name-First: Asifa Maaria
Author-X-Name-Last: Hussain
Author-Name: Mohammed Ishaq
Author-X-Name-First: Mohammed
Author-X-Name-Last: Ishaq
Title: Equality and diversity in the British armed forces: progress, challenges and prospects
Abstract:
The UK's changing political and legal landscape since 2000 reflecting
transformations in wider society have elevated equality and diversity
(E&D) issues to prominence in the public sector, including in the British
armed forces. This research highlights key developments in the British
military in relation to E&D, focusing both on areas of progress, and on
the challenges still confronting the Forces. The findings reveal that the
Forces have made significant strides in advancing E&D through the
implementation of a range of policy initiatives but the persistence of
discrimination, developments in the wider environment and the dilemmas
raised by the strands of age and disability pose challenges. The value of
this research is to increase our understanding of diversity management in
a public sector institution that has been under-researched and views
itself as “different,” and will be of interest to
policymakers, E&D practitioners and academics in the field.
Journal: Defense & Security Analysis
Pages: 36-50
Issue: 1
Volume: 32
Year: 2016
Month: 3
X-DOI: 10.1080/14751798.2015.1130317
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130317
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:36-50
Template-Type: ReDIF-Article 1.0
Author-Name: Edgar Jones
Author-X-Name-First: Edgar
Author-X-Name-Last: Jones
Author-Name: Hugh Milroy
Author-X-Name-First: Hugh
Author-X-Name-Last: Milroy
Title: Stolen trauma: why some veterans elaborate their psychological experience of military service
Abstract:
The embellishment of a warrior biography has a long history but examples
of veteran elaboration of traumatic experience have become increasingly
apparent. Although legislative change in the UK has removed the penalties
for fabrication and a progressive decline in the military footprint may
have increased the likelihood of such false trauma narratives, a paradigm
shift in explanations for mental illness underpins this phenomenon. The
recognition of post-traumatic stress disorder (PTSD) in 1980, followed by
studies to identify risk factors, led to a greater appreciation of
psychological vulnerability. As a result, the use of shame to discourage
acts formerly labelled as “cowardly” or “lacking in
morale fibre” is no longer considered appropriate. Recent conflicts
in Iraq and Afghanistan generated popular sympathy for service personnel,
whilst media focus on PTSD has led the UK public to believe that most
veterans have been traumatised by their tours of duty.
Journal: Defense & Security Analysis
Pages: 51-63
Issue: 1
Volume: 32
Year: 2016
Month: 3
X-DOI: 10.1080/14751798.2015.1130318
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130318
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:51-63
Template-Type: ReDIF-Article 1.0
Author-Name: Maja Garb
Author-X-Name-First: Maja
Author-X-Name-Last: Garb
Author-Name: Marjan Malešič
Author-X-Name-First: Marjan
Author-X-Name-Last: Malešič
Title: The causes of trust and distrust in the military
Abstract:
Trust in institutions is an important issue of political science and
sociology. This article contributes to the discussion by exploring public
trust in the military at the global, regional and national levels, and the
causes of trust and distrust in the military. Analyses of public opinion
data reveal that the military is a highly trusted social institution
across the world. In Slovenia, the trust in the military is high as well;
however, it is lower than international data would suggest, averaging at
50%. Against this background, the article focuses on the causes of trust.
The original empirical survey was accomplished and shows that the most
significant causes of a high level of trust in the military are its
frequent and successful involvement in disaster relief, its professional
qualifications and high performance, as well as its national defense role.
Whereas the key causes of distrust are: the poor levels of transparency in
its procurement process; the politicization of the military and
organizational problems.
Journal: Defense & Security Analysis
Pages: 64-78
Issue: 1
Volume: 32
Year: 2016
Month: 3
X-DOI: 10.1080/14751798.2015.1130316
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130316
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:64-78
Template-Type: ReDIF-Article 1.0
Author-Name: Andrea Malizia
Author-X-Name-First: Andrea
Author-X-Name-Last: Malizia
Title: Disaster management in case of CBRNe events: an innovative methodology to improve the safety knowledge of advisors and first responders
Abstract:
Nowadays, Chemical-Biological-Radiological-Nuclear-explosive (CBRNe) risks
are one of the world's main safety concerns. The radiological disasters of
Fukushima and Chernobyl, the chemical events of Seveso or the release of
Sarin in the Tokyo Subway, the biological emergencies such as the H1N1 flu
or the recent Ebola outbreak, and recent news about the availability of
non-conventional weapons acquired by fundamentalist organisations
represent evidence of potential future threats. CBRNe risks are a real and
global threat. The University of Rome, Tor Vergata, in collaboration with
the most important Italian and international bodies working in the field
of CBRNe safety and security, and supported by the North Atlantic Treaty
Organisation and the Organisation for the Prohibition of Chemical Weapons,
organises International Masters Courses on the Protection against CBRNe
events. Within this framework, a Table-Top Exercise was planned, in
collaboration with the Italian Ministry of Interior and Ministry of
Defence. The scenario, the logistic organisation, on-going adjustments
during the exercise and the outcomes are presented here and analysed.
Journal: Defense & Security Analysis
Pages: 79-90
Issue: 1
Volume: 32
Year: 2016
Month: 3
X-DOI: 10.1080/14751798.2015.1130319
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130319
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:79-90
Template-Type: ReDIF-Article 1.0
Author-Name: Andrey Zhukov
Author-X-Name-First: Andrey
Author-X-Name-Last: Zhukov
Author-Name: Nikolay Geraskin
Author-X-Name-First: Nikolay
Author-X-Name-Last: Geraskin
Author-Name: Andrey Krasnoborodko
Author-X-Name-First: Andrey
Author-X-Name-Last: Krasnoborodko
Title: Defining quantitative criteria for the physical protection system effectiveness of nuclear facilities
Abstract:
The article is devoted to problems of defining quantitative criteria for
the physical protection system (PPS) effectiveness of nuclear facilities.
The article briefly describes the scheme of the PPS development used in
the nuclear industry in Russia, gives a review of existing approaches to
defining the minimal acceptable value of the system's effectiveness, and
reveals advantages and disadvantages of the approaches. The article
describes in detail an approach based on facility categorization by
potential losses and a technique of defining the minimal acceptable value
of the PPS effectiveness developed on its base.
Journal: Defense & Security Analysis
Pages: 91-96
Issue: 1
Volume: 32
Year: 2016
Month: 3
X-DOI: 10.1080/14751798.2015.1130320
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1130320
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:91-96
Template-Type: ReDIF-Article 1.0
Author-Name: Patrick Mileham
Author-X-Name-First: Patrick
Author-X-Name-Last: Mileham
Title: Human conflict and universal ethics (part 2)
Abstract:
This second part of the review article begins with a definition of
military power, when and how it should be used. From a large number of
authors, “moral forces” are linked to “codes of
conduct”, and the fundamental understandings about the
“profession of arms”, based on “fiduciary
trust”, “covenanted” service and professional and
personal “conscience”. The article covers what authors have
written about “culture” and the ethics of
“technology” devices and systems, including
“cyber” warfare. It concludes with recognition of the
increase in ethical sensitivity in this century which is characterized by
a phenomenon, the crises of “identity”, personal, national
and global.
Journal: Defense & Security Analysis
Pages: 97-111
Issue: 1
Volume: 32
Year: 2016
Month: 3
X-DOI: 10.1080/14751798.2015.1133164
File-URL: http://hdl.handle.net/10.1080/14751798.2015.1133164
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:1:p:97-111
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 113-114
Issue: 2
Volume: 32
Year: 2016
Month: 6
X-DOI: 10.1080/14751798.2016.1165394
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1165394
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:113-114
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: Unblocking inertia: US-Russian nuclear arms control and missile defenses
Abstract:
The United States and Russia, in the aftermath of Russia’s
annexation of Crimea and destabilization of Ukraine, seem to have ditched
entirely the “reset” in their political relations. Despite
this odor of Cold War redux, there remain the opportunities and
necessities for renewed attention to strategic nuclear arms control as
between the two governments. US and NATO missile defenses as planned for
European deployment figure into this equation, although in somewhat
unpredictable ways, given technological uncertainties in existing and
foreseeable defenses, as well as the possibility of improved delivery
systems for offensive conventional or nuclear weapons.
Journal: Defense & Security Analysis
Pages: 115-128
Issue: 2
Volume: 32
Year: 2016
Month: 6
X-DOI: 10.1080/14751798.2016.1160485
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160485
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:115-128
Template-Type: ReDIF-Article 1.0
Author-Name: Glenn Diesen
Author-X-Name-First: Glenn
Author-X-Name-Last: Diesen
Author-Name: Conor Keane
Author-X-Name-First: Conor
Author-X-Name-Last: Keane
Title: Constraining missile defence
Abstract:
Assessing missile defence through the prism of offence--defence theory
requires primarily an examination of legal and structural constraints on
future development. New weapons technology is frequently cited as having
the most critical impact on the offence--defence balance. Yet, the method
for assessing the introduction of a new weapons technology tends to
neglect projected maturity and instead focus excessively on the initial
rudimentary capabilities. It is argued here that the North Atlantic Treaty
Organisation’s (NATO’s) missile defence is set to
incrementally become more advanced in terms of quality, quantity and
mobility, which is supported by a strategy that is increasingly favouring
offence. As the system gradually enhances the offensive advantage
vis-à-vis Russia, NATO categorically rejects any legal or structural
constraints on future deployments.
Journal: Defense & Security Analysis
Pages: 129-143
Issue: 2
Volume: 32
Year: 2016
Month: 6
X-DOI: 10.1080/14751798.2016.1160487
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160487
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:129-143
Template-Type: ReDIF-Article 1.0
Author-Name: Nicolas Groffman
Author-X-Name-First: Nicolas
Author-X-Name-Last: Groffman
Title: Indian and Chinese espionage
Abstract:
India and China both have powerful spy networks; completely different in
their approaches to espionage; both effective against their perceived
enemies. China focuses first on internal threats, on Taiwan and Hong Kong,
and then the US and Japan. India’s defense policy focuses on
Pakistan and internal terrorist threats, and then on China. In reality,
however, when it comes to spying on each other, both China and India
suffer from incompetence and apathy -- which endangers both their own
security and regional stability. This article looks at how they spy on
each other, and asks why and how they need to improve. The narrative also
touches upon some of the individuals who are waging the spy war, from
India’s wily spymaster Ajit Doval down to junior Chinese agents
such as Wang Qing and Pema Tsering. The two countries are not friends.
They have the largest territorial dispute in the world on their hands,
covering an area the size of North Korea, and they have large armies
facing each other along 4000 kilometers of frontier. But they also lay
claim to the world’s two oldest and richest civilizations, with a
rich history of exchange, and now with a combined population of 2.6
billion people and more than a quarter of the world’s economic
output. If they cooperated, they could solve many of the world’s
problems; but if they lurch into conflict, the potential consequences are
terrifying to contemplate. Unfortunately, despite their geographical
closeness, they do not know much about each other. They have few cultural
interchanges, little diplomacy, few trade missions. They do not watch each
other’s films, read each other’s books or listen to each
other’s music. Chinese tourists would rather fly to New Zealand for
their holidays than cross the border to India, and Indian students would
rather study in Europe than China. China and India are neighbors that
barely talk to each other. Most significantly, they do not spy on each
competently. For countries that do not interact socially, defensive
understanding is important for security -- but China prefers the glamor of
facing up to its Pacific and other maritime rivals such as the US and
Japan. India, for its part, does talk a great deal about the China threat,
but its resources and expertise are wrapped up in controlling its security
threat from Pakistan and the Islamic world. When China and India do try to
spy on each other, it is often without the benefit of a long-term focus or
understanding. India has some very skilled operatives within the Research
and Analysis Wing, but few that specialize in China. China has an enormous
pool of resources spread across several government departments, including
the Ministry of Public Security, and also has extensive facilities and
manpower in the Joint Staff Department of the Central Military Commission
(the JSD) and the new Strategic Support Force (the SSF). However,
China’s intelligence services generally behave as if India is not
worth spying on. Given that the two countries do not have the cultural or
political machinery in place to understand each other, espionage and
intelligence gathering is vital to ensure that miscalculations do not take
place. This has been apparent over the last few years in stand-offs in the
Himalaya, as well as top-level suspicions on each side about a variety of
subjects including terrorism, covert operations in Sri Lanka and Burma,
and the two countries’ nuclear weapons programs. Both countries do
occasionally make efforts in espionage against each other, especially
during sensitive periods such as the mountain stand-offs of 2014 and 2013
and during policy developments in nuclear warfare. In this article the
author looks at actual spying incidents between the two countries, their
methodologies, their staff, their technical capabilities, and how the act
of spying, which is usually viewed as intrinsically adversarial, can be a
force for good. The article relies on interviews with actual participants
in intelligence from both countries as well as extensive use of
contemporary online sources, and secondary analysis by both military and
academic experts from China, India and NATO countries.
Journal: Defense & Security Analysis
Pages: 144-162
Issue: 2
Volume: 32
Year: 2016
Month: 6
X-DOI: 10.1080/14751798.2016.1160486
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160486
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:144-162
Template-Type: ReDIF-Article 1.0
Author-Name: Kristian Åtland
Author-X-Name-First: Kristian
Author-X-Name-Last: Åtland
Title: North European security after the Ukraine conflict
Abstract:
Russia’s illegal occupation and annexation of the Crimean peninsula
in February--March 2014, and the country’s well-documented
involvement in the separatist conflict in Eastern Ukraine, have led to a
significant worsening of Russia’s relations with the West. Vladimir
Putin’s move to redraw Russia’s southern borders through the
use of military force and subversive measures has given rise to an
uncertainty that goes well beyond the post-Soviet space. Since 2014, North
Atlantic Treaty Organization (NATO) has had to reassess many aspects of
its relationship with Russia. The alliance has also initiated various
measures to strengthen the military security of its eastern member states,
particularly the Baltic states, Poland, and Romania. Further to the North,
NATO’s northernmost member -- Norway -- is following developments
in Russia with a heightened sense of awareness. The same goes for
non-aligned Sweden and Finland, which are trying to adapt to the emerging,
and increasingly complex, security environment in Northern Europe.
Journal: Defense & Security Analysis
Pages: 163-176
Issue: 2
Volume: 32
Year: 2016
Month: 6
X-DOI: 10.1080/14751798.2016.1160484
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160484
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:163-176
Template-Type: ReDIF-Article 1.0
Author-Name: Steven T. Zech
Author-X-Name-First: Steven T.
Author-X-Name-Last: Zech
Title: Decapitation, disruption, and unintended consequences in counterterrorism: lessons from Islamist terror networks in Spain
Abstract:
This study examines the unintended consequences of decapitation
strategies. Two Islamist terror networks in Spain have been used to
critically evaluate theories of leadership removal guided by large-N
cross-sectional research. Arguably, current models neglect to include
relational variables that constitute the foundation for policies of
network disruption. Spanish terror networks are mapped out over a 10-year
period (1995--2004) to demonstrate the importance of network variables.
Policies meant to disrupt militant networks can generate unintended
consequences, as was the case with Spain’s Operation Dátil
following the 9/11 attacks on the Twin Towers and the Pentagon in the
United States. The Madrid train bombing network developed in the vacant
political space following the counterterrorism operation that targeted
radical Islamists in Spain.
Journal: Defense & Security Analysis
Pages: 177-191
Issue: 2
Volume: 32
Year: 2016
Month: 6
X-DOI: 10.1080/14751798.2016.1160489
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160489
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:177-191
Template-Type: ReDIF-Article 1.0
Author-Name: Shameer Modongal
Author-X-Name-First: Shameer
Author-X-Name-Last: Modongal
Title: Deterrence of nuclear terrorism in the context of South Asia
Abstract:
Stability among the great powers during the Cold War is widely theorized
in terms of nuclear deterrence. Rationality of States and their preference
for survival are the basis of nuclear deterrence. The rationality of
non-state terrorist groups is different from that of nation-states. Even
though they are also rational actors with their own hierarchy of
preferences, survival may not be their ultimate goal. Deterrence of
nuclear terrorism is therefore different from deterrence against states.
South Asia is more vulnerable to nuclear terrorism than any other region
of the world for many reasons. This article analyzes the possibility of
nuclear terrorism and the ways of deterrence against it in the context of
South Asia.
Journal: Defense & Security Analysis
Pages: 192-198
Issue: 2
Volume: 32
Year: 2016
Month: 6
X-DOI: 10.1080/14751798.2016.1160488
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1160488
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:192-198
Template-Type: ReDIF-Article 1.0
Author-Name: Sean M. Maloney
Author-X-Name-First: Sean M.
Author-X-Name-Last: Maloney
Title: Towards a new national security policy for Canada
Abstract:
Canada is now at a crossroads unlike any other period in its history and
needs to carefully consider which path to take. With the new Trudeau
government comfortably ensconced since the defeat of the Harper government
in the fall of 2015, a variety of competing interests have emerged in an
attempt to turn Canadian policy back to a more nostalgic period of the
1970s that some see as preferable to the institutional lash-up that
existed since the rolling out of the Canada First policy in the 2000s.
That nostalgic period is, however, misunderstood both willfully for
political purposes but also through a lack of historical context. Firmly
rooting future actions in a blunt analysis of national interests is
preferable to the alternative.
Journal: Defense & Security Analysis
Pages: 199-206
Issue: 2
Volume: 32
Year: 2016
Month: 6
X-DOI: 10.1080/14751798.2016.1161363
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1161363
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:2:p:199-206
Template-Type: ReDIF-Article 1.0
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 207-208
Issue: 3
Volume: 32
Year: 2016
Month: 9
X-DOI: 10.1080/14751798.2016.1201729
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1201729
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:207-208
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Makara
Author-X-Name-First: Michael
Author-X-Name-Last: Makara
Title: Rethinking military behavior during the Arab Spring
Abstract:
Why did some Arab militaries remain loyal to authoritarian rulers amid
mass uprisings during the Arab Spring while others defected to the
opposition? One popular explanation shows this variation with reference to
the degree of military institutionalization: institutionalized militaries
defected, while patrimonial militaries remained loyal. This article argues
that the institutionalization hypothesis does not provide a complete
account of the mechanisms through which the degree of military
institutionalization leads to either defection or continued loyalty. This
shortcoming stems from the fact that scholars have treated military
institutionalization as a catch-all concept for three distinct variables:
ethnic stacking of the military, patronage distribution, and
organizational factionalization. Examining the interaction between these
variables highlights the mechanisms through which military defection
occurs, and therefore that disaggregating institutionalization into its
component parts provides a more complete explanation of military behavior
during the Arab Spring.
Journal: Defense & Security Analysis
Pages: 209-223
Issue: 3
Volume: 32
Year: 2016
Month: 9
X-DOI: 10.1080/14751798.2016.1199121
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199121
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:209-223
Template-Type: ReDIF-Article 1.0
Author-Name: Jason Heeg
Author-X-Name-First: Jason
Author-X-Name-Last: Heeg
Title: Pakistan’s response to US foreign policy towards South Asia 1977--1993
Abstract:
Relations between the USA and Pakistan have been tenuous since the 1947
partition of British India and the subsequent creation of the former. The
1979 Soviet intervention in Afghanistan focused the attention of the
international community on South Asia. This article will examine the
foreign policies of three successive US Presidential Administrations
between 1977 and 1993, and how their decisions and corresponding actions
were interpreted by the Pakistani government and its people. The key
finding is the trend of the ebb and flow of US interest in Pakistan. The
primary research conducted for this article shows that Pakistanis
recognize this trend and consider it hypocritical of the US government.
The current conditions in South Asia are ominously similar to those of
1992 with the drawdown of US and NATO troops from Afghanistan.
Policy-makers would be wise to review the events of 1977--1993 so that the
cycle is not repeated again.
Journal: Defense & Security Analysis
Pages: 224-236
Issue: 3
Volume: 32
Year: 2016
Month: 9
X-DOI: 10.1080/14751798.2016.1199120
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199120
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:224-236
Template-Type: ReDIF-Article 1.0
Author-Name: Colin Robinson
Author-X-Name-First: Colin
Author-X-Name-Last: Robinson
Title: Revisiting the rise and fall of the Somali Armed Forces, 1960--2012
Abstract:
The history of the Somali Armed Forces, principally the army, forms an
important part of studying the Somali civil war. Two key themes are
evident from 1960: the pursuit of an irredentist agenda beyond reasonable
limits, which led to the downfall of Siad Barre’s regime, and the
clan divisions and agendas that Barre used to shore up his rule in the
1980s and that have bedeviled the rebirth of the Somali Army in the
twenty-first century. With the twentieth-century context covered, and in
some places reinterpreted, this article then focuses on the uncertain
rebirth of the Somali Armed Forces since 2008, using a host of primary and
United Nations official sources. Assistance efforts have been focused on
Mogadishu, but limited success has been made in forming truly national
armed forces. Future prospects are uncertain, but there are some signs of
hope.
Journal: Defense & Security Analysis
Pages: 237-252
Issue: 3
Volume: 32
Year: 2016
Month: 9
X-DOI: 10.1080/14751798.2016.1199122
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199122
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:237-252
Template-Type: ReDIF-Article 1.0
Author-Name: James Hasík
Author-X-Name-First: James
Author-X-Name-Last: Hasík
Title: Mimetic and normative isomorphism in the establishment and maintenance of independent air forces
Abstract:
Why do countries have air forces? Organizational alternatives, such as
maintaining separate air arms for the army and navy, have become quite
rare. The conventional narrative advanced by advocates of independent air
forces stress that the primacy of airpower in modern warfare mandates
centralized control of most military aviation. In this view,
political--military uncertainty has driven mimetic
isomorphism -- pressure on national governments to organize as
others organize so as to fight or deter war just as effectively. However,
working from a set of 56 countries that were politically independent
within a few years of the establishment of the first ever independent air
force (the Royal Air Force) in 1918, and continuing through nearly the
present, there is no clear pattern of external military pressure prompting
this particular reorganization. Rather, from anecdotal evidence, the cause
has more likely been normative isomorphism -- a
professional craving to look as others look to foster political or
personal legitimacy. For whatever reason, though, choices of structures
tend to lead to specific choices of policies. Thus, the result suggests
that defense ministries looking for more effective or less costly
organizational schemas may reasonably consider alternatives to the
tripartite army--navy--air force structure.
Journal: Defense & Security Analysis
Pages: 253-263
Issue: 3
Volume: 32
Year: 2016
Month: 9
X-DOI: 10.1080/14751798.2016.1199119
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199119
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:253-263
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Bang
Author-X-Name-First: Martin
Author-X-Name-Last: Bang
Author-Name: Hans Liwång
Author-X-Name-First: Hans
Author-X-Name-Last: Liwång
Title: Influences on threat assessment in a military context
Abstract:
The anchoring effect is a well-studied subject. This article connects the
effect with the rules-in-use within a military intelligence institution.
Particularly the rules-in-use that dictate that an analyst takes his or
hers starting point from recently conducted assessments of the specific
area or threat. The threat assessment as well as the written assessment
were affected. The results show that officers have an aversion to lower a
previous given threat assessment. This gives that to understand risk
assessment we not only need to understand the methods used, we also need
to understand the institutions in which they are used. This is especially
relevant for military intelligence as the assessments are conducted in an
environment of high uncertainty.
Journal: Defense & Security Analysis
Pages: 264-277
Issue: 3
Volume: 32
Year: 2016
Month: 9
X-DOI: 10.1080/14751798.2016.1199118
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1199118
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:3:p:264-277
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 279-280
Issue: 4
Volume: 32
Year: 2016
Month: 12
X-DOI: 10.1080/14751798.2016.1238702
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1238702
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:279-280
Template-Type: ReDIF-Article 1.0
Author-Name: Joel R. Hillison
Author-X-Name-First: Joel R.
Author-X-Name-Last: Hillison
Author-Name: Avram Isaacson
Author-X-Name-First: Avram
Author-X-Name-Last: Isaacson
Title: Deviant globalization: the application of strategic landpower
Abstract:
In both Afghanistan and Iraq, US landpower was able to gain control
rapidly over terrain. However, that control ebbed as US presence weakened.
Non-state actors, such as the Taliban, the Haqqani network, the Islamic
State, and Al Qaeda, gained control of segments of the population.
Transnational Criminal Organizations capitalized on this permissive
environment to strengthen their networks, often eroding the legitimacy of
the host nation government, fueling regional instability, and, ultimately,
undermining US policy objectives. The proliferation of deviant
globalization, or the connectedness of subversive elements, is a key
indicator of future conflict. Strategic landpower is uniquely positioned
to influence the physical, psychological, economic, and social
interactions of various non-state actors and their association with
deviant globalization. It is no longer enough to seize and hold terrain.
Landpower must also have the capability to influence the actions and
attitudes of populations on that terrain wherever and whenever these
interactions occur.
Journal: Defense & Security Analysis
Pages: 281-292
Issue: 4
Volume: 32
Year: 2016
Month: 12
X-DOI: 10.1080/14751798.2016.1233697
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233697
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:281-292
Template-Type: ReDIF-Article 1.0
Author-Name: Lawrence E. Cline
Author-X-Name-First: Lawrence E.
Author-X-Name-Last: Cline
Title: Tipping the scales: short-term interventions and counterinsurgency
Abstract:
Particularly in African operations, United Nations (UN) peacekeeping
forces have faced significant problems in restoring stability. In at least
a few situations, unilateral national military interventions have been
launched in the same countries. In the cases of Sierra Leone and Côte
d’Ivoire, the British and French interventions respectively played
a significant role in re-establishing stability. Lessons from these
operations suggest that if effective coordination and liaison channels are
established, such hybrid unilateral-UN missions can in fact be more
successful than “pure” peace operations.
Journal: Defense & Security Analysis
Pages: 293-311
Issue: 4
Volume: 32
Year: 2016
Month: 12
X-DOI: 10.1080/14751798.2016.1233694
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233694
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:293-311
Template-Type: ReDIF-Article 1.0
Author-Name: Shay Shabtai
Author-X-Name-First: Shay
Author-X-Name-Last: Shabtai
Title: The war after next is here -- what does the elephant look like?
Abstract:
A comprehensive paradigm of future wars can be defined, and is called in
this article “Extended conflicts.” These can be
characterized by strategic attrition, to which all national resources and
all possible international legitimacy are mobilized, in order to achieve a
resolution by transformation of the opponent. The use of military force in
this kind of conflict is limited. The understanding that we are facing an
era of extended conflicts will improve the way it is utilized.
Journal: Defense & Security Analysis
Pages: 312-320
Issue: 4
Volume: 32
Year: 2016
Month: 12
X-DOI: 10.1080/14751798.2016.1233699
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233699
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:312-320
Template-Type: ReDIF-Article 1.0
Author-Name: Bence Nemeth
Author-X-Name-First: Bence
Author-X-Name-Last: Nemeth
Title: Making defense planning meaningful: the evolution of strategic guidance in the Hungarian Ministry of Defense
Abstract:
Hungary, a former communist state, adapted a Western-style defense
planning system during the 1990s and 2000s. Although on the surface the
elements of this planning system were similar to the planning programming
budgeting system (PPBS) developed by the US Department of Defense,
strategic guidance for defense planning has not been properly developed
until recently. Thus, albeit PPBS-based defense plans were developed in
the Hungarian Ministry of Defense (Hungarian MoD) regularly, they lacked
both an expression of clear priorities and strategic focus. This article
delineates the evolution of strategic guidance in the Hungarian MoD
concentrating on current developments, and introduces the newly elaborated
analytical concepts and tools, which helped to create needed strategic
guidance in Hungary.
Journal: Defense & Security Analysis
Pages: 321-335
Issue: 4
Volume: 32
Year: 2016
Month: 12
X-DOI: 10.1080/14751798.2016.1233693
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233693
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:321-335
Template-Type: ReDIF-Article 1.0
Author-Name: Iis Gindarsah
Author-X-Name-First: Iis
Author-X-Name-Last: Gindarsah
Title: Strategic hedging in Indonesia’s defense diplomacy
Abstract:
With the rapid pace of regional arms modernization and unresolved
territorial disputes, Indonesia is increasingly susceptible to the impact
of emerging great power rivalry in Asia-Pacific. Rather than pursuing a
robust military build-up, Indonesian policy-makers assert that diplomacy
is the country’s first line of defense. This article argues that
defense diplomacy serves two agenda of Indonesia’s hedging strategy
-- strategic engagement and military modernization. This way, Indonesian
defense and security officials seek to moderate the impact of geopolitical
changes while maintaining the country’s defensive ability against
regional uncertainties.
Journal: Defense & Security Analysis
Pages: 336-353
Issue: 4
Volume: 32
Year: 2016
Month: 12
X-DOI: 10.1080/14751798.2016.1233695
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233695
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:336-353
Template-Type: ReDIF-Article 1.0
Author-Name: Shameer Modongal
Author-X-Name-First: Shameer
Author-X-Name-Last: Modongal
Title: Deterrence of nuclear terrorism in the context of South Asia
Abstract:
Stability among the great powers during the Cold War is widely theorized
in terms of nuclear deterrence. Rationality of states and their preference
for survival are the basis of nuclear deterrence. The rationality of
non-state terrorist groups is different from that of nation-states. Even
though they are also rational actors with their own hierarchy of
preferences, survival may not be their ultimate goal. Deterrence of
nuclear terrorism is therefore different from deterrence against states.
South Asia is more vulnerable to nuclear terrorism than any other region
of the world for many reasons. This article analyzes the possibility of
nuclear terrorism and the ways of deterrence against it in the context of
South Asia.
Journal: Defense & Security Analysis
Pages: 354-360
Issue: 4
Volume: 32
Year: 2016
Month: 12
X-DOI: 10.1080/14751798.2016.1233698
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1233698
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:32:y:2016:i:4:p:354-360
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 1-2
Issue: 1
Volume: 33
Year: 2017
Month: 3
X-DOI: 10.1080/14751798.2017.1299448
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1299448
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:1-2
Template-Type: ReDIF-Article 1.0
Author-Name: James Horncastle
Author-X-Name-First: James
Author-X-Name-Last: Horncastle
Title: Majority rule, minority issues: The Macedonian question in the Dekemvriana
Abstract:
This article examines the role of the Macedonian Question in the 1944
December Uprising (Dekemvriana) in Greece. While the
Dekemvriana is commonly portrayed in right--left terminology in the
historiography, this article argues that part of the reason for the
left’s failure was their inability to manage the Macedonian ethnic
component of the struggle, either within their armed forces or in their
relationship with Yugoslavia. As such, this article integrates the early
phases of the Greek Civil War into the broader literature on minorities in
civil conflict, while simultaneously exposing some of the myths about
Macedonian involvement that result from its contemporary political
ramifications.
Journal: Defense & Security Analysis
Pages: 3-14
Issue: 1
Volume: 33
Year: 2017
Month: 3
X-DOI: 10.1080/14751798.2016.1269388
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1269388
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:3-14
Template-Type: ReDIF-Article 1.0
Author-Name: Jason Ridler
Author-X-Name-First: Jason
Author-X-Name-Last: Ridler
Title: The fertile ground of Hell’s carnival: Charles T. R. Bohannan and the US Army’s Counter Intelligence Corps’ investigations of war criminals, collaborators, and the Huk, in the Philippines 1945--1947
Abstract:
Insurgencies thrive in regions where government legitimacy is absent. In
the post-war Philippines, Captain Charles T. R. Bohannan of the
Army’s Counter Intelligence Corps became actively aware of this
dynamic. Bohannan is best known for his later work with Edward Lansdale
and Ramon Magsaysay in defeating the Huk Rebellion (1950--1954). Here the
author examines Bohannan’s early investigative work against
Japanese war criminals, wartime Filipino collaborators, and the rising
threat of communist subversion most associated with the Huk. All of these
experiences fed into what would be the successful campaign against the
Huk, chronicled in his seminal work, Counter Guerrilla Operations:
The Philippines Experience, and offers lessons on the
investigative (as opposed to tactical or psychological) nature of
effective counter-insurgency work, as it relates to both legitimacy in
governance and the rise of insurgencies.
Journal: Defense & Security Analysis
Pages: 15-29
Issue: 1
Volume: 33
Year: 2017
Month: 3
X-DOI: 10.1080/14751798.2016.1269391
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1269391
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:15-29
Template-Type: ReDIF-Article 1.0
Author-Name: Hans Liwång
Author-X-Name-First: Hans
Author-X-Name-Last: Liwång
Title: Risk communication within military decision-making: pedagogic considerations
Abstract:
Risk management is a decision-support process and a vital tool for
military planning and decision-making. Today, several nations utilize
risk-based approaches to analyze the level of security in military
operations. There are both strengths and challenges in applying risk-based
approaches to support military decisions. In this article, the challenges
related to risk communication are investigated with the aim of describing
how a military organization should train to create a good environment for
effective risk communication. The analysis finds that it is important for
the organization to define and consistently use a shared risk
understanding. Such a shared risk understanding will need a systematic
development process that focuses on the future decision makers’ and
analysts’ education and training. To reach understanding, all
involved parties must have the chance to identify the problem, reflect on
its implications, test different solutions and develop a solution.
Journal: Defense & Security Analysis
Pages: 30-44
Issue: 1
Volume: 33
Year: 2017
Month: 3
X-DOI: 10.1080/14751798.2016.1269389
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1269389
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:30-44
Template-Type: ReDIF-Article 1.0
Author-Name: Christine Sixta Rinehart
Author-X-Name-First: Christine Sixta
Author-X-Name-Last: Rinehart
Title: Sharing security in an era of international cooperation: unmanned aerial vehicles and the United States’ Air Force
Abstract:
The United States’ Air Force (USAF) has developed and used unmanned
aerial vehicle (UAV) technology to monitor and assassinate dangerous
terrorists in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and
Yemen. Currently, there are few countries that possess armed UAV and since
the US created much of this technology, the USAF is usually part of the
training that automatically accompanies the purchase of its UAVs. The
research question this article attempts to answer is, “What is the
extent of the United States’ Air Force assistance in the training
and proliferation of UAV technology to foreign militaries?”
Journal: Defense & Security Analysis
Pages: 45-56
Issue: 1
Volume: 33
Year: 2017
Month: 3
X-DOI: 10.1080/14751798.2016.1269390
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1269390
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:45-56
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: Putin and Russia in retro and forward: the nuclear dimension
Abstract:
Deterioration in security relations as between NATO and Russia reached
boiling point in the aftermath of Russia’s annexation of Crimea in
2014 and its subsequent destabilization of Eastern Ukraine. As a result,
some voices in the West look forward to the departure of Vladimir Putin
from power, and others to the possible disintegration of Russia as a
unitary state. However, both the departure of Putin and the collapse of
Russia have a nuclear dimension. Putin has issued pointed reminders of
Russia’s status as a nuclear great power, and Russian military
doctrine allows for nuclear first use in the event of a conventional war
with extremely high stakes. Beyond Putin, a breakup of Russia would leave
political chaos in Eastern Europe, Central Asia and elsewhere, inviting
ambiguous command and control over formerly Russian nuclear forces.
Journal: Defense & Security Analysis
Pages: 57-67
Issue: 1
Volume: 33
Year: 2017
Month: 3
X-DOI: 10.1080/14751798.2017.1289636
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1289636
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:57-67
Template-Type: ReDIF-Article 1.0
Author-Name: Douglas Mastriano
Author-X-Name-First: Douglas
Author-X-Name-Last: Mastriano
Title: Putin -- the masked nemesis of the strategy of ambiguity
Abstract:
Recent events demonstrate the complex and adaptive approach employed by
Russia to reassert influence in Europe. The changing face of
Russia’s strategy commenced in 2007 when it launched a crippling
cyber-attack against Estonia. This was followed by a large Russian
conventional attack against Georgia in 2008, occupying two large areas of
the nation. 2014 witnessed the Russian annexation of Crimea where in just
a week, Russia seized control of Crimea “without firing a
shot.” The annexation of Crimea was rapidly followed by a Russian
inspired and led subversive war in eastern Ukraine. The common thread
among these diverse Russian operations is its use of ambiguity to confound
and confuse decision makers in the West.
Journal: Defense & Security Analysis
Pages: 68-76
Issue: 1
Volume: 33
Year: 2017
Month: 3
X-DOI: 10.1080/14751798.2016.1272175
File-URL: http://hdl.handle.net/10.1080/14751798.2016.1272175
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:1:p:68-76
Template-Type: ReDIF-Article 1.0
Author-Name: Jon Rahbek-Clemmensen
Author-X-Name-First: Jon
Author-X-Name-Last: Rahbek-Clemmensen
Title: The strategic purpose of individual augmentee officers for junior partners in multinational military operations
Abstract:
This article examines the strategic purpose of Individual Augmentee Officers (IAOs) for junior partners in multinational military operations through an exploratory case study of Danish IAOs in Iraq and South Sudan between 2014 and 2017. IAOs are individual officers who are moved from their normal functions to be seconded to other units of the armed forces of their own or another country or an international institution. The study concludes that IAOs function as strategically important, yet not necessarily indispensable, supplements to military contingents in several ways: making tangible contributions to the overall mission (contributing), gaining access to information, knowledge, and experience (learning), and lobbying decision-making processes within mission headquarters (lobbying). The usefulness of IAOs depends on whether the junior partner has specific interests and a significant presence in the theatre and whether the mission is conducted as a UN mission, a NATO mission, or an ad hoc coalition.
Journal: Defense & Security Analysis
Pages: 343-361
Issue: 4
Volume: 35
Year: 2019
Month: 10
X-DOI: 10.1080/14751798.2019.1675937
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675937
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:343-361
Template-Type: ReDIF-Article 1.0
Author-Name: Anna Jackman
Author-X-Name-First: Anna
Author-X-Name-Last: Jackman
Title: Consumer drone evolutions: trends, spaces, temporalities, threats
Abstract:
While the drone has become synonymous with the War on Terror, the asymmetric iconography of the battlefield is shifting. Commercially available off-the-shelf (COTS) drones are increasingly prevalent features of global battlefields, employed by non-state actors in both visualising such spaces, and the directing and inflicting of harm. As such usage increases, so too do concerns around their evolving adoption, adaptation, and potential portability into homeland spheres. While cognizant of the range of positive drone applications, it is asserted that drones nonetheless remain simultaneously bound to an inverse potential for exploitation. In examining drone risk, this article approaches the consumer drone through a series of sites and spaces through which it is technically and socially constructed. Reflecting upon industry innovation, community-driven experimentation, and evolving airspace – it calls for greater attention to the drone’s malleability, arguing that understandings of COTS drones must remain attentive to both drone potential and potential drone threat.
Journal: Defense & Security Analysis
Pages: 362-383
Issue: 4
Volume: 35
Year: 2019
Month: 10
X-DOI: 10.1080/14751798.2019.1675934
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675934
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:362-383
Template-Type: ReDIF-Article 1.0
Author-Name: Antti Seppo
Author-X-Name-First: Antti
Author-X-Name-Last: Seppo
Author-Name: Iulia-Sabina Joja
Author-X-Name-First: Iulia-Sabina
Author-X-Name-Last: Joja
Title: The struggle of a Kantian power in a Lockean world – German leadership in security and defence policy
Abstract:
German security and defence policy has undergone substantial transformation. This transformation requires an unprecedented level of political leadership, suggesting that Germany needs to solve the dilemma of how to supply leadership to increasingly demanding partners. What are the conditions under which German leadership can unfold in security and defence policy? To what degree do German role-conceptions of international agency and role-expectations of German leadership coincide? What kind of leadership outputs are produced? This study offers a comprehensive analysis of German security and defence policy in terms of supply (role conceptions) and demand (role expectations). We outline three leadership role conceptions present in the German strategic debate, which we then assess in the context of the Wendtian theory of cultures of anarchy. We then analyse Berlin's leadership in terms of outputs via the case study on Anchor Army and the Framework Nations Concept. We conclude that while Germany has tried to match leadership role expectations both rhetorically and in action, Berlin's leadership inputs have so far been insufficient. This has led to an imbalance in terms of role conceptions and expectations hampering effective German leadership in security and defence policy.
Journal: Defense & Security Analysis
Pages: 384-405
Issue: 4
Volume: 35
Year: 2019
Month: 10
X-DOI: 10.1080/14751798.2019.1678718
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1678718
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:384-405
Template-Type: ReDIF-Article 1.0
Author-Name: Viljar Veebel
Author-X-Name-First: Viljar
Author-X-Name-Last: Veebel
Author-Name: Illimar Ploom
Author-X-Name-First: Illimar
Author-X-Name-Last: Ploom
Title: Are the Baltic States and NATO on the right path in deterring Russia in the Baltic?
Abstract:
The aim of the current study is to discuss which particular factors Russia considers as sufficient deterrent capabilities and whether the national defence models implemented in the Baltic countries have the potential to deter Russia's military planners and political leadership. Whilst the existing conventional reserves of NATO are sizeable, secure, and rapid, deployment is still a critical variable in case of a conflict in the Baltic countries because of the limited range of safe transportation options. However, whilst the Baltic States are developing their capabilities according to the priorities defined by NATO in 2010; which were updated after the invasion of Crimea in 2014, Russian military planners have meanwhile redesigned both their military doctrine and military forces, learning from the experience of the Russo-Georgian war, the Russia-Ukraine conflict, and other recent confrontations. Accordingly, there is a risk that the efforts of the Baltic countries could prove rather inefficient in deterring Russia.
Journal: Defense & Security Analysis
Pages: 406-422
Issue: 4
Volume: 35
Year: 2019
Month: 10
X-DOI: 10.1080/14751798.2019.1675947
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675947
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:406-422
Template-Type: ReDIF-Article 1.0
Author-Name: Colin D. Robinson
Author-X-Name-First: Colin D.
Author-X-Name-Last: Robinson
Title: Glimpse into an army at its peak: notes on the Somali National Army in the 1960–80s
Abstract:
Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state.
Journal: Defense & Security Analysis
Pages: 423-429
Issue: 4
Volume: 35
Year: 2019
Month: 10
X-DOI: 10.1080/14751798.2019.1675944
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675944
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:423-429
Template-Type: ReDIF-Article 1.0
Author-Name: Paul B. Rich
Author-X-Name-First: Paul B.
Author-X-Name-Last: Rich
Title: The snowball phenomenon: the US Marine Corps, military mythology and the spread of hybrid warfare theory
Abstract:
This article reviews the book by Ofer Fridman and seeks to situate the strategic debate on hybrid war in the context of debate on the US involvement in Iraq. It points to intellectuals from the Marine Corps having a significant role in the initial development of the hybrid warfare concept at a time of some reservation in US military circles over COIN strategy as this was set out in the field manual FM3-24. Thereafter, the hybrid war concept rapidly spread and became a conceptual device used to explain Russian strategic intentions in the aftermath of the invasion of Ukraine in 2014.
Journal: Defense & Security Analysis
Pages: 430-446
Issue: 4
Volume: 35
Year: 2019
Month: 10
X-DOI: 10.1080/14751798.2019.1675942
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1675942
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:4:p:430-446
Template-Type: ReDIF-Article 1.0
Author-Name: Lazar Zsolt
Author-X-Name-First: Lazar
Author-X-Name-Last: Zsolt
Title: The Hungarian experience with Gripen fighter aircraft
Abstract:
The post-communist countries transition from the Warsaw Pact style of platforms and systems to Western-compatible capabilities has never been an easy task or a process without conflicts. This was no different for the Visegrád countries either, in which case the Hungarian Gripen procurement stands out. After much debate, Budapest decided to modernize its fighter fleet with the not battle tested Swedish-made Gripen fighter aircraft. This decision received several critiques due to the lack of transparency in the selection process and the initial lack of NATO-required systems. Subsequently, the fleet has had to operate in a financially demanding environment. Moreover, the air force has lost two aircrafts in accidents. Now that the jets are in the middle of their envisaged life cycle, it is more than appropriate to answer the question if the Gripens can utilize their full combat potential or will they fail the test of time?
Journal: Defense & Security Analysis
Pages: 161-175
Issue: 2
Volume: 34
Year: 2018
Month: 4
X-DOI: 10.1080/14751798.2018.1478180
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478180
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:161-175
Template-Type: ReDIF-Article 1.0
Author-Name: Roger Handberg
Author-X-Name-First: Roger
Author-X-Name-Last: Handberg
Title: War and rumours of war, do improvements in space technologies bring space conflict closer?
Abstract:
Combat in near-Earth orbit is emerging as a more realistic possibility. The argument here is that changes in space technologies combined with a sea change in political rhetoric is bringing the possibility of military conflict in space technologies. This movement reflects a generational shift as the original decisions regarding military conflict in space are now being reassessed by a generation who did not experience World War II or the Cold War. For these, the sanctuary approach to space activities is not as persuasive and new enhanced space technologies bring the possibility of victory or at least survival possible during a conflict in space.
Journal: Defense & Security Analysis
Pages: 176-190
Issue: 2
Volume: 34
Year: 2018
Month: 4
X-DOI: 10.1080/14751798.2018.1478181
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478181
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:176-190
Template-Type: ReDIF-Article 1.0
Author-Name: Glen Grant
Author-X-Name-First: Glen
Author-X-Name-Last: Grant
Author-Name: Vladimir Milenski
Author-X-Name-First: Vladimir
Author-X-Name-Last: Milenski
Title: Identifying the challenges to defence reform in Central and Eastern Europe: observations from the field
Abstract:
The authors have over 50 years' experience of working on defence in Central and Eastern Europe. They have been intimately involved in trying to reform over 10 national defence organisations including Ukraine. During this work, they often faced intractable resistance and scepticism or conversely, apparent unbounded support, but following this, a complete lack of any actual implementation work by officials. This paper addresses some of the findings and observations identified by the authors that appear to cause these responses and the consequent failure of reform. A new research approach has been taken by using the business and culture tools from Schein, Hofstede and Kotter to try and unravel the underlying causality of that failure. The second part of the paper produces a new process for change based upon the research conclusions to help other advisers and consultants working on reform in the post communist defence arena.
Journal: Defense & Security Analysis
Pages: 191-209
Issue: 2
Volume: 34
Year: 2018
Month: 4
X-DOI: 10.1080/14751798.2018.1478182
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478182
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:191-209
Template-Type: ReDIF-Article 1.0
Author-Name: Ash Rossiter
Author-X-Name-First: Ash
Author-X-Name-Last: Rossiter
Title: Drone usage by militant groups: exploring variation in adoption
Abstract:
Judging by recent media reporting and pronouncements by senior US military and security officials, the use of drones by militant groups is both reshaping conflict between armed non-state actors and state parties and now presents a grave and direct threat to nations in the West and elsewhere. But does this threat warrant the attention it is currently receiving? To answer this question, this article surveys how various militant groups have used drones both tactically on the battlefield and for wider strategic purposes. Closely examining how drones have been employed and by whom provides a basis for understanding variation in adoption. The article shows how drone usage or non-usage is highly contingent on the setting of the conflict, the aims of different groups, and the capacity of groups to adopt the technology. Though advances in drone technology could make the use-case more appealing for militant groups, drones will be subject to the same back-and-forth, techno-tactical adaptation dynamic between adversaries that have accompanied prior military innovations.
Journal: Defense & Security Analysis
Pages: 113-126
Issue: 2
Volume: 34
Year: 2018
Month: 4
X-DOI: 10.1080/14751798.2018.1478183
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478183
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:113-126
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas Bolland
Author-X-Name-First: Thomas
Author-X-Name-Last: Bolland
Author-Name: Jan Andre Lee Ludvigsen
Author-X-Name-First: Jan Andre
Author-X-Name-Last: Lee Ludvigsen
Title: “No boots on the ground”: the effectiveness of US drones against Al Qaeda in the Arabian Peninsula
Abstract:
The number of US drone strikes against Al Qaeda in the Arabian Peninsula (AQAP) in Yemen has increased significantly since 2010, but received limited academic attention. This article examines the effectiveness of this drone campaign using an existing theoretical framework. Crucially, we contribute to the framework by adding a fourth intervening variable, namely target correspondence. Through a single case study, it is found that drones have only enjoyed limited success in degrading AQAP's hierarchical structure, qualified human resources and access to key material resources, and in some cases – owing to our target correspondence analysis – this limited success has come at a price. It is found that drones have temporarily disrupted AQAP by successfully eliminating senior leaders involved in coordinating and overseeing external operations. Overall, AQAP's ability to hit Western targets remains significant.
Journal: Defense & Security Analysis
Pages: 127-143
Issue: 2
Volume: 34
Year: 2018
Month: 4
X-DOI: 10.1080/14751798.2018.1478184
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478184
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:127-143
Template-Type: ReDIF-Article 1.0
Author-Name: Paul B. Rich
Author-X-Name-First: Paul B.
Author-X-Name-Last: Rich
Title: Cinema, drone warfare and the framing of counter-terrorism
Abstract:
The study of the cinematic representation is extremely useful in framing of counter-terrorism policies, whether in the US or elsewhere. This paper examines cinema’s interest in drone warfare as well as the lives and personalities of drone pilots. It argues that drone warfare suffers a considerable image problem that has been brought out in several recent features and it is unlikely that any major cinematic myth of drone warfare will easily develop, certainly in comparison to myths concerning special forces and special operations.
Journal: Defense & Security Analysis
Pages: 144-160
Issue: 2
Volume: 34
Year: 2018
Month: 4
X-DOI: 10.1080/14751798.2018.1478185
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1478185
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:2:p:144-160
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas-Durell Young
Author-X-Name-First: Thomas-Durell
Author-X-Name-Last: Young
Title: professor Emeritus Martin Hugh Anthony Edmonds of Hornby
Journal: Defense & Security Analysis
Pages: 1-1
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565340
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565340
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:1-1
Template-Type: ReDIF-Article 1.0
Author-Name: Daniel Salisbury
Author-X-Name-First: Daniel
Author-X-Name-Last: Salisbury
Title: An evolving state of play? Exploring competitive advantages of state assets in proliferation networks
Abstract:
Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation.
Journal: Defense & Security Analysis
Pages: 2-22
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565362
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565362
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:2-22
Template-Type: ReDIF-Article 1.0
Author-Name: David S. Sorenson
Author-X-Name-First: David S.
Author-X-Name-Last: Sorenson
Title: More military base closure? Considering the alternatives
Abstract:
Despite multiple base closing rounds, the United States Department of Defense still has excess base capacity, and thus President Trump and high-level Defense Department officials are calling for more base closure through the Base Realignment and Closure (BRAC) process. However, another BRAC may not be the optimal solution, because simple base closure is not an efficient way to reduce surplus base capacity. Thus, Defense Department officials should consider other methods to reduce surplus capacity, including reduction in base size, leasing excess base property, or transferring it to another government agency for a variety of alternative uses. The surplus capacity issue also offers an opportunity to DOD to reassess base utilization, to update base requirements with current and future force structure. While BRAC focuses on American military bases, the process and alternatives also have international applications.
Journal: Defense & Security Analysis
Pages: 23-39
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565363
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565363
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:23-39
Template-Type: ReDIF-Article 1.0
Author-Name: Murat Caliskan
Author-X-Name-First: Murat
Author-X-Name-Last: Caliskan
Title: Hybrid warfare through the lens of strategic theory
Abstract:
Hybrid warfare is the latest of the terms/concepts that have been used within the defence community in the last three decades to label contemporary warfare. It has been officially adopted in the core strategic documents of NATO, EU and national governments and has already inspired many articles, policy papers and books; however, this paper is unique in the sense that it analysis the hybrid warfare concept through the lens of strategic theory. It is argued that hybrid warfare does not merit the adoption as a doctrinal concept. Strategic theory instead, which lies at the nexus of all dimensions of warfare, provides a better viewpoint to approach contemporary warfare. It concludes that efforts should be directed towards exploring warfare under the light of eternal principles instead of proving the emergence of new types of warfare.
Journal: Defense & Security Analysis
Pages: 40-58
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565364
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565364
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:40-58
Template-Type: ReDIF-Article 1.0
Author-Name: Stephan De Spiegeleire
Author-X-Name-First: Stephan
Author-X-Name-Last: De Spiegeleire
Author-Name: Karlijn Jans
Author-X-Name-First: Karlijn
Author-X-Name-Last: Jans
Author-Name: Mischa Sibbel
Author-X-Name-First: Mischa
Author-X-Name-Last: Sibbel
Author-Name: Khrystyna Holynska
Author-X-Name-First: Khrystyna
Author-X-Name-Last: Holynska
Author-Name: Deborah Lassche
Author-X-Name-First: Deborah
Author-X-Name-Last: Lassche
Title: Implementing defence policy: a benchmark-“lite”
Abstract:
Most countries put significant amounts of time and effort in writing and issuing high-level policy documents. These are supposed to guide subsequent national defence efforts. But do they? And how do countries even try to ensure that they do? This paper reports on a benchmarking effort of how a few “best of breed” small- to medium-sized defence organisations (Australia, Canada, and New Zealand) deal with these issues. We find that most countries fail to link goals to resources and pay limited attention to specific and rigorous ex-ante or post-hoc evaluation, even when compared to their own national government-wide provisions. We do, however, observe a (modest) trend towards putting more specific goals and metrics in these documents that can be – and in a few rare cases were – tracked. The paper identifies 42 concrete policy “nuggets” – both “do’s and don’ts” – that should be of interest to most defence policy planning/analysis communities. It ends with two recommendations that are in line with recent broader (non-defence) scholarship on the policy formulation-policy implementation gap: to put more rigorous emphasis on implementation (especially on achieving desired policy effects), but to do so increasingly in more experiential (“design”) ways, rather than in industrial-age bureaucratic ones (“PPBS”-systems).
Journal: Defense & Security Analysis
Pages: 59-81
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565365
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565365
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:59-81
Template-Type: ReDIF-Article 1.0
Author-Name: Glen Grant
Author-X-Name-First: Glen
Author-X-Name-Last: Grant
Author-Name: Vladimir Milenski
Author-X-Name-First: Vladimir
Author-X-Name-Last: Milenski
Title: Defence models uncovered: how to understand the defence style of a country
Abstract:
This paper describes four different styles, or models, of defence organisation that can be found worldwide. The framework outlined in the paper has been designed to help politicians, diplomats and officials understand better their own system so they can improve it, or to understand the system of others so they can produce better interoperability. The four styles (or models) suggested are mutually exclusive as each has defining factors that mark them out from the other three. The models are rational focusing upon warfighting; emotional, the antithesis of rationality where choices of the day dominate; politically dominant, where a political solution is chosen for the country such as conscription; and militarily dominant, where the whole defence system is controlled by the military with no proper civilian oversight. Each model is hard to sustain and most countries tend towards one style being dominant with elements of the others.
Journal: Defense & Security Analysis
Pages: 82-94
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565669
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565669
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:82-94
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas Durell Young
Author-X-Name-First: Thomas Durell
Author-X-Name-Last: Young
Title: Editorial to open a debate: VOSTOK 2018: are Russian armed forces experimenting with mission-command?
Journal: Defense & Security Analysis
Pages: 95-95
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565670
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565670
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:95-95
Template-Type: ReDIF-Article 1.0
Author-Name: Michael H. Clemmesen
Author-X-Name-First: Michael H.
Author-X-Name-Last: Clemmesen
Title: On the roles of free play in army exercises and the Russians
Abstract:
The article outlines the essential role of free play elements in various types of exercises for the development of in-depth and practical military professionalism. It thereafter argues why such use of free play contradicts the military science founded Russian Way of War.
Journal: Defense & Security Analysis
Pages: 96-97
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565671
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565671
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:96-97
Template-Type: ReDIF-Article 1.0
Author-Name: Vladimir Milenski
Author-X-Name-First: Vladimir
Author-X-Name-Last: Milenski
Title: VOSTOK-2018 and the fear of free-play in Russian military training
Journal: Defense & Security Analysis
Pages: 98-99
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565673
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565673
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:98-99
Template-Type: ReDIF-Article 1.0
Author-Name: Daivis Petraitis
Author-X-Name-First: Daivis
Author-X-Name-Last: Petraitis
Title: Russian mission-command in VOSTOK strategic exercises
Abstract:
Russian military prefers and exercises differently compare to the Western planning and execution philosophies with mission command allowed and appreciated in sub unit levels only. “Vostok-2018” provided a lot of evidences Russians using de-centralised execution in the sub-unit levels and at the same time centralised control at levels of units and formations.
Journal: Defense & Security Analysis
Pages: 100-102
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565672
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565672
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:100-102
Template-Type: ReDIF-Article 1.0
Author-Name: Mathieu Boulègue
Author-X-Name-First: Mathieu
Author-X-Name-Last: Boulègue
Title: Did the Russian General Staff experiment with free play during VOSTOK-2018?
Abstract:
The VOSTOK-2018 strategic field training exercise (FTX) that took place in mid-September 2018 rehearsed forces’ integration and combat preparedness across multiple strategic directions. Regarding combat readiness, the research question outlined in this paper relates to whether the General Staff experimented with mission-command - a key component of Russia’s modern military thinking. The answer is clearly no: operational creative manoeuvring hardly featured during the VOSTOK-2018 drills for clearly identified reasons. At the systemic level, little room was left for initiatives since the drills focused on implementing and testing command and control (C2) systems. At the structural level, VOSTOK-2018 was not oriented towards mission-command but ‘mission-control’ and streamlining centralised decision-making processes down to the tactical level. At the symbolic level, free play was not exercised due to the participation of China in the drills, and the necessity to impress Chinese military observers.
Journal: Defense & Security Analysis
Pages: 103-105
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565674
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565674
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:103-105
Template-Type: ReDIF-Article 1.0
Author-Name: Jyri Raitasalo
Author-X-Name-First: Jyri
Author-X-Name-Last: Raitasalo
Title: Lessons from VOSTOK-2018: free-play manoeuvers are overrated and mission-command needs to be bounded
Journal: Defense & Security Analysis
Pages: 106-107
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565675
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565675
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:106-107
Template-Type: ReDIF-Article 1.0
Author-Name: Alex Gould
Author-X-Name-First: Alex
Author-X-Name-Last: Gould
Title: Security entrepreneurs: performing protection in post-cold war Europe
Journal: Defense & Security Analysis
Pages: 108-110
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565676
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565676
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:108-110
Template-Type: ReDIF-Article 1.0
Author-Name: Jeffrey Michaels
Author-X-Name-First: Jeffrey
Author-X-Name-Last: Michaels
Title: Cinema and unconventional warfare in the twentieth century: insurgency, terrorism and special operations
Journal: Defense & Security Analysis
Pages: 110-112
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565677
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565677
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:110-112
Template-Type: ReDIF-Article 1.0
Author-Name: Gergely Németh
Author-X-Name-First: Gergely
Author-X-Name-Last: Németh
Title: Strategy, evolution and warfare: from apes to artificial intelligence
Journal: Defense & Security Analysis
Pages: 112-113
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565689
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565689
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:112-113
Template-Type: ReDIF-Article 1.0
Author-Name: Benjamin Tuck
Author-X-Name-First: Benjamin
Author-X-Name-Last: Tuck
Title: Learning to fight: military innovation and change in the British Army, 1914–1918
Journal: Defense & Security Analysis
Pages: 114-115
Issue: 1
Volume: 35
Year: 2019
Month: 1
X-DOI: 10.1080/14751798.2019.1565690
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1565690
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:1:p:114-115
Template-Type: ReDIF-Article 1.0
Author-Name: Blažo M. Radović
Author-X-Name-First: Blažo M.
Author-X-Name-Last: Radović
Title: The Serbian defence institution: the need for clear policy guidance to improve the Serbian defence planning, management, and command processes
Abstract:
The uncritical layering of western liberal defence governance norms and concepts on top of existing legacy concepts has impeded achieving coherent military capabilities and capacities when Serbia’s political and military leadership tried to reform the defence system using Western benchmarking principles and Western countries’ best practices. The process of this change has been more valuable than its actual output, as defined by increased capabilities. Such outcomes should be reflective of policy guidance, and can be thought of as closing the trinity loop of a defence planning system: plans, money and execution. This article addresses two key functional areas of the Serbian defence institution. First, it assesses the current state of defence planning to discern its strengths and weaknesses to ascertain if plans are tied to financial decision-making. Second, a full examination of current Serbian defence management is conducted to discern whether weaknesses exist that distract from producing operational capabilities. Both areas are analyzed thoroughly and some solutions for change are proposed. Also, the article analyzes the appearance of two negative phenomena in the planning process – economization and managerialism.
Journal: Defense & Security Analysis
Pages: 211-231
Issue: 3
Volume: 34
Year: 2018
Month: 7
X-DOI: 10.1080/14751798.2018.1500753
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500753
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:211-231
Template-Type: ReDIF-Article 1.0
Author-Name: Kenneth Boutin
Author-X-Name-First: Kenneth
Author-X-Name-Last: Boutin
Title: Feeding the Lion: China and defence development in African states
Abstract:
In analysing trends in Chinese defence engagement and their impact on defence development in African states, it is important to consider both China's changing policy priorities and its capabilities for the provision of defence support. China's international ambitions and its economic development contribute to its emergence as a key supporter of defence capability development in Africa, occupying a crucial niche as a provider of support, particularly arms transfers, appropriate to evolving local requirements. The economic and politico-military imperatives driving China's engagement of Africa, which stem from its economic reforms and re-emergence as a great power, are facilitating defence modernisation by accelerating the introduction of modern arms in substantial quantities. The commercial importance of arms exports and the growing importance of strategic ties strongly situate China to help sustain processes of defence capability development in African states over the long term.
Journal: Defense & Security Analysis
Pages: 232-248
Issue: 3
Volume: 34
Year: 2018
Month: 7
X-DOI: 10.1080/14751798.2018.1500755
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500755
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:232-248
Template-Type: ReDIF-Article 1.0
Author-Name: Colin D. Robinson
Author-X-Name-First: Colin D.
Author-X-Name-Last: Robinson
Title: What explains the failure of U.S. army reconstruction in Afghanistan?
Abstract:
This author wrote his doctorate thesis on post-conflict army reconstruction, submitting it in 2011. Continued research on the subject in the intervening seven years indicates that his theoretical propositions can be refined and improved. This article examines refinements to the model, and then applies those refinements in detail to the Afghan case. In so doing, it shifts the focus from potentially altruistic state-building to a case that was driven by pure national-strategic interests. Issues surrounding the liberal peace ideology dominate recent army reconstruction in conflict-affected states. The liberal peace underpinning is of supreme importance, so much so that in many discussions, it is internalised and accepted virtually without thought. This paper will advance the body of knowledge by establishing, for the first time, a theoretical basis for the widespread failure of army reconstruction in Afghanistan. The empirical basis builds on extensive previous research by other scholars. The resulting model can also be applied to better explain outcomes in other similar cases.
Journal: Defense & Security Analysis
Pages: 249-266
Issue: 3
Volume: 34
Year: 2018
Month: 7
X-DOI: 10.1080/14751798.2018.1500756
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500756
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:249-266
Template-Type: ReDIF-Article 1.0
Author-Name: Jahara Matisek
Author-X-Name-First: Jahara
Author-X-Name-Last: Matisek
Title: The crisis of American military assistance: strategic dithering and Fabergé Egg armies
Abstract:
The United States has provided substantial amounts of military assistance and aid since the end of World War Two. During the Cold War, it proved vital in protecting numerous regimes from communist takeovers. Successful outcomes occurred when American leaders made large initial aid commitments, and the states had the capacity and political willpower to use it effectively. However, Vietnam was an example of how U.S. support lagged, as leaders in Saigon preferred political survival instead of creating regime legitimacy. Following 9/11, American security aid focused on making weak countries develop stronger security forces. Unfortunately, this created Fabergé egg militaries: expensive and easily broken by insurgents. This article suggests long-term strategic commitments need to be made alongside more resources for the American State Department and similar organizations to focus on the politics of state-building. Finally, this article suggests strategies, such as “whole-of-government” approaches, to improve long-term security and political institution building.
Journal: Defense & Security Analysis
Pages: 267-290
Issue: 3
Volume: 34
Year: 2018
Month: 7
X-DOI: 10.1080/14751798.2018.1500757
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500757
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:267-290
Template-Type: ReDIF-Article 1.0
Author-Name: Viljar Veebel
Author-X-Name-First: Viljar
Author-X-Name-Last: Veebel
Title: (Un)justified expectations on nuclear deterrence of non-nuclear NATO members: the case of Estonia and Latvia?
Abstract:
Nuclear assets are one of the cornerstones of credible collective deterrence of the North Atlantic Treaty Organisation. Paradoxically, the most endangered member states are the ones without nuclear capabilities, left with the hope and expectation that the owners of nuclear assets will defend them and that their potential enemies are deterred by these capabilities. However, the expectations from one side, practical commitment of allies from other side may not go in harmony and synchronisation. Is there a capability gap which needs to be fulfilled? If yes then, is the gap in the side of nuclear powers or is it on the side of those endangered states who need to understand what can or cannot realistically be expected? The current article focuses on the question of how the political and military elite of the Baltic states describes their expectations in terms of using Alliance's nuclear capabilities to deter Russia's regional ambitions.
Journal: Defense & Security Analysis
Pages: 291-309
Issue: 3
Volume: 34
Year: 2018
Month: 7
X-DOI: 10.1080/14751798.2018.1500758
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500758
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:291-309
Template-Type: ReDIF-Article 1.0
Author-Name: Paul B. Rich
Author-X-Name-First: Paul B.
Author-X-Name-Last: Rich
Title: Counter-insurgency as Magic: Edward G Lansdale, covert operations and the cultural Cold War
Journal: Defense & Security Analysis
Pages: 310-319
Issue: 3
Volume: 34
Year: 2018
Month: 7
X-DOI: 10.1080/14751798.2018.1500764
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1500764
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:310-319
Template-Type: ReDIF-Article 1.0
Author-Name: The Editors
Title: Correction
Journal: Defense & Security Analysis
Pages: X-X
Issue: 3
Volume: 34
Year: 2018
Month: 7
X-DOI: 10.1080/14751798.2018.1532029
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1532029
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:3:p:X-X
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 289-291
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2017.1393865
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1393865
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:289-291
Template-Type: ReDIF-Article 1.0
Author-Name: Gjorgji Veljovski
Author-X-Name-First: Gjorgji
Author-X-Name-Last: Veljovski
Author-Name: Nenad Taneski
Author-X-Name-First: Nenad
Author-X-Name-Last: Taneski
Author-Name: Metodija Dojchinovski
Author-X-Name-First: Metodija
Author-X-Name-Last: Dojchinovski
Title: The danger of “hybrid warfare” from a sophisticated adversary: the Russian “hybridity” in the Ukrainian conflict
Abstract:
The term “hybrid warfare” is a new one that the West began to use to explain its failure to cope with asymmetric threats. Focusing on the war on global terrorism, the West temporarily withdrew its attention from traditional adversaries, such as Russia, which has used this gap and has audaciously returned to the stage as a global actor. Until the Russian annexation of the Crimean Peninsula in 2014 and inflaming the Ukrainian crisis, most Western authors attributed “hybrid threats” mostly to non-state actors. But the Ukrainian scenario showed the true face of “hybridity” in the modern battlefield when practised by a powerful state actor. Russian “hybrid warfare” in Ukraine has already been seen as a combination of conventional and unconventional methods, that have been complemented with other instruments of national power – diplomatic, economic and information. The purpose of this article is, through an analysis of the Ukrainian scenario, to demonstrate that although the term “hybrid” is new, the concept itself is old and is a continuation of already seen doctrine from the Cold War era. Although “hybrid threats” can come both from state and non-state actors, the Russian interference in Ukraine is proof that they are especially dangerous for the West if, or when, they are initiated from a traditional, sophisticated adversary that has the capacity to use all forms of warfare.
Journal: Defense & Security Analysis
Pages: 292-307
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2017.1377883
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377883
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:292-307
Template-Type: ReDIF-Article 1.0
Author-Name: Anton Bebler
Author-X-Name-First: Anton
Author-X-Name-Last: Bebler
Title: Turkey’s imperial legacy and the conflict potential in the Balkans
Abstract:
Turkey is the only Eurasian state surrounded in almost a full circle by acute hot or “frozen conflicts,” ranging from low-intensity violence, terrorism to fully fledged wars. The prevailing pattern of intercommunal and interethnic conflicts in the continental Balkans and on Cyprus has long been different from those in the rest of Europe and in the Near East. This difference is closely related to the fact that these lands had experienced in the past centuries-long rule by the Ottoman Empire, whose legal successor is the Republic of Turkey. The intercommunal conflict potential in the rest of Europe used to differ substantially, but the difference has been greatly reduced as Western Europe has, in one respect, become “balkanized.”
Journal: Defense & Security Analysis
Pages: 308-319
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2017.1377368
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377368
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:308-319
Template-Type: ReDIF-Article 1.0
Author-Name: Idowu Johnson
Author-X-Name-First: Idowu
Author-X-Name-Last: Johnson
Author-Name: Azeez Olaniyan
Author-X-Name-First: Azeez
Author-X-Name-Last: Olaniyan
Title: The politics of renewed quest for a Biafra Republic in Nigeria
Abstract:
The quest for a Biafran Republic by the Igbo ethnic group has become a recurring demand in Nigeria since the late 1960s. The agitation has been premised on claims of marginalisation and exclusion of the Igbo people in the Nigerian body politic. In spite of the consistency of the agitation through various Administrations, there was a noticeable lull in such demands during the time of President Goodluck Jonathan, only to assume a frightening proportion since the advent of the Administration of President Muhammadu Buhari. This article locates the factors in the outcomes of the 2015 general elections: the question of inclusion and representation; the unfinished nature of the Nigerian civil war; economic challenges, miscalculation both on the part of the Igbo people and indiscretion in the initial appointments made by President Muhammadu Buhari. The article recommends political restructuring of Nigeria as one of the ways to address secessionist tendencies.
Journal: Defense & Security Analysis
Pages: 320-332
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2017.1382029
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1382029
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:320-332
Template-Type: ReDIF-Article 1.0
Author-Name: Yan Cimon
Author-X-Name-First: Yan
Author-X-Name-Last: Cimon
Title: Perspectives for the development of key industrial capabilities for Canada’s defence sector
Abstract:
With the Canada First Defence Strategy, Canada has put forth a major opportunity to reconcile national security imperatives and industrial policy. The Jenkins Report (2013) set out to examine ways to use that procurement effort to foster key industrial capabilities (KICs) that would put the Canadian defence industry at an advantage both nationally and internationally. The Canadian defence industry should then develop highly focused capabilities with a view to moving up global value chains. As such, KICs that hold the best potential should be selected. They should be sustained through a range of strategies that are however contingent on the elimination of policy gaps. This leads to a balancing act between the need to control intellectual property assets versus accessing them in a world where national boundaries are eroded. Canada’s industry should target opportunities outside North America while continuing to focus on better integration with the North American industry.
Journal: Defense & Security Analysis
Pages: 333-346
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2017.1377422
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377422
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:333-346
Template-Type: ReDIF-Article 1.0
Author-Name: Evan A. Laksmana
Author-X-Name-First: Evan A.
Author-X-Name-Last: Laksmana
Title: Threats and civil–military relations: explaining Singapore’s “trickle down” military innovation
Abstract:
This article explains why Singapore, despite its small size and semi-authoritarian regime, retains one of the best military forces in the Indo-Pacific. It unpacks Singapore’s ability to continuously innovate since the 1960s – technologically, organizationally, and conceptually – and even recently joined the Revolution in Military Affairs bandwagon. Drawing from the broader military innovation studies literature, this article argues evolutionary peacetime military innovation is more likely to occur in a state with a unified civil–military relation and whose military faces a high-level diverse set of threats. This argument explains how the civil–military fusion under the People’s Action Party-led government since Singapore’s founding moment has been providing coherent and consistent strategic guidance, political support, and financial capital, allowing the Singapore Armed Forces to continuously innovate in response to high levels and diversity of threats.
Journal: Defense & Security Analysis
Pages: 347-365
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2017.1377369
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377369
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:347-365
Template-Type: ReDIF-Article 1.0
Author-Name: Paul Antonopoulos
Author-X-Name-First: Paul
Author-X-Name-Last: Antonopoulos
Author-Name: Renato Velez
Author-X-Name-First: Renato
Author-X-Name-Last: Velez
Author-Name: Drew Cottle
Author-X-Name-First: Drew
Author-X-Name-Last: Cottle
Title: NATO’s push into the Caucasus: geopolitical flashpoints and limits for expansion
Abstract:
The Caucasus has been a major flashpoint of contention between NATO and a resurgent Russia since the collapse of the Soviet Union. The rivalry saw the escalation of hostility in the region during the brief 2008 Russo-Georgian War where a NATO-backed Georgia challenged South Ossetia supported by the Russian military. In 2011, NATO officially recognised Georgia as a potential member, challenging Russia’s traditional sphere of influence in the Caucasus. Moscow says the Eastward expansion of NATO into the Baltics and to include Georgia as a member state is a method of containing a resurgent Russia. However, the former Soviet Republics of Ukraine, the Baltics and Georgia, maintain that Russia represents a threat to their sovereignty, as seen by the Russian support of the breakaway unrecognised Republics of South Ossetia and Abkhazia. A hostile rivalry between the Russian-backed Armenia and Azerbaijan, which is reliant upon NATO-member Turkey, intensifies the polarisation in the Caucasus.
Journal: Defense & Security Analysis
Pages: 366-379
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2017.1379119
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1379119
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:366-379
Template-Type: ReDIF-Article 1.0
Author-Name: Stefano Musco
Author-X-Name-First: Stefano
Author-X-Name-Last: Musco
Title: The art of meddling: a theoretical, strategic and historical analysis of non-official covers for clandestine Humint
Abstract:
The building of reliable covers has always been of the utmost importance for clandestine Humint. Using both primary and secondary sources, this study seeks to examine how classical authors and modern scholars have dealt with this topic, and which kind of covers have been the most used throughout history in different sociopolitical contexts, and what are the new perspectives for today’s challenges. Findings suggest that a careful reading of the political milieu in which intelligence officers are required to work, and a certain degree of creativity, are the essential premises for the construction of a plausible cover; that some apparently outdated disguises such as merchants, itinerant monks and philosophers should be understood more broadly today to include business people, humanitarian NGOs and academics; that undercover practices have been theoretically and historically recognized as necessary and convenient by a great number of societies, often with scant regard for ethical considerations.
Journal: Defense & Security Analysis
Pages: 380-394
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2017.1377367
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1377367
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:380-394
Template-Type: ReDIF-Article 1.0
Author-Name: Oluwaseun Bamidele
Author-X-Name-First: Oluwaseun
Author-X-Name-Last: Bamidele
Title: RETRACTED ARTICLE: Boko Haram “Jama'atu Ahlus-Sunnah Lidda'Awati Wal Jihad” in North-eastern Nigeria: implications for Sub-Saharan African peace and security
Journal: Defense & Security Analysis
Pages: iii-xiv
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2014.948280
File-URL: http://hdl.handle.net/10.1080/14751798.2014.948280
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:iii-xiv
Template-Type: ReDIF-Article 1.0
Author-Name: The Editors
Title: Editorial board
Journal: Defense & Security Analysis
Pages: ebi-ebi
Issue: 4
Volume: 33
Year: 2017
Month: 10
X-DOI: 10.1080/14751798.2017.1393866
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1393866
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:4:p:ebi-ebi
Template-Type: ReDIF-Article 1.0
Author-Name: Maja Garb
Author-X-Name-First: Maja
Author-X-Name-Last: Garb
Title: Coping with the refugee and migrant crisis in Slovenia: the role of the military
Abstract:
Approximately 470,000 refugees and migrants passed through Slovenian territory between September 2015 and March 2016, creating a crisis that required a great deal of organisational and field work on the part of many governmental and non-governmental institutions. In the social sciences, a discourse on “security versus humanitarian approach” on the refugees and migrant issue appeared; however, the article goes over such a discourse and deals with roles and problems of different institutions – mostly the military – that responded to the crisis. Namely, coping with the crisis was characterised by significant institutional adjustments, difficult co-ordination, and intense public debate. The Slovenian Armed Forces were included in this process as support for Civil Protection and Police. The military’s role followed the military missions defined by the Defence Act; however, the government also proposed some changes to the act that were met with some doubts on the part of the public and different institutions.
Journal: Defense & Security Analysis
Pages: 3-15
Issue: 1
Volume: 34
Year: 2018
Month: 1
X-DOI: 10.1080/14751798.2018.1421400
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421400
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:3-15
Template-Type: ReDIF-Article 1.0
Author-Name: Bence Nemeth
Author-X-Name-First: Bence
Author-X-Name-Last: Nemeth
Title: Militarisation of cooperation against mass migration – the Central European Defence Cooperation (CEDC)
Abstract:
As a result of the migration crisis of 2015–2016, the management of mass migration and border control became militarised in Central Europe, and this process has also reshaped the dynamics of multinational defence cooperation in the region. Accordingly, while the so-called Central European Defence Cooperation (CEDC) was created by Austria, Croatia, the Czech Republic, Hungary, Slovakia and Slovenia in 2010 to support NATO and EU capability development projects via defence cooperation, after the migration crisis it became the major Central European forum for military cooperation against irregular mass migration. Although many defence officials in the region are not necessarily enthusiastic about this development, the Central European political environment and also practical defence considerations pushed the defence ministries of CEDC countries towards deeper cooperation on border control, as well as better coordination with ministries of interior affairs on the national and the regional levels.
Journal: Defense & Security Analysis
Pages: 16-34
Issue: 1
Volume: 34
Year: 2018
Month: 1
X-DOI: 10.1080/14751798.2018.1421401
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421401
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:16-34
Template-Type: ReDIF-Article 1.0
Author-Name: Aslı Ilgıt
Author-X-Name-First: Aslı
Author-X-Name-Last: Ilgıt
Author-Name: Özlem Kayhan Pusane
Author-X-Name-First: Özlem
Author-X-Name-Last: Kayhan Pusane
Title: Countering insurgency: Turkey’s policy toward the PKK’s transnational dynamics in Europe
Abstract:
Insurgents often develop international connections and benefit from external assistance from a variety of sources. Support from diaspora communities has long been considered one of the critical external factors in the persistence of insurgent groups. Yet how the counterinsurgent state addresses external support from transnational ethnic communities and what factors influence the state's policies remain understudied. By focusing on the transnational political practices of the Kurdish community and the PKK in Western Europe, this paper examines how Turkey has addressed the diasporic support for the PKK since the 1980s. It shows that three major factors – the composition of foreign policy decision-makers, their ideological contestation over the Kurdish question, and the European political context – have affected Turkey's policy regarding the PKK's transnational dynamics in Europe.
Journal: Defense & Security Analysis
Pages: 35-52
Issue: 1
Volume: 34
Year: 2018
Month: 1
X-DOI: 10.1080/14751798.2018.1421402
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421402
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:35-52
Template-Type: ReDIF-Article 1.0
Author-Name: Abel Esterhuyse
Author-X-Name-First: Abel
Author-X-Name-Last: Esterhuyse
Author-Name: Gerhard Louw
Author-X-Name-First: Gerhard
Author-X-Name-Last: Louw
Title: The practice of strategy: South African defence in stasis
Abstract:
The article concerns the strategy development processes of the South African Department of Defence in South Africa. It intends to identify the probable causes of the observed failure of the South African National Defence Force to develop appropriate departmental policy and military strategy. Military strategy comprises force development, force employment, force deployment and the coordination of these elements in pursuit of national, grand-strategic objectives. (See Dennis M. Drew and Donald M. Snow, Making Twenty-first Century Strategy: An Introduction to Modern National Security Processes and Problems Montgomery, AL: Air University Press, Maxwell Air Force Base, November 2006, 103). Of these four constructs, the article concerns itself only with the first two. The article analyses two complementary approaches to strategy formation: a resource-driven, inside-out model and an interests-driven, outside-in method. The article concludes that the Department is preoccupied with the inside-out method to the lasting detriment of the declared strategic intent of the defence policy.
Journal: Defense & Security Analysis
Pages: 53-72
Issue: 1
Volume: 34
Year: 2018
Month: 1
X-DOI: 10.1080/14751798.2018.1421403
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421403
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:53-72
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas-Durell Young
Author-X-Name-First: Thomas-Durell
Author-X-Name-Last: Young
Title: Programming challenges and impediments to reform: identifying pragmatic solutions
Abstract:
Using two recently published essays by the current writer that assesses the dismal record of performance of Planning, Programming, and Budgeting System in enabling communist legacy defence institutions in Central and Eastern Europe to develop viable defence plans, this essay argues the need for deep reforms in the region’s defence institutions. To guide this reform effort, pragmatic solutions are suggested to improve the ability of these organisations to produce viable defence plans. Recommended reforms are: (1) conduct conceptual and cultural “audits,” (2) make operational and financial data central to decision-making, (3) change current organisational sociology, (4) examine planning methods and practices, and (5) stress the need to adopt policy frameworks to drive the operation of defence institutions.
Journal: Defense & Security Analysis
Pages: 73-92
Issue: 1
Volume: 34
Year: 2018
Month: 1
X-DOI: 10.1080/14751798.2018.1421404
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421404
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:73-92
Template-Type: ReDIF-Article 1.0
Author-Name: Mihail Naydenov
Author-X-Name-First: Mihail
Author-X-Name-Last: Naydenov
Title: The subversion of the Bulgarian defence system – the Russian way
Abstract:
Russia has long been pursuing an intended and calculated policy of keeping enough influence in Bulgaria in order to have control over national decisions. Together with the economic, energy, political and information tools used by Russia in its hybrid war against Bulgaria and in its bid to achieve an enduring “state capture,” defence is also a distinct target of Russian subversion now. A list of noticeable subversive actions with tangible effects can be summarised, ranging from fuelling division and manipulating public opinion, preventing the strengthening of the NATO position in the Black Sea, sabotaging defence reform to various options of subverting the modernisation of the Bulgarian Armed Forces and seeking new ways to keep legacy Soviet military equipment in operation as long as possible. This issue must be urgently addressed both nationally and in NATO.
Journal: Defense & Security Analysis
Pages: 93-112
Issue: 1
Volume: 34
Year: 2018
Month: 1
X-DOI: 10.1080/14751798.2018.1421408
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1421408
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:93-112
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas-Durell Young
Author-X-Name-First: Thomas-Durell
Author-X-Name-Last: Young
Title: Editorial by the new editor-in-chief
Journal: Defense & Security Analysis
Pages: 1-2
Issue: 1
Volume: 34
Year: 2018
Month: 1
X-DOI: 10.1080/14751798.2018.1433493
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1433493
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:1:p:1-2
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Title: Editorial
Journal: Defense & Security Analysis
Pages: 191-192
Issue: 3
Volume: 33
Year: 2017
Month: 7
X-DOI: 10.1080/14751798.2017.1351164
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351164
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:191-192
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Title: Nuclear deterrence and cyber warfare: coexistence or competition?
Abstract:
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.
Journal: Defense & Security Analysis
Pages: 193-208
Issue: 3
Volume: 33
Year: 2017
Month: 7
X-DOI: 10.1080/14751798.2017.1351142
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351142
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:193-208
Template-Type: ReDIF-Article 1.0
Author-Name: Christopher G. Pernin
Author-X-Name-First: Christopher G.
Author-X-Name-Last: Pernin
Author-Name: Angela O’Mahony
Author-X-Name-First: Angela
Author-X-Name-Last: O’Mahony
Author-Name: Thomas S. Szayna
Author-X-Name-First: Thomas S.
Author-X-Name-Last: Szayna
Author-Name: Derek Eaton
Author-X-Name-First: Derek
Author-X-Name-Last: Eaton
Author-Name: Katharina Ley Best
Author-X-Name-First: Katharina Ley
Author-X-Name-Last: Best
Author-Name: Elizabeth Bodine-Baron
Author-X-Name-First: Elizabeth
Author-X-Name-Last: Bodine-Baron
Author-Name: Joshua Mendelsohn
Author-X-Name-First: Joshua
Author-X-Name-Last: Mendelsohn
Author-Name: Osonde A. Osoba
Author-X-Name-First: Osonde A.
Author-X-Name-Last: Osoba
Title: What is the global landpower network and what value might it provide?
Abstract:
US national security guidance, as well as the US Army’s operational experiences since 2001, emphasizes the importance of working closely with partner countries to achieve US strategic objectives. The US Army has introduced the global landpower network (GLN) concept as a means to integrate, sustain and advance the Army’s considerable ongoing efforts to meet US national security guidance. This study develops the GLN concept further, and addresses three questions. What benefits can the GLN provide the Army? What are the essential components of the GLN? What options exist for implementing the GLN concept? By developing the GLN concept, the Army has the opportunity to transition the GLN from an often ad hoc and reactive set of relationships to one that the Army more self-consciously prioritizes and leverages as a resource to meet US strategic objectives.
Journal: Defense & Security Analysis
Pages: 209-222
Issue: 3
Volume: 33
Year: 2017
Month: 7
X-DOI: 10.1080/14751798.2017.1351153
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351153
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:209-222
Template-Type: ReDIF-Article 1.0
Author-Name: Raul Gouvea
Author-X-Name-First: Raul
Author-X-Name-Last: Gouvea
Title: US–Latin America’s security: moving through an inflection point?
Abstract:
Recent elections in Latin America, such as those of Mauricio Macri in Argentina, Horacio Cartes in Paraguay, and the impeachment process of Dilma Rousseff in Brazil, point to a new direction in Latin American politics and away from the “hard left;” they also point to a new momentum in the security relationship between the US and Latin American countries. Former US President Obama’s 2016 trip to Cuba and Argentina was a clear demonstration of this new security paradigm and also a clear indication that there is a new momentum brewing in the US towards a rethinking and reshaping of security strategies and mindsets. This article will explore the multidimensional security relationship between the US and Latin American countries in light of recent changes in the US’ posture toward the region.
Journal: Defense & Security Analysis
Pages: 223-241
Issue: 3
Volume: 33
Year: 2017
Month: 7
X-DOI: 10.1080/14751798.2017.1351138
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351138
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:223-241
Template-Type: ReDIF-Article 1.0
Author-Name: Simon Haddad
Author-X-Name-First: Simon
Author-X-Name-Last: Haddad
Title: Accounting for Lebanese Muslims’ perspectives on the Islamic state (ISIS): religious militancy, sectarianism and personal attributions
Abstract:
This article seeks to determine the correlates of Lebanese Muslims perceptions of the Islamic State (ISIS) which are measured using the hypotheses that commitment to political Islam, young age, education and occupational status would predict approval of ISIS. In view of the accentuated polarisation between Sunnis and Shiis along sectarian lines, it is proposed that dislike for the Shiis would enhance the level of support for ISIS. The study was based on a cross-sectional survey Lebanese Muslims (N = 302) administered during the fall of 2015.The suggestion is that adherence to the tenets of political Islam, sectarianism and educational attainment are major predictors of endorsement for ISIS.
Journal: Defense & Security Analysis
Pages: 242-262
Issue: 3
Volume: 33
Year: 2017
Month: 7
X-DOI: 10.1080/14751798.2017.1349997
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1349997
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:242-262
Template-Type: ReDIF-Article 1.0
Author-Name: Hans-Georg Ehrhart
Author-X-Name-First: Hans-Georg
Author-X-Name-Last: Ehrhart
Title: Postmodern warfare and the blurred boundaries between war and peace
Abstract:
Each age has its own wars and its own forms of warfare. In today’s evolving world risk society warfare has entered a new development stage. The states of the “global North” adapt their forms of intervention. They increasingly practice postmodern warfare characterized especially by the role of influencing the information space, networked approaches, the incorporation of indirect and covert actions, and the special quality of new technologies. This practice furthers an increasing grey zone between limiting and de-bounding of warfare. The phenomenon of postmodern warfare raises some tough questions and offers a rich research agenda.
Journal: Defense & Security Analysis
Pages: 263-275
Issue: 3
Volume: 33
Year: 2017
Month: 7
X-DOI: 10.1080/14751798.2017.1351156
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351156
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:263-275
Template-Type: ReDIF-Article 1.0
Author-Name: Ian Westerman
Author-X-Name-First: Ian
Author-X-Name-Last: Westerman
Title: Too much Western bias? The need for a more culturally adaptable approach to post-conflict security sector reform
Abstract:
The existing guidelines for security sector reform (SSR) tend to draw on theoretical work in the field of civil–military relations, which in turn has been derived from Western, liberal democratic models of governance. Although guidelines strongly advise that local culture and context need to be considered when drawing up objectives for post-conflict SSR programmes, this is not often reflected in practice. This article considers some of the reasons for this, citing both in-country challenges and donor-related issues, and suggests that one of the biggest problems is a lack of alternative, non-orthodox models of civil–military relations to draw upon. It is further suggested that elements of suitable alternative models may be found in states which possess political structures not entirely dissimilar to the Western, liberal democratic ideal, but which can offer different perspectives. Detailed research of these structures should produce a pool of sub-models which could then be employed to create bespoke, culturally appropriate objectives for use in post-conflict SSR programmes.
Journal: Defense & Security Analysis
Pages: 276-288
Issue: 3
Volume: 33
Year: 2017
Month: 7
X-DOI: 10.1080/14751798.2017.1351602
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1351602
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:3:p:276-288
Template-Type: ReDIF-Article 1.0
Author-Name: Martin Edmonds
Author-X-Name-First: Martin
Author-X-Name-Last: Edmonds
Author-Name: Julian Palmore
Author-X-Name-First: Julian
Author-X-Name-Last: Palmore
Title: Editorial
Journal: Defense & Security Analysis
Pages: 77-78
Issue: 2
Volume: 33
Year: 2017
Month: 4
X-DOI: 10.1080/14751798.2017.1313533
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1313533
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:77-78
Template-Type: ReDIF-Article 1.0
Author-Name: Jon Strandquist
Author-X-Name-First: Jon
Author-X-Name-Last: Strandquist
Title: US paramilitary programs in comparative perspective: CIA, the US Army Special Forces, and the question of organizational form
Abstract:
Assumed in the long-standing debate over which agency, CIA or the Department of Defense, should conduct US paramilitary operations is the idea that these organizations’ paramilitary programs are fundamentally the same kinds of things. This article questions that assumption by investigating the organizational forms underlying these agencies’ paramilitary programs in four empirical cases drawn from South Vietnam and post-9/11 Afghanistan. A typology is constructed around two identified organizational forms: “franchising” for CIA vs. “company ownership” for the US Army Special Forces. Different paramilitary organizational forms are found to have significant operational implications that should inform the paramilitary transfer debate.
Journal: Defense & Security Analysis
Pages: 79-93
Issue: 2
Volume: 33
Year: 2017
Month: 4
X-DOI: 10.1080/14751798.2017.1310701
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1310701
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:79-93
Template-Type: ReDIF-Article 1.0
Author-Name: Matthew Crosston
Author-X-Name-First: Matthew
Author-X-Name-Last: Crosston
Title: The Millenials’ war: dilemmas of network dependency in today’s military
Abstract:
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.
Journal: Defense & Security Analysis
Pages: 94-105
Issue: 2
Volume: 33
Year: 2017
Month: 4
X-DOI: 10.1080/14751798.2017.1310699
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1310699
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:94-105
Template-Type: ReDIF-Article 1.0
Author-Name: James J. Wirtz
Author-X-Name-First: James J.
Author-X-Name-Last: Wirtz
Title: Life in the “Gray Zone”: observations for contemporary strategists
Abstract:
The term “Gray Zone” is gaining in popularity as a way of describing contemporary security challenges. This article describes the “short-of-war” strategies – the fait accompli, proxy warfare, and the exploitation of ambiguous deterrence situations, i.e. “salami tactics” – that are captured by the term and offers several explanations for why state and non-state actors are drawn to these strategies. The analysis highlights why defense postures based on deterrence are especially vulnerable to the short-of-war strategies that populate the “Gray Zone.” The article concludes by suggesting how defense officials might adapt defense policies to life in the “Gray Zone.”
Journal: Defense & Security Analysis
Pages: 106-114
Issue: 2
Volume: 33
Year: 2017
Month: 4
X-DOI: 10.1080/14751798.2017.1310702
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1310702
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:106-114
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen J. Cimbala
Author-X-Name-First: Stephen J.
Author-X-Name-Last: Cimbala
Author-Name: Peter Kent Forster
Author-X-Name-First: Peter
Author-X-Name-Last: Kent Forster
Title: The US NATO and military burden sharing: post-Cold War accomplishments and future prospects
Abstract:
NATO burden sharing has become an especially timely issue in the past several years as a result of a number of factors, including Russian annexation of Crimea and destabilization of eastern Ukraine in 2014. This article argues that alliance unity among the great democracies of Europe and North America is indispensable to peace and stability on the Eurasian continent. A fractured NATO, and especially, a large divide in purposes or commitments as between the United States and its European security partners, invites aggression and the possibility of inadvertent escalation. Past successes and failures in US-involved multinational peace and stability operations, within and outside of Europe, show that mission accomplishment requires give and take, including the occasional acceptance of unequal costs and benefits among the members, in order to achieve peace and security objectives.
Journal: Defense & Security Analysis
Pages: 115-130
Issue: 2
Volume: 33
Year: 2017
Month: 4
X-DOI: 10.1080/14751798.2017.1302575
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1302575
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:115-130
Template-Type: ReDIF-Article 1.0
Author-Name: Jordan Becker
Author-X-Name-First: Jordan
Author-X-Name-Last: Becker
Title: The correlates of transatlantic burden sharing: revising the agenda for theoretical and policy analysis
Abstract:
While recent work has attempted to update the research agenda for transatiantic defense burden-sharing, there remain significant gaps between the public choice defense economics literature and the security studies literature. The presence of such a gap is unfortunate, because defense spending choices are likely shaped by factors identified by the public choice literature, as well as the strategic and cultural variables that the security studies literature tends to focus on, as well as domestic macroeconomic factors. The independent variables identified in recent qualitative literature are extremely useful analytically, and, fortunately, they have reasonable proxies in available quantitative data, which enables scholars to study them across large groups of countries and many years. This article builds upon such work to synthesize the most notable of the factors identified in the current literature, and offers some common analytical ground that will benefit both scholars and practitioners..
Journal: Defense & Security Analysis
Pages: 131-157
Issue: 2
Volume: 33
Year: 2017
Month: 4
X-DOI: 10.1080/14751798.2017.1311039
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1311039
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:131-157
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Kluth
Author-X-Name-First: Michael
Author-X-Name-Last: Kluth
Title: European defence industry consolidation and domestic procurement bias
Abstract:
How have European cross-border defence industrial mergers and acquisitions affected domestic procurement bias among the major EU powers? This article departs from the findings of Andrew Moravcsik more than two decades ago suggesting that major West European states had no ingrained preferences for defence industrial autarchy. When cross-national armament projects were derailed, this could be attributed to political efforts of national defence industrial champions favouring purely domestic projects. As former national champions join pan-European defence groups, their preferences are likely modified. Does this shift procurement towards non-European “off-the-shelf” solutions which, according to Moravcsik, are favoured by defence departments? Or does it give impetus to a stronger preference for European as opposed to domestic systems? In this article, procurement patterns in the aftermath of cross-border defence industry consolidation will be analysed. Procurement bias is assessed in two industry segments characterised by pervasive consolidation.
Journal: Defense & Security Analysis
Pages: 158-173
Issue: 2
Volume: 33
Year: 2017
Month: 4
X-DOI: 10.1080/14751798.2017.1302576
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1302576
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:158-173
Template-Type: ReDIF-Article 1.0
Author-Name: Ling Li
Author-X-Name-First: Ling
Author-X-Name-Last: Li
Author-Name: Ron Matthews
Author-X-Name-First: Ron
Author-X-Name-Last: Matthews
Title: “Made in China”: an emerging brand in the global arms market
Abstract:
Possession of a brand is a sine qua non for economic success, not least because it connotes trust in delivering the value promised. Although Western arms exporters offer branded systems whose sales are influenced by price, there is a plethora of other economic variables, such as offset requirements and life-cycle support. Entrants to the international arms market will struggle without such arms “packages.” China’s entry, however, goes beyond the traditional economic paradigm. A four-stage historical model offers the backdrop for identifying the drivers that have forged its market entry into 55 countries worldwide. The strategy initially focused on sales of rudimentary military equipment for political purposes, but recently it has begun to commercialize exports, repositioning them from a low- to a high-tech sales trajectory. A Sino “brand” is thus emerging, reflecting both competitiveness and diplomatic considerations, especially non-interference in client state domestic affairs.
Journal: Defense & Security Analysis
Pages: 174-189
Issue: 2
Volume: 33
Year: 2017
Month: 4
X-DOI: 10.1080/14751798.2017.1310700
File-URL: http://hdl.handle.net/10.1080/14751798.2017.1310700
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:33:y:2017:i:2:p:174-189
Template-Type: ReDIF-Article 1.0
Author-Name: Joakim Berndtsson
Author-X-Name-First: Joakim
Author-X-Name-Last: Berndtsson
Title: The market and the military profession: competition and change in the case of Sweden
Abstract:
The rise of private military and security companies (PMSCs) challenges our notion of military professionals. PMSCs bring new claims to professional status and legitimacy outside military institutions and represent an increasing diffusion of - and competition over - military and security expertise. In light of this development, understanding the formation of professional identities in military and private security organisations is as an important undertaking. This paper contributes to this endeavour by analysing professional self-images in the Swedish Armed Forces and how these relate to PMSCs. The study is based on data collected from official documents, semi-structured interviews and a small-scale survey among senior military officers. Focusing on military understandings of PMSCs and contractors, the analysis provides much-needed insight into relational aspects of professional identity formation outside the US context. Furthermore, it points to discrepancies in organisational and group levels in understandings of commercial security actors, and paves the way for future research.
Journal: Defense & Security Analysis
Pages: 190-210
Issue: 2
Volume: 35
Year: 2019
Month: 4
X-DOI: 10.1080/14751798.2019.1600798
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600798
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:190-210
Template-Type: ReDIF-Article 1.0
Author-Name: Sebastian Bruns
Author-X-Name-First: Sebastian
Author-X-Name-Last: Bruns
Title: From show of force to naval presence, and back again: the U.S. Navy in the Baltic, 1982–2017
Abstract:
This article discusses roles and missions of the United States Navy with a particular focus on the Baltic Sea. That particular sea has gained renewed political and military attention following Russia's resurgent and increasingly hybrid-offensive foreign policy. Baltic nations, uncertain of what the future holds, ought to look at sea power and maritime missions in the Baltic, as well as US naval presence in Europe, to draw lessons for future posture.
Journal: Defense & Security Analysis
Pages: 117-132
Issue: 2
Volume: 35
Year: 2019
Month: 4
X-DOI: 10.1080/14751798.2019.1600799
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600799
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:117-132
Template-Type: ReDIF-Article 1.0
Author-Name: James Johnson
Author-X-Name-First: James
Author-X-Name-Last: Johnson
Title: Artificial intelligence & future warfare: implications for international security
Abstract:
Recent developments in artificial intelligence (AI) suggest that this emerging technology will have a deterministic and potentially transformative influence on military power, strategic competition, and world politics more broadly. After the initial surge of broad speculation in the literature related to AI this article provides some much needed specificity to the debate. It argues that left unchecked the uncertainties and vulnerabilities created by the rapid proliferation and diffusion of AI could become a major potential source of instability and great power strategic rivalry. The article identifies several AI-related innovations and technological developments that will likely have genuine consequences for military applications from a tactical battlefield perspective to the strategic level.
Journal: Defense & Security Analysis
Pages: 147-169
Issue: 2
Volume: 35
Year: 2019
Month: 4
X-DOI: 10.1080/14751798.2019.1600800
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600800
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:147-169
Template-Type: ReDIF-Article 1.0
Author-Name: Colin D. Robinson
Author-X-Name-First: Colin D.
Author-X-Name-Last: Robinson
Title: The Somali National Army: an assessment
Abstract:
To engage properly with the Somali National Army, to understand it in the hope of improving stability and the lives of over 12 million Somalis, good basic information on its composition and characteristics is necessary. Authoritative accounts on the subject have been scarce for over 25 years. This account seeks to detail the army’s dispositions across southern Somalia, and, more importantly, the brigades’ clan compositions and linkages. Clan ties supersede loyalties to the central government. The army as it stands is a collection of former militias which suffer from ill-discipline and commit crime along with greater atrocities. Estimates of numbers are unreliable, but there might be 13,000 or more fighters in six brigades in the Mogadishu area and five beyond.
Journal: Defense & Security Analysis
Pages: 211-221
Issue: 2
Volume: 35
Year: 2019
Month: 4
X-DOI: 10.1080/14751798.2019.1600805
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600805
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:211-221
Template-Type: ReDIF-Article 1.0
Author-Name: Jan Angstrom
Author-X-Name-First: Jan
Author-X-Name-Last: Angstrom
Author-Name: Peter Haldén
Author-X-Name-First: Peter
Author-X-Name-Last: Haldén
Title: The poverty of power in military power: how collective power could benefit strategic studies
Abstract:
Strategic studies deals intimately with the topic of power. Most scholars in the discipline work with a concept of power as an adversarial zero-sum competition. This is natural and necessary. However, other conceptions of power developed within political science and sociology could enrich strategic studies. Approaching two typical, traditional tasks of strategy – alliance building and war-fighting – this article demonstrates the heuristic mileage of theories of collective power. In particular, we can shed new light on the post-Cold War transformation of NATO as well as state-building as a strategy in counter-insurgencies with new ideas of power. Broadening the palette of theories of power is thus valuable if strategic studies is to prosper as an independent field of study.
Journal: Defense & Security Analysis
Pages: 170-189
Issue: 2
Volume: 35
Year: 2019
Month: 4
X-DOI: 10.1080/14751798.2019.1600812
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600812
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:170-189
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Evans
Author-X-Name-First: Michael
Author-X-Name-Last: Evans
Title: A usable past: a contemporary approach to history for the Western profession of arms
Abstract:
The most effective way for the Western profession of arms to use history is to disavow the purism and narrow specialisation of today’s academia in favour of developing a contemporary approach to the subject. The latter aims to foster a range of applied diagnostic skills that transcend the temporal dimensions of past, present, and future. A contemporary approach to history for military professionals emphasises the use of inter-disciplinary war studies to enhance policy relevance. In any defense and security organisation, history must be usable in the sense of providing cognitive and interpretative skills for probing relationships between possibility and actuality, between experience and expectation, and between singularity and repetition. Using history to examine such dialectical interconnections is particularly valuable when military establishments confront their essential task of analyzing emerging trends in the future of war.
Journal: Defense & Security Analysis
Pages: 133-146
Issue: 2
Volume: 35
Year: 2019
Month: 4
X-DOI: 10.1080/14751798.2019.1600813
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1600813
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:2:p:133-146
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Tkacik
Author-X-Name-First: Michael
Author-X-Name-Last: Tkacik
Title: Understanding China’s goals and strategy in the South China Sea: bringing context to a revisionist systemic challenge – intentions and impact
Abstract:
The slow moving conflict in the South China Sea has been characterized by some as “not worth the candle.” China claims the entirety of the South China Sea pursuant to a nine-dash line, the legal impact of which has been limited by international courts. At the same time, China has changed the reality of control over the South China Sea by building a number of fortified islands in the Spratly Islands and elsewhere. The US has either refused to stand up to China's behavior (Obama) or responded unevenly (Trump). This paper examines the impact of China's behaviour on local parties, US interests, and the liberal international system.
Journal: Defense & Security Analysis
Pages: 321-344
Issue: 4
Volume: 34
Year: 2018
Month: 10
X-DOI: 10.1080/14751798.2018.1529092
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529092
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:321-344
Template-Type: ReDIF-Article 1.0
Author-Name: Thomas C. Bruneau
Author-X-Name-First: Thomas C.
Author-X-Name-Last: Bruneau
Title: A conceptual framework for the analysis of civil-military relations and intelligence
Abstract:
The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements.
Journal: Defense & Security Analysis
Pages: 345-364
Issue: 4
Volume: 34
Year: 2018
Month: 10
X-DOI: 10.1080/14751798.2018.1529085
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529085
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:345-364
Template-Type: ReDIF-Article 1.0
Author-Name: Marian Zulean
Author-X-Name-First: Marian
Author-X-Name-Last: Zulean
Author-Name: Emilia Şercan
Author-X-Name-First: Emilia
Author-X-Name-Last: Şercan
Title: Democratic control of Romanian intelligence after three decades: quis custodiet ipsos custodes?
Abstract:
Romania faced one of the most dramatic transitions from authoritarian communism to become a democracy and a member of the North-Atlantic Treaty Organization (NATO) and the European Union (EU). The backbone of building a democratic society has been civilian control of the military. This article briefly describes the norms and institutions of democratic control of the intelligence services in Romania and assesses how the mechanisms of democratic control have worked in practice after almost three decades of reform. We argue that many of the post-1989 reforms have been only superficial implemented and monitored, particularly after Romania joined NATO and the EU. The article concludes that the democratic control of intelligence in Romania is an unfinished business. There are structural shortcomings embedded in the process of democracy consolidation that need to be addressed.
Journal: Defense & Security Analysis
Pages: 365-384
Issue: 4
Volume: 34
Year: 2018
Month: 10
X-DOI: 10.1080/14751798.2018.1529103
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529103
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:365-384
Template-Type: ReDIF-Article 1.0
Author-Name: Leandro Bolzan de Rezende
Author-X-Name-First: Leandro Bolzan
Author-X-Name-Last: de Rezende
Author-Name: Paul Blackwell
Author-X-Name-First: Paul
Author-X-Name-Last: Blackwell
Author-Name: Marcos Degaut
Author-X-Name-First: Marcos
Author-X-Name-Last: Degaut
Title: Brazilian National Defence Policy: foreign policy, national security, economic growth, and technological innovation
Abstract:
With the world’s ninth largest economy and comprising nearly 60% of South America’s GDP, 47% of its territory, and 49% of its population, Brazil has become a regional power and an important actor in world affairs over recent decades. This scenario has led the government to re-evaluate its role in the world order, resulting in the enactment of the National Defence Policy, whose objective was to consolidate the country as a regional power while at the same time addressing national security issues, promoting economic development through a series of defence programmes, restructuring the defence industrial base, fostering innovation through technology and knowledge transfer to Brazil, and indigenous research and development. However, the policy’s implementation suffers from several challenges discussed in this article, which may test the capability and competence of Brazilian policymakers, military, industrialists, and other individuals and organisations involved in its implementation.
Journal: Defense & Security Analysis
Pages: 385-409
Issue: 4
Volume: 34
Year: 2018
Month: 10
X-DOI: 10.1080/14751798.2018.1529084
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529084
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:385-409
Template-Type: ReDIF-Article 1.0
Author-Name: Andrew Ross
Author-X-Name-First: Andrew
Author-X-Name-Last: Ross
Author-Name: Bob Hall
Author-X-Name-First: Bob
Author-X-Name-Last: Hall
Title: Shots per casualty: an indicator of combat efficiency for the first Australian task force in South Vietnam
Abstract:
In combat, the ratio of shots fired per casualty inflicted can provide a measure of the combat effectiveness of a force. The shots per casualty ratio achieved by the 1st Australian Task Force in Vietnam is shown to change according to factors including marksmanship, tactics and combat type. While, over the course of the campaign, 1ATF fired an increasing number of shots to achieve a casualty, this is explained by improvements in the quality of Viet Cong and People’s Army small arms. Australian Task Force and US Army shots per casualty ratios are briefly compared..
Journal: Defense & Security Analysis
Pages: 410-423
Issue: 4
Volume: 34
Year: 2018
Month: 10
X-DOI: 10.1080/14751798.2018.1529080
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529080
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:410-423
Template-Type: ReDIF-Article 1.0
Author-Name: David Lonsdale
Author-X-Name-First: David
Author-X-Name-Last: Lonsdale
Title: Theory of strategy
Journal: Defense & Security Analysis
Pages: 424-426
Issue: 4
Volume: 34
Year: 2018
Month: 10
X-DOI: 10.1080/14751798.2018.1529069
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529069
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:424-426
Template-Type: ReDIF-Article 1.0
Author-Name: Kevin Rowlands
Author-X-Name-First: Kevin
Author-X-Name-Last: Rowlands
Title: Naval Advising and Assisting: History Challenges and Analysis
Journal: Defense & Security Analysis
Pages: 426-427
Issue: 4
Volume: 34
Year: 2018
Month: 10
X-DOI: 10.1080/14751798.2018.1529073
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529073
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:426-427
Template-Type: ReDIF-Article 1.0
Author-Name: Bence Németh
Author-X-Name-First: Bence
Author-X-Name-Last: Németh
Title: Allies that count: junior partners in coalition warfare
Journal: Defense & Security Analysis
Pages: 427-429
Issue: 4
Volume: 34
Year: 2018
Month: 10
X-DOI: 10.1080/14751798.2018.1529075
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529075
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:427-429
Template-Type: ReDIF-Article 1.0
Author-Name: Donald Stoker
Author-X-Name-First: Donald
Author-X-Name-Last: Stoker
Title: Mavericks of war: the unconventional, unorthodox innovators and thinkers, scholars, and outsiders who mastered the art of war
Journal: Defense & Security Analysis
Pages: 429-430
Issue: 4
Volume: 34
Year: 2018
Month: 10
X-DOI: 10.1080/14751798.2018.1529078
File-URL: http://hdl.handle.net/10.1080/14751798.2018.1529078
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:34:y:2018:i:4:p:429-430
Template-Type: ReDIF-Article 1.0
Author-Name: William T. Johnsen
Author-X-Name-First: William T.
Author-X-Name-Last: Johnsen
Title: Land power in the age of joint interdependence: toward a theory of land power for the twenty-first century
Abstract:
This essay outlines a theory of land power. After explaining the absence of such a theory, the article establishes the modern context for such a theory, specifically within the concept of joint interdependence. The analysis defines key terms and premises behind the theory, to include a definition of land power. The argument then outlines the national elements of power that contribute to a theory of land power. The analysis next applies the theory to the fundamental purposes of military power: defeat, deter, compel, assure, shape and support to the nation. The analysis then tests key definitions, supporting premises, and utility of the theory. The essay argues that historical experience validates the applicability and utility of the theory, and offers a solid basis for extrapolating the validity of the theory into the near future.
Journal: Defense & Security Analysis
Pages: 223-240
Issue: 3
Volume: 35
Year: 2019
Month: 7
X-DOI: 10.1080/14751798.2019.1640417
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640417
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:223-240
Template-Type: ReDIF-Article 1.0
Author-Name: Lawrence E. Cline
Author-X-Name-First: Lawrence E.
Author-X-Name-Last: Cline
Title: Sharing the load: factors in supporting local armed groups in insurgencies
Abstract:
Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities.
Journal: Defense & Security Analysis
Pages: 241-260
Issue: 3
Volume: 35
Year: 2019
Month: 7
X-DOI: 10.1080/14751798.2019.1640418
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640418
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:241-260
Template-Type: ReDIF-Article 1.0
Author-Name: Amadeo Watkins
Author-X-Name-First: Amadeo
Author-X-Name-Last: Watkins
Title: Fighter aircraft acquisition in Croatia: failure of policy delivery
Abstract:
The possibility for Croatia to obtain new fighter aircraft is not new, as this option has been publicly debated for at least a decade. A sudden decision to advance the acquisition of a limited number of fighter aircraft was made in 2017 with an international tendering process concluding in early 2018. Through open source material, this paper will look at this procurement process by examining the relationship between policy and strategic thinking on the one side, and policy delivery on the other, and evaluate why the tendering process failed in achieving envisaged results. The paper concludes that the problems facing the Croatian aircraft acquisition process stem from at least two interrelated factors: firstly, at the operational level, the failure of the procurement was the direct result of mismanaged tendering procedures linked to the wider public administration reform process; and secondly, at the strategic level, inherently complex civil-military relations and related cultural aspects which have not been adequately addressed over the past decades. The result was a failure to deliver on government policy, something which this paper argues will need to be addressed over the medium to long term.
Journal: Defense & Security Analysis
Pages: 261-282
Issue: 3
Volume: 35
Year: 2019
Month: 7
X-DOI: 10.1080/14751798.2019.1640419
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640419
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:261-282
Template-Type: ReDIF-Article 1.0
Author-Name: Zsolt Lazar
Author-X-Name-First: Zsolt
Author-X-Name-Last: Lazar
Title: Success and failures of the Gripen offsets in the Visegrad Group countries
Abstract:
The Soviet-led Council for Mutual Economic Assistance member, Central European countries found themselves in a difficult political and economic situation after the collapse of the Soviet Union. Three post-Eastern Bloc countries formed the Visegrad Group to strengthen their ties to the West, but the need for foreign investment, job creation and technology transfer was urgent.This is when military modernisation also came into the picture and the counter-trade—as known as offset—as a tool to help these economies. A trade practice which was meant to energise these economies via defence acquisitions linked economic programmes.Two Visegrad Group member countries, Hungary and the Czech Republic decided to sign offset agreement with the defence firm SAAB to license Gripen fighter aircrafts. This study intends to analyse if these deals were able to help governments to reach their objectives or the two countries were unable to take advantage of the offset programmes.
Journal: Defense & Security Analysis
Pages: 283-307
Issue: 3
Volume: 35
Year: 2019
Month: 7
X-DOI: 10.1080/14751798.2019.1640423
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640423
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:283-307
Template-Type: ReDIF-Article 1.0
Author-Name: Sandor Fabian
Author-X-Name-First: Sandor
Author-X-Name-Last: Fabian
Title: The Russian hybrid warfare strategy – neither Russian nor strategy
Abstract:
Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts.
Journal: Defense & Security Analysis
Pages: 308-325
Issue: 3
Volume: 35
Year: 2019
Month: 7
X-DOI: 10.1080/14751798.2019.1640424
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640424
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:308-325
Template-Type: ReDIF-Article 1.0
Author-Name: Jomana Amara
Author-X-Name-First: Jomana
Author-X-Name-Last: Amara
Title: Revisiting the justification for an all-volunteer force
Abstract:
In 1968, President Nixon established the Commission on an All-Volunteer Armed Force, or the Gates Commission, which served as the impetus and justification for an All-Volunteer Force (AVF). At the end of its deliberations, the commission recommended abolishing the draft and transforming the U.S. military into a force of volunteers beginning in 1973. Interestingly, the debate regarding the merits of both systems appeared to be largely economic – with cost–benefit analysis playing the primary role. Lately, we are beginning to see a new, politically-motivated impetus for returning to a “system of national service.” The ideas spurring this debate are many: the need to reaffirm the nation state, the commitment of citizens to the state, political ownership and oversight of the forces, the need for social equity in serving the nation, limiting the support for armed conflict by burden-sharing among citizens, and equitably spreading the personal cost of war.
Journal: Defense & Security Analysis
Pages: 326-342
Issue: 3
Volume: 35
Year: 2019
Month: 7
X-DOI: 10.1080/14751798.2019.1640425
File-URL: http://hdl.handle.net/10.1080/14751798.2019.1640425
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:35:y:2019:i:3:p:326-342
Template-Type: ReDIF-Article 1.0
Author-Name: Branden Little
Author-X-Name-First: Branden
Author-X-Name-Last: Little
Title: Tarnishing victory? Contested histories & civil–military discord in the U.S. Navy, 1919–24
Abstract:
As the First World War came to an end, the U.S. Navy's leadership engaged in a bitter fight over the “lessons” of the war. Admiral William S. Sims and Secretary of the Navy Josephus Daniels fought against each other's irreconcilable positions. Sims argued that the Navy Department's inexpert civilian secretary had hamstrung mobilisation, impeded the anti-submarine campaign, and ostracised capable officers in favour of friends upon whom he bestowed medals. Daniels countered that his administration had masterfully responded to the crisis of war. The Navy's record, Daniels insisted, could best be summarised as “a great job greatly done.” Only disloyal nit-pickers could find fault in its accomplishments. The Sims-Daniels controversy raged in congressional hearings, the press, and in partisan histories written by the protagonists. The heart of the dispute and its uncertain resolution rested in radically different understandings of American civil–military relations, naval heroism, and the determinants of victory.
Journal: Defense & Security Analysis
Pages: 1-29
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712021
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712021
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:1-29
Template-Type: ReDIF-Article 1.0
Author-Name: Steve Wills
Author-X-Name-First: Steve
Author-X-Name-Last: Wills
Title: “These aren’t the SLOC’s you’re looking for”: mirror-imaging battles of the Atlantic won’t solve current Atlantic security needs
Abstract:
Discussion surrounding the announcement of a new NATO Maritime Command for the North Atlantic seems to have settled on the assumption that there is again a vital “sea-line of communication” (SLOC) between North America and Europe as there was supposed to be during the Cold War. The Soviet Union had a large fleet of nuclear and conventional submarines and it seemed very clear that Soviet admirals intended to fight a third “Battle of the Atlantic” in the event of war to prevent Western resupply of NATO. However, this scenario bore no resemblance to what the Soviet Navy actually intended to do in case of war. Changes in technology, notably in submarine propulsion, antisubmarine warfare (ASW), and ballistic missile range and accuracy were the real drivers of the Cold War in the Atlantic. Cruise missile-armed submarines that can attack shore-based economic infrastructure are the real threat from the Russian submarine force.
Journal: Defense & Security Analysis
Pages: 30-41
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712029
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712029
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:30-41
Template-Type: ReDIF-Article 1.0
Author-Name: Montgomery McFate
Author-X-Name-First: Montgomery
Author-X-Name-Last: McFate
Title: Being there: US Navy organisational culture and the forward presence debate
Abstract:
This article argues that the US Navy’s roles (which have historically been bifurcated between warfighting and political use of force) manifest in its organisational culture as two different concepts of war: the US Navy as diplomatic actor and the US Navy as warfighting force. The conflict between these different concepts of war can be seen in the current debate about the definition and function of presence. The debate about presence is not just theoretical, but represents a deep and enduring conflict within the Navy as an organisation about its concept of war. Since the end of WWII, the Navy has been designing its fleet architecture according to a Mahanian concept of war, despite the preponderance of non-lethal missions and activities. The result is a mismatch between platforms and tasks.
Journal: Defense & Security Analysis
Pages: 42-64
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712024
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712024
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:42-64
Template-Type: ReDIF-Article 1.0
Author-Name: Steven Paget
Author-X-Name-First: Steven
Author-X-Name-Last: Paget
Title: Mind over matter? Multinational naval interoperability during Operation Iraqi Freedom
Abstract:
The increasing frequency of multinational operations has heightened the importance of interoperability. While human and cultural factors are only two pieces of the interoperability jigsaw they are of enduring significance. The cohesiveness of the relationship amongst the Royal Australian Navy, the Royal Navy and the United States Navy during the 2003 Iraq War was underpinned by high levels of perceptive interoperability, which manifested itself in effective working relationships. That conflict demonstrated that while historical ties provided a foundation for cooperation, a number of multinational initiatives were undertaken to further enhance interoperability. This article addresses how such a high level of perceptive interoperability was achieved by examining the conduct of multinational exercises, the importance of personnel exchanges and the role of liaison officers, before considering the effect it had on the conduct of operations. The Iraq War demonstrated that cultural factors are at least as important as other facets of interoperability.
Journal: Defense & Security Analysis
Pages: 65-87
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712025
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712025
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:65-87
Template-Type: ReDIF-Article 1.0
Author-Name: James J. Wirtz
Author-X-Name-First: James J.
Author-X-Name-Last: Wirtz
Title: Innovation for seapower: U.S. Navy strategy in an age of acceleration
Abstract:
A call for innovation as a means to outpace the acceleration of technological change and to bolster capabilities quickly is a central theme of contemporary U.S. Naval Strategy. The need for innovation is accepted, but the integration of readily available technologies into the Fleet is slow. Innovation unfolds according to “Navy-Time,” a cycle lasting between a long-decade and thirty-years. To accelerate the innovation process in the U.S. Navy, the article offers a Concept of Operations for Innovation that outlines how a deliberate process of analysis, weaponisation and integration can move new ideas and weapons into the Fleet in a strategically relevant time-frame.
Journal: Defense & Security Analysis
Pages: 88-100
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712026
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712026
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:88-100
Template-Type: ReDIF-Article 1.0
Author-Name: Peter Haynes
Author-X-Name-First: Peter
Author-X-Name-Last: Haynes
Title: What U.S. Navy strategists and defense planners should think about in the era of maritime great power competition
Abstract:
For the first time in a generation, the US Navy finds itself in an era of great power competition. As US naval strategists and defense planners begin to organise materially and conceptually to confront the strategic and operational-level challenges posed by China and Russia, what should they keep in mind? What should frame their thinking? Absorbed with the day-to-day tasks associated with managing how the fleet is being built, operated, and rationalised, these busy officers and civilians seldom can step back and gain some perspective on fundamental aspects of the security environment and relate those to naval purpose. To that end, this article provides a primer on what to keep in mind and how to think in an era of maritime great power competition.
Journal: Defense & Security Analysis
Pages: 101-108
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712027
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712027
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:101-108
Template-Type: ReDIF-Article 1.0
Author-Name: Colin D. Robinson
Author-X-Name-First: Colin D.
Author-X-Name-Last: Robinson
Title: The U.S. Navy's task forces: 1–199
Abstract:
Grouping warships for combat has evolved greatly over the centuries. In the early 1940s, the United States Navy began to group its warships for combat in much more flexible task forces than the previous single-type-of-warship formations. This system has evolved and spread to naval forces ashore but remains fundamentally unchanged. It now covers numbers between 1 to over 1000, of which the most prominent is the first 100 or so which U.S. Navy combat forces use. The numbered fleets worldwide utilize the series covering 20-79; 1-19 and 90-99 appear to be reserved for special allocations and Commander, Pacific Fleet; numbers over 80 to the Atlantic; 100-119 for Northern Europe and briefly Tenth Fleet; the 120 series for Second Fleet as a Joint Task Force leader; the 150 series for Naval Forces Central Command; and the 180 series for Atlantic Fleet and now-Fleet Forces Command.
Journal: Defense & Security Analysis
Pages: 109-122
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712028
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712028
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:109-122
Template-Type: ReDIF-Article 1.0
Author-Name: James Russell
Author-X-Name-First: James
Author-X-Name-Last: Russell
Title: Asia’s naval expansion: an arms race in the making?
Journal: Defense & Security Analysis
Pages: 123-124
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712030
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712030
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:123-124
Template-Type: ReDIF-Article 1.0
Author-Name: Branden Little
Author-X-Name-First: Branden
Author-X-Name-Last: Little
Title: Progressives in Navy Blue: maritime strategy, American empire, and the transformation of U.S. naval identity, 1873-1898
Journal: Defense & Security Analysis
Pages: 124-125
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712031
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712031
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:124-125
Template-Type: ReDIF-Article 1.0
Author-Name: Corbin Williamson
Author-X-Name-First: Corbin
Author-X-Name-Last: Williamson
Title: The War for the Seas: a maritime history of World War II
Journal: Defense & Security Analysis
Pages: 126-127
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712032
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712032
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:126-127
Template-Type: ReDIF-Article 1.0
Author-Name: Márton Péri
Author-X-Name-First: Márton
Author-X-Name-Last: Péri
Title: US Naval Strategy and national security: the evolution of American maritime power
Journal: Defense & Security Analysis
Pages: 127-128
Issue: 1
Volume: 36
Year: 2020
Month: 1
X-DOI: 10.1080/14751798.2020.1712036
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1712036
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:1:p:127-128
Template-Type: ReDIF-Article 1.0
Author-Name: Mitja Kleczka
Author-X-Name-First: Mitja
Author-X-Name-Last: Kleczka
Author-Name: Caroline Buts
Author-X-Name-First: Caroline
Author-X-Name-Last: Buts
Author-Name: Marc Jegers
Author-X-Name-First: Marc
Author-X-Name-Last: Jegers
Title: Addressing the “headwinds” faced by the European arms industry
Abstract:
The European arms industry is challenged by several adverse “headwinds.” Fragmentation leads to costly duplications and, in conjunction with stagnating budgets and sharply increasing costs, prevents firms from exploiting economies of scale and learning. This is exacerbated by size differentials vis-a-vis the leading US arms manufacturers and competition from emerging producers. As some “headwinds” are self-enforcing, far-reaching industrial and policy responses are required to improve the industry's outlook. As exports may not indefinitely compensate for low domestic demand, there is an economic imperative for further cross-border collaboration and consolidation. Despite various EU policy initiatives, progresses regarding the European Defence Equipment Market and strengthening the European Defence Technological Industrial Base have been relatively slow. It remains to be seen whether the European Defence Fund will be the proclaimed “game-changer,” raising competitiveness of the European arms industry. At the same time, the UK's withdrawal from the EU adds uncertainties.
Journal: Defense & Security Analysis
Pages: 129-160
Issue: 2
Volume: 36
Year: 2020
Month: 4
X-DOI: 10.1080/14751798.2020.1750178
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750178
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:129-160
Template-Type: ReDIF-Article 1.0
Author-Name: Caroline Batka
Author-X-Name-First: Caroline
Author-X-Name-Last: Batka
Author-Name: Molly Dunigan
Author-X-Name-First: Molly
Author-X-Name-Last: Dunigan
Author-Name: Rachel Burns
Author-X-Name-First: Rachel
Author-X-Name-Last: Burns
Title: Private military contractors’ financial experiences and incentives
Abstract:
This article analyses findings from an original survey of 187 private military contractors on their incentives for working in the industry. Perceptions of contractors as “greedy, ruthless, and unscrupulous mercenaries” shape both public and military opinions of outsourcing and may impact U.S. military effectiveness, civil–military relations, and contractor identity. We find that contractors are motivated by a range of factors and that their financial experiences are not clearly more positive than that of state military troops. We recommend broad education of military and defense officials and the public in the U.S. and other relevant nations, regarding the true incentives of modern-day, Western contractors, in an effort to dispel misperceptions, increase effective utilisation of contractors, and beneficially shape PMC-military coordination. DoD may consider integrating such training into its current efforts to improve outsourcing, including its Joint OCS Planning and Execution Course, pre-deployment fora, and curricula of advanced military studies schools.
Journal: Defense & Security Analysis
Pages: 161-179
Issue: 2
Volume: 36
Year: 2020
Month: 4
X-DOI: 10.1080/14751798.2020.1750180
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750180
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:161-179
Template-Type: ReDIF-Article 1.0
Author-Name: Charles W. Mahoney
Author-X-Name-First: Charles W.
Author-X-Name-Last: Mahoney
Title: United States defence contractors and the future of military operations
Abstract:
The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.
Journal: Defense & Security Analysis
Pages: 180-200
Issue: 2
Volume: 36
Year: 2020
Month: 4
X-DOI: 10.1080/14751798.2020.1750182
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750182
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:180-200
Template-Type: ReDIF-Article 1.0
Author-Name: Robert Czulda
Author-X-Name-First: Robert
Author-X-Name-Last: Czulda
Title: Defence industry in Iran – between needs and real capabilities
Abstract:
The paper’s goal is to analyses the potential of the Iranian defence industry, including both research-and-development and production capabilities. It is argued that, despite official statements about the great power and sophistication of the Iranian defence industry, in reality its capabilities are very limited and cannot meet the operational needs of the Iranian armed forces. At the same time, it is argued that many official releases, which are abundantly available in the Iranian press and often unthinkingly repeated by the Western media, do not present the real and value of military products, but are rather a tool for deception and propaganda.
Journal: Defense & Security Analysis
Pages: 201-217
Issue: 2
Volume: 36
Year: 2020
Month: 4
X-DOI: 10.1080/14751798.2020.1750184
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750184
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:201-217
Template-Type: ReDIF-Article 1.0
Author-Name: C. Peeters
Author-X-Name-First: C.
Author-X-Name-Last: Peeters
Author-Name: R. Pilon
Author-X-Name-First: R.
Author-X-Name-Last: Pilon
Title: Clustering in defence-related procurement: the case of a Belgian naval construction cluster
Abstract:
This paper examines the importance of closer co-operation in defence-related procurement. Led by the decision that Belgium will lead the procurement of 12 Mine CounterMeasures Vessels (MCMV), the case of a potential Belgian naval construction cluster is discussed. The feasibility of a potential cluster is investigated by looking at key elements of a successful naval construction cluster, the Dutch naval construction cluster, and comparing those key elements to the current Belgian situation. Forming a sustainable Belgian naval construction cluster will be difficult. Most of the procurement process of the MCMVs is set on a European tender. In the long run, due to the absence of both a launching customer and leader firms, no party is able to carry the cluster with investments and knowledge spill-overs. In order to keep public support for large defence-related investments, clustering around the MCMV integration system and proactive cluster support is recommended.
Journal: Defense & Security Analysis
Pages: 218-233
Issue: 2
Volume: 36
Year: 2020
Month: 4
X-DOI: 10.1080/14751798.2020.1750185
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750185
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:218-233
Template-Type: ReDIF-Article 1.0
Author-Name: Bohuslav Pernica
Author-X-Name-First: Bohuslav
Author-X-Name-Last: Pernica
Title: The Czech defence and security industry: taking the pulse to an ailing man
Abstract:
The paper summarises the evolution of the iron triangle of the mutual relationships amongst the ministry of defence, defence industry, and the political elite in the post-communist Czech Republic in 1990-2020. The essay stresses the oddness of this relationship. On the one hand, the government is bound by a partnership to the Defence and Security Industry Association of the Czech Republic (DSIA), a lobbying group of more than 100 organisations that conduct business in defence and security sector in Czechia. Yet, since its creation in 2000, this assemblage of industries within DSIA's market position is falling, in fact. Neither political parties in power, nor the governments have been able to support national defence industry through the small military. Just a few DSIA national members are able to compete internationally with their cutting-edge products. Others have evolved into middlemen trading intime-expired Czechoslovak equipment retired from the Czech Armed Forces.
Journal: Defense & Security Analysis
Pages: 234-244
Issue: 2
Volume: 36
Year: 2020
Month: 4
X-DOI: 10.1080/14751798.2020.1750186
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750186
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:234-244
Template-Type: ReDIF-Article 1.0
Author-Name: Zsolt Lazar
Author-X-Name-First: Zsolt
Author-X-Name-Last: Lazar
Title: Technology Offsets in International Defence Procurement
Journal: Defense & Security Analysis
Pages: 245-247
Issue: 2
Volume: 36
Year: 2020
Month: 4
X-DOI: 10.1080/14751798.2020.1750188
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1750188
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:2:p:245-247
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen Blank
Author-X-Name-First: Stephen
Author-X-Name-Last: Blank
Title: The Un-Holy Russo-Chinese alliance
Abstract:
This essay argues that a Sino-Russian alliance has come into being over many years of the two states’ evolutionary policies. Although Vladimir Putin has emphasised that this is a multi-faceted relationship, this essay focuses exclusively on its military dimension. It comprises extensive inter-ministerial and inter-governmental cooperation, arms sales, joint exercises, and shared political orientation. While it may not be a formal alliance like NATO research, e.g. by Alexander Korolev, indicates that in general experts argue that what they have achieved is even better than an alliance.
Journal: Defense & Security Analysis
Pages: 249-274
Issue: 3
Volume: 36
Year: 2020
Month: 7
X-DOI: 10.1080/14751798.2020.1790805
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790805
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:249-274
Template-Type: ReDIF-Article 1.0
Author-Name: Muhamad Haripin
Author-X-Name-First: Muhamad
Author-X-Name-Last: Haripin
Author-Name: Chaula Rininta Anindya
Author-X-Name-First: Chaula Rininta
Author-X-Name-Last: Anindya
Author-Name: Adhi Priamarizki
Author-X-Name-First: Adhi
Author-X-Name-Last: Priamarizki
Title: The politics of counter-terrorism in post-authoritarian states: Indonesia’s experience, 1998–2018
Abstract:
The separation of the Indonesian national police (POLRI) from the military (ABRI), now named the TNI, in 1999 led to transfer of domestic security role from the armed forces to POLRI. On one hand, POLRI has a greater role in internal security, particularly in countering terrorism. On the other hand, TNI continually attempts to reassert its dominance in the field of counter-terrorism. Previous studies on the subject place the issue in the context of the early days of democratisation. This paper aims to contribute by counting latest developments, notably the rise of new terrorist groups and recent counter-terrorism legislations. We argue that institutional rivalries between the POLRI and the TNI, and the military's determination to reclaim a greater role in domestic security have become an impediment to achieving successful counterterrorism efforts. This article also examines the development of military reform against the backdrop of the military's disproportionate and growing influence.
Journal: Defense & Security Analysis
Pages: 275-299
Issue: 3
Volume: 36
Year: 2020
Month: 7
X-DOI: 10.1080/14751798.2020.1790807
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790807
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:275-299
Template-Type: ReDIF-Article 1.0
Author-Name: Lukas Milevski
Author-X-Name-First: Lukas
Author-X-Name-Last: Milevski
Title: Modern liberal wars, illiberal allies, and peace as the failure of policy
Abstract:
The post-Cold War period nearly up to the present has been characterised as the age of liberal wars, yet key facets of the liberal guidance of war remain under appreciated. This article seeks to address this wider gap with regard to the particular concern of war termination and the fulfilment or failure of policy. First, it develops characterisations of liberal wars based on the existing literature, identifying three broad types through consideration of context—defensive versus offensive—and of political and strategic agency, particularly regarding the motives for and intents of action. Three types of liberal wars result: defensive liberal wars, offensive liberal wars with humanitarian motive and geopolitical intent, and offensive liberal wars with geopolitical motive and humanitarian intent. The article then presents one exemplary case for each liberal war with an emphasis on how liberal strategy required an illiberal ally and that ally's effect on the subsequent peace.
Journal: Defense & Security Analysis
Pages: 300-313
Issue: 3
Volume: 36
Year: 2020
Month: 7
X-DOI: 10.1080/14751798.2020.1790808
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790808
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:300-313
Template-Type: ReDIF-Article 1.0
Author-Name: Diego Esparza
Author-X-Name-First: Diego
Author-X-Name-Last: Esparza
Author-Name: Santiago Arca Henon
Author-X-Name-First: Santiago Arca
Author-X-Name-Last: Henon
Author-Name: Hope Dewell Gentry
Author-X-Name-First: Hope Dewell
Author-X-Name-Last: Gentry
Title: Peacekeeping and civil–military relations in Uruguay
Abstract:
There have been over 90,000 UN peacekeepers deployed around the world to 78 peacekeeping operations (PKOs) in over 125 countries since 1948. Some scholars have made the case that these missions have had a positive impact on the relationship between the military and the civilians they work for. However, other scholars have identified a negative impact on civil military relations (CMR). This paper contributes to this debate by investigating how peacekeeping has impacted civil-military relations in Latin America's most prolific contributor to peacekeeping: Uruguay. This paper finds that PKOs in Uruguay have facilitated post-transitions attempts by civilians to build first-generation control, but not second-generation control. Further, PKOs have marginally improved military effectiveness, but we find that they do not improve societal trust in the armed forces.
Journal: Defense & Security Analysis
Pages: 314-334
Issue: 3
Volume: 36
Year: 2020
Month: 7
X-DOI: 10.1080/14751798.2020.1790809
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790809
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:314-334
Template-Type: ReDIF-Article 1.0
Author-Name: Kristýna Pavlíčková
Author-X-Name-First: Kristýna
Author-X-Name-Last: Pavlíčková
Author-Name: Monika Gabriela Bartoszewicz
Author-X-Name-First: Monika Gabriela
Author-X-Name-Last: Bartoszewicz
Title: To free or not to free (ride): a comparative analysis of the NATO burden-sharing in the Czech Republic and Lithuania
Abstract:
The recent rise in the defence budgets among the NATO members reawakens the free-riding dilemma. This article provides an analysis of the defence spending of two new member states, the Czech Republic and Lithuania. Based on the free-riding theory, we explain why some of the new NATO members decide to increase their defence budgets (Lithuania), and others do not (Czech Republic). In contrast to the majority of works which focus either on the US as the biggest spender or on the “old” members of the Alliance, we explain under what circumstances some of the small European states who became new NATO members started to increase their defence budgets even though they do not have to, and the literature suggests that free-riding is easier. In the process, we identify three crucial factors that influence the decision-making process in this regard: the level of threat perception, economic situation, and the US pressure.
Journal: Defense & Security Analysis
Pages: 335-351
Issue: 3
Volume: 36
Year: 2020
Month: 7
X-DOI: 10.1080/14751798.2020.1790810
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790810
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:335-351
Template-Type: ReDIF-Article 1.0
Author-Name: Doreen Horschig
Author-X-Name-First: Doreen
Author-X-Name-Last: Horschig
Title: Cyber-weapons in nuclear counter-proliferation
Abstract:
Under what conditions are cyber-weapons effective in nuclear counter-proliferation? With continued interest in nuclear proliferation professed by Iran, North Korea, and Saudi Arabia, a discussion of the effectiveness of counter-proliferation measures remains relevant. Cyber-attacks as military option in a state-on-state conflict still requires additional corroborating evidence to make conclusions about its long-term effectiveness. This work analyses the general applicability of cyber-weapons and their usefulness in nuclear counter-proliferation. Through a comparative case study of Operation Orchard, Stuxnet, and recent “Left-of-Launch” operations against North Korea, the essay finds that cyber-operations are not particularly effective against nuclear programmes that are in the later stages of their development. They can disrupt and delay a nuclear programme temporarily, if the attack remains clandestine, but cannot halt nuclear proliferation all together. However, effectiveness increases if they are used in combination with conventional weapons. The article addresses a topic of interest to national-level decision-makers: whether cyber-operations can and should play a role in nuclear counter-proliferation.
Journal: Defense & Security Analysis
Pages: 352-371
Issue: 3
Volume: 36
Year: 2020
Month: 7
X-DOI: 10.1080/14751798.2020.1790811
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790811
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:352-371
Template-Type: ReDIF-Article 1.0
Author-Name: Greg Kennedy
Author-X-Name-First: Greg
Author-X-Name-Last: Kennedy
Title: World War II at sea: a global history
Journal: Defense & Security Analysis
Pages: 372-373
Issue: 3
Volume: 36
Year: 2020
Month: 7
X-DOI: 10.1080/14751798.2020.1790812
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790812
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:372-373
Template-Type: ReDIF-Article 1.0
Author-Name: Viljar Veebel
Author-X-Name-First: Viljar
Author-X-Name-Last: Veebel
Title: Strategic challenges in the Baltic Sea region: Russia, deterrence, and reassurance
Journal: Defense & Security Analysis
Pages: 373-375
Issue: 3
Volume: 36
Year: 2020
Month: 7
X-DOI: 10.1080/14751798.2020.1790814
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1790814
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:3:p:373-375
Template-Type: ReDIF-Article 1.0
Author-Name: Manseok Lee
Author-X-Name-First: Manseok
Author-X-Name-Last: Lee
Author-Name: Sangmin Lee
Author-X-Name-First: Sangmin
Author-X-Name-Last: Lee
Title: North Korea’s choice of a nuclear strategy: a dynamic approach
Abstract:
This study presents an analytical framework for predicting the conditions under which North Korea would choose a particular nuclear strategy. Based on the assessment of North Korea’s strategic environment, which involves its national identity and interests, strategic goals, relations with allies, and military capabilities, the nuclear strategy choice model presented in this study explains how North Korea’s beliefs about its relative capabilities vis-à-vis the US and South Korea determine its strategy regarding the employment of nuclear weapons. As such, this study represents a necessary extension of the prior literature, which has focused on static theories concerning North Korea’s nuclear strategy. This study concludes by offering policy recommendations for dealing with a nuclear-armed North Korea.
Journal: Defense & Security Analysis
Pages: 377-397
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1858536
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1858536
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:377-397
Template-Type: ReDIF-Article 1.0
Author-Name: Heather Kearney
Author-X-Name-First: Heather
Author-X-Name-Last: Kearney
Author-Name: Michelle Black
Author-X-Name-First: Michelle
Author-X-Name-Last: Black
Title: Identifying leader’s intent: an analysis of Kim Jong-Un
Abstract:
One of the most challenging tasks for a deterrence planner is assessing a leader's intent, which requires having an in-depth level of subject-matter expertise. This article investigates this challenge and offers answers to the following question “how can we identify a leader’s intent” to aid deterrence planners, operators, and policymakers? To examine this question, we used a multi-method approach by performing several qualitative analyses on Kim Jong-Un’s New Year’s Eve speeches (2013–2018). We focused on techniques that assessed the underlying facets of intent (e.g. cognitive beliefs and goals). These speeches served as a viable secondary source that identified objective markers to which we applied a coding scheme to extract the adversary’s “intent” to perform a particular action. This article argues that identifying intent can help policy-makers and planners understand if an adversary has plans to perform specific operations.
Journal: Defense & Security Analysis
Pages: 398-421
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1857910
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857910
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:398-421
Template-Type: ReDIF-Article 1.0
Author-Name: James Johnson
Author-X-Name-First: James
Author-X-Name-Last: Johnson
Title: Deterrence in the age of artificial intelligence & autonomy: a paradigm shift in nuclear deterrence theory and practice?
Abstract:
How might nuclear deterrence be affected by the proliferation of artificial intelligence (AI) and autonomous systems? How might the introduction of intelligent machines affect human-to-human (and human-to-machine) deterrence? Are existing theories of deterrence still applicable in the age of AI and autonomy? The article builds on the rich body of work on nuclear deterrence theory and practice and highlights some of the variegated and contradictory – especially human cognitive psychological – effects of AI and autonomy for nuclear deterrence. It argues that existing theories of deterrence are not applicable in the age of AI and autonomy and introducing intelligent machines into the nuclear enterprise will affect nuclear deterrence in unexpected ways with fundamentally destabilising outcomes. The article speaks to a growing consensus calling for conceptual innovation and novel approaches to nuclear deterrence, building on nascent post-classical deterrence theorising that considers the implications of introducing non-human agents into human strategic interactions.
Journal: Defense & Security Analysis
Pages: 422-448
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1857911
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857911
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:422-448
Template-Type: ReDIF-Article 1.0
Author-Name: Zsolt Lazar
Author-X-Name-First: Zsolt
Author-X-Name-Last: Lazar
Title: Debate opener: where is the European defence industry heading? European defence industrial cooperation is at crossroads
Journal: Defense & Security Analysis
Pages: 449-449
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1857912
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857912
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:449-449
Template-Type: ReDIF-Article 1.0
Author-Name: Julia Muravska
Author-X-Name-First: Julia
Author-X-Name-Last: Muravska
Title: How can the European Commission help Europe’s defence industry? By making the most out of what it is already doing
Abstract:
The European Commission's proposal for the €13 bn European Defence Fund (EDF) to incentivise collaborative defence research and capability development projects with EU funding was an ambitious statement of policy intent to drive forward European defence cooperation. However, the summer 2020 EU budget negotiations left it with only about 60% of that amount over the 2021-2027 period. This debate contribution argues that despite this curtailment in resource and ambition, the European Commission can still maximise the EDF's impact to benefit European defence industry by ensuring that the various defence industrial policy activities it is already leading are achieving their full potential, incentivising EU governments to acquire and use the capabilities developed through the Fund, and maintaining coherence amongst existing research projects, capability development projects, and joint capability requirements.
Journal: Defense & Security Analysis
Pages: 450-452
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1857913
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857913
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:450-452
Template-Type: ReDIF-Article 1.0
Author-Name: Ron Matthews
Author-X-Name-First: Ron
Author-X-Name-Last: Matthews
Author-Name: Jonata Anicetti
Author-X-Name-First: Jonata
Author-X-Name-Last: Anicetti
Title: Death spiral of European offset?
Abstract:
This paper is concerned with evaluating the impact of the Procurement Directive, 2009/81/EC, on defence offset in Europe. The aim of the Directive was to reduce the extent of Article 346 derogations based on offset. Indirect offset has disappeared, and while the evidence is patchy, direct offset appears to be declining. This gradual demise of offset is in line with the global trend, especially among advanced countries. Offset is increasingly becoming a developing country phenomenon.
Journal: Defense & Security Analysis
Pages: 453-454
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1857917
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857917
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:453-454
Template-Type: ReDIF-Article 1.0
Author-Name: Mitja Kleczka
Author-X-Name-First: Mitja
Author-X-Name-Last: Kleczka
Title: Between Europeanisation and domestic favouritism: recent progresses of defence-industrial restructuring in Germany
Abstract:
Germany’s export-oriented defence industry, like most other “large” European producers, aims to maintain its “key” capabilities whilst the scope for national approaches narrows further. Given the rising economic and security challenges, it appears likely that Europeanisation will gradually proceed.
Journal: Defense & Security Analysis
Pages: 455-457
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1857918
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857918
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:455-457
Template-Type: ReDIF-Article 1.0
Author-Name: Kogila Balakrishnan
Author-X-Name-First: Kogila
Author-X-Name-Last: Balakrishnan
Title: Future of the European Defence Industrial and Technological Base (EDTIB) post Brexit: Nationalism versus integration?
Journal: Defense & Security Analysis
Pages: 458-459
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1857919
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857919
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:458-459
Template-Type: ReDIF-Article 1.0
Author-Name: Jocelyn Mawdsley
Author-X-Name-First: Jocelyn
Author-X-Name-Last: Mawdsley
Title: The impact of Brexit on European defence industry
Abstract:
This contribution to the discussion forum considers the impact of Brexit on European defence industry. It argues that while in the short term there is unlikely to be an institutionalised defence relationship between the UK and the EU, that the size of the UK defence budget and technological strength, coupled with NATO membership make it hard to cut the UK out of European armaments cooperation. The contribution suggests however that the uncertainty surrounding both the success of PESCO and the EDF and the outcome of the UK’s Integrated Review makes the future difficult to predict.
Journal: Defense & Security Analysis
Pages: 460-462
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1857920
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857920
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:460-462
Template-Type: ReDIF-Article 1.0
Author-Name: Robert Czulda
Author-X-Name-First: Robert
Author-X-Name-Last: Czulda
Title: A Polish perspective on the European defence industry
Journal: Defense & Security Analysis
Pages: 463-464
Issue: 4
Volume: 36
Year: 2020
Month: 10
X-DOI: 10.1080/14751798.2020.1857921
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1857921
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:36:y:2020:i:4:p:463-464
Template-Type: ReDIF-Article 1.0
Author-Name: Tamás Csiki Varga
Author-X-Name-First: Tamás Csiki
Author-X-Name-Last: Varga
Title: Security perception and security policy in Central Europe, 1989–2019
Journal: Defense & Security Analysis
Pages: 1-8
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831224
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831224
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:1-8
Template-Type: ReDIF-Article 1.0
Author-Name: Ádám Budai
Author-X-Name-First: Ádám
Author-X-Name-Last: Budai
Title: The security perception and security policy of Hungary, 1989–2018
Abstract:
Between 1989 and 2018, the basic characteristics of the security perception of the Hungarian society remained constant, but significant changes occurred in the realm of security policy. The security perception of the Hungarian society retained its multidimensional character, while non-military dimensions became increasingly predominant. As a consequence of the changing strategic environment and the country's accession to NATO, Hungary became a more active actor in international security policy, albeit with strict limitations on the use of force. The changes in Hungary's foreign policy orientation after the end of the Cold War can be best described as a gradual and consistent shift towards Euro-Atlantic integration, facilitated by both external and internal factors. Furthermore, the Hungarian Defence Forces began their transformation from a Soviet-type mass army into a Western-type of expeditionary model of armed forces, that has been further accelerated by a new large-scale modernisation programme since 2016.
Journal: Defense & Security Analysis
Pages: 9-22
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831225
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831225
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:9-22
Template-Type: ReDIF-Article 1.0
Author-Name: Tomáš Čižik
Author-X-Name-First: Tomáš
Author-X-Name-Last: Čižik
Title: Security perception and security policy of the Slovak Republic, 1993–2018
Abstract:
The development of Slovak and security policy faced many challenges throughout last few decades. Slovakia, since its independence in 1993, was trying to find its geopolitical orientation - from the “bridge” between West and East, through the “black-hole” of Europe to the fully-fledged member of the EU and NATO. The main aim of this article is to provide a short, but detailed, description of the changes in Slovak security perceptions and development of the Slovak security policy and also to reveal how these changes influenced the opinion and perceptions of Slovak citizens.
Journal: Defense & Security Analysis
Pages: 23-37
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831228
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831228
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:23-37
Template-Type: ReDIF-Article 1.0
Author-Name: Zdeněk Kříž
Author-X-Name-First: Zdeněk
Author-X-Name-Last: Kříž
Title: The security perception and security policy of the Czech Republic, 1993–2018
Abstract:
All Czech strategic security documents since the end of the Cold War have been based on the argument that the risk of any direct military aggression against the territory of the Czech Republic is virtually nil. The 2015 Security Strategy responded to the changes of international security environment, especially to the Russian aggressive policy in Ukraine, hybrid war waged by Russia against the West, escalation of conflict in Syria against the background of the Arab Spring and the refugee crisis directly related to it. The 2015 Strategy continuously develops the ties to the transatlantic security partnership (NATO) and building up the security dimension of the European integration process. However, it is very likely that the Czech Republic can be expected to become a passive actor, meeting its allies' expectations only to an extent that is strictly necessary.
Journal: Defense & Security Analysis
Pages: 38-52
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831231
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831231
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:38-52
Template-Type: ReDIF-Article 1.0
Author-Name: Hennadiy Maksak
Author-X-Name-First: Hennadiy
Author-X-Name-Last: Maksak
Title: The security perception and security policy of Ukraine, 1991–2018
Journal: Defense & Security Analysis
Pages: 53-65
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831232
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831232
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:53-65
Template-Type: ReDIF-Article 1.0
Author-Name: Tamás Levente Molnár
Author-X-Name-First: Tamás Levente
Author-X-Name-Last: Molnár
Title: The security perception and security policy of Austria, 1989–2017
Abstract:
Austria's security architecture has changed significantly following the end of the Cold War. The fall of the Berlin Wall in 1989, the country's accession to the EU in 1995, and the Yugoslav Wars in the 1990s led to a re-calibration of the Austrian understanding of foreign and security policy. As a result, Austria became more engaged in international peace-keeping operations and was interacting more with international organisations (EU, NATO-PfP). Austria became more and more engaged with EU CSDP, which de-facto undermined the country's neutrality, even if the neutrality issue keeps coming up at the level of political discourses. The public assessment of perceived threats is shifted from more traditional threat categories (e.g. crime) towards new security challenges (e.g. immigration), but in general, Austrians feel extraordinarily safe in comparison with other European nations.
Journal: Defense & Security Analysis
Pages: 66-79
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831234
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831234
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:66-79
Template-Type: ReDIF-Article 1.0
Author-Name: Milena Palczewska
Author-X-Name-First: Milena
Author-X-Name-Last: Palczewska
Title: The security perception and security policy of Poland, 1989–2017
Abstract:
Article is an attempt to answer the question about the state of Poland's security in years 1989-2017, what are its determinants, what kind of challenges Poland faces and which of them may turn into a threat and which into an opportunity, or what Polish potential is and which of its components determine its position on the international arena. It is achieved through a detailed analysis of actions undertaken by Poland in the international arena to strengthen its international position as well as the level of its security. Thus, the aim is to identify those determinants which may contribute to establish a stronger position and which can create problems and become a formidable challenge in the context of various aspects of security, and even develop into a threat.
Journal: Defense & Security Analysis
Pages: 80-95
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831237
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831237
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:80-95
Template-Type: ReDIF-Article 1.0
Author-Name: Alexandra Sarcinschi
Author-X-Name-First: Alexandra
Author-X-Name-Last: Sarcinschi
Title: Security perception and security policy in Romania since the 1989 Revolution
Abstract:
This paper argues that the security perception in Romania has been oriented in the following 30 years after the 1989 Revolution towards a gradually implemented multidimensional approach that can be identified both in the subsequent security strategies and in the national or European public opinion polls. The case study focuses on the perception of the risks and threats affecting both the Romanian society and other countries, the identification of specific patterns, the way in which the security sector has changed over time, and the pace of adapting the security policy to the dynamics of the security environment.
Journal: Defense & Security Analysis
Pages: 96-113
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831239
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831239
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:96-113
Template-Type: ReDIF-Article 1.0
Author-Name: László Szerencsés
Author-X-Name-First: László
Author-X-Name-Last: Szerencsés
Title: Security perception in Croatia since the declaration of independence
Abstract:
Croatia's security environment went through a gradual change since the declaration of independence in 1991. The changing environment is reflected on in the National Security Strategy and also in the security perception of the population. This period was marked with a solid transition of foreign policy by joining NATO and EU, and by later on fulfilling the responsibilities coming with the membership. These responsibilities include the participation in an increased number of peace support operations, and contribution to the common responses of the EU to the security threats of today. To live up to these challenges Croatia needs to develop its military capabilities, which Croatia has begun with the acquisition of air force equipment.
Journal: Defense & Security Analysis
Pages: 114-128
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831241
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831241
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:114-128
Template-Type: ReDIF-Article 1.0
Author-Name: Aleksandar Vanchoski
Author-X-Name-First: Aleksandar
Author-X-Name-Last: Vanchoski
Title: The security perception and security policy of Serbia
Abstract:
Serbia has important role in the regional peace and stability in South Eastern Europe. Over the last three decades Serbian security policies have been directly shaped by numerous turbulent political, social, and economic circumstances. In order the better to understand what determines the patterns of development and perceptions of Serbian security strategy and defence policies, a comprehensive overview of the legislative and institutional mechanisms of Serbian security and foreign policy in combination with content analysis of the key strategic security documents and analysis of the socio-political developments in Serbian society were conducted. After a period of confrontational discourse and abuse of the security system, the democratic changes in Serbia in the beginning of 2000s resulted with reforms in the security system as well. However, many of them were not undertaken systematically. Serbian security and foreign policy priorities are mainly determined by the EU accession process and the status of Kosovo.
Journal: Defense & Security Analysis
Pages: 129-143
Issue: 1
Volume: 37
Year: 2021
Month: 01
X-DOI: 10.1080/14751798.2020.1831243
File-URL: http://hdl.handle.net/10.1080/14751798.2020.1831243
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:1:p:129-143
Template-Type: ReDIF-Article 1.0
Author-Name: Tommi Koivula
Author-X-Name-First: Tommi
Author-X-Name-Last: Koivula
Title: Carry that weight: assessing continuity and change in NATO’s burden-sharing disputes
Abstract:
This article proposes Stephen Jay Gould’s concepts of time’s arrow and time’s cycle as a conceptual tool to analyse NATO’s burden-sharing disputes. It argues that the controversies on burden-sharing in NATO can be assessed in terms of their cyclic or arrow kind nature, rendering some disputes more likely to recur than others and providing different kinds of starting points for their forecasting. The study identifies four cyclic categories in which burden-sharing has transformed into a political debate among NATO members during the post-Cold War era: geopolitical change related to Russia; periods of US foreign political retrenchment or renewal; the passivity or activism of European NATO members; and during NATO or allied out-of-area operations. Moreover, the study suggests an arrow kind of direction in burden-sharing disputes, indicating an expansion of disputes to cover comprehensive security, resilience, security co-operation and diplomacy, and to engulf also NATO partner countries.
Journal: Defense & Security Analysis
Pages: 145-163
Issue: 2
Volume: 37
Year: 2021
Month: 04
X-DOI: 10.1080/14751798.2021.1920092
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1920092
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:145-163
Template-Type: ReDIF-Article 1.0
Author-Name: Christopher Kinsey
Author-X-Name-First: Christopher
Author-X-Name-Last: Kinsey
Author-Name: Andreas Krieg
Author-X-Name-First: Andreas
Author-X-Name-Last: Krieg
Title: Assembling a Force to Defeat Boko Haram: How Nigeria Integrated the Market into its Counterinsurgency Strategy
Abstract:
In the context of an increased use of commercial soldiers in high-end conflict, this article investigates how the Nigerian government's reliance on the global market for force has helped its efforts to counter Boko Haram. The article shows, through a case study of Nigeria's counterinsurgency campaign against jihadist insurgents, that states in the developing world can augment their ability to provide effective public security by creating security assemblages. Moving beyond the normative debate about Private Military Companies (PMCs), this article highlights that public-private security arrangements can support the state in the developing world to live up to its role as a communal security provider. Nigeria's employment of the South African PMC Special Tasks, Training, Equipment and Protection Ltd. (STTEP), helped it build an effective public-commercial partnership, thus providing the Nigerian Armed Forces (NAF) with capacity, capability and norms that were essential in their counterinsurgency struggle.
Journal: Defense & Security Analysis
Pages: 232-249
Issue: 2
Volume: 37
Year: 2021
Month: 04
X-DOI: 10.1080/14751798.2021.1919356
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919356
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:232-249
Template-Type: ReDIF-Article 1.0
Author-Name: David Pion Berlin
Author-X-Name-First: David
Author-X-Name-Last: Pion Berlin
Author-Name: Andrew Ivey
Author-X-Name-First: Andrew
Author-X-Name-Last: Ivey
Title: Military dissent in the United States: are there lessons from Latin america?
Abstract:
The civil–military relations of the Trump Presidency became increasingly troubled. The President attempted not only to involve the military in partisan politics, but also in counter-protest operations in the face of nationwide demonstrations. Such operations increase the likelihood of human rights abuses by the military, which prides itself on professionalism and public approval. How can officers resist a commander-in-chief pulling them into partisan politics, particularly when this endangers military professionalism and quite possibly democracy itself? This article finds that U.S. military commanders might turn to their counterparts across Latin America for examples and lessons. Commanders in Chile, Ecuador, Colombia and Brazil have found innovative waves to resist unwise Presidential orders and potentially save lives in the process. Critically, we find that these instances of justifiable dissent did not result in an erosion of civilian control.
Journal: Defense & Security Analysis
Pages: 193-211
Issue: 2
Volume: 37
Year: 2021
Month: 04
X-DOI: 10.1080/14751798.2021.1919354
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919354
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:193-211
Template-Type: ReDIF-Article 1.0
Author-Name: Kristýna Pavlíčková
Author-X-Name-First: Kristýna
Author-X-Name-Last: Pavlíčková
Author-Name: Monika Gabriela Bartoszewicz
Author-X-Name-First: Monika
Author-X-Name-Last: Gabriela Bartoszewicz
Title: Beyond bare numbers: the qualitative subtleties of free-riding on NATO’s engagement in the Middle East
Abstract:
This paper closely scrutinises NATO engagement, particularly the The Eastern Flank countries in the Middle East. Our main argument is that the quantitative approach to free riding is useful only when it comes to black-and-white policy choices and either-or policy decisions. Simultaneously, it fails when we are faced with more complex situations in which evaluations go beyond the very simple numerical markers, such as the 2% threshold of defence spending. By bringing together a unique regional focus (the European East and the Middle East), theoretical dilemmas (free-riding) and policy issues (NATO's multilateral framework of co-operation understood in terms of strategic interests and practical engagement), we are able to show that Romania is a subtle free rider, which cannot be verified by merely looking at numbers alone, but can be ascertained by a careful qualitative analysis which reveals a discrepancy between the country's strategic interests and its level of engagement.
Journal: Defense & Security Analysis
Pages: 177-192
Issue: 2
Volume: 37
Year: 2021
Month: 04
X-DOI: 10.1080/14751798.2021.1919353
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919353
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:177-192
Template-Type: ReDIF-Article 1.0
Author-Name: Shang-su Wu
Author-X-Name-First: Shang-su
Author-X-Name-Last: Wu
Title: Military modernisation in Southeast Asia in the Indo-Pacific strategic context
Journal: Defense & Security Analysis
Pages: 212-231
Issue: 2
Volume: 37
Year: 2021
Month: 04
X-DOI: 10.1080/14751798.2021.1919355
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919355
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:212-231
Template-Type: ReDIF-Article 1.0
Author-Name: Jaroslav Dvorak
Author-X-Name-First: Jaroslav
Author-X-Name-Last: Dvorak
Author-Name: Bohuslav Pernica
Author-X-Name-First: Bohuslav
Author-X-Name-Last: Pernica
Title: To free or not to free (ride): a comparative analysis of the NATO burden-sharing in the Czech Republic and Lithuania – another insight into the issues of military performance in the Central and Eastern Europe
Abstract:
In this paper we argue that free riding within NATO should be assessed from a microeconomic point of view. In particular, nations with a communist background should be appraised in a much broader perspective than the 2% GDP spending target, or number of soldiers on deployment. In comparison with post-Soviet countries such as Lithuania, wealthy post-communist country such as Czechia where defence institution experienced an extensive militarisation of society and economy in the Soviet style, continues to fail in reducing their military-administrative complexes, as well as maintaining an excessive structure of militarised civilian activities; e.g., sport clubs, folkloric choirs, medical and educational facilities, established for purpose of autonomy from civil society. Hence, increasing defence spending to 2% GDP can have the effect of strengthening this structure when weak defence institutions are not able to manage their entire defence budget to achieve military modernisation, as has happened in Czechia.
Journal: Defense & Security Analysis
Pages: 164-176
Issue: 2
Volume: 37
Year: 2021
Month: 04
X-DOI: 10.1080/14751798.2021.1919345
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1919345
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:2:p:164-176
Template-Type: ReDIF-Article 1.0
Author-Name: Marius Kristiansen
Author-X-Name-First: Marius
Author-X-Name-Last: Kristiansen
Author-Name: Njål Hoem
Author-X-Name-First: Njål
Author-X-Name-Last: Hoem
Title: Strategic utility of security sector assistance, from a small state perspective
Abstract:
In a world of global interdependent security, the West is increasingly involved in the stability of all regions that could directly or indirectly influence national interests. To this end, security sector assistance (SSA), with its’ perceived favourable effect-to-resource-ratio, has become somewhat of a panacea. For small states, coalition SSA has become the way to pursue own ambitions with military means internationally. But SSA is a difficult task, especially for miniscule contributors with scarce resources. We therefore ask: How can small states achieve the highest yield from their SSA-efforts? From a Norwegian perspective, and focusing on the SOF component, this article provides a practitioner’s view on how to increase the military contribution to strategic utility. Through understanding the wicked problem SSA represents, and adhering to the principles of long-term commitment, vertical implementation, and specialised skillsets, we argue small states might gain a disproportionate advantage allowing them to punch above own weight.
Journal: Defense & Security Analysis
Pages: 295-327
Issue: 3
Volume: 37
Year: 2021
Month: 07
X-DOI: 10.1080/14751798.2021.1961069
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1961069
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:295-327
Template-Type: ReDIF-Article 1.0
Author-Name: Cameran Ashraf
Author-X-Name-First: Cameran
Author-X-Name-Last: Ashraf
Title: Defining cyberwar: towards a definitional framework
Abstract:
For nearly thirty years scholars have offered changing definitions of cyberwar. The continued ambiguity demonstrates that efforts at establishing definitional clarity have not been successful. As a result, there are many different and contradictory definitions, ranging from cyberwar’s non-existence to cyberwar as an imminent threat. Ongoing definitional ambiguity makes interdisciplinary research and policy communications challenging in this diverse field. Instead of offering a new definition, this paper proposes that cyberwar can be understood through a fluid framework anchored in three themes and five variables identified in a broad interdisciplinary survey of literature. This framework's applicability is demonstrated by constructing an example definition of cyberwar utilising these themes and variables.
Journal: Defense & Security Analysis
Pages: 274-294
Issue: 3
Volume: 37
Year: 2021
Month: 07
X-DOI: 10.1080/14751798.2021.1959141
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959141
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:274-294
Template-Type: ReDIF-Article 1.0
Author-Name: Sebastián Briones Razeto
Author-X-Name-First: Sebastián Briones
Author-X-Name-Last: Razeto
Author-Name: Nicole Jenne
Author-X-Name-First: Nicole
Author-X-Name-Last: Jenne
Title: Security and defence policy documents: a new dataset
Abstract:
Security and defence policy documents have sparked academic interest since their publication has become a common international practice in the 1990s. Yet, broad comparisons across time and countries have been scarce. This article presents information from a new dataset on security and defence documents published by OECD countries. Specifically, we analyse what type of documents were published by each country between 1990 and 2019, which security concerns they identify, and what level of importance is given to different agendas of security and defence. The dataset reveals an unexpected level of diversity, including an apparent lack of a common framework even among countries belonging to NATO or the European Union. In terms of content, there was a recent recurrence of traditional security topics, along with the prominence of some newer ones. Overall, the documents reveal a surprising lack of consistency and completeness with regards to provisions for policy execution.
Journal: Defense & Security Analysis
Pages: 346-363
Issue: 3
Volume: 37
Year: 2021
Month: 07
X-DOI: 10.1080/14751798.2021.1959730
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959730
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:346-363
Template-Type: ReDIF-Article 1.0
Author-Name: Oscar L. Larsson
Author-X-Name-First: Oscar L.
Author-X-Name-Last: Larsson
Title: The maritime turn in EU foreign and security policies – aims, actors, and mechanisms of integration
Journal: Defense & Security Analysis
Pages: 381-383
Issue: 3
Volume: 37
Year: 2021
Month: 07
X-DOI: 10.1080/14751798.2021.1959741
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959741
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:381-383
Template-Type: ReDIF-Article 1.0
Author-Name: Ron Matthews
Author-X-Name-First: Ron
Author-X-Name-Last: Matthews
Author-Name: Collin Koh
Author-X-Name-First: Collin
Author-X-Name-Last: Koh
Title: The decline of South Africa’s defence industry
Abstract:
The growth of South Africa’s apartheid era defence industry was propelled by international isolation following the 1984 UN arms embargo and revealed military technology deficiencies during the border war. Weapons innovation became an imperative, fostering development of frontier technologies and upgrades of legacy platforms that drove expansion in arms exports. However, this golden era was not to last. The 1994 election of the country’s first democratic government switched resources from military to human security. The resultant defence-industrial stagnation continues to this day, exacerbated by corruption, unethical sales, and government mismanagement. The industry’s survival into the 2020s cannot be assured.
Journal: Defense & Security Analysis
Pages: 251-273
Issue: 3
Volume: 37
Year: 2021
Month: 07
X-DOI: 10.1080/14751798.2021.1961070
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1961070
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:251-273
Template-Type: ReDIF-Article 1.0
Author-Name: Won-June Hwang
Author-X-Name-First: Won-June
Author-X-Name-Last: Hwang
Title: How are drones being flown over the gray zone?
Abstract:
Drones have been affecting many areas since their advent, including conflicts between states. Used as a coercive measure, how they are flown by measured or limited revisionists can be understood in terms of the gray zone strategy. The concept of the gray zone is somewhere between peace and war, and the gray zone strategy enables revisionists to gradually alter the status quo without triggering war or overt conflict. Both theoretically and empirically, drones could be a useful tool in gray zone conflicts. This paper attempts to specify and organise such operations according to the question: “How are drones being flown over the gray zone?” Revisionist states fly drones based on the salami tactic, or feigned innocence, or by putting them in the hands of proxy forces to expand gradually their interests and destabilise troubled regions; therefore, understanding drone strategy and considering counter-measures are indispensable for securing stability in such regions.
Journal: Defense & Security Analysis
Pages: 328-345
Issue: 3
Volume: 37
Year: 2021
Month: 07
X-DOI: 10.1080/14751798.2021.1959734
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959734
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:328-345
Template-Type: ReDIF-Article 1.0
Author-Name: Mauro Mantovani
Author-X-Name-First: Mauro
Author-X-Name-Last: Mantovani
Author-Name: Ralf Müllhaupt
Author-X-Name-First: Ralf
Author-X-Name-Last: Müllhaupt
Title: Analysing armed forces transformation: methodology and visualisation
Abstract:
There is scant research on models for visualising strategies retrospectively. The authors present a new analytical, visual methodology for assessing the transformation of armed forces, which is usually considered to be the “second dimension” of strategy. It is novel and generally applicable to armed forces, and additionally provides several benefits, in particular with regard to its synoptic character. The methodology translates a sociological approach into strategic studies, a discipline which has not really developed its own yet. It is exemplified by means of the (airborne part of the) Swiss Air Force's transformation since the end of the Cold War.
Journal: Defense & Security Analysis
Pages: 364-380
Issue: 3
Volume: 37
Year: 2021
Month: 07
X-DOI: 10.1080/14751798.2021.1959731
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1959731
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:364-380
Template-Type: ReDIF-Article 1.0
Author-Name: Sarah Perret
Author-X-Name-First: Sarah
Author-X-Name-Last: Perret
Title: Border Frictions: Gender, Generation and Technology on the Frontline
Journal: Defense & Security Analysis
Pages: 383-385
Issue: 3
Volume: 37
Year: 2021
Month: 07
X-DOI: 10.1080/14751798.2021.1976088
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1976088
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:3:p:383-385
Template-Type: ReDIF-Article 1.0
Author-Name: Kogila Balakrishnan
Author-X-Name-First: Kogila
Author-X-Name-Last: Balakrishnan
Title: How to measure value from defence spending? The Malaysian case study
Abstract:
Nations and their citizens now demand clear evidence as to the benefits of defence spending. The opportunity cost of defence expenditure against other sectors is constantly queried. It is economically challenging to find consensus amongst traditional economists, and policy-makers, on how to measure value in the context of defence. This article offers solutions by using the case study of Malaysia. Primary data sources include open-ended and semi structured interviews to produce a thematic discussion, as well as secondary resources. The author argues that it is hard to appraise defence value, as measurements are case-specific. Rather, the paper will use a novel ‘Triple-Defence Value Framework’, to argue that value can be measured by dividing the role of defence into a primary level: for protection and safety; a secondary level: for socio-economic prosperity; and a tertiary level: for soft power projection. The paper concludes by using the framework to measure the value derived from the Malaysian defence sector.
Journal: Defense & Security Analysis
Pages: 387-413
Issue: 4
Volume: 37
Year: 2021
Month: 10
X-DOI: 10.1080/14751798.2021.1995966
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995966
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:387-413
Template-Type: ReDIF-Article 1.0
Author-Name: Alessandro Arduino
Author-X-Name-First: Alessandro
Author-X-Name-Last: Arduino
Author-Name: Asif Shuja
Author-X-Name-First: Asif
Author-X-Name-Last: Shuja
Title: Russia’s scalable soft power: leveraging defense diplomacy through the transfer of S-400 triumph
Abstract:
Military hardware and technology transfer is increasingly becoming a crucial factor in international relations. This is especially so when the military hardware transfer involves sophisticated weapon's platforms that need specialised training and maintenance, resulting in a long-term relationship that strengthens the geopolitical relationship between the contracting parties. Driven by the re-emergence of great power rivalry, the S-400 Triumph air defence missile system deployment appears to be fast becoming a core component of Russia's military diplomacy. The agreed S-400 export contracts include Turkey, China and India with a long list of interested Middle Eastern countries. The transfer of S-400 well encompasses all the dimensions of the Russian defense diplomacy and could be considered as a primary example of scalable soft power, as it underlines the evolving pattern of high-technology arms transfers that is going to be constant in an increasingly complex multilateral world.
Journal: Defense & Security Analysis
Pages: 435-452
Issue: 4
Volume: 37
Year: 2021
Month: 10
X-DOI: 10.1080/14751798.2021.1995963
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995963
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:435-452
Template-Type: ReDIF-Article 1.0
Author-Name: Stephen Blank
Author-X-Name-First: Stephen
Author-X-Name-Last: Blank
Author-Name: Younkyoo Kim
Author-X-Name-First: Younkyoo
Author-X-Name-Last: Kim
Title: The Mediterranean Eskadra and Russia’s military-political strategy in the Mediterranean Basin
Abstract:
Russia seeks to convert the Black Sea into a Russian lake. This entails projecting power well into the Mediterranean Sea. Since 2013 Moscow has reinforced the missile, air defence, and submarine component of its Mediterranean Eskadra (Squadron) to deny NATO access to the Eastern Mediterranean and Black Seas. This article explains how and why Russia's Mediterranean Eskadra has become a major arm of Russia's military-political strategy in these waters. By analysing its missions, roles, and activities the article shows how Moscow conducts innovative, sophisticated, yet simultaneously traditional military-political operations to maximise and enhance its global standing in accordance with its own strategy. The article further argues that the Eskadra's creation and deployment corresponds not just to the revival of Russian military capability in 2013, but also to a much broader Russian perspective on contemporary war, and analyzes Russia's political considerations in the deployment of major military forces in the Mediterranean Basin.
Journal: Defense & Security Analysis
Pages: 453-471
Issue: 4
Volume: 37
Year: 2021
Month: 10
X-DOI: 10.1080/14751798.2021.1995969
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995969
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:453-471
Template-Type: ReDIF-Article 1.0
Author-Name: Jakub Pražák
Author-X-Name-First: Jakub
Author-X-Name-Last: Pražák
Title: Planetary defence systems – threat to survival?
Abstract:
The article explains why Weaponisation of outer space may soon be inevitable and that development of space weapons is a serious issue, especially in regard to dealing with sensitive dual-use technology. At the same time, the Earth may be threatened by incoming asteroids and comets, which may endanger humankind’s existence. Hence, it is advisable to develop effective planetary defence systems. However, the article claims that discussed planetary defence technology – kinetic impactor, nuclear explosion, gravity tractor and space tug, laser, and solar collector – have far-reaching dual-use consequences with potential for their weaponisation. Thus, the article argues in favour of greater transparency and surveillance mechanisms for dual-use and arms control. Moreover, the private sector should be involved in discussion since it may be contributing to negotiation processes and can ensure secure research and development, as well as operability of sensitive planetary defence systems.
Journal: Defense & Security Analysis
Pages: 492-508
Issue: 4
Volume: 37
Year: 2021
Month: 10
X-DOI: 10.1080/14751798.2021.1995979
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995979
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:492-508
Template-Type: ReDIF-Article 1.0
Author-Name: Zsolt Lazar
Author-X-Name-First: Zsolt
Author-X-Name-Last: Lazar
Title: Joint by Design
Journal: Defense & Security Analysis
Pages: 509-511
Issue: 4
Volume: 37
Year: 2021
Month: 10
X-DOI: 10.1080/14751798.2021.1996097
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1996097
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:509-511
Template-Type: ReDIF-Article 1.0
Author-Name: Lukasz Stach
Author-X-Name-First: Lukasz
Author-X-Name-Last: Stach
Title: The Philippines maritime forces and its maritime military power projection capabilities: unfulfilled ambitions?
Abstract:
The Philippine Navy is among the weakest of the naval forces in the Southeast Asia region, and its power projection capabilities are very limited. It is surprising how the Philippines, an archipelago country involved in maritime territorial disputes, could ignore the development of its maritime forces. As a result, the position of the Philippines in regional territorial disputes is weak. This study analyses the factors which have led to this situation, the PN modernisation process, and Filipino maritime power projection capabilities. The text is divided into three parts. The first defines the term “power projection” (or “force projection”). The second analyses the Philippines’ security challenges. Later, the potential and modernisation of the Philippine Navy, as well as its maritime power projection prospects, is analysed. The study concludes with findings. This study employs descriptive methodology and uses data from readily accessible sources to assess critically the conditions of this naval force.
Journal: Defense & Security Analysis
Pages: 414-434
Issue: 4
Volume: 37
Year: 2021
Month: 10
X-DOI: 10.1080/14751798.2021.1996096
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1996096
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:414-434
Template-Type: ReDIF-Article 1.0
Author-Name: Alastair Finlan
Author-X-Name-First: Alastair
Author-X-Name-Last: Finlan
Title: The shape of warfare to come: a Swedish perspective 2020–2045
Abstract:
This research explores the shape of warfare to come over the next twenty-five years from a Swedish perspective. It is evident that change in the practice of warfare is apparent in international relations today due to the use of innovative new technologies. These developments raise profound practical and conceptual questions for armed forces as to what do these new systems mean for the prosecution of warfare and the intellectual ideas/knowledge base that underpin the contemporary application of force. This research offers a tentative exploration of three aspects (artificial intelligence, autonomous platforms and the future battlefield: the soldier level) framed in the context of the traditional environments of air, land and sea to interrogate their meaning for Sweden and future warfare.
Journal: Defense & Security Analysis
Pages: 472-491
Issue: 4
Volume: 37
Year: 2021
Month: 10
X-DOI: 10.1080/14751798.2021.1995976
File-URL: http://hdl.handle.net/10.1080/14751798.2021.1995976
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:37:y:2021:i:4:p:472-491
Template-Type: ReDIF-Article 1.0
Author-Name: Christopher Spearin
Author-X-Name-First: Christopher
Author-X-Name-Last: Spearin
Title: UN peacekeeping and Chinese Private Security Companies: assessing demand factors for China
Abstract:
Using China’s UN peacekeeping as a foil, the article explores the demand factors that inform the usage of Chinese Private Security Companies (PSCs) to protect Chinese economic interests and nationals abroad. The article makes three assertions. First, compared to Chinese peacekeepers, PSCs can offer a more focused and responsive presence overseas, a presence that is increasingly demanded by the Chinese leadership and citizenry. Second, Chinese PSCs can provide a less prominent footprint for when Chinese agendas and approaches, despite the desire to maintain a policy of non-interference, inevitably clash with local political dynamics and actors. Third, when considering Chinese peacekeepers that increasingly face the pressure to apply lethal violence, Chinese policy regarding the PSC employment of firearms constrains more robust PSC responses to security challenges that might further inflame sensitive matters regarding non-interference.
Journal: Defense & Security Analysis
Pages: 91-105
Issue: 1
Volume: 38
Year: 2022
Month: 01
X-DOI: 10.1080/14751798.2022.2030917
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2030917
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:91-105
Template-Type: ReDIF-Article 1.0
Author-Name: Glen Segell
Author-X-Name-First: Glen
Author-X-Name-Last: Segell
Title: Israel’s Intelligence gathering and analysis for the target assassination of Baha Abu al-Ata (2019)
Abstract:
On 12 November 2019 Baha Abu al-Ata, a leader of the Palestinian Islamic Jihad in Gaza was targeted assassinated by Israel. Intelligence was the driver of the operation – information and data were the components of intelligence gathering enabling informed decision-making via defence and security analysis. There was effective co-ordination and co-operation between the civilian government, the Israel Defense Force’s Units Skylark, Moran, 504, 8200 and 9900, and the Israel Security Agency. Policy and technicalities were integrated through civil–military relations. The methodology used six sets of different types of intelligence gathering, analysis and risk assessment that were separate yet simultaneously were asking: why, who, when, where, how (what weapon), and assessing repercussions.
Journal: Defense & Security Analysis
Pages: 53-73
Issue: 1
Volume: 38
Year: 2022
Month: 01
X-DOI: 10.1080/14751798.2022.2030914
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2030914
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:53-73
Template-Type: ReDIF-Article 1.0
Author-Name: James Horncastle
Author-X-Name-First: James
Author-X-Name-Last: Horncastle
Title: The unsettled foundation: self-management and its implications for Yugoslavia’s policy of Total National Defence
Abstract:
Whilst scholars have examined the long-term political, social, and cultural dynamics with regards to Yugoslavia’s collapse, the military has largely escaped similar scrutiny. This paper explores the League of Communists of Yugoslavia’s attempt to solve the nationalist problems of Yugoslavia through the ideology of self-management, and how the failure to do so affected the strategy of Total National Defence. The republics were able to construct their own armed forces due to Total National Defence’s devolution of powers and self-management making changes to the policy extremely difficult for the federal government and Yugoslav People’s Army.
Journal: Defense & Security Analysis
Pages: 106-121
Issue: 1
Volume: 38
Year: 2022
Month: 01
X-DOI: 10.1080/14751798.2022.2030919
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2030919
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:106-121
Template-Type: ReDIF-Article 1.0
Author-Name: Lawrence E. Cline
Author-X-Name-First: Lawrence E.
Author-X-Name-Last: Cline
Title: Terrorism futures: evolving technology and TTPs use
Journal: Defense & Security Analysis
Pages: 122-123
Issue: 1
Volume: 38
Year: 2022
Month: 01
X-DOI: 10.1080/14751798.2022.2031716
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2031716
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:122-123
Template-Type: ReDIF-Article 1.0
Author-Name: Paul Lushenko
Author-X-Name-First: Paul
Author-X-Name-Last: Lushenko
Title: U.S. Presidents’ use of drone warfare
Abstract:
Scholars often reduce America's use of drones to a bureaucratic process. While this enables them to recognise shifts in America's use of strikes since 2002, they cannot adequately explain such change over time. Rather, I argue that America's use of strikes is a function of presidents' decisions. Presidents adopt strategic and legal-normative cognitive frames that shape their decisions to use strikes. I use this typology to study crucial and pathway cases during the Obama and Trump administrations. I show that presidents' decisions to use drones are made to achieve state and social goals. The balance between these aims is informed by, and constitutive of, presidents' strategic and legal-normative frames. Understanding America's use of drones as a leader-driven practice suggests that the legitimacy of strikes may relate more to their impact on the relationship between norms and interests, and not the military or political nature of targets, as some ethicists claim.
Journal: Defense & Security Analysis
Pages: 31-52
Issue: 1
Volume: 38
Year: 2022
Month: 01
X-DOI: 10.1080/14751798.2022.2031708
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2031708
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:31-52
Template-Type: ReDIF-Article 1.0
Author-Name: Steven I. Davis
Author-X-Name-First: Steven I.
Author-X-Name-Last: Davis
Title: Artificial intelligence at the operational level of war
Abstract:
Artificial intelligence (AI) is an emerging technology with widespread applications. The National Defense Strategy highlights the importance of AI to military operations for the United States to retain an advantage against its near-peer competitors. To fully realise this advantage, it will be necessary to integrate AI not only at the tactical level but also at the operational level of war. AI can be integrated into the complex task of operational planning most efficiently by subdividing it into its component operational functions, which can be processed by narrow AI. This organisation reduces problems to a size that can be parsed by an AI and maintains human oversight over machine supported decision-making.
Journal: Defense & Security Analysis
Pages: 74-90
Issue: 1
Volume: 38
Year: 2022
Month: 01
X-DOI: 10.1080/14751798.2022.2031692
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2031692
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:74-90
Template-Type: ReDIF-Article 1.0
Author-Name: Mark L. Bailey
Author-X-Name-First: Mark L.
Author-X-Name-Last: Bailey
Title: The mismatch: Royal Australian Navy maritime constabulary 1955–2020
Abstract:
Large-scale illegal fishing commenced in Australian coastal reefs 1970. Since, the Royal Australian Navy (RAN) has been “out of synch” with matching its Tier 2 constabulary vessels to their mission. The pattern is that “mission goalposts” shift post-acquisition, reflecting changes to UNCLOS. Post-WWII, the RAN employed wartime escorts in patrol roles, and wartime launches for littoral constabulary. The RAN has recreated this mix in the twentyfirst century. This paper traces this process and associated problems. Minimum resources are assigned to constabulary functions in peacetime, yet the units involved are arguably the most operational and politically sensitive. Vessel unsuitability has consistently meant personnel problems, over-use of constabulary vessels, and high maintenance costs. Australia's strategic situation is deteriorating towards a point where the rising risk demands mobilisation responses. This would include rapid acquisition of large numbers of Tier 2 assets to meet existing and conflict low-mix roles.
Journal: Defense & Security Analysis
Pages: 1-30
Issue: 1
Volume: 38
Year: 2022
Month: 01
X-DOI: 10.1080/14751798.2022.2030904
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2030904
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:1:p:1-30
Template-Type: ReDIF-Article 1.0
Author-Name: John P. Cann
Author-X-Name-First: John P.
Author-X-Name-Last: Cann
Title: Sangonhá: a PAIGC “liberated zone” gone awry, January 1969
Abstract:
Portugal, in an attempt to retain its colonial possession of Guiné, fought a war there between 1961 and 1974. The opposition nationalist movement, known by its acronym PAIGC, sought to establish “liberated zones” within the difficult terrain of the more remote regions of the colony and service these from its immediate neighbour Guinea-Conakry, which had given it sanctuary. The PAIGC hosted its aid donors on carefully staged visits to these zones in an attempt to provide a picture of success in its “people's war.” The Swedish government, its primary non-military donor, decided to create a propaganda film featuring “heroic PAIGC freedom fighters” in action in one of these zones. This is the story of a well-intentioned yet naïve Swedish government effort at film-making and its largely misplaced aid in the face of the serious Portuguese air threat to PAIGC liberated zones.
Journal: Defense & Security Analysis
Pages: 146-168
Issue: 2
Volume: 38
Year: 2022
Month: 04
X-DOI: 10.1080/14751798.2022.2060475
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2060475
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:146-168
Template-Type: ReDIF-Article 1.0
Author-Name: Michael Kluth
Author-X-Name-First: Michael
Author-X-Name-Last: Kluth
Title: Make or buy? Explaining diverging frigate procurement approaches in Denmark and Norway
Abstract:
Why did Denmark and Norway opt for respectively a domestic “make” and a “buy” abroad approach when acquiring comparable major surface combatants given both host a capable shipbuilding industry? Three explanations are examined: (1) Balancing concerns inch small states towards “buy” abroad decisions, if requirements are deemed urgent and if junior alliance partners fear abandonment by senior partners. Junior partners by contrast prefer “make at home” if entanglement is a greater concern. (2) National innovation systems can be biased towards large projects, such as complex warship programmes, or have a knowledge diffusion focus emphasising niche capabilities. The former point to a “make” decision whereas the latter is inclined towards “buy.” (3) Domestic defence industry advocate “make” decisions with the qualification that weaker firms favour “buy” with offset arrangements. Political executives balance job creation with military capability, but recent adverse domestic procurement experiences may prompt governments to favour “buy.”
Journal: Defense & Security Analysis
Pages: 190-209
Issue: 2
Volume: 38
Year: 2022
Month: 04
X-DOI: 10.1080/14751798.2022.2063995
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2063995
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:190-209
Template-Type: ReDIF-Article 1.0
Author-Name: Droff Josselin
Author-X-Name-First: Droff
Author-X-Name-Last: Josselin
Title: European cooperation in maintaining defence equipment in operational condition: an analytical framework derived from economic geography
Abstract:
Based on economic geography concepts, this article proposes an original analytical framework to understand co-operation between countries in the Maintenance in Operational Condition (MOC) of defence equipment in Europe. European countries are facing problems of MOC cost growth under strong budgetary and usage constraints. A possible solution is to share costs to benefit from economies of scale. However, as the number of participating countries increases, the “distances” (geographical, normative, political) multiply and generate new costs. These costs are likely to weigh on the choices made by countries and therefore constitute a brake on pooling and sharing initiatives. This article proposes to understand the mutualisation of MOC in Europe through a set of centripetal forces (all the advantages offered by mutualisation) and centrifugal forces (all the costs generated by mutualisation). Such a reading grid makes it possible to consider the multidimensional trade-offs underlying the organisation of MOC in Europe.
Journal: Defense & Security Analysis
Pages: 169-189
Issue: 2
Volume: 38
Year: 2022
Month: 04
X-DOI: 10.1080/14751798.2022.2062886
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2062886
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:169-189
Template-Type: ReDIF-Article 1.0
Author-Name: Ash Rossiter
Author-X-Name-First: Ash
Author-X-Name-Last: Rossiter
Author-Name: Brendon J. Cannon
Author-X-Name-First: Brendon J.
Author-X-Name-Last: Cannon
Title: Turkey's rise as a drone power: trial by fire
Abstract:
Turkey's production and operational use of its own armed drones has grabbed much media attention and caused consternation in some regional capitals. Not only has Turkey emerged as one of the world's most prolific users of largely indigenously built armed drones but it has also become a major exporter of these systems. Analyses put Turkey's position as a major drone power down to long-term strategic calculation. Whilst Ankara's emergence as a serious drone player is certainly no accident – it is the output of a concerted state effort – this article emphasises how Turkish political-military leaders have absorbed military and political lessons from early forays into armed drone usage and adjusted foreign policy and military tactics accordingly. Such a non-linear evolution of its drone strategy suggests future change in how Turkey seeks to derive benefits from this niche capability.
Journal: Defense & Security Analysis
Pages: 210-229
Issue: 2
Volume: 38
Year: 2022
Month: 04
X-DOI: 10.1080/14751798.2022.2068562
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2068562
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:210-229
Template-Type: ReDIF-Article 1.0
Author-Name: Sebastian Bruns
Author-X-Name-First: Sebastian
Author-X-Name-Last: Bruns
Title: Of high tides and of perfect storms: US Navy strategic planning, 1970s–1990s
Journal: Defense & Security Analysis
Pages: 238-241
Issue: 2
Volume: 38
Year: 2022
Month: 04
X-DOI: 10.1080/14751798.2022.2068230
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2068230
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:238-241
Template-Type: ReDIF-Article 1.0
Author-Name: James A. Russell
Author-X-Name-First: James A.
Author-X-Name-Last: Russell
Title: Maritime strategy and naval power in the 21st century – dissembling the Rubik’s cube
Journal: Defense & Security Analysis
Pages: 230-237
Issue: 2
Volume: 38
Year: 2022
Month: 04
X-DOI: 10.1080/14751798.2022.2066963
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2066963
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:230-237
Template-Type: ReDIF-Article 1.0
Author-Name: Urszula Staśkiewicz
Author-X-Name-First: Urszula
Author-X-Name-Last: Staśkiewicz
Title: Non-governmental pro-defence organisations in Poland – untapped potential for enhancing Polish defence capabilities?
Abstract:
The article’s purpose is to indicate the hypothesis that non-governmental organisations, specialised in pro-defence and paramilitary activities, have untapped potential defence capabilities in Poland. Therefore, in order to validate the thesis, the article highlights the impact of non-governmental organisations that were operating in Poland between the two world wars and during the time of the Polish People’s Republic. Moreover, conclusions from the abovementioned subject matter are compared with the Estonian law concerning cooperation with defence NGOs within the Estonian defence system. Finally, the article provides conclusions on the Polish government’s financial support for the pro-defence and paramilitary non-governmental organisations and also evaluates existing legal provisions that are covered by such support.
Journal: Defense & Security Analysis
Pages: 125-145
Issue: 2
Volume: 38
Year: 2022
Month: 04
X-DOI: 10.1080/14751798.2022.2059049
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2059049
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:2:p:125-145
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2085538_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Ava Avila
Author-X-Name-First: Ava
Author-X-Name-Last: Avila
Author-Name: Ron Matthews
Author-X-Name-First: Ron
Author-X-Name-Last: Matthews
Title: The Philippine defence-development-disaster security paradigm
Abstract:
The Philippines suffers from three threats to its national security. Firstly, unlike advanced states, it faces both external and internal assaults on its political and territorial sovereignty. Secondly, self-sustaining economic security remains elusive, with the country failing to emulate the economic successes of its ASEAN neighbours, Singapore and Malaysia. Thirdly, the archipelago must constantly contend with the destabilising effects of natural disasters, including volcanic eruptions, typhoons, and earthquakes. Manila's policy responses to these three disparate, but interlinked threats, have been conditioned by four centuries of Spanish, American, and Japanese occupation. The Philippine government remains a work in progress as diverse efforts to build institutional capacity have produced uneven results. Nevertheless, recent innovative policy approaches are instructive. These are framed around what might be termed a D3 (Defence-Development-Disaster) security paradigm, covering external military security, internal security and non-traditional security, including the Duterte administration's “drug war”
Journal: Defense & Security Analysis
Pages: 269-283
Issue: 3
Volume: 38
Year: 2022
Month: 07
X-DOI: 10.1080/14751798.2022.2085538
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2085538
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:269-283
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2093433_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: James J. Wirtz
Author-X-Name-First: James J.
Author-X-Name-Last: Wirtz
Title: Imagining maritime conflict in the Indo-Pacific: can analogies substitute for strategy?
Abstract:
Historical analogies are sometimes used to imagine the scope and nature of a potential conflict in the Indo-Pacific. Using analogies, scenarios, and “images” of future war, instead of strategy, however, can produce an inadequate assessment of future material, operational, and tactical requirements that will be encountered by the U.S. Navy in the maritime domain. Without a long-term strategy to set force development and guide operational requirements, the U.S. Navy will suffer from a “strategy deficit” when it comes to dealing with deterrence, coercion, and escalation in the Indo-Pacific. As planning guidance, the use of analogies is no substitute for strategy.
Journal: Defense & Security Analysis
Pages: 349-368
Issue: 3
Volume: 38
Year: 2022
Month: 07
X-DOI: 10.1080/14751798.2022.2093433
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2093433
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:349-368
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2085537_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Luke Hally
Author-X-Name-First: Luke
Author-X-Name-Last: Hally
Title: The Politicisation of Archaeology in Border Demarcation Conflict in the Asia Pacific Region
Abstract:
Within contemporary developments of Asian regional security, a core undertone of conflict catalysts and motivations for territorial claims is directly motivated through archaeological findings. These findings include artefacts and settlements, which are utilised to justify political and territorial claims in the region. This overlooked factor will be analysed using three regional case studies through an archaeological and security studies lens. The research aims to further understand Asia Pacific regional security and political disputes and reflect conflict motivation undertones of each interacting nation-state. The article assesses core case studies of Chinese claims in the South China Sea, Japanese and Korean island claims, and Thai-Cambodian temple disputes. The research will analyse how site evidence becomes politicised to justify territorial claims in Asia- Pacific. Through interdisciplinary research, the article will conclude with a greater understanding of assessing conflict development and motivations between state actors in the Asia Pacific region.
Journal: Defense & Security Analysis
Pages: 258-268
Issue: 3
Volume: 38
Year: 2022
Month: 07
X-DOI: 10.1080/14751798.2022.2085537
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2085537
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:258-268
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2093460_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Kogila Balakrishnan
Author-X-Name-First: Kogila
Author-X-Name-Last: Balakrishnan
Author-Name: Zsolt Lazar
Author-X-Name-First: Zsolt
Author-X-Name-Last: Lazar
Title: The challenges in buyer-supplier relationship for technological absorption capability in international defence acquisition: the case of Southeast Asia
Abstract:
Transfer of technology (TOT) is a contentious issue in the international defence trade. In 2019 it was estimated to form at least 40%, or $123 billion USD, of total international defence trade. Whilst purchasing nations set requirements for TOT within their industrial participation (IP) policies, there is often a mismatch between the scale and type of technology suppliers can offer and the buyer’s technological absorption capability (TAC). This persistent tension between ambition and reality frequently strains the buyer-supplier relationship. Thus, understanding how TAC can be enhanced is of vital importance. This paper defines TAC in the international defence acquisition and offsets context and determines the factors for successful TAC. The paper focusses on the potential challenges for successful TAC and offers recommendations on how to enhance TAC. This research is limited to the context of Southeast Asia. The respondents consist of industry, government and academics who operate in the Southeast Asian defence and security sector.
Journal: Defense & Security Analysis
Pages: 317-335
Issue: 3
Volume: 38
Year: 2022
Month: 07
X-DOI: 10.1080/14751798.2022.2093460
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2093460
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:317-335
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2088331_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Haneol Lee
Author-X-Name-First: Haneol
Author-X-Name-Last: Lee
Title: Evaluating civil-military relationship for effective procurement decision-making: the case of two fighter jet procurements of the Republic of Korea
Abstract:
Overseas procurement aims not only to acquire the most high-end weapons systems, but also to enhance their technological expertise. However, the degree to which a procuring state succeeds in these dual objectives varies. Sometimes, a state acquires nearly the most advanced weapon systems in a timely manner with significant terms of technology transfer. At other times, a state’s procurement is fraught with a series of disadvantageous decisions on technology transfer, maintenance, and timeliness. From where does this variation in effectiveness emanate? This article argues that the key to explaining these variations is civil–military co-ordination. States can secure effectiveness when a civilian chief executive proactively capitalises on appointment authority and/or when proactive civil–military consultations transpire. For these causations, this article studies two major fighter jet procurement activities of the Republic of Korea (ROK), the Korea Fighter Project (KFP) and the Fighter eXperimental-I (FX-I) programme.
Journal: Defense & Security Analysis
Pages: 296-316
Issue: 3
Volume: 38
Year: 2022
Month: 07
X-DOI: 10.1080/14751798.2022.2088331
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2088331
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:296-316
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2084816_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Richard A. Bitzinger
Author-X-Name-First: Richard A.
Author-X-Name-Last: Bitzinger
Title: The security environment in the Asia-Pacific: the context for arming
Abstract:
Countries in the Asia-Pacific have many reasons for acquiring new defense hardware and improving national military capabilities. The region is clearly one of constantly shifting security dynamics, with rising great powers, new threats and security challenges, and new military commitments. All of these require new capabilities for power projection, mobility, firepower, intelligence and surveillance, and joint operations, thereby driving regional military modernisation. Consequently, some of the most modern and most advanced armaments are finding their way into the inventories of Asian militaries. Many regional militaries have experienced a significant, if not unprecedented, build-up in terms of both quantity and quality, over the past several years. Recent acquisitions by regional armed forces constitute something more than mere modernisation; rather, the new types of armaments being procured and deployed promise to significantly expand regional maritime and airborne warfighting capabilities.
Journal: Defense & Security Analysis
Pages: 247-257
Issue: 3
Volume: 38
Year: 2022
Month: 07
X-DOI: 10.1080/14751798.2022.2084816
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2084816
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:247-257
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2084815_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Laxman Kumar Behera
Author-X-Name-First: Laxman Kumar
Author-X-Name-Last: Behera
Title: Made in India: an aspiring brand in global arms bazaar
Abstract:
With INR 107.45 billion ($1.54 billion) worth of arms exports and export authorisations in 2018–2019, India realised its biggest annual defence export ambition to date. Breaking into the world’s top 25 defence exporters for the first time, India has set its goal even higher, with a target of INR 300 billion ($5 billion) in defence exports by 2025. Can India achieve the goal and join the ranks of major arms exporting countries? What would it take for India to realise its defence export goal? And what has India done to achieve it? The paper examines India’s recent defence export performance and, in so doing, it probes various reform initiatives taken by the Indian government to promote international arms sales. The article argues that India has a significant domestic arms manufacturing capability, which, if harnessed properly, could propel the country as a significant player in the global arms bazaar.
Journal: Defense & Security Analysis
Pages: 336-348
Issue: 3
Volume: 38
Year: 2022
Month: 07
X-DOI: 10.1080/14751798.2022.2084815
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2084815
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:336-348
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2085109_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Pascal Lottaz
Author-X-Name-First: Pascal
Author-X-Name-Last: Lottaz
Author-Name: Heinz Gärtner
Author-X-Name-First: Heinz
Author-X-Name-Last: Gärtner
Title: Dual-neutrality for the Koreas: a two-pronged approach toward reunification
Abstract:
This article builds a novel argument for the unification of the two Korean states by way of a dual neutralisation process. After reviewing the neutralisation concept and the history of neutrality ideas for the peninsula, the authors introduce two historical models that would fit the security needs of both Koreas and their respective security partners. Using a realist framework, it is argued that the “Finlandisation” of the DPRK on the one hand; and the “Austriasation” of the ROK on the other, would not change the de facto security relationships with their patrons, but would create the structural underpinning for future foreign policy compatibility. Assuming other factors remain equal and a solution to internal political division could be brokered, the article proposes a security framework for both states aimed at separately creating the structures for a future unified neutral Korea.
Journal: Defense & Security Analysis
Pages: 284-295
Issue: 3
Volume: 38
Year: 2022
Month: 07
X-DOI: 10.1080/14751798.2022.2085109
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2085109
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:284-295
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2094857_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Zsolt Lazar
Author-X-Name-First: Zsolt
Author-X-Name-Last: Lazar
Author-Name: Kogila Balakrishnan
Author-X-Name-First: Kogila
Author-X-Name-Last: Balakrishnan
Title: Asia-Pacific special edition – introduction
Journal: Defense & Security Analysis
Pages: 243-246
Issue: 3
Volume: 38
Year: 2022
Month: 07
X-DOI: 10.1080/14751798.2022.2094857
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2094857
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:3:p:243-246
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2076343_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Colonel Ronald Ti
Author-X-Name-First: Colonel Ronald
Author-X-Name-Last: Ti
Title: The strategic vulnerability of NATO blood supply logistics: a case study of Estonian national defence
Abstract:
If an event triggers Article V and NATO is drawn into defensive combat operations, there could well be more dead and wounded than the West has encountered before. Most casualties will result from combat trauma and require both surgery and blood transfusion to survive. Under NATO’s split “collective-individual” responsibility system, should national blood logistic systems be unable to deliver; and with NATO unable to exercise overall coordination, serious consequences for individual morale, the will to fight, and overall combat capability will occur, producing dire strategic outcomes. This article focusses on NATO blood supply logistics and highlights current deficiencies, using Estonian Defence Force blood supply logistics as its working example. The article’s principal argument is that blood supply logistics has “tactical-level” effects which have critical flow-on strategic effects on issues such as force preservation and morale. Blood supply logistics is a complex issue urgently requiring concerted NATO, multinational, and national attention.
Journal: Defense & Security Analysis
Pages: 369-388
Issue: 4
Volume: 38
Year: 2022
Month: 10
X-DOI: 10.1080/14751798.2022.2076343
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2076343
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:369-388
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2122204_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Stephen Blank
Author-X-Name-First: Stephen
Author-X-Name-Last: Blank
Title: Gunboat diplomacy à la Russe: Russia’s naval base in Sudan and its implications
Abstract:
In 2020 Russia acquired a new naval base or logistic support centre off Sudan’s coast in Port Sudan. This base represents the culmination to date of Moscow’s quest for bases in and around the Mediterranean, Horn of Africa, and even the Indian Ocean. While the politics of obtaining and developing this base pertain largely to Moscow’s Africa policy; this paper focuses upon Russia’s overall naval strategy and its linked power projection programme. These strategies have hitherto been insufficiently appreciated abroad and it is hoped that this assessment will galvanise greater attention to them.
Journal: Defense & Security Analysis
Pages: 470-489
Issue: 4
Volume: 38
Year: 2022
Month: 10
X-DOI: 10.1080/14751798.2022.2122204
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2122204
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:470-489
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2110701_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Col (ret) Gerhard M. Louw
Author-X-Name-First: Col (ret) Gerhard M.
Author-X-Name-Last: Louw
Author-Name: Abel Esterhuyse
Author-X-Name-First: Abel
Author-X-Name-Last: Esterhuyse
Title: South African defence decision-making: analysing dysfunctional approaches
Abstract:
Defence planning in South Africa has gradually declined to the point of collapse; for reasons that are both complex and largely unexplained. While South Africa is not alone in this situation, the paucity of universal theories to explain the ineffectiveness of defence planning currently limits the theoretical validity of analyses that seek to address the phenomenon. Generating a substantive hypothesis that explains not only the causes of South Africa's current defence predicament, but also those of other countries in similar circumstances, became the paper's primary purpose. By abstracting from theories in management sciences and security studies, the paper concludes that top management's approaches to defence planning are the primary mechanisms that bring about success or failure in defence decision-making. The authors subsequently integrate relevant critical, contextual, and functional approaches to defence planning in a theoretical framework, using empirical evidence from the South African defence environment to substantiate their arguments throughout.
Journal: Defense & Security Analysis
Pages: 389-409
Issue: 4
Volume: 38
Year: 2022
Month: 10
X-DOI: 10.1080/14751798.2022.2110701
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2110701
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:389-409
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2125708_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Kenneth Boutin
Author-X-Name-First: Kenneth
Author-X-Name-Last: Boutin
Title: Transnational industry and national security: China and American industrial security
Abstract:
Concern over the national security implications of transnational industrial integration is growing in the United States. Direct and indirect Sino-American integration in high-technology industrial sectors is regarded as a threat to American industrial security in terms of the National Technology and Industrial Base and technological primacy. The American government has launched a number of national and international initiatives to strengthen the resilience of American defence supply chains and limit China’s capacity to derive defence-industrial benefits from industrial ties. The emerging industrial security framework supports the functional requirements of American defence firms, but threatens American arms programmes through its potential impact on the affordability of arms, the flexibility of arms production arrangements, the scale and time frame of arms production, and the development of arms over the long-term, as restrictions on offshore collaboration threaten industrial processes that are central to high-technology production and development.
Journal: Defense & Security Analysis
Pages: 431-452
Issue: 4
Volume: 38
Year: 2022
Month: 10
X-DOI: 10.1080/14751798.2022.2125708
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2125708
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:431-452
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2117285_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Andrew Dowse
Author-X-Name-First: Andrew
Author-X-Name-Last: Dowse
Author-Name: Sascha Dov Bachmann
Author-X-Name-First: Sascha Dov
Author-X-Name-Last: Bachmann
Title: Information warfare: methods to counter disinformation
Abstract:
The information age has transformed society by allowing people to interact digitally, yet it enables motivated actors to use mass influence to further their political objectives. The struggle against disinformation requires an appreciation of how a disinformation effect can be achieved in order to counter it. We consider the nature of disinformation and its use in the hybrid warfare domain, before examining the problem through frames of planning approach, truth theory, systems thinking, and military strategy. These approaches are informative in developing counter-strategies and we specifically identify the concept of kill chains as a useful framework to assist in the disinformation challenge.
Journal: Defense & Security Analysis
Pages: 453-469
Issue: 4
Volume: 38
Year: 2022
Month: 10
X-DOI: 10.1080/14751798.2022.2117285
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2117285
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:453-469
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2114582_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20220907T060133 git hash: 85d61bd949
Author-Name: Guillermo López-Rodríguez
Author-X-Name-First: Guillermo
Author-X-Name-Last: López-Rodríguez
Title: Building military expeditionary culture: Spanish Army after international operations
Abstract:
This article analyses the Spanish experience in military operations abroad, studying the functions it carried out in order to demonstrate how expeditionary experience has shaped military change processes. Using a database built from the Spanish Army’s online missions register, as well as from 23 personal interviews conducted with Spanish servicemen, this research focuses on how the Spanish Army has changed through its overseas deployments and how its organisational culture has evolved. The results obtained show a tangible transformation, which has modified procedures, military equipment, and operational functions. There have also been intangible transformations, reflected in the mentality and awareness of military personnel, readying them for deployment anywhere and anytime.
Journal: Defense & Security Analysis
Pages: 410-430
Issue: 4
Volume: 38
Year: 2022
Month: 10
X-DOI: 10.1080/14751798.2022.2114582
File-URL: http://hdl.handle.net/10.1080/14751798.2022.2114582
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:38:y:2022:i:4:p:410-430
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2146052_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Uğur Ermiş
Author-X-Name-First: Uğur
Author-X-Name-Last: Ermiş
Author-Name: Günseli Gümüşel
Author-X-Name-First: Günseli
Author-X-Name-Last: Gümüşel
Title: Why the Turkish defense industry between 1919 and 1950 failed?
Abstract:
This study seeks to answer why Turkey could not reach its defense industry targets despite the efforts between 1919-1950. Defense industry was significant for the government's foreign policies and efficiency. The problems in defense industrial infrastructure and absence of a private industrial sector were significant reasons for falling of the empire. During Turkish Independence War and in early Republican Era, lack of national defense industry remained as a crucial problem. Thus the government considered the establishment of indigenous defense industry as a strategic target and invested limited resources. Despite, by the end of the World War II, Turkish Republic still failed to fulfil military requirements. This failure led Turkey to join NATO due to security requirements against USSR. It led to dependency on Western military assistance. Turkey's failure was due to lack of corporate planning, inadequate investment financing, and the difference between current human resources and strategic target requirements.
Journal: Defense & Security Analysis
Pages: 1-14
Issue: 1
Volume: 39
Year: 2023
Month: 01
X-DOI: 10.1080/14751798.2023.2146052
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2146052
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:1-14
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2159103_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Matthew Powell
Author-X-Name-First: Matthew
Author-X-Name-Last: Powell
Title: Defence procurement in perspective: what the history of the aircraft industry can tell us about UK defence procurement
Abstract:
Defence procurement in the UK has drawn a large degree of political and academic attention due to large-scale projects regularly being delayed and costing significantly more than the original estimate. The focus on contemporary defence procurement, however, suffers from one major drawback: a lack of historical contexualistation. This article redresses this imbalance between the focus on contemporary defence procurement and the problems faced purchasing military equipment in the past. The defence industry most representative of the contemporary procurement environment is the British aircraft industry in the inter-war period. This was an industry that was not publicly owned and presented dynamics that are comparable to today. This article explores the problems associated with twenty-first century defence procurement through this historical lens, demonstrating that many of the problems faced, and solutions proposed are not necessarily as new or innovative as has been claimed.
Journal: Defense & Security Analysis
Pages: 15-33
Issue: 1
Volume: 39
Year: 2023
Month: 01
X-DOI: 10.1080/14751798.2023.2159103
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2159103
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:15-33
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2166520_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Gershon Adela
Author-X-Name-First: Gershon
Author-X-Name-Last: Adela
Title: Institutional counterinsurgency frameworks in the Lake Chad Basin: the case of the Multinational Joint Task Force against Boko Haram
Abstract:
The Multinational Joint Task Force (MNJTF) is engaged in active combat operations against Boko Haram in the Lake Chad Basin, but the latter remains very resilient and continues to launch lethal attacks. Yet, scholarship has failed to examine the institutional circumstances that account for the lack of success by the MNJTF. This article explores the influence of the counterinsurgency frameworks of the Organization of African Unity (OAU)/African Union (AU), Economic Community of West Africa States (ECOWAS), and the Economic Community of Central African States (ECCAS) on the operations of the MNJTF. It takes a critical look at how the MNJTF’s states’ affiliation to separate sub-regional blocs influences military and intelligence cooperation among them. The article argues that the AU, ECOWAS, and ECCAS institutional counterinsurgency frameworks severely limit military and intelligence collaboration among its member nations, therefore impeding the MNJTF’s operations.
Journal: Defense & Security Analysis
Pages: 91-110
Issue: 1
Volume: 39
Year: 2023
Month: 01
X-DOI: 10.1080/14751798.2023.2166520
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2166520
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:91-110
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2157942_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Marcin Lasoń
Author-X-Name-First: Marcin
Author-X-Name-Last: Lasoń
Title: The position of the special operations forces soldiers on the so-called global war on terrorism. A survey report
Abstract:
Operations involving special operations forces are veiled in mystery, and public opinion is usually not well informed. The period of the last twenty years, beginning with the terrorist attacks of 09/11, has been no exception. But occasionally, official reports and the results of investigative journalism are published, very often criticising the actions of special operations forces soldiers. Given the secretive nature of special operations forces, researching these groups is challenging. The paper provides Special operations forces soldiers' views on the so-called global war on terrorism based on their views, observations, and experiences. There are individual opinions present in published testimonies of special operations forces members around the world. However, the research that includes a vast sample of seasoned, Polish special operations forces soldiers is an initial and original attempt to fill the gaps in the academic knowledge of the subject.
Journal: Defense & Security Analysis
Pages: 47-72
Issue: 1
Volume: 39
Year: 2023
Month: 01
X-DOI: 10.1080/14751798.2023.2157942
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2157942
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:47-72
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2163997_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Zbigniew Galar
Author-X-Name-First: Zbigniew
Author-X-Name-Last: Galar
Author-Name: Adam Sadowski
Author-X-Name-First: Adam
Author-X-Name-Last: Sadowski
Title: Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Abstract:
Polish border guards can’t stop a few dozen fast-wheeled APCs and IFVs. If such a force would cross through any road at the eastern border of Poland, it would pass almost intact. Afterward, it would be an easy target, but only before it could hide in a dense urban area. Is eastern Poland prepared for such a surprise attack of under a hundred vehicles that could arrive in many city centres within an hour after the border crossing? If a Russian force arrives at even a medium-sized city centre, they could occupy and hold such a position for weeks and use local civilians as human shields. They could force political negotiations holding also precious city infrastructure hostage. Lack of fast and decisive decision-making which is highly likely (because any bombardment will mean a loss of life of civilians) will only make any attempt to regain the city more difficult.
Journal: Defense & Security Analysis
Pages: 111-117
Issue: 1
Volume: 39
Year: 2023
Month: 01
X-DOI: 10.1080/14751798.2023.2163997
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2163997
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:111-117
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2170515_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Reuben Steff
Author-X-Name-First: Reuben
Author-X-Name-Last: Steff
Title: Artificial intelligence and the future of warfare: the USA, China and strategic stability
Journal: Defense & Security Analysis
Pages: 118-121
Issue: 1
Volume: 39
Year: 2023
Month: 01
X-DOI: 10.1080/14751798.2023.2170515
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2170515
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:118-121
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2147637_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Yoram Fried
Author-X-Name-First: Yoram
Author-X-Name-Last: Fried
Title: Identifying and planning military potential and national power: the case of the Israeli civilian-military planning units
Abstract:
Research on the military potential/national power has focused on features such as numbers of soldiers, the military budget, population size, industrial production, technology, and others as underlying national power. The geopolitical situation of the State of Israel made the IDF General Staff the arbiter of any planning decision related to the development of the state economy, and responsible for planning and directing national security. Because the asymmetry between the military potential of the Arab countries and that of Israel was a reality on the ground that Israel’s national security concept had to take into consideration, and because modern warfare is between nations, their material forces and their mental capacities, the Israel Defence Forces [IDF] recommended setting up civil–military Planning Units based on military guidelines to identify, calculate and plan specific areas of national potential such as administration and regime, morale and education, static defence, the economy in wartime, and manpower.
Journal: Defense & Security Analysis
Pages: 73-90
Issue: 1
Volume: 39
Year: 2023
Month: 01
X-DOI: 10.1080/14751798.2023.2147637
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2147637
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:73-90
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2162140_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Spyridon Plakoudas
Author-X-Name-First: Spyridon
Author-X-Name-Last: Plakoudas
Title: The Greek defence industry: from crisis to equilibrium
Abstract:
Greece was never internationally renowned for its defence industry; in fact, its state-owned industries were usually a source of headaches rather than income for Athens. The Debt Crisis (2008-18) compounded the chronic ills of the Greek defence ecosystem which appeared to decline irreversibly. And yet, in recent years they rebounded and reached new heights. How can this surprising turnaround be explained? And what does it indicate for the future of the Greek defence industry? This paper aspires to examine how the Greek defence ecosystem (state- and private-owned) evolved from a stage of stagnation and decline into a phase of stabilisation.
Journal: Defense & Security Analysis
Pages: 34-46
Issue: 1
Volume: 39
Year: 2023
Month: 01
X-DOI: 10.1080/14751798.2023.2162140
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2162140
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:1:p:34-46
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2178519_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: James Rogers
Author-X-Name-First: James
Author-X-Name-Last: Rogers
Title: The Second Drone Age: defining war in the 2020s
Journal: Defense & Security Analysis
Pages: 256-259
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2178519
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178519
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:256-259
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2178071_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Ilan Shklarsky
Author-X-Name-First: Ilan
Author-X-Name-Last: Shklarsky
Author-Name: Eitan Shamir
Author-X-Name-First: Eitan
Author-X-Name-Last: Shamir
Title: Driving innovation in air power: the cold war’s four generations of fighter jets
Abstract:
The aim of this article is to add an air power perspective to the innovation field, with emphasis on the development of jet fighters. Contemporary theory has not adequately addressed air power-related significant innovation, a shortcoming this article addresses. Using in-depth qualitive research methodology with eight diverse case-studies in the Cold War period, we show that innovation of jet fighters was typically initiated in response to hegemonic tensions, immediate threats and organsational factors such as civil–military relations, bureaucratic politics, and air force innovation culture. Moreover, through a comparative analysis we argue that significant and successful air power innovation is achieved through proficiency and knowledge gained by constant learning of air power theory and bottom-up innovation mechanisms. Looking forward, this study may be significant for assisting military professionals in making better-informed decisions about the use of fifth-generation air power by implementing past lessons learned into contemporary theory and future plans.
Journal: Defense & Security Analysis
Pages: 146-170
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2178071
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178071
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:146-170
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2178541_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Antonio Calcara
Author-X-Name-First: Antonio
Author-X-Name-Last: Calcara
Author-Name: Ivan Zaccagnini
Author-X-Name-First: Ivan
Author-X-Name-Last: Zaccagnini
Author-Name: Mauro Gilli
Author-X-Name-First: Mauro
Author-X-Name-Last: Gilli
Author-Name: Andrea Gilli
Author-X-Name-First: Andrea
Author-X-Name-Last: Gilli
Title: Military drones, air defence, and the hider-finder competition in air warfare
Journal: Defense & Security Analysis
Pages: 260-262
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2178541
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178541
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:260-262
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2191809_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Thomas C. Bruneau
Author-X-Name-First: Thomas C.
Author-X-Name-Last: Bruneau
Title: American Defense Reform: Lessons from Failure and Success in Navy History
Journal: Defense & Security Analysis
Pages: 275-277
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2191809
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2191809
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:275-277
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2178069_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Tahir Mahmood Azad
Author-X-Name-First: Tahir Mahmood
Author-X-Name-Last: Azad
Author-Name: Karl Dewey
Author-X-Name-First: Karl
Author-X-Name-Last: Dewey
Title: Assessing the security of Pakistan’s nuclear weapon programme
Abstract:
Although the broad outlines of Pakistan's nuclear weapons' programme are well documented, significant gaps remain in the understanding of the country's nuclear security regime. Nuclear security remains a highly politicised topic, with little robust information available regarding the steps taken to secure the country's nuclear assets. To help “fill the gaps”, this paper places official Pakistani documents, statements, and other open source information, into an analytical framework based on international standards of physical security. Although gaps in understanding remain, this paper finds that, in general, Pakistan has enacted robust security measures to protect its nuclear weapons and nuclear-weapons related infrastructure. Nonetheless, the prevailing perception of Pakistan's nuclear security remains dominated by embarrassing episodes that emphasise the importance of effective nuclear security culture. Based on its findings, this paper also offers policy recommendations which may offer additional confidence about the rigours of the country's nuclear security regime.
Journal: Defense & Security Analysis
Pages: 123-145
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2178069
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178069
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:123-145
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2210368_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Carl Gibson
Author-X-Name-First: Carl
Author-X-Name-Last: Gibson
Title: Islamic state’s online propaganda: a comparative analysis
Journal: Defense & Security Analysis
Pages: 277-278
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2210368
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2210368
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:277-278
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2185947_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: SeyedMilad KashefiPour Dezfuli
Author-X-Name-First: SeyedMilad KashefiPour
Author-X-Name-Last: Dezfuli
Title: Targeted killings and the erosion of international norm against assassination
Abstract:
In recent years State-sponsored assassination, reframed as “targeted killing” in the context of the war on terrorism, is undergoing a normalisation process due to the hybrid and asymmetrical threat of international terrorism. A more recent concern is the extension of the practice to the realm of inter-state relations, as exemplified by the assassination of the Iranian General Soleimani in January 2020. This paper argues that normative transformations in our understanding of concepts such as state sovereignty, alongside the persistence of inclusion/exclusion criteria in international relations, have facilitated the application of techniques and practices developed in response to non-state military threats in inter-state relations.
Journal: Defense & Security Analysis
Pages: 191-206
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2185947
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2185947
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:191-206
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2182479_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Wayne Stephen Coetzee
Author-X-Name-First: Wayne Stephen
Author-X-Name-Last: Coetzee
Author-Name: Joakim Berndtsson
Author-X-Name-First: Joakim
Author-X-Name-Last: Berndtsson
Title: Understanding Sweden’s security economy
Abstract:
This article aims to map out and analyse how Sweden’s security economy is shaped and sustained through security policies, political decisions, and personal connections amongst commercial and state elites. We treat the arms and security service industries as two sides of the same coin. In doing so, we address a shortcoming in the security literature that often analyses these two fields as separate areas of study with their own set of logic, research questions, theories, and methodologies. By bringing these two areas together, our study contributes to knowledge of the relationship between commercial defence and security actors and the state and a deeper understanding of Sweden’s security economy.
Journal: Defense & Security Analysis
Pages: 171-190
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2182479
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2182479
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:171-190
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2178571_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Marc R. DeVore
Author-X-Name-First: Marc R.
Author-X-Name-Last: DeVore
Title: “No end of a lesson:” observations from the first high-intensity drone war
Journal: Defense & Security Analysis
Pages: 263-266
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2178571
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178571
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:263-266
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2210367_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Lance Y. Hunter
Author-X-Name-First: Lance Y.
Author-X-Name-Last: Hunter
Author-Name: Craig D. Albert
Author-X-Name-First: Craig D.
Author-X-Name-Last: Albert
Author-Name: Christopher Henningan
Author-X-Name-First: Christopher
Author-X-Name-Last: Henningan
Author-Name: Josh Rutland
Author-X-Name-First: Josh
Author-X-Name-Last: Rutland
Title: The military application of artificial intelligence technology in the United States, China, and Russia and the implications for global security
Abstract:
A number of studies have considered the theoretical role that Artificial Intelligence (AI) may play in shaping the global balance of power in the future. While these studies are informative, we currently lack an understanding regarding the precise manner AI technologies are being applied and incorporated in militaries in major power states. Thus, in this study, we examine how AI technology is being applied in the militaries in the US, China, and Russia and analyse the implications for the future of AI, global military competition, and international security. We examine current research on the military application of AI technology in the US, China, and Russia and conduct expert interviews with leading AI experts in academia, think tanks, multinational technology companies, and the military to better understand how AI technology is being applied in the three major powers states and the implications for global security.
Journal: Defense & Security Analysis
Pages: 207-232
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2210367
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2210367
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:207-232
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2178500_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Ash Rossiter
Author-X-Name-First: Ash
Author-X-Name-Last: Rossiter
Title: Military technology and revolutions in warfare: priming the drone debate
Abstract:
The collection of essays in the special debate tackle the claim that drones deserve their acquired status as a revolutionary technology that has indelibly recast warfare. It is a debate embedded within a long-running and contentious, broader discussion about the role technology plays an independent variable affecting the character and perhaps the nature of war. How far can the introduction of a new technology really alter ways of fighting or radically impact battlefield outcomes? The complexity of the issue is reflected in the diversity of positions and approaches taken by the debaters. The purpose of these papers is not to arrive at a conclusion through a dialectic process; rather, readers are left to form their own views after weighing up the strengths of the arguments presented.
Journal: Defense & Security Analysis
Pages: 253-255
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2178500
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178500
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:253-255
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2178577_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Brendon J. Cannon
Author-X-Name-First: Brendon J.
Author-X-Name-Last: Cannon
Title: Out of Africa: the impact of drones in Sub-Saharan conflicts
Journal: Defense & Security Analysis
Pages: 267-270
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2178577
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178577
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:267-270
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2191807_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Bryan T. Stinchfield
Author-X-Name-First: Bryan T.
Author-X-Name-Last: Stinchfield
Title: The military and commercial development of brain–computer interfaces: international (in)security with brain-machine teaming
Abstract:
Brain-computer interfaces (BCIs) are an emerging dual-use technology that will affect international security in ways similar to other dual-use technologies such as artificial intelligence, autonomous weapons, and cyber tools and tactics. In this paper, I use open sources and network analyses to reveal the structure of the BCI research and development industry, which indicates that BCIs will soon be operational, and the technology will diffuse across many sectors and regions. As a result, I argue that the unique qualities of BCIs will provide incentives to engage in conflict and disrupt international security; therefore, militaries in liberal democracies should strive to achieve and maintain BCI technological superiority over authoritarian regimes and violent non-state actors.
Journal: Defense & Security Analysis
Pages: 233-252
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2191807
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2191807
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:233-252
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2178599_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Sarah Kreps
Author-X-Name-First: Sarah
Author-X-Name-Last: Kreps
Author-Name: Paul Lushenko
Author-X-Name-First: Paul
Author-X-Name-Last: Lushenko
Title: Drones in modern war: evolutionary, revolutionary, or both?
Journal: Defense & Security Analysis
Pages: 271-274
Issue: 2
Volume: 39
Year: 2023
Month: 04
X-DOI: 10.1080/14751798.2023.2178599
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2178599
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:2:p:271-274
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2204595_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Stephen Blank
Author-X-Name-First: Stephen
Author-X-Name-Last: Blank
Title: How Ukraine reveals Russian nuclear strategy
Abstract:
If we examine the role played by nuclear weapons in Russia's war against Ukraine, we find that they play an offensive role in Russian strategy. The deterrence mission is as much intended to free Russia's hands for conventional war on its periphery as it is intended to prevent a nuclear first strike from the West. Indeed, the evidence of exercises etc. strongly points to a readiness for attacking Western sea-lines of communication in the Atlantic were a Western response to come as a result of the attack on Ukraine. Similarly, the potential for nuclear threat exists in the vicinity of the Black Sea as shown by Russian exercises in advance of the war there and in the Eastern Mediterranean. Those exercises reveal that Moscow's power projection policy into the Levant and beyond is also part of its deterrence strategy and has amongst its objectives protecting the Black Sea as a Russian lake, an inherently offensive posture. Therefore Russia's nuclear strategy in this war and in general stand revealed as offensive ones which the West must reckon with.
Journal: Defense & Security Analysis
Pages: 353-368
Issue: 3
Volume: 39
Year: 2023
Month: 07
X-DOI: 10.1080/14751798.2023.2204595
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2204595
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:353-368
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2235139_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Zdeněk Kříž
Author-X-Name-First: Zdeněk
Author-X-Name-Last: Kříž
Title: Concluding remarks: Russian invasion - the dawn of a new world order without American hegemony?
Journal: Defense & Security Analysis
Pages: 407-408
Issue: 3
Volume: 39
Year: 2023
Month: 07
X-DOI: 10.1080/14751798.2023.2235139
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2235139
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:407-408
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2202035_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Zdeněk Kříž
Author-X-Name-First: Zdeněk
Author-X-Name-Last: Kříž
Title: The costly gamble: how Russia's invasion of Ukraine weakened its role as a balancing power
Abstract:
Russia is not a superpower, and it is not a conventional great power either. Russia is a balancing great power (balancer), which since 2007 has been purposefully offsetting western influence in the international system and attempting to resist Western (American) hegemony. The paper develops the argument that the failed aggression against Ukraine has very significantly limited Russia’s ability to use available balancing techniques. Ukraine has clearly opted for a Western orientation because Russia has entirely lost its appeal. Russian positions in Central Asia and the Caucasus are weakened. In both areas, Russia must confront the growing activities of the EU, the US, China, and Turkey. Russia’s ability to manage an equilibrium between China and India in Asia is diminishing as it can no longer export sophisticated weapons. Russia’s conventional military capabilities have been significantly reduced. All in all, Russia’s relative position among the other great powers has deteriorated significantly.
Journal: Defense & Security Analysis
Pages: 387-406
Issue: 3
Volume: 39
Year: 2023
Month: 07
X-DOI: 10.1080/14751798.2023.2202035
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2202035
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:387-406
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2204596_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Martin Chovančík
Author-X-Name-First: Martin
Author-X-Name-Last: Chovančík
Author-Name: Oldřich Krpec
Author-X-Name-First: Oldřich
Author-X-Name-Last: Krpec
Title: Cloaked disintegration – Ukraine war and European defence-industrial co-operation in Central and Eastern Europe
Abstract:
Progress made in European defence-industrial integration has been subjected to the hardest test with the 2022 Russian invasion of Ukraine. The conflict has had profound implications for European defence industries across the board and spurred on massive investment into the sector. Based on extensive analysis of procurements, adopted policies, and shifts in discourse, we argue that the practical steps undertaken by Central and Eastern European (CEE) defence industries in the wake of the conflict are disintegrational. This is contrary to many discernible indicators which align with European integrational initiatives in defence. Moreover, the paper argues that the pattern of decisions taken by Central and Eastern European countries reinforces structural barriers to potential future European defence-industrial integration. The findings are significant to EU-wide, regional, and bilateral defence-industrial co-operation as well as national defence industrial strategies in reaction to the ongoing war in Ukraine.
Journal: Defense & Security Analysis
Pages: 369-386
Issue: 3
Volume: 39
Year: 2023
Month: 07
X-DOI: 10.1080/14751798.2023.2204596
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2204596
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:369-386
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2235124_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Zdeněk Kříž
Author-X-Name-First: Zdeněk
Author-X-Name-Last: Kříž
Title: Introduction
Journal: Defense & Security Analysis
Pages: 279-280
Issue: 3
Volume: 39
Year: 2023
Month: 07
X-DOI: 10.1080/14751798.2023.2235124
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2235124
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:279-280
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2201017_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Deborah Sanders
Author-X-Name-First: Deborah
Author-X-Name-Last: Sanders
Title: Ukraine’s third wave of military reform 2016–2022 – building a military able to defend Ukraine against the Russian invasion
Abstract:
This article explores an important and often overlooked element of Ukraine’s ability to defend itself against the Russian invasion in February 2022 – the adoption of a modified western transformational model of military reform – which has focused on mass and building a western style NATO interoperable and trained military. This article argues that Ukraine’s military reform since 2016, in particular the focus on Command and Control, the development of an NCO Corps and Special Forces as well as clear procurement priorities have created the enabling conditions for the development of a flexible and adaptable military force, able to limit Russia’s battlefield success and bring the fight to the enemy. Despite this progress, however, a recurring problem facing the Ukrainian military, that is likely to continue in the future, is how to balance the ongoing requirement for mass against the urgent need for military modernisation.
Journal: Defense & Security Analysis
Pages: 312-328
Issue: 3
Volume: 39
Year: 2023
Month: 07
X-DOI: 10.1080/14751798.2023.2201017
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2201017
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:312-328
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2235121_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Nicholas Marsh
Author-X-Name-First: Nicholas
Author-X-Name-Last: Marsh
Title: Responding to needs: military aid to Ukraine during the first year after the 2022 invasion
Abstract:
The article analyses the provision of military aid to Ukraine during the first year after the 2022 Russian invasion and explains why it was more effective compared to other examples. It discusses the impact of material and intangible military assistance. The article examines tensions arising from principal-agent relationships between Ukraine and the states that provided support that may have affected what was provided and when it was delivered. It is notable that providers of assistance emphasised equipment rather than training, a choice that could be made because Ukraine had already built up a high level of combat skills and military organisation. The article argues that the distinctive aspects of military assistance to Ukraine that led to its impact were the quality and quantity of equipment provided, good communication and co-ordination between Ukraine and those states providing assistance, and that Ukrainian defence and government institutions could manage the aid provided.
Journal: Defense & Security Analysis
Pages: 329-352
Issue: 3
Volume: 39
Year: 2023
Month: 07
X-DOI: 10.1080/14751798.2023.2235121
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2235121
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:329-352
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2201018_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Kateřina Fridrichová
Author-X-Name-First: Kateřina
Author-X-Name-Last: Fridrichová
Title: Mugged by reality: Russia's strategic narratives and the war in Ukraine
Abstract:
This article discusses the surprising lack of preparedness in Russian propaganda preceding the invasion of Ukraine on February 24, 2022. Despite previous successes in developing strategic narratives during the annexation of Crimea, Russia underestimated the need for unique communication strategies for the conflict in Ukraine. The article argues that Russia's miscalculation was due to the assumption that it already had a set of strategic narratives in place, from the international order to specific issues, and viewed the conflict as a continuation of the story it had already told. However, increased scrutiny from Western media and academia led to a reexamination of assumptions and attitudes towards the region. Instead of Russia adapting its strategic narrative for a Western audience, it fell back on the existing one, further alienating the audience. This chapter highlights the importance of strategic narrative in international conflicts and its complex relationship with audience perception.
Journal: Defense & Security Analysis
Pages: 281-295
Issue: 3
Volume: 39
Year: 2023
Month: 07
X-DOI: 10.1080/14751798.2023.2201018
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2201018
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:281-295
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2232188_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Richard Stojar
Author-X-Name-First: Richard
Author-X-Name-Last: Stojar
Title: The Russian invasion and its failure in the first days
Abstract:
In February 2022, Russia launched a large-scale military operation to take full control of the Ukrainian state. The invasion achieved virtually none of Russia's originally stated goals and instead of demonstrating Russian military power and effectiveness, it showed the exact opposite. Ambitious goals that were supposed to be achieved within a few days, turned out to be completely unrealistic. The war has become a long-term conflict of high intensity, instead of a flash military operation. The author argues that the cause of the Russian failure was not only the erroneous intelligence evaluation of the adversary by the Russian intelligence services and numerous mistakes of Russian units at the tactical and operational level. Rather, failure has also been due the structural weaknesses and shortcomings of the Russian army as institution. These long-term shortcomings were identified during the previous combat deployment of Russian forces in local conflicts and have never been resolved.
Journal: Defense & Security Analysis
Pages: 296-311
Issue: 3
Volume: 39
Year: 2023
Month: 07
X-DOI: 10.1080/14751798.2023.2232188
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2232188
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:3:p:296-311
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2254079_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Maria Constantinescu
Author-X-Name-First: Maria
Author-X-Name-Last: Constantinescu
Title: Using the concept of mission command in defence resources management – the case of Romania
Abstract:
Elements of mission command can be found in successful styles of leadership both in military and in business environments, as it is based on empowering subordinates or employees to make decisions, encouraging their confidence and creativity to solve problems/achieve objectives. The purpose of this paper is to explore the potential advantages and drawbacks of applying this concept to the field of defence resources management, by analysing the common areas between these approaches. The research hypothesis is that the concept of mission command can be approached as a management process aimed at achieving clearly identified objectives, similar to the processes of project management, programme management, or defence resource management in general. The paper uses qualitative research methods, based on the analysis of existing specialised literature regarding the concept of mission-based command, the concept of defence resource management, and on an exploratory research, based on unstructured interviews with specialists in the two fields.
Journal: Defense & Security Analysis
Pages: 481-501
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2254079
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2254079
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:481-501
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2240654_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Frank Daumann
Author-X-Name-First: Frank
Author-X-Name-Last: Daumann
Title: The client’s struggle to control private military companies effectively
Abstract:
Private military companies (PMC) offer combat and training services and can have considerable advantages for the client on the one hand, but on the other hand it is hard for the client to exercise effective external governance. Using tools of New Institutional Economics, we analyse the relationship between the PMC and the client and show that effects like adverse selection, moral hazard and supply induced demand are detrimental to the client. We derive approaches from the theory to solve the identified problems. With the help of a comparative case study (Wagner Group in Syria and Gurkha Security Guards in Sierra Leone), the insights gained are tested and put into perspective. It turns out that there must be an effective military or economic threat potential in particular in order to achieve good behaviour on the part of the PMC. In this way, we expand the insights of successful monitoring private providers of military force from the client's point of view.
Journal: Defense & Security Analysis
Pages: 432-451
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2240654
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2240654
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:432-451
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2257485_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Bohuslav Pernica
Author-X-Name-First: Bohuslav
Author-X-Name-Last: Pernica
Title: Military strategies of the new European allies. A comparative study. (Cass Military Studies)
Journal: Defense & Security Analysis
Pages: 565-567
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2257485
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2257485
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:565-567
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2257483_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Caroline Batka
Author-X-Name-First: Caroline
Author-X-Name-Last: Batka
Title: What’s in a name? Confucian considerations for referring to U.S. military contractors
Abstract:
Stakeholders use a number of different terms to refer to the contractors supporting expeditionary military operations. Often, these terms are inconsistently-applied, stigmatising, and unclear. This analysis uses the U.S. Department of Defense (DoD) as a case study for exploring the efforts that the U.S. military has taken to improve contractor terminology. The study finds that DoD uses the terms contractor, contractor personnel, and contractor employee to refer to organisations, groups of employees, and individual employees providing outsourced expeditionary services. DoD also uses a number of more specific terms to refer to certain contractors and relationships. However, there are gaps and inconsistencies in DoD’s terminological scheme, and challenges remain in differentiating contractors from other actors in war and in reconciling terminology across the U.S. Government and the international community. By contextualising DoD contractor terminology within the framework of the Confucian Rectification of Names, this study offers insights regarding contractors’ normative roles.
Journal: Defense & Security Analysis
Pages: 452-480
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2257483
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2257483
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:452-480
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2244300_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Caroline Batka
Author-X-Name-First: Caroline
Author-X-Name-Last: Batka
Title: Outsourcing national defense: why and how private contractors are providing public services
Journal: Defense & Security Analysis
Pages: 561-565
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2244300
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2244300
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:561-565
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2273632_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Zsolt Lazar
Author-X-Name-First: Zsolt
Author-X-Name-Last: Lazar
Title: In memoriam: Richard Bitzinger Scholar and Mentor Remembered
Journal: Defense & Security Analysis
Pages: 409-410
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2273632
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2273632
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:409-410
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2264070_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Michael Mayer
Author-X-Name-First: Michael
Author-X-Name-Last: Mayer
Title: Trusting machine intelligence: artificial intelligence and human-autonomy teaming in military operations
Abstract:
Continuous advances in artificial intelligence has enabled higher levels of autonomy in military systems. As the role of machine-intelligence expands, effective co-operation between humans and autonomous systems will become an increasingly relevant aspect of future military operations. Successful human-autonomy teaming (HAT) requires establishing appropriate levels of trust in machine-intelligence, which can vary according to the context in which HAT occurs. The expansive body of literature on trust and automation, combined with newer contributions focused on autonomy in military systems, forms the basis of this study. Various aspects of trust within three general categories of machine intelligence applications are examined. These include data integration and analysis, autonomous systems in all domains, and decision-support applications. The issues related to appropriately calibrating trust levels varies within each category, as do the consequences of poorly aligned trust and potential mitigation measures.
Journal: Defense & Security Analysis
Pages: 521-538
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2264070
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2264070
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:521-538
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2270230_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Zoltan Szenes
Author-X-Name-First: Zoltan
Author-X-Name-Last: Szenes
Title: Reinforcing deterrence: assessing NATO’s 2022 Strategic Concept
Abstract:
At the June 29, 2022, NATO summit in Madrid the heads of state and government adopted a new strategic concept for the alliance. The eighth strategic concept is the official long-term vision of NATO, at the same time it is the second most important document after the North Atlantic Treaty. This document describes the security environment the alliance faces, reaffirms the purpose and principles of the organisation, as well as its core defence tasks for the coming decade. As a crucial NATO document, it has an impact on the security and defence policy of the alliance and its member states; and sooner or later its ideas, principles, and requirements described in the concept will be materialised in the form of different policies, priorities, and tasks. The article examines comprehensively NATO's 2022 Strategic Concept, compares it with the 2010 Strategic Concept and the NATO 2030 Report. Given that the new Concept was adopted in the wake of the Russian-Ukrainian war, the study primarily deals with the Alliance's new perception of deterrence and defence and its planned measures. The analysis concludes that the Strategic Concept represents a significant shift away from the previous one, although it is an evolutionary document, and it has brought NATO into a new era of great power competition.
Journal: Defense & Security Analysis
Pages: 539-560
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2270230
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2270230
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:539-560
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2255382_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Haim Yogev
Author-X-Name-First: Haim
Author-X-Name-Last: Yogev
Author-Name: Ronen A. Cohen
Author-X-Name-First: Ronen A.
Author-X-Name-Last: Cohen
Author-Name: Eyal Lewin
Author-X-Name-First: Eyal
Author-X-Name-Last: Lewin
Title: The importance of war stratagem: the case study of the 1973 war Mount Hermon battles
Abstract:
This research empirically examines the common assumption in scholarly literature that a military stratagem leads to an advantage on battlefields. It focuses on three different forms of stratagem: (1) surprise, (2) deception, and (3) special tactics. We took the battles for the Mount Hermon outpost during the 1973 Arab-Israeli war as our case studies. Constructing an independent measures design, or a between-groups design, we treated the Golani Brigade (in a set of two battles), and the 317 Paratroopers Brigade (in another battle), as two separate groups of participants – one experiencing the use of stratagems and one avoiding this condition. Our analysis shows that stratagems prove to be highly effective; however, we also raise some reservations, calling for any generalisation to be taken with a grain of salt. This research can serve as a model for future examinations of other military campaigns throughout history.
Journal: Defense & Security Analysis
Pages: 502-520
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2255382
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2255382
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:502-520
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2245224_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Adam Shindler
Author-X-Name-First: Adam
Author-X-Name-Last: Shindler
Title: Warfare under scrutiny: British public perspectives of soldiers, and tactical behaviours in operation HERRICK
Abstract:
The importance of civil society to the military is well documented in UK Defence and Army policy, doctrine, and concepts. Civilian and military analyses commonly focus on the policy dimensions of the relationship whereby British civil society is deemed important for the legitimacy of campaigns. This research paper draws together less-common references from across the literature about a more direct impact that societal perspectives can have on deployed land operations and extends them through new archival research. It uses the military’s experience in Helmand to propose a model of “societal operational influence.” In this model tactical behaviours across the conceptual, physical, and moral components of Task Force Helmand’s fighting power altered in response to the military’s interpretation of public opinion about soldiers, which arguably resulted in changes to its culture.
Journal: Defense & Security Analysis
Pages: 411-431
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2245224
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2245224
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:411-431
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2257484_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20230119T200553 git hash: 724830af20
Author-Name: Zsolt Lazar
Author-X-Name-First: Zsolt
Author-X-Name-Last: Lazar
Title: Subversion – the strategic weaponization of narratives
Journal: Defense & Security Analysis
Pages: 568-570
Issue: 4
Volume: 39
Year: 2023
Month: 10
X-DOI: 10.1080/14751798.2023.2257484
File-URL: http://hdl.handle.net/10.1080/14751798.2023.2257484
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:39:y:2023:i:4:p:568-570
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2285139_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: Thomas Bruneau
Author-X-Name-First: Thomas
Author-X-Name-Last: Bruneau
Title: Outsourcing national defense: an impediment to the US strategy of great power competition
Abstract:
My goals in this paper are to elaborate further an approach to civil-military relations going beyond control to include effectiveness; and, to argue that outsourcing by the Department of Defense (DoD) results in opportunity costs making very difficult the implementation of the national security strategy of “great power competition.” The current acquisition authority for outsourcing impedes DoD accessing cutting-edge technology generated by “startups.” In an earlier era of strategic competition, the main US response was to create the National Aeronautics and Space Agency with a new acquisition authority – “other transaction authority” (OTA). In the National Defense Authorization Act of FY 2018 Congress stipulated that OTAs should be the preference for DoD in science and technology and prototyping, and education in OTAs be provided. This education has not been implemented. Consequently, a key element of the US great power competition strategy, which is the acquisition of new technology, goes wanting.
Journal: Defense & Security Analysis
Pages: 60-79
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2285139
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2285139
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:60-79
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2300889_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: William E. Lippert
Author-X-Name-First: William E.
Author-X-Name-Last: Lippert
Title: How conventional arms control failures caused the Russo-Ukraine War
Abstract:
What role did conventional arms control (CAC) agreements failures play in Russia's decision to invade Ukraine? Using a process tracing and counterfactual mixed methodology analyzing Russia's invasion motivations, this article attempts to answer the question by assessing Russian strategic policies, proposals, and arms control agreements. These demonstrate that Russia, seeing its sense of “indivisible security” being violated, sought to adjust or establish new CAC agreements to address a growing conventional military imbalance between NATO and Russia. Having failed to establish a fixed and stable conventional military balance through CAC, and as Ukraine edged closer to NATO membership, Russia resorted to the use of force shortly after their December 2021 proposals were not accepted. The article concludes by suggesting that this case supports arms racing and arms-control related causes of war theories, and that dissonant perceptions of the actual or ideal military balance can lead to conflict.
Journal: Defense & Security Analysis
Pages: 138-160
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2300889
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2300889
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:138-160
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2308361_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: Scott Woodruff Lyons
Author-X-Name-First: Scott Woodruff
Author-X-Name-Last: Lyons
Title: Darfur peacekeepers: the African Union peacekeeping mission in Darfur (AMIS) from the perspective of a Hungarian military advisor
Journal: Defense & Security Analysis
Pages: 165-166
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2308361
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2308361
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:165-166
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2312676_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: Tadeusz Pieciukiewicz
Author-X-Name-First: Tadeusz
Author-X-Name-Last: Pieciukiewicz
Author-Name: Anna Brzozowska
Author-X-Name-First: Anna
Author-X-Name-Last: Brzozowska
Author-Name: Jędrzej Kowalczewski
Author-X-Name-First: Jędrzej
Author-X-Name-Last: Kowalczewski
Author-Name: Arkadiusz Kurkiewicz
Author-X-Name-First: Arkadiusz
Author-X-Name-Last: Kurkiewicz
Author-Name: Tomasz Miedziński
Author-X-Name-First: Tomasz
Author-X-Name-Last: Miedziński
Author-Name: Dariusz Płóciennik
Author-X-Name-First: Dariusz
Author-X-Name-Last: Płóciennik
Author-Name: Krystian Zięć
Author-X-Name-First: Krystian
Author-X-Name-Last: Zięć
Author-Name: Rafał Lipka
Author-X-Name-First: Rafał
Author-X-Name-Last: Lipka
Title: The Polish Air Force in transition: lessons from the F-16 programme
Abstract:
The purpose of this article is to analyse the process of equipping the Polish Air Force with the F-16 aircraft. The Polish F-16 programme serves as an essential source of knowledge for avoiding errors that may occur when introducing new weapon systems in Poland, or other post-communist countries that are still reliant on Soviet-designed military technologies. Due to various external and internal factors, not all elements of the F-16 programme are suitable for replication in the acquisition of new weapon systems; however, some solutions have been applied in Poland’s F-35 and WISŁA air defence programmes. The authors examined selected aspects of the F-16 programme, including its historical background, legal and organisational framework, personnel training, infrastructure, logistics, and the economic implications of the offset agreement.
Journal: Defense & Security Analysis
Pages: 20-40
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2312676
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2312676
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:20-40
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2293341_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: John P. Cann
Author-X-Name-First: John P.
Author-X-Name-Last: Cann
Title: The Bushmen of Angola
Abstract:
This is the story about the particular indigenous force of Bushmen known as flechas or “arrows” that was established by the Portuguese in Eastern Angola in 1966 in response to an intelligence gathering need there during its campaign to retain its African possessions. The mobilisation of this indigenous people with a natural instinct to live invisibly yielded striking results. Its relentless pursuit of the enemy on the eastern front helped significantly to defeat him militarily, and indeed, the flechas at one stage accounted for 60 percent of all enemy kills. While this offensive was the result of a unity of effort by all elements of the Portuguese Armed Forces, the flechas played a successful and unique role, so much so that its duplication in other theatres and other wars was attempted, but never with quite the success of Angola.
Journal: Defense & Security Analysis
Pages: 41-59
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2293341
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2293341
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:41-59
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2288717_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: Ivor Wiltenburg
Author-X-Name-First: Ivor
Author-X-Name-Last: Wiltenburg
Author-Name: Vibeke Gootzen
Author-X-Name-First: Vibeke
Author-X-Name-Last: Gootzen
Title: Military adaptation to combat mentoring: Belgium’s Operational Mentoring and Liaison Team experience
Abstract:
This article investigates the Belgian Operational Mentoring and Liaison mission in Kunduz between 2009 and 2013 by applying military adaptation theory to the empirical data retrieved from interviews and archival research. The lessons learned by the Belgian OMLTs in Afghanistan, and its adaptation and emulation processes provide a useful template for upcoming Security Force Assistance operations. In addition, Belgian formal and informal procedures to disseminate lessons learned across the armed forces provide valuable insights for future operations.
Journal: Defense & Security Analysis
Pages: 1-19
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2288717
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2288717
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:1-19
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2295102_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: Alies Jansen
Author-X-Name-First: Alies
Author-X-Name-Last: Jansen
Title: Understanding security force assistance: a matter of control?
Abstract:
This article seeks to explain the historically poor performance of the US Department of Defence’s security force assistance (SFA) to state and non-state armed forces to counter terrorism. The article argues that the dominant understanding of SFA as a one-way, top-down relation between a principal (sponsor) and an agent (recipient) has neglected the socio-political dynamics and effects of the intervention. Studying the socio-political processes reveals the messy reality on the ground and how difficult, if not impossible, it is to fully control the operation and the participating recipients. Rather than controlling recipients, this article argues that SFA should be concerned with negotiating the multiple and diverse interests, needs, and priorities. This claim will be substantiated with an in-depth, qualitative case study of Operation Inherent Resolve in Iraq between 2014 and 2018.
Journal: Defense & Security Analysis
Pages: 80-96
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2295102
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2295102
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:80-96
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2322805_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: Joseph A. Ledford
Author-X-Name-First: Joseph A.
Author-X-Name-Last: Ledford
Title: Limited force and the fight for the just war tradition
Journal: Defense & Security Analysis
Pages: 162-164
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2322805
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2322805
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:162-164
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2302699_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: Jeremy Julian Sarkin
Author-X-Name-First: Jeremy Julian
Author-X-Name-Last: Sarkin
Author-Name: Saba Sotoudehfar
Author-X-Name-First: Saba
Author-X-Name-Last: Sotoudehfar
Title: Artificial intelligence and arms races in the Middle East: the evolution of technology and its implications for regional and international security
Abstract:
Artificial Intelligence is now deeply connected to weapons systems. It therefore plays a critical role in matters concerning international peace and security. AI has also seen military competition take on a new dynamic. However, few studies have addressed the distinct dynamics of AI and its effects on Middle Eastern arms races. Given that these issues have the potential to fuel regional conflicts and jeopardise international security, it is contended that it is crucial to investigate their impact in both the medium and long-term. This article argues that the Middle East has had several arms races in past, which need to be understood to learn the lessons about what might happen in the future. It is also important to understand how a variety of international actors have negatively affected peace and stability in the region with their arms sales. The research argues that at present, there is a lack of understanding about the implications of AI and its economic, legal, security, and political consequences. The article makes a variety of recommendations on the implications of AI, including that states in the region should be coordinating, planning, and developing policy with respect to AI and arms matters.
Journal: Defense & Security Analysis
Pages: 97-119
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2302699
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2302699
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:97-119
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2322804_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: Mark Bailey
Author-X-Name-First: Mark
Author-X-Name-Last: Bailey
Title: The new age of naval power in the Indo-Pacific: strategy, order and regional security
Journal: Defense & Security Analysis
Pages: 161-162
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2322804
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2322804
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:161-162
Template-Type: ReDIF-Article 1.0
# input file: CDAN_A_2304424_J.xml processed with: repec_from_jats12.xsl darts-xml-transformations-20240209T083504 git hash: db97ba8e3a
Author-Name: Hanna Samir Kassab
Author-X-Name-First: Hanna Samir
Author-X-Name-Last: Kassab
Title: Geographically small but not weak: comparing the national security policies of Israel and Singapore
Abstract:
This paper offers a comparative study of Israel and Singapore to understand the national security policies of geographically smaller states. These states are militarily powerful, geographically small, and in close proximity with much larger potential adversaries. These states are also different in terms of their relationship with that much larger state as well as their independence narratives. Israel remains in a state of conflict with Iran through Syria and through terrorist groups like Hamas and Hezbollah. Israel was created through war. On the other hand, Singapore has a complicated relationship with Malaysia based on suspicious cooperation. Malaysia also allowed Singapore independence given differences in the voting behavior of Singaporeans. Both states share a military strategy of preemption or prevention. Since these states are geographically small, striking first may offer Israel and Singapore a better chance at avoiding annihilation.
Journal: Defense & Security Analysis
Pages: 120-137
Issue: 1
Volume: 40
Year: 2024
Month: 01
X-DOI: 10.1080/14751798.2024.2304424
File-URL: http://hdl.handle.net/10.1080/14751798.2024.2304424
File-Format: text/html
File-Restriction: Access to full text is restricted to subscribers.
Handle: RePEc:taf:cdanxx:v:40:y:2024:i:1:p:120-137