Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (104)
  • Turkish
  • POLITICAL SCIENCE ; Security (National & International)
Datasource
Material
Language
Keywords
Subjects(RVK)
  • 1
    ISBN: 1626166676 , 9781626166677
    Language: English
    Pages: 1 Online-Ressource (1 online resource)
    DDC: 303.6/4082
    Keywords: Women in combat ; Insurgency ; SOCIAL SCIENCE ; General ; POLITICAL SCIENCE ; Security (National & International) ; Insurgency ; Women in combat
    Note: Place of publication from publisher's Web site
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Ithaca : Cornell University Press
    ISBN: 1501738151 , 150173816X , 9781501738159 , 9781501738166
    Language: English
    Pages: 1 Online-Ressource (xvii, 181 pages)
    Series Statement: Cornell studies in security affairs
    Parallel Title: Erscheint auch als Eichenberg, Richard C., 1952- author Gender, war, and world order
    DDC: 303.6/6081
    Keywords: War Public opinion ; Sex differences ; Violence Public opinion ; Sex differences ; National security Public opinion ; Sex differences ; Women and war ; Sex differences (Psychology) ; Sex differences (Psychology) ; fast ; (OCoLC)fst01114336 ; Women and war ; fast ; (OCoLC)fst01177123 ; SOCIAL SCIENCE / General ; bisacsh ; POLITICAL SCIENCE / Security (National & International) ; bisacsh ; SOCIAL SCIENCE ; General ; POLITICAL SCIENCE ; Security (National & International) ; Sex differences (Psychology) ; Women and war ; Electronic books
    Abstract: "Provides a comprehensive, cross-national description and analysis of gender difference in citizen opinions of national security issues"--
    Abstract: Hypotheses, data, and method -- Threats, power, war, and institutions -- The gendered politics of defense spending -- American attitudes toward torture -- Gender difference in American public opinion on the use of military force -- Gender difference in cross-national perspective -- Global variation in gender difference.
    Note: Includes bibliographical references and index
    URL: Cover
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781760461898 , 1760461903 , 176046189X , 1760461903 , 9781760461898 , 9781760461904
    Language: English
    Pages: 1 Online-Ressource (xxii, 683 pages)
    Series Statement: Peacebuilding compared
    Parallel Title: Print version Braithwaite, John Cascades of violence
    Keywords: Peace-building ; Peace-building ; Peace-building ; Peace-building ; Peace-building ; Peace-building ; Peace-building ; Peace-building ; Peace-building ; Peace-building ; Politics and government ; Warfare & Defence ; Society & Social Sciences ; POLITICAL SCIENCE ; Security (National & International) ; Peace studies and conflict resolution ; Warfare and defence ; Bangladesh ; India ; Pakistan ; South Asia ; Sri Lanka ; Violence in society ; Peace-building ; Bangladesh Politics and government ; Sri Lanka Politics and government ; South Asia Politics and government ; India Politics and government ; Pakistan Politics and government ; Bangladesh ; Sri Lanka ; South Asia ; India ; Pakistan
    Abstract: War and crime are cascade phenomena. War cascades across space and time to more war; crime to more crime; crime cascades to war; and war to crime. As a result, war and crime become complex phenomena. That does not mean we cannot understand how to prevent crime and war simultaneously. This book shows, for example, how a cascade analysis leads to an understanding of how refugee camps are nodes of both targeted attack and targeted recruitment into violence. Hence, humanitarian prevention also must target such nodes of risk. This book shows how nonviolence and nondomination can also be made to cascade, shunting cascades of violence into reverse. Complexity theory implies a conclusion that the pursuit of strategies for preventing crime and war is less important than understanding meta strategies. These are meta strategies for how to sequence and escalate many redundant prevention strategies. These themes were explored across seven South Asian societies during eight years of fieldwork
    Abstract: War and crime are cascade phenomena. War cascades across space and time to more war; crime to more crime; crime cascades to war; and war to crime. As a result, war and crime become complex phenomena. That does not mean we cannot understand how to prevent crime and war simultaneously. This book shows, for example, how a cascade analysis leads to an understanding of how refugee camps are nodes of both targeted attack and targeted recruitment into violence. Hence, humanitarian prevention also must target such nodes of risk. This book shows how nonviolence and nondomination can also be made to cascade, shunting cascades of violence into reverse. Complexity theory implies a conclusion that the pursuit of strategies for preventing crime and war is less important than understanding meta strategies. These are meta strategies for how to sequence and escalate many redundant prevention strategies. These themes were explored across seven South Asian societies during eight years of fieldwork
    Note: Includes bibliographical references (pages 601-683)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cambridge : Open Book Publishers
    ISBN: 9781783742721 , 1783742720 , 9781783742707 , 1783742704 , 9781783742684 , 1783742712
    Language: English
    Pages: 1 Online-Ressource (256 pages)
    Series Statement: Open Reports Vol. 4
    Keywords: National security ; Politics and government ; Society and social sciences Society and social sciences ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; National security ; Scotland ; Conference papers and proceedings ; Electronic books
    Abstract: Introduction / Andrew W. Neal -- 1. Perspectives on small state security in the Scottish independence debate / Juliet Kaarbo and Daniel Kenealy -- 2. Do small states need 'alliance shelter'? Scotland and the Nordic nations / Baldur Thorhallsson and Alyson J.K. Bailes -- 3. Security, privacy and oversight / Charles D. Raab -- 4. Parliamentary oversight of intelligence agencies: lessons from Westminster / Hugh Bochel and Andrew Defty -- 5. Scotland and the politics of intelligence accountability / Colin Atkinson, Nick Brooke and Brian Harris -- 6. 'Hardly a moment's discussion'? intelligence and the Scottish referendum / Sandy Hardie -- 7. Press scrutiny and the proposals for security and intelligence in an independent Scotland / Eamonn P. O'Neill -- 8. To speak security or not to speak security? responsibility and deference in the Scottish independence debate / Andrew W. Neal -- Concluding remarks: the narrative of security and pathways of transition / Thierry Balzacq
    Abstract: "The 2014 Referendum on Scottish independence sparked debate on every dimension of modern statehood. Levels of public interest and engagement were unprecedented, as demonstrated by record-breaking voter turnout. Yet aside from Trident, the issue of security was relatively neglected in the campaigns, and there remains a lack of literature on the topic. In this volume Andrew Neal has collated a variety of interdisciplinary perspectives on security and constitutional change in Scotland and the UK, including writing from experts in foreign policy analysis, intelligence studies, parliamentary studies, and journalism. Security in a Small Nation provides an illuminating analysis of the politics of security. Its authors reflect on a number of related issues including international comparisons, alliances, regional cooperation, terrorism, intelligence sharing, democratic oversight, and media coverage. It has a particular focus on what security means for small states and democratic politics. The book draws on current debates about the extent of intelligence powers and their implications for accountability, privacy, and human rights. It examines the foreign and security policy of other small states through the prism of Scottish independence, providing unique insight into the bureaucratic and political processes associated with multi-level security governance. These contributions provide a detailed picture of the changing landscape of security, including the role of diverse and decentralised agencies, and new security interdependencies within and between states. The analysis presented in this book will inform ongoing constitutional debates in the UK and the study of other secessionist movements around the world. Security in a Small Nation is essential reading for any follower of UK and Scottish politics, and those with an interest in security and nationhood on a global scale."--Publisher's website
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Acton, A.C.T : ANU Press
    ISBN: 9781760461379 , 1760461385 , 1760461377 , 9781760461386
    Language: English
    Pages: 1 Online-Ressource (xxiv, 383 pages)
    Series Statement: Pacific series
    Parallel Title: Print version Maclellan, Nic Grappling with the bomb
    Keywords: Nuclear weapons testing victims ; Pacific Islanders Health and hygiene ; Nuclear explosions Environmental aspects ; Nuclear weapons Testing ; Environmental aspects ; Operation Grapple, Kiribati, 1956-1958 ; Hydrogen bomb Testing ; Hydrogen bomb Testing ; Nuclear weapons Testing ; Nuclear weapons Testing ; Nuclear weapons testing victims ; Pacific Islanders ; Nuclear explosions ; Nuclear weapons ; Operation Grapple, Kiribati, 1956-1958 ; Hydrogen bomb ; Hydrogen bomb ; Nuclear weapons ; Nuclear weapons ; Nuclear issues ; Nuclear weapons ; Oceania ; Oceans and seas ; Other geographical groupings, oceans and seas ; Pacific Ocean ; Polynesia ; Society and social sciences Society and social sciences ; The environment ; Warfare and defence ; Weapons and equipment ; POLITICAL SCIENCE ; Security (National & International) ; Hydrogen bomb ; Testing ; Military policy ; Nuclear explosions ; Environmental aspects ; Nuclear weapons ; Testing ; Nuclear weapons ; Testing ; Environmental aspects ; Nuclear weapons testing victims ; Pacific Islanders ; Health and hygiene ; Australasia, Oceania and other land areas ; Great Britain ; Kiribati ; Oceania ; Earth sciences, geography, environment, planning ; Kiribati ; Operation Grapple (Kiribati : 1956-1958) ; Great Britain Military policy ; Great Britain ; Electronic books
    Abstract: The leader: Sir Winston Churchill -- The survivors: Lemeyo Abon and Rinok Riklon -- The fisherman: Matashichi Oishi -- The Task Force Commander: Wilfred Oulton -- The businessman: James Burns -- The pacifist: Harold Steele -- Interlude: On radiation, safety and secrecy -- The Chief Petty Officer: Ratu Inoke Bainimarama -- The sailor: Paul Ah Poy -- The high chief: Ratu Penaia Ganilau -- The WVS ladies: Mary and Billie Burgess -- The pilot: Geoffrey Dhenin -- The Prime Minister: Harold Macmillan -- The Foreign Officer: Gillian Brown -- The telegraphist: Roy Sefton -- The soldiers: Isireli Qalo -- The Banaban: Tekoti Rotan -- The mothers: Sui Kiritome -- The last soldiers: Josefa Vueti -- The President: John F. Kennedy -- Interlude: Contested illnesses -- The research scientist: Al Rowland -- The litigant: Pita Rokoratu -- The Rear Admiral: Josaia Voreqe Bainimarama
    Abstract: The leader: Sir Winston Churchill -- The survivors: Lemeyo Abon and Rinok Riklon -- The fisherman: Matashichi Oishi -- The Task Force Commander: Wilfred Oulton -- The businessman: James Burns -- The pacifist: Harold Steele -- Interlude: On radiation, safety and secrecy -- The Chief Petty Officer: Ratu Inoke Bainimarama -- The sailor: Paul Ah Poy -- The high chief: Ratu Penaia Ganilau -- The WVS ladies: Mary and Billie Burgess -- The pilot: Geoffrey Dhenin -- The Prime Minister: Harold Macmillan -- The Foreign Officer: Gillian Brown -- The telegraphist: Roy Sefton -- The soldiers: Isireli Qalo -- The Banaban: Tekoti Rotan -- The mothers: Sui Kiritome -- The last soldiers: Josefa Vueti -- The President: John F. Kennedy -- Interlude: Contested illnesses -- The research scientist: Al Rowland -- The litigant: Pita Rokoratu -- The Rear Admiral: Josaia Voreqe Bainimarama
    Note: Includes bibliographical references (pages 347-373) and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9780833092830 , 0833093746 , 0833092839 , 9780833093745
    Language: English
    Pages: 1 Online-Ressource (xxiv, 114 pages)
    Series Statement: Rand Corporation research report series RR-1243-OSD
    Keywords: U.S. Task Force for Business and Stability Operations ; U.S. Task Force for Business and Stability Operations ; Economic development ; Nation-building Economic aspects ; Economic development ; Nation-building ; Economic development ; Afghanistan ; POLITICAL SCIENCE ; Security (National & International) ; Electronic books
    Abstract: "The Task Force for Business and Stability Operations (TFBSO), a multi-year endeavor for the U.S. Department of Defense, sought to use private-sector strategies to create sustainable economies in Iraq and Afghanistan. In this report, RAND researchers use semistructured interviews and both public and internal documentation to identify lessons from the Task Force's activities in Afghanistan, offering insights for similar projects in the future. The analysis describes the multitude of the Task Force's stakeholders resulting from its complex institutional status, plus the challenges that resulted from these diverse stakeholders. It uses a stakeholder-focused approach to explore several prominent TFBSO projects, informed by disparate stakeholder views. Ultimately, lessons identified from the Task Force's activities in Afghanistan fell under six categories: programmatic flexibility, leadership, measures of success, staffing, freedom of movement, and contracting. Because economic development is likely to remain a key component of U.S. contingency operations, policymakers can use the lessons identified in this report when planning and designing similar organizations in the future to find the right balance for success"--Publisher's web site
    Abstract: "The Task Force for Business and Stability Operations (TFBSO), a multi-year endeavor for the U.S. Department of Defense, sought to use private-sector strategies to create sustainable economies in Iraq and Afghanistan. In this report, RAND researchers use semistructured interviews and both public and internal documentation to identify lessons from the Task Force's activities in Afghanistan, offering insights for similar projects in the future. The analysis describes the multitude of the Task Force's stakeholders resulting from its complex institutional status, plus the challenges that resulted from these diverse stakeholders. It uses a stakeholder-focused approach to explore several prominent TFBSO projects, informed by disparate stakeholder views. Ultimately, lessons identified from the Task Force's activities in Afghanistan fell under six categories: programmatic flexibility, leadership, measures of success, staffing, freedom of movement, and contracting. Because economic development is likely to remain a key component of U.S. contingency operations, policymakers can use the lessons identified in this report when planning and designing similar organizations in the future to find the right balance for success"--Publisher's web site
    Note: "National Security Research Division , Includes bibliographical references (pages 109-114) , Series from web site
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND
    ISBN: 9780833094537 , 0833094351 , 083309453X , 9780833094353
    Language: English
    Pages: 1 Online-Ressource (ix, 57 pages)
    Series Statement: Perspectives PE-192-RC
    Keywords: Terrorism Risk assessment 21st century ; Intelligence service Methodology ; Terrorism Prevention 21st century ; Civil-military relations ; National security 21st century ; Terrorism ; Intelligence service ; Terrorism ; Civil-military relations ; National security ; POLITICAL SCIENCE ; Security (National & International) ; Administrative agencies ; Reorganization ; Executive advisory bodies ; Interagency coordination ; Military readiness ; Decision making ; National security ; Decision making ; United States ; Electronic book
    Abstract: "Every president needs a decisionmaking system that harnesses the full capabilities and accumulated wisdom of the U.S. government and the nation's many stakeholders. Yet national security professionals--the officials who must advise the president on the most-difficult decisions -- cite a range of structural problems that hinder effective policymaking. While a more focused and timely decisionmaking process will not necessarily improve outcomes for the United States, poor choices could be calamitous. This Perspective analyzes a range of management challenges in the national security system and presents eight recommendations for strengthening U.S. decisionmaking and oversight of policy implementation. Among the conclusions: The National Security Council staff size should be reduced to better focus on high-priority areas. Civil-military operations should be planned by a new joint office at the State Department with a military general officer as deputy. Red-team and lessons-learned efforts would help ensure that the system is adaptive and responsive. Better integration of intelligence insights and secondments of senior officials across agencies can improve the quality and coherence of decisionmaking. And the use of special envoys, or "czars," should be limited"--Publisher's description
    Description / Table of Contents: Foreword -- Acknowledgments -- Chapter 1: Introduction: Evolution of Strategies and Systems -- Chapter 2: Why Process Matters -- Chapter 3: How Did the National Security System Evolve? -- How Do Other Nations Make Decisions? -- Chapter 4: Previous Attempts at Reform -- Chapter 5: Changing Environment -- Chapter 6: Recommendations for the National Security Decision Structure -- NSC Staff Size -- Civil-Military Cooperation and Resource Sharing -- Decline of Disciplined, Organizational Messaging Systems -- Including the Right Agencies -- Integrating Intelligence Insights -- Groupthink and Embedded Assumptions -- Continuity, Integration, and Professional Staff Development -- Overuse of Czars -- Chapter 7: Conclusion: Strategizing, Decisionmaking, and Policy Implementation -- Abbreviations -- Bibliography -- About the Author.
    Note: "April 5, 2016"--Table of contents page , Includes bibliographical references (pages 51-56)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9780833092625 , 0833093835 , 0833092626 , 9780833093837
    Language: English
    Pages: 1 Online-Ressource (xi, 38 pages)
    Series Statement: Research report RR-1273-OSD
    Keywords: Counterinsurgency ; Asymmetric warfare ; Low-intensity conflicts (Military science) ; Peacekeeping forces ; Insurgency History 21st century ; Counterinsurgency Case studies ; Counterinsurgency ; Asymmetric warfare ; Low-intensity conflicts (Military science) ; Peacekeeping forces ; Insurgency ; Counterinsurgency ; POLITICAL SCIENCE ; Security (National & International) ; Asymmetric warfare ; Counterinsurgency ; Insurgency ; Low-intensity conflicts (Military science) ; Peacekeeping forces ; Afghanistan ; Case studies ; History ; Electronic books
    Abstract: "Previous RAND research examined 71 insurgencies begun and completed worldwide between World War II and 2010 to analyze correlates of success in counterinsurgency (COIN). A key finding was that a case's score on a scorecard of 15 equally weighted good and 11 equally weighted bad COIN factors and practices corresponded perfectly with the outcomes of the cases analyzed. That is, the balance of good and bad factors and practices was always positive when the outcome was a COIN win (insurgent loss) and always negative when the outcome was a COIN loss (insurgent win). Using the scorecard approach as its foundation, a RAND study sought to apply the findings to the case of Afghanistan in 2015. The effort involved an expert elicitation in which experts were asked to make "worst-case" assessments of the factors to complete the scorecard for ongoing operations in Afghanistan. It was the third Afghanistan-focused exercise conducted with the scorecard, allowing rough comparisons with scores assigned by expert panels in 2011 and 2013. The 2015 consensus results indicated that Afghanistan continues to have a positive score, though its score is tied with the lowest-scoring historical wins. Two factors remained absent in Afghanistan in 2015 but essential to success in historical COIN campaigns: disrupting flows of tangible support to the insurgents and a demonstration (and improvement) of commitment and motivation on the part of the Afghan National Security Forces, the primary COIN force since the coalition drawdown. Despite some potentially positive developments resulting from the 2014 election of a new government in Afghanistan, it appears that the most promising end to the conflict will be a negotiated settlement in which the Afghan government makes some concessions to the insurgents and in which external powers, including the United States and Pakistan, help broker a satisfactory power-sharing agreement that brings greater stability to the country"--Publisher's description
    Description / Table of Contents: Preface -- Figure and Tables -- Summary -- Counterinsurgency Scorecard Update: Afghanistan in Early 2015 Relative to Insurgencies Since World War II -- Findings from Previous Research on Insurgency: Findings from Previous Research on Insurgency -- The Counterinsurgency Scorecard -- Endgames for Insurgencies: Getting to Negotiated Settlements -- Scoring the Ongoing Conflict in Afghanistan: Using the Delphi Method -- Building on Previous Scorecards -- 2015 Scorecard Results: Specific Factors in the Current Case -- Notes on Factors Present or Absent in 2015 but Tenuous in the Future -- 2015 Results Compared with Previous Results and Analyses: What Improved? -- What Declined? -- What Stayed the Same? -- Scorecard and Duration of Conflict -- Summary of Scorecard Analyses -- Prospects for a Negotiated Settlement -- Conclusions and Recommendations -- APPENDIX -- References.
    Note: Includes bibliographical references (pages 37-38)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Urbana : University of Illinois Press
    ISBN: 1322604649 , 9781322604640 , 9780252096822 , 0252096827 , 025203886X , 9780252038860 , 9780252080401 , 0252080408
    Language: English
    Pages: Online Ressource
    Parallel Title: Erscheint auch als Covering bin Laden
    DDC: 070.4
    Keywords: Bin Laden, Osama 1957-2011 Bin Laden, Osama 1957-2011 ; Bin Laden, Osama ; Bin Laden, Osama ; Terrorism Press coverage ; Terrorism and mass media ; Mass media and world politics ; Terrorism Press coverage ; POLITICAL SCIENCE ; Security (National & International) ; Mass media and world politics ; Terrorism and mass media ; Terrorism ; Press coverage ; Electronic books ; Electronic book ; Electronic books
    Abstract: Starting in 2001, much of the world media used the image of Osama bin Laden as a shorthand for terrorism. Bin Laden himself considered media manipulation on a par with military, political, and ideological tools, and intentionally used interviews, taped speeches, and distributed statements to further al-Qaida's ends. In Covering Bin Laden, editors Susan Jeffords and Fahed Yahya Al-Sumait collect perspectives from global scholars exploring a startling premise: that media depictions of Bin Laden not only diverge but often contradict each other, depending on the media provider and format, the place in which the depiction is presented, and the viewer's political and cultural background. The contributors analyze the representations of the many Bin Ladens, ranging from Al Jazeera broadcasts to video games. They examine the media's dominant role in shaping our understanding of terrorists and why/how they should be feared, and they engage with the ways the mosaic of Bin Laden images and narratives have influenced policies and actions around the world --
    Note: Includes bibliographical references. - Print version record
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Santa Monica : Rand Corporation
    ISBN: 9780833088710 , 0833093320 , 0833088718 , 9780833093325
    Language: English
    Pages: 1 Online-Ressource (xix, 58 pages)
    Series Statement: [Research report] RR-937-OSD
    Parallel Title: Print versionPaul, Christopher, 1971- What works best when building partner capacity in challenging contexts
    Keywords: Soldiers Training of ; International cooperation ; National security International cooperation ; Military education International cooperation ; Military assistance, American ; Soldiers ; National security ; Military education ; Military assistance, American ; POLITICAL SCIENCE ; Security (National & International) ; Military assistance, American ; Military education ; International cooperation ; National security ; International cooperation ; Armies ; Military & Naval Science ; Law, Politics & Government ; Electronic book
    Abstract: "For both diplomatic and national security reasons, security cooperation continues to be important for the United States. The needs and existing capabilities of various nations differ, however, as will results. In previous research, RAND identified a series of factors that correlate with the success of building partner capacity (BPC) efforts. Some of these are under U.S. control, and some are inherent in the partner nation or under its control. Strategic imperatives sometimes compel the United States to work with PNs that lack favorable characteristics but with which the United States needs to conduct BPC anyway. This report explores what the United States can do, when conducting BPC in challenging contexts, to maximize prospects for success. The authors address this question using the logic model outlined in a companion report and examining a series of case studies, looking explicitly at the challenges that can interfere with BPC. Some of the challenges stemmed from U.S. shortcomings, such as policy or funding issues; others from the partner's side, including issues with practices, personalities, baseline capacity, and lack of willingness; still others from disagreements among various stakeholders over objectives and approaches. Among the factors correlated with success in overcoming these challenges were consistency of funding and implementation, shared security interests, and matching objectives with the partner nation's ability to absorb and sustain capabilities."--Back cover
    Description / Table of Contents: Preface -- Figures and Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter One: Introduction: Methods and Approach -- Outline of the Remainder of the Report -- Chapter Two: Insights from Building Partner Capacity in Four Contextually Challenging Cases: Results from a Previous Study Largely Validated in the New Case Studies -- Additional Comparative Observations -- Chapter Three: Contextual Challenges, Disrupters, and Workarounds: Variations in How Contextual Challenges Play Out -- Input and Disrupter Categories -- Disrupters and Workarounds, by Disrupter Category -- Chapter Four: Recommendations: Get Your Own House in Order -- Anticipate Challenges and Plan Accordingly -- Match Delivery to Partners' Willingness, Interests, and Absorption Capacity -- Plan for Sustainment -- Strive for Consistency, but Retain Agility -- Appendix: Catalog of Identified Disrupters -- References.
    Note: "National Defense Research Institute , "August 21, 2015"--Table of contents page , "Prepared for the Joint Staff J5, the Office of Cost Assessment and Program Evaluation in the Office of the Secretary of Defense, and the Office of the Under Secretary of Defense for Policy"--Preface , Includes bibliographical references (pages 57-58)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9780833088918 , 0833093339 , 0833088912 , 9780833093332
    Language: English
    Pages: 1 Online-Ressource (xi, 54 pages)
    Series Statement: RR-949-OSD Advising the command
    Keywords: Military assistance, American ; Military education ; Consultants Armed Forces ; Military assistance, American ; Military education ; Consultants ; POLITICAL SCIENCE ; Security (National & International) ; Military assistance, American ; Military education ; Military relations ; Armies ; Military & Naval Science ; Law, Politics & Government ; Afghanistan ; United States ; United States Military relations ; United States ; Electronic books
    Abstract: "Special Operators assigned to Special Operations Advisory Groups advise the commanders and staff of the Afghan Special Security Forces. Drawing on in-depth interviews with these personnel, this report identifies best practices for operational level advising. Topics addressed include rapport building, the advising engagement, integration, sustainability, pre-deployment training, and continuity of operations"--Puiblisher's description
    Abstract: "Special Operators assigned to Special Operations Advisory Groups advise the commanders and staff of the Afghan Special Security Forces. Drawing on in-depth interviews with these personnel, this report identifies best practices for operational level advising. Topics addressed include rapport building, the advising engagement, integration, sustainability, pre-deployment training, and continuity of operations"--Puiblisher's description
    Note: "RR-949-OSD , Includes bibliographical references (pages 53-54)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9780833088673 , 0833093312 , 083308867X , 9780833093318
    Language: English
    Pages: 1 Online-Ressource (xxiii, 96 pages)
    Series Statement: [Research report] RR-935-OSD
    Parallel Title: Print versionPaul, Christopher, 1971- Building partner capacity assessment framework
    Keywords: National security International cooperation ; Evaluation ; Soldiers Training of ; International cooperation ; Evaluation ; Military education International cooperation ; Evaluation ; Military assistance, American Evaluation ; National security ; Soldiers ; Military education ; Military assistance, American ; POLITICAL SCIENCE ; Security (National & International) ; Military assistance, American ; Evaluation ; Electronic books
    Abstract: "For both diplomatic and national security reasons, security cooperation continues to be important for the United States. The Department of Defense conducts an assortment of programs aimed at building the capacity of partner nations, and training is an important element of these efforts. The needs and existing capabilities of various nations differ, however, as will results. Planning for each building partner capacity (BPC) effort carefully, assessing progress while the effort is in progress, and assessing results are all important to ensure that it meets U.S. goals and partner expectations. This report presents a framework intended to aid all these steps. Before execution, the framework can help determine and plan for what might go wrong with the intended BPC effort. During BPC execution, the framework can help monitor progress to discover whether everything is going according to plan and, if not, what is wrong and what can be done about it. Finally, the framework can help determine whether the BPC has achieved its objectives and, if not, why and what can be done about it in the future"--Publisher's description
    Description / Table of Contents: Preface -- Figures and Tables -- Summary -- Acknowledgments -- Abbreviations -- Chapter One: Introduction: Study Background and Companion Reports -- Methods and Approach -- Outline of the Remainder of the Report -- Chapter Two: The BPC Training and Equipping Logic Model: Nested Logic Models -- Target High-Level Outcomes in the BPC Training and Equipping Logic Model -- Target Core Outputs of the Sequential Phases of the BPC Training and Equipping Logic Model -- Input Categories -- BPC Training and Equipping Logic Model Overview -- Chapter Three: Description of Logic Model Elements for the Preengagement Phase: U.S. Program Goals and Plans: Preengagement -- U.S. Political Will: Preengagement -- Partner Nation Political Will: Preengagement -- Funding: Preengagement -- Partner Nation Personnel: Preengagement -- U.S. Trainers: Preengagement -- Equipment: Preengagement -- Logistics and Transport: Preengagement -- Facilities: Preengagement -- Curriculum and Training Content: Preengagement -- Chapter Four: Description of Logic Model Elements for the Engagement Phase: U.S. Program Goals and Plans: During Engagement -- U.S. Political Will: During Engagement -- Partner Nation Political Will: During Engagement -- Funding: During Engagement -- Partner Nation Personnel: During Engagement -- U.S. Trainers: During Engagement -- Equipment: During Engagement -- Logistics and Transport: During Engagement -- Facilities: During Engagement -- Curriculum and Training Content: During Engagement -- Chapter Five: Description of Logic Model Elements for the Postengagement Phase, Including Outcomes: U.S. Program Goals and Plans: Postengagement -- U.S. Program Goals and Plans: Outcomes -- U.S. Political Will: Postengagement -- U.S. Political Will: Outcomes -- Partner Nation Political Will: Postengagement -- Partner Nation Political Will: Outcomes -- Funding: Postengagement -- Funding: Outcomes -- Partner Nation Personnel: Postengagement -- Partner Nation Personnel: Outcomes -- U.S. Trainers: Postengagement -- U.S. Trainers: Outcomes -- Equipment: Postengagement -- Equipment: Outcomes -- Logistics and Transportation: Postengagement -- Logistics and Transportation: Outcomes -- Facilities: Postengagement -- Facilities: Outcomes -- Curriculum and Training Content: Postengagement -- Curriculum and Training Content: Outcomes -- Chapter Six: Using the BPC Training and Equipping Logic Model as Part of an Assessment Framework: Three Questions, Three Places to Start -- Contextualizing the Logic Model -- The Logic Model Helps with Selection and Prioritization of Measures -- References.
    Note: "Prepared for the Joint Staff J5, the Office of Cost Assessment and Program Evaluation in the Office of the Secretary of Defense, and the Office of the Under Secretary of Defense for Policy"--Preface , "National Defense Research Institute , Includes bibliographical references (pages 95-96)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833091130 , 083309114X , 0833091093 , 0833091158 , 0833091131 , 9780833091154 , 9780833091093 , 9780833091147
    Language: English
    Pages: 1 Online-Ressource (xxxi, 134 pages)
    Series Statement: Strategic rethink
    Series Statement: [Research report] RR-1114-RC
    Parallel Title: Print version Dobbins, James, 1942- Choices for America in a turbulent world
    Keywords: National security ; National interest ; Strategic planning ; International relations ; Security, International ; National security ; National interest ; Strategic planning ; International relations ; Security, International ; POLITICAL SCIENCE ; Government ; International ; POLITICAL SCIENCE ; International Relations ; General ; Diplomatic relations ; Economic policy ; International relations ; National interest ; National security ; Politics and government ; Security, International ; Strategic planning ; United States ; POLITICAL SCIENCE ; Security (National & International) ; United States Economic policy ; United States Foreign relations ; United States Politics and government ; United States ; United States ; United States ; Electronic book
    Abstract: "This book is the first of a series in which RAND will explore the elements of a national strategy for the conduct of U.S. foreign policy in a fast-changing world. Here, we lay out the major choices facing the next American administration both globally and in three critical regions. The initial chapters lay out alternatives for managing the world economy and the national defense, countering international terrorism, handling conflict in the cyber domain, and dealing with climate change. Subsequent chapters examine in more detail the choices to be faced in Europe, the Middle East, and East Asia. The final section proposes broad strategic guidelines that can inform and guide these choices"--Provided by publisher
    Abstract: "This book is the first of a series in which RAND will explore the elements of a national strategy for the conduct of U.S. foreign policy in a fast-changing world. Here, we lay out the major choices facing the next American administration both globally and in three critical regions. The initial chapters lay out alternatives for managing the world economy and the national defense, countering international terrorism, handling conflict in the cyber domain, and dealing with climate change. Subsequent chapters examine in more detail the choices to be faced in Europe, the Middle East, and East Asia. The final section proposes broad strategic guidelines that can inform and guide these choices"--Provided by publisher
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9780833082428 , 0833082426 , 9780833082435 , 0833082442 , 0833082434 , 083308237X , 9780833082374 , 9780833082442
    Language: English
    Pages: 1 Online-Ressource (xvii, 73 pages)
    Series Statement: RAND Corporation research report series RR469
    Parallel Title: Print version Clarke, Colin P From stalemate to settlement
    Keywords: Insurgency History ; Insurgency ; Mediation, International ; Peace-building ; Insurgency ; Insurgency ; Mediation, International ; Peace-building ; Insurgency ; Mediation, International ; Peace-building ; Law, Politics & Government ; International Relations ; Afghanistan ; LAW ; International ; History ; POLITICAL SCIENCE ; Security (National & International) ; Electronic books
    Abstract: "In June 2013, the Afghan Taliban opened a political office in Qatar to facilitate peace talks with the U.S. and Afghan governments. Negotiations between the United States and the group that sheltered al-Qaeda would have been unthinkable 12 years ago, but the reality is that a negotiated settlement in Afghanistan is one of several possible end games under the current U.S. withdrawal plan. Negotiating an end to an insurgency can be a long and arduous process beset by false starts and continued violence, but a comprehensive review of historical cases that ended in settlement shows that these negotiations followed a similar path that can be generalized into a "master narrative." This research examines 13 historical cases of insurgencies that were resolved through negotiated settlement in which neither side (insurgents or counterinsurgents) unambiguously prevailed. Taken together, these cases reveal that the path to negotiated settlement generally proceeds in seven steps in a common sequence. Although this resulting master narrative does not necessarily conform precisely to every conflict brought to resolution through negotiation, it can serve as an important tool to guide the progress of a similar approach to resolving the conflict in Afghanistan as U.S. forces prepare to withdraw."--Provided by publisher
    Abstract: "In June 2013, the Afghan Taliban opened a political office in Qatar to facilitate peace talks with the U.S. and Afghan governments. Negotiations between the United States and the group that sheltered al-Qaeda would have been unthinkable 12 years ago, but the reality is that a negotiated settlement in Afghanistan is one of several possible end games under the current U.S. withdrawal plan. Negotiating an end to an insurgency can be a long and arduous process beset by false starts and continued violence, but a comprehensive review of historical cases that ended in settlement shows that these negotiations followed a similar path that can be generalized into a "master narrative." This research examines 13 historical cases of insurgencies that were resolved through negotiated settlement in which neither side (insurgents or counterinsurgents) unambiguously prevailed. Taken together, these cases reveal that the path to negotiated settlement generally proceeds in seven steps in a common sequence. Although this resulting master narrative does not necessarily conform precisely to every conflict brought to resolution through negotiation, it can serve as an important tool to guide the progress of a similar approach to resolving the conflict in Afghanistan as U.S. forces prepare to withdraw."--Provided by publisher
    Note: "This report builds on previous RAND Corporation research on the demonstrated effectiveness of a variety of concepts for counterinsurgency ... at the core of the current research is an analysis of the correlates and conditions of negotiated settlements in historical insurgencies."--Preface , "Approved for public release; distribution unlimited , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9780833085641 , 0833090003 , 0833085646 , 9780833090003
    Language: English
    Pages: 1 Online-Ressource (xxii, 97 pages)
    Parallel Title: Erscheint auch als Osburg, Jan Assessing locally focused stability operations
    Keywords: Counterinsurgency ; Counterinsurgency ; United States ; Military & Naval Science ; Law, Politics & Government ; Armed Forces ; Stability operations ; Military Science - General ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; United States Armed Forces ; Stability operations ; United States ; Electronic books
    Abstract: This report describes how the Army and other services can better measure and assess the progress and outcomes of locally focused stability operations (LFSO), which are defined as the missions, tasks, and activities that build security, governance, and development by, with, and through the directly affected community, in order to increase stability at the local level. A number of issues related to assessing LFSO are identified, along with foundational challenges that include an inherently complex operational environment, limited doctrinal guidance, competing visions of stability, untested assumptions, and redundant or excessive reporting requirements. The report offers solutions to these and other challenges, and provides concrete recommendations and implementation-related guidance for designing and conducting assessments of LFSO. The report concludes with an assessment plan for a notional African LFSO scenario that illustrates the practical application of those insights
    Abstract: This report describes how the Army and other services can better measure and assess the progress and outcomes of locally focused stability operations (LFSO), which are defined as the missions, tasks, and activities that build security, governance, and development by, with, and through the directly affected community, in order to increase stability at the local level. A number of issues related to assessing LFSO are identified, along with foundational challenges that include an inherently complex operational environment, limited doctrinal guidance, competing visions of stability, untested assumptions, and redundant or excessive reporting requirements. The report offers solutions to these and other challenges, and provides concrete recommendations and implementation-related guidance for designing and conducting assessments of LFSO. The report concludes with an assessment plan for a notional African LFSO scenario that illustrates the practical application of those insights
    Note: "RAND Arroyo Center , "This research was sponsored by the Army's Asymmetric Warfare Group and was conducted within RAND Arroyo Center's Force Development and Technology Program"--Preface , Includes bibliographical references (pages 93-97)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9780833087188 , 0833087185 , 9780833087195 , 0833087207 , 0833087193 , 0833085727 , 9780833085726 , 9780833087201
    Language: English
    Pages: 1 Online-Ressource (xv, 92 pages)
    Series Statement: RAND Corporation research report series RR637
    Parallel Title: Print version Jones, Seth G., 1972- Persistent threat
    Keywords: Qaida (Organization) ; Qaida (Organization) ; Jihad ; Terrorism Religious aspects ; Islam ; Islamic fundamentalism ; Jihad ; Terrorism ; Islamic fundamentalism ; BUSINESS & ECONOMICS ; Infrastructure ; SOCIAL SCIENCE ; General ; POLITICAL SCIENCE ; Security (National & International) ; Islamic fundamentalism ; Jihad ; Terrorism ; Religious aspects ; Islam ; Middle East ; Qaida (Organization) ; Electronic books
    Abstract: "This report examines the status and evolution of al Qa'ida and other Salafi-jihadist groups, a subject of intense debate in the West. Based on an analysis of thousands of primary source documents, the report concludes that there has been an increase in the number of Salafi-jihadist groups, fighters, and attacks over the past several years. The author uses this analysis to build a framework for addressing the varying levels of threat in different countries, from engagement in high-threat, low government capacity countries; to forward partnering in medium-threat, limited government capacity environments; to offshore balancing in countries with low levels of threat and sufficient government capacity to counter Salafi-jihadist groups."--Provided by publisher
    Abstract: "This report examines the status and evolution of al Qa'ida and other Salafi-jihadist groups, a subject of intense debate in the West. Based on an analysis of thousands of primary source documents, the report concludes that there has been an increase in the number of Salafi-jihadist groups, fighters, and attacks over the past several years. The author uses this analysis to build a framework for addressing the varying levels of threat in different countries, from engagement in high-threat, low government capacity countries; to forward partnering in medium-threat, limited government capacity environments; to offshore balancing in countries with low levels of threat and sufficient government capacity to counter Salafi-jihadist groups."--Provided by publisher
    Note: "Prepared for the Office of the Secretary of Defense; approved for public release; distribution unlimited , Includes bibliographical references (pages 69-83) and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    ISBN: 9780833087751 , 0833089412 , 0833087754 , 9780833089410
    Language: English
    Pages: 1 Online-Ressource (xxiv, 142 pages)
    Keywords: United States ; United States ; Irregular warfare ; Afghan War, 2001- ; Strategy ; Iraq War, 2003-2011 ; Irregular warfare ; Afghan War, 2001- ; Strategy ; Iraq War, 2003-2011 ; Military & Naval Science ; Law, Politics & Government ; POLITICAL SCIENCE ; Security (National & International) ; Iraq ; Irregular warfare ; Afghan War (2001- ) ; Strategy ; Iraq War (2003-2011) ; Military Science - General ; United States ; Electronic books
    Abstract: This report contributes to the ongoing debate about the lessons from the past 13 years of war and the requirements for addressing future conflicts. It addresses a particular disconnect in the current debate on the future of national security strategy and the role of landpower caused by an inadequate examination of the national level of strategy made by the U.S. government. The disconnect exists because there has been no systematic effort to collect and analyze insights from those who have been actively engaged in making policy and strategy from 2001 to 2014. A RAND Arroyo Center workshop provided a mechanism for eliciting insights from policymakers and academic experts involved in the formation of national-level strategy and its implementation over the past 13 years. This study analyzes and develops those insights in the context of the debate on future national security strategy. It applies those insights to the future operating environment, which will include irregular and hybrid threats, and identifies critical requirements for land forces and special operations forces to operate successfully in conjunction with other joint, interagency, and multinational partners
    Abstract: This report contributes to the ongoing debate about the lessons from the past 13 years of war and the requirements for addressing future conflicts. It addresses a particular disconnect in the current debate on the future of national security strategy and the role of landpower caused by an inadequate examination of the national level of strategy made by the U.S. government. The disconnect exists because there has been no systematic effort to collect and analyze insights from those who have been actively engaged in making policy and strategy from 2001 to 2014. A RAND Arroyo Center workshop provided a mechanism for eliciting insights from policymakers and academic experts involved in the formation of national-level strategy and its implementation over the past 13 years. This study analyzes and develops those insights in the context of the debate on future national security strategy. It applies those insights to the future operating environment, which will include irregular and hybrid threats, and identifies critical requirements for land forces and special operations forces to operate successfully in conjunction with other joint, interagency, and multinational partners
    Note: "RAND Arroyo Center , "This research was ... conducted within RAND Arroyo Center's Strategy, Doctrine, and Resources Program"--Preface , Includes bibliographical references (pages 125-142)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Santa Monica, California : RAND
    ISBN: 9780833085924 , 083308593X , 0833085921 , 9780833085931
    Language: English
    Pages: 1 Online-Ressource (xi, 58 pages)
    Parallel Title: Erscheint auch als Iran's influence in Afghanistan : implications for the U.S. drawdown
    Keywords: Political stability ; Afghan War, 2001- Peace ; Political stability ; Afghan War, 2001- ; Diplomatic relations ; Peace ; Political stability ; Strategic aspects of individual places ; Afghan War (2001- ) ; POLITICAL SCIENCE ; Security (National & International) ; POLITICAL SCIENCE ; Government ; International ; Afghanistan ; Iran ; United States ; POLITICAL SCIENCE ; International Relations ; General ; United States Foreign relations ; Iran Foreign relations ; Afghanistan Strategic aspects ; Iran Foreign relations ; Afghanistan Foreign relations ; United States Foreign relations ; United States ; Iran ; Afghanistan ; Iran ; Afghanistan ; United States ; Electronic books
    Abstract: This study explores Iranian influence in Afghanistan and the implications for the United States after the departure of most American forces from Afghanistan. Iran has substantial economic, political, cultural, and religious leverage in Afghanistan. Kabul faces an obdurate insurgency that is likely to exploit the U.S. and international drawdown. The Afghan government will also face many economic difficulties in future years, and Afghanistan is highly dependent on international economic aid. Additionally, the biggest problem facing Afghanistan may be political corruption. Iranian influence in Afghanistan following the drawdown of international forces need not necessarily be a cause of concern for the United States though. Although Tehran will use its cultural, political, and economic sway in an attempt to shape a post-2016 Afghanistan, Iran and the United States share core interests there: to prevent the country from again becoming dominated by the Taliban and a safe haven for al Qaeda. This study examines Iran's historic interests in Afghanistan and its current policies in that country, and explores the potential implications for U.S. policy. The research is based on field interviews in Afghanistan, the use of primary sources in Dari and Persian, and scholarly research in English
    Abstract: This study explores Iranian influence in Afghanistan and the implications for the United States after the departure of most American forces from Afghanistan. Iran has substantial economic, political, cultural, and religious leverage in Afghanistan. Kabul faces an obdurate insurgency that is likely to exploit the U.S. and international drawdown. The Afghan government will also face many economic difficulties in future years, and Afghanistan is highly dependent on international economic aid. Additionally, the biggest problem facing Afghanistan may be political corruption. Iranian influence in Afghanistan following the drawdown of international forces need not necessarily be a cause of concern for the United States though. Although Tehran will use its cultural, political, and economic sway in an attempt to shape a post-2016 Afghanistan, Iran and the United States share core interests there: to prevent the country from again becoming dominated by the Taliban and a safe haven for al Qaeda. This study examines Iran's historic interests in Afghanistan and its current policies in that country, and explores the potential implications for U.S. policy. The research is based on field interviews in Afghanistan, the use of primary sources in Dari and Persian, and scholarly research in English
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9780833080547 , 0833083414 , 0833080547 , 9780833083418
    Language: English
    Pages: 1 Online-Ressource (xlii, 286 pages)
    Additional Information: Paths to victory: detailed insurgency case studies
    Series Statement: Rand Corporation research report series RR-291/1-OSD
    Parallel Title: Erscheint auch als Paul, Christopher, 1971- Paths to victory
    Keywords: Counterinsurgency Research ; Counterinsurgency Case studies ; Counterinsurgency ; Counterinsurgency ; Military & Naval Science ; Case studies ; Law, Politics & Government ; Military Science - General ; Counterinsurgency ; Counterinsurgency ; Research ; POLITICAL SCIENCE ; Security (National & International) ; Electronic books
    Abstract: When a country is threatened by an insurgency, what efforts give its government the best chance of prevailing? Contemporary discourse on this subject is voluminous and often contentious. Advice for the counterinsurgent is often based on little more than common sense, a general understanding of history, or a handful of detailed examples, instead of a solid, systematically collected body of historical evidence. A 2010 RAND study challenged this trend with rigorous analyses of all 30 insurgencies that started and ended between 1978 and 2008. This update to that original study expanded the data set, adding 41 new cases and comparing all 71 insurgencies begun and completed worldwide since World War II. With many more cases to compare, the study was able to more rigorously test the previous findings and address critical questions that the earlier study could not. For example, it could examine the approaches that led counterinsurgency forces to prevail when an external actor was involved in the conflict. It was also able to address questions about timing and duration, such as which factors affect the duration of insurgencies and the durability of the resulting peace, as well as how long historical counterinsurgency forces had to engage in effective practices before they won
    Abstract: When a country is threatened by an insurgency, what efforts give its government the best chance of prevailing? Contemporary discourse on this subject is voluminous and often contentious. Advice for the counterinsurgent is often based on little more than common sense, a general understanding of history, or a handful of detailed examples, instead of a solid, systematically collected body of historical evidence. A 2010 RAND study challenged this trend with rigorous analyses of all 30 insurgencies that started and ended between 1978 and 2008. This update to that original study expanded the data set, adding 41 new cases and comparing all 71 insurgencies begun and completed worldwide since World War II. With many more cases to compare, the study was able to more rigorously test the previous findings and address critical questions that the earlier study could not. For example, it could examine the approaches that led counterinsurgency forces to prevail when an external actor was involved in the conflict. It was also able to address questions about timing and duration, such as which factors affect the duration of insurgencies and the durability of the resulting peace, as well as how long historical counterinsurgency forces had to engage in effective practices before they won
    Note: "National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Companion publication to: Paths to victory: detailed insurgency case studies , Includes bibliographical references (pages 277-286)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9780833081094 , 0833083422 , 0833081098 , 9780833083425
    Language: English
    Pages: 1 Online-Ressource (xxxvii, 468 pages)
    Additional Information: Paths to victory: lessons from modern insurgencies
    Series Statement: Rand Corporation research report series RR-291/2-OSD
    Parallel Title: Erscheint auch als Paul, Christopher, 1971- Paths to victory
    Keywords: Insurgency Case studies ; Insurgency ; Case studies ; POLITICAL SCIENCE ; Security (National & International) ; Military Science - General ; Military & Naval Science ; Law, Politics & Government ; Insurgency ; Electronic books
    Abstract: Detailed overviews of 41 insurgency cases. UK in Palestine, 1944-1947 -- Greece, 1945-1949 -- Indochina, 1946-1954 -- Philippines (Huk Rebellion), 1946-1956 -- Colombia ("La Violencia"), 1948-1958 -- Malaya, 1948-1955 -- Kenya, 1952-1956 -- Algerian Independence, 1954-1962 -- Cyprus, 1955-1959 -- Cuba, 1956-1959 -- Oman (Imamate Uprising), 1957-1959 -- Indonesia (Darul Islam), 1958-1962 -- Tibet, 1956-1974 -- Guatemala, 1960-1996 -- Laos, 1959-1975 -- Namibia, 1960-1989 -- South Africa, 1960-1990 -- South Vietnam, 1960-1975 -- Eritrea, 1961-1991 -- Iraqi Kurdistan, 1961-1975 -- Angolan Independence, 1961-1974 -- Guinea-Bissau, 1962-1974 -- Mozambican Independence, 1962-1974 -- Yemen, 1962-1970 -- Uruguay, 1963-1972 -- Oman (Dhofar Rebellion), 1965-1975 -- Zimbabwe/Rhodesia, 1965-1980 -- Argentina, 1969-1979 -- Cambodia, 1967-1975 -- Northern Ireland, 1969-1999 -- Jordan, 1970-1971 -- Bangladesh, 1971 -- Philippines (MNLF), 1971-1996 -- Baluchistan, 1973-1978 -- Angola (UNITA), 1975-2002 -- Indonesia (East Timor), 1975-2000 -- Lebanese Civil War, 1975-1990 -- Western Sahara, 1975-1991 -- Indonesia (Aceh), 1976-2005 -- Mozambique (RENAMO), 1976-1995 -- Sri Lanka, 1976-2009
    Abstract: Detailed overviews of 41 insurgency cases. UK in Palestine, 1944-1947 -- Greece, 1945-1949 -- Indochina, 1946-1954 -- Philippines (Huk Rebellion), 1946-1956 -- Colombia ("La Violencia"), 1948-1958 -- Malaya, 1948-1955 -- Kenya, 1952-1956 -- Algerian Independence, 1954-1962 -- Cyprus, 1955-1959 -- Cuba, 1956-1959 -- Oman (Imamate Uprising), 1957-1959 -- Indonesia (Darul Islam), 1958-1962 -- Tibet, 1956-1974 -- Guatemala, 1960-1996 -- Laos, 1959-1975 -- Namibia, 1960-1989 -- South Africa, 1960-1990 -- South Vietnam, 1960-1975 -- Eritrea, 1961-1991 -- Iraqi Kurdistan, 1961-1975 -- Angolan Independence, 1961-1974 -- Guinea-Bissau, 1962-1974 -- Mozambican Independence, 1962-1974 -- Yemen, 1962-1970 -- Uruguay, 1963-1972 -- Oman (Dhofar Rebellion), 1965-1975 -- Zimbabwe/Rhodesia, 1965-1980 -- Argentina, 1969-1979 -- Cambodia, 1967-1975 -- Northern Ireland, 1969-1999 -- Jordan, 1970-1971 -- Bangladesh, 1971 -- Philippines (MNLF), 1971-1996 -- Baluchistan, 1973-1978 -- Angola (UNITA), 1975-2002 -- Indonesia (East Timor), 1975-2000 -- Lebanese Civil War, 1975-1990 -- Western Sahara, 1975-1991 -- Indonesia (Aceh), 1976-2005 -- Mozambique (RENAMO), 1976-1995 -- Sri Lanka, 1976-2009
    Note: "National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Companion publication to: Paths to victory: lessons from modern insurgencies , Includes bibliographical references (pages 441-468)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9780833081766 , 0833083643 , 0833081764 , 9780833083647
    Language: English
    Pages: 1 Online-Ressource (x, 25 pages)
    Keywords: Counterinsurgency ; Counterinsurgency Case studies ; Counterinsurgency ; Counterinsurgency ; Afghanistan ; Military Science - General ; Case studies ; Military & Naval Science ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Law, Politics & Government ; Electronic books
    Abstract: The RAND report Paths to Victory: Lessons from Modern Insurgencies added 41 new cases to a previously studied set of 30 insurgencies, examining the 71 insurgencies begun and completed worldwide between World War II and 2008 to analyze correlates of success in counterinsurgency (COIN). A key finding of this research was that a case's score on a scorecard of 15 equally weighted good and 11 equally weighted bad COIN factors and practices perfectly discriminated the outcomes of the cases analyzed. That is, the balance of good and bad factors and practices correlated with either a COIN win (insurgency loss) or a COIN loss (insurgency win) in the overall case. Using the scorecard approach as its foundation, a RAND study sought to apply the findings to the case of Afghanistan in early 2013. The effort involved an expert elicitation, or Delphi exercise, in which experts were asked to make "worst-case" assessments of the factors to complete the scorecard for ongoing operations in Afghanistan. The consensus results revealed that early 2013 Afghanistan ranks among the historical COIN winners, but its score is equal to those of the lowest-scoring historical wins. This tenuous position points to several areas in need of improvement, but particularly the need to disrupt the flow of insurgent support and the need for the Afghan government and Afghan security forces to better demonstrate their commitment and motivation. Afghanistan in early 2011 scored in the middle of the historical record in terms of COIN wins and losses, suggesting an overall improvement in COIN progress in that conflict by early 2013. However, conditions may change as coalition forces prepare to hand over responsibility for the country's security to the Afghan government and Afghan security forces in 2014
    Abstract: The RAND report Paths to Victory: Lessons from Modern Insurgencies added 41 new cases to a previously studied set of 30 insurgencies, examining the 71 insurgencies begun and completed worldwide between World War II and 2008 to analyze correlates of success in counterinsurgency (COIN). A key finding of this research was that a case's score on a scorecard of 15 equally weighted good and 11 equally weighted bad COIN factors and practices perfectly discriminated the outcomes of the cases analyzed. That is, the balance of good and bad factors and practices correlated with either a COIN win (insurgency loss) or a COIN loss (insurgency win) in the overall case. Using the scorecard approach as its foundation, a RAND study sought to apply the findings to the case of Afghanistan in early 2013. The effort involved an expert elicitation, or Delphi exercise, in which experts were asked to make "worst-case" assessments of the factors to complete the scorecard for ongoing operations in Afghanistan. The consensus results revealed that early 2013 Afghanistan ranks among the historical COIN winners, but its score is equal to those of the lowest-scoring historical wins. This tenuous position points to several areas in need of improvement, but particularly the need to disrupt the flow of insurgent support and the need for the Afghan government and Afghan security forces to better demonstrate their commitment and motivation. Afghanistan in early 2011 scored in the middle of the historical record in terms of COIN wins and losses, suggesting an overall improvement in COIN progress in that conflict by early 2013. However, conditions may change as coalition forces prepare to hand over responsibility for the country's security to the Afghan government and Afghan security forces in 2014
    Note: "RAND National Defense Research Institute , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (page 25)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9780833081803 , 0833083457 , 0833081802 , 9780833083456
    Language: English
    Pages: 1 Online-Ressource (xxi, 53 pages)
    Series Statement: Rand Corporation research report series
    Keywords: United States Information resources management ; United States ; Leaks (Disclosure of information) Prevention ; Security classification (Government documents) Management ; Leaks (Disclosure of information) ; Security classification (Government documents) ; Information resources management ; United States ; United States ; POLITICAL SCIENCE ; Security (National & International) ; Electronic books
    Abstract: In 2012, the Office of the Under Secretary of Defense for Intelligence established the Unauthorized Disclosures Program Implementation Team to prevent and deter the unauthorized disclosures of classified information by all Department of Defense personnel through the implementation of the UD Strategic Plan. RAND was asked to help monitor and assess the potential for effectiveness of this new initiative. Researchers determined that the UD PIT's implementation of the UD Strategic Plan has made important and discernible progress toward its main objectives, but the advances are partial, fragile, and may be impermanent, facing strategic and tactical obstacles. RAND offered 22 recommendations, including ways to sustain and expand the effort, a continued emphasis on top-down support, establishing metrics, improving accountability, and prioritizing responses
    Abstract: In 2012, the Office of the Under Secretary of Defense for Intelligence established the Unauthorized Disclosures Program Implementation Team to prevent and deter the unauthorized disclosures of classified information by all Department of Defense personnel through the implementation of the UD Strategic Plan. RAND was asked to help monitor and assess the potential for effectiveness of this new initiative. Researchers determined that the UD PIT's implementation of the UD Strategic Plan has made important and discernible progress toward its main objectives, but the advances are partial, fragile, and may be impermanent, facing strategic and tactical obstacles. RAND offered 22 recommendations, including ways to sustain and expand the effort, a continued emphasis on top-down support, establishing metrics, improving accountability, and prioritizing responses
    Note: "National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 49-53)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    [Santa Monica, CA] : RAND Corporation
    ISBN: 9780833080905 , 0833083430 , 0833080903 , 9780833083432
    Language: English
    Pages: 1 Online-Ressource (11 pages)
    Series Statement: RAND Corporation research report series RR296
    Parallel Title: Print version Pézard, Stéphanie Toward a secure and stable northern Mali
    Keywords: Internal security ; Postwar reconstruction ; Political stability ; Internal security ; Postwar reconstruction ; Political stability ; POLITICAL SCIENCE ; Security (National & International) ; Mali ; Ethnic relations ; Internal security ; Political stability ; Postwar reconstruction ; Mali Ethnic relations ; Mali ; Electronic books
    Abstract: The 2012 conflict in northern Mali has shown that many assumptions about Mali's political stability, internal cohesion, and military capabilities were deeply flawed. The January 2013 French-led military intervention scattered the insurgents, but the conditions and drivers that brought about the crisis in the first place have yet to be addressed. This report is intended to assist with the post-conflict planning in northern Mali by examining the historical, economic, and social factors that drive conflict in northern Mali and the different groups that have been involved in the conflict. The authors argue that, in the absence of a large international presence, durable security in northern Mali will have to be provided, to a large extent, by local actors. The authors draw on historical examples of rebellions in Mali since 1916 to show how detailed knowledge of the different local actors and their political dynamics can help in finding solutions that will bring lasting security and stability to the region
    Note: Includes bibliographical references (page 11)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9780833078018 , 0833078011 , 9780833078025 , 0833078038 , 083307802X , 0833078003 , 9780833078001 , 9780833078032
    Language: English
    Pages: 1 Online-Ressource (xxv, 85 pages)
    Series Statement: Rand Corporation monograph series MG-1246-NRL
    Parallel Title: Print version Perry, Walt L Predicting suicide attacks
    Keywords: Terrorists Suicidal behavior ; Terrorism ; Suicide bombings ; Terrorists ; Terrorism ; Suicide bombings ; POLITICAL SCIENCE ; Security (National & International) ; Suicide bombings ; Terrorism ; Terrorists ; Suicidal behavior ; Israel ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books
    Abstract: "The Naval Research Laboratory (NRL) set out to develop ways to predict what determines the targets of suicide attacks. While the ultimate goal is to create a list of areas at risk for the U.S. environment, the first phase of development employed a data set from Israel. Initially, NRL focused on spatial attributes, creating its own risk index, but realized that this focus on the where ignored the broader social context, the why. The lab asked RAND to test, as a proof of principle, the ability of sociocultural, political, economic, and demographic factors to enhance the predictive ability of NRL's methodology. Again using Israel as a sample, RAND created a database that coded for these factors, then conducted both quantitative and qualitative analyses with an eye to determining what puts a given area at greater risk. The quantitative analysis established that these factors are related to the odds of attack within specific neighborhoods and that the relationships held even when controlling for geospatial factors, so they seem to confer risk for reasons beyond their association with geospatial features of neighborhoods. The specifics of the research are limited to the preferences of Palestinian suicide bombers in Israel; however, the methods used to assess target preferences in Israel could be transferred to the United States or other countries. Any results, if proven to be robust, could be used to develop recommendations for heightened public awareness in certain areas."--Page 4 of cover
    Abstract: "The Naval Research Laboratory (NRL) set out to develop ways to predict what determines the targets of suicide attacks. While the ultimate goal is to create a list of areas at risk for the U.S. environment, the first phase of development employed a data set from Israel. Initially, NRL focused on spatial attributes, creating its own risk index, but realized that this focus on the where ignored the broader social context, the why. The lab asked RAND to test, as a proof of principle, the ability of sociocultural, political, economic, and demographic factors to enhance the predictive ability of NRL's methodology. Again using Israel as a sample, RAND created a database that coded for these factors, then conducted both quantitative and qualitative analyses with an eye to determining what puts a given area at greater risk. The quantitative analysis established that these factors are related to the odds of attack within specific neighborhoods and that the relationships held even when controlling for geospatial factors, so they seem to confer risk for reasons beyond their association with geospatial features of neighborhoods. The specifics of the research are limited to the preferences of Palestinian suicide bombers in Israel; however, the methods used to assess target preferences in Israel could be transferred to the United States or other countries. Any results, if proven to be robust, could be used to develop recommendations for heightened public awareness in certain areas."--Page 4 of cover
    Note: Includes bibliographical references (pages 83-85)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corporation
    ISBN: 9780833080783 , 0833083279 , 0833080784 , 9780833083272
    Language: English
    Pages: 1 Online-Ressource (xiv, 76 pages)
    Series Statement: Rand Corporation research report series RR-114-ODNI
    Keywords: United States Personnel management ; United States Personnel management ; United States ; United States ; Intelligence service Personnel management ; Intelligence service ; POLITICAL SCIENCE ; Security (National & International) ; Personnel management ; United States ; United States ; United States ; United States ; United States ; Electronic books
    Abstract: The U.S. intelligence community has a continuing and important role to play in providing the best intelligence and analytic insight possible to aid the nation's leaders in making decisions and taking action. Executing this role will require unprecedented collaboration and information sharing. The personnel throughout the intelligence agencies are essential to accomplishing these tasks. The intelligence community has made significant progress during the past decade in rebuilding its workforce and developing capabilities lost during the 1990s. As decisionmakers look ahead to a future most certainly defined by constrained budgets, it will be important to avoid repeating the post-Cold War drawdown experience and losing capability in a similar way because the consequences of such actions can be long lasting. This report chronicles intelligence community efforts over more than half a decade to improve community-wide workforce planning and management. It describes workforce planning tools that will help decisionmakers maintain a workforce capable of meeting the challenges that lie ahead, even as budgets decline. In addition, the community's collective efforts to take a more strategic approach to workforce planning point to a number of important considerations that serve as guideposts for the future: (1) rebuilding lost capability takes time, (2) resource flexibility is needed, (3) risk is an essential element in workforce planning, (4) systematic planning shores up requirements, and (5) the supply of military personnel is likely to decline. These lessons learned through an era of workforce rebuilding can inform resource decisions today and in the years to come
    Abstract: The U.S. intelligence community has a continuing and important role to play in providing the best intelligence and analytic insight possible to aid the nation's leaders in making decisions and taking action. Executing this role will require unprecedented collaboration and information sharing. The personnel throughout the intelligence agencies are essential to accomplishing these tasks. The intelligence community has made significant progress during the past decade in rebuilding its workforce and developing capabilities lost during the 1990s. As decisionmakers look ahead to a future most certainly defined by constrained budgets, it will be important to avoid repeating the post-Cold War drawdown experience and losing capability in a similar way because the consequences of such actions can be long lasting. This report chronicles intelligence community efforts over more than half a decade to improve community-wide workforce planning and management. It describes workforce planning tools that will help decisionmakers maintain a workforce capable of meeting the challenges that lie ahead, even as budgets decline. In addition, the community's collective efforts to take a more strategic approach to workforce planning point to a number of important considerations that serve as guideposts for the future: (1) rebuilding lost capability takes time, (2) resource flexibility is needed, (3) risk is an essential element in workforce planning, (4) systematic planning shores up requirements, and (5) the supply of military personnel is likely to decline. These lessons learned through an era of workforce rebuilding can inform resource decisions today and in the years to come
    Note: "Prepared for the Office of the Director of National Intelligence , "National Defense Research Institute , Includes bibliographical references (pages 73-76)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9780833080981 , 0833084607 , 0833080989 , 9780833084606
    Language: English
    Pages: 1 Online-Ressource (57 pages)
    Parallel Title: Erscheint auch als Paul, Christopher, 1971- RAND security cooperation prioritization and propensity matching tool
    Keywords: Security, International ; Decision making Data processing ; Military assistance, American Planning ; National security International cooperation ; Security, International ; Decision making ; Military assistance, American ; National security ; Security, International ; United States ; Law, Politics & Government ; International Relations ; Military policy ; POLITICAL SCIENCE ; Security (National & International) ; Decision making ; Data processing ; Diplomatic relations ; National security ; International cooperation ; United States Foreign relations 1989- ; United States Military policy ; United States ; United States ; Electronic books
    Abstract: Security cooperation is the umbrella term used to describe a wide range of programs and activities with such goals as building relationships between the United States and partner countries, developing these countries' security capabilities, and facilitating contingency and peacetime access by U.S. forces. With increased pressure on defense spending, the scope and budget for these activities are likely to decrease. Therefore, it will be important for the U.S. Department of Defense to scrutinize and, perhaps, reevaluate current and proposed security cooperation efforts, ensuring that expected benefits align with costs and corresponding policy priorities. Recent RAND research identified practices and contextual factors associated with greater or lesser degrees of success in security cooperation, using 29 historical case studies of U.S. efforts to build partner capacity since the end of the Cold War. The RAND Security Cooperation Prioritization and Propensity Matching Tool applies these findings and results from other existing research to all current and potential security cooperation partners. This customizable diagnostic tool, built in Microsoft Excel®, will help planners preliminarily identify mismatches between the importance of a country to U.S. interests, funding for initiatives, and the propensity for successful U.S. security cooperation with a given country. For each of the world's 195 countries, the tool produces an overall security cooperation propensity score. Planners can then compare these scores with available funding and security cooperation priorities. The tool has the virtues of being systematic, being based on global data, and not relying on subjective assessments. Strategic thinking and nuanced understanding of individual countries remain important, but the tool is useful in helping to identify which countries to scrutinize
    Abstract: Security cooperation is the umbrella term used to describe a wide range of programs and activities with such goals as building relationships between the United States and partner countries, developing these countries' security capabilities, and facilitating contingency and peacetime access by U.S. forces. With increased pressure on defense spending, the scope and budget for these activities are likely to decrease. Therefore, it will be important for the U.S. Department of Defense to scrutinize and, perhaps, reevaluate current and proposed security cooperation efforts, ensuring that expected benefits align with costs and corresponding policy priorities. Recent RAND research identified practices and contextual factors associated with greater or lesser degrees of success in security cooperation, using 29 historical case studies of U.S. efforts to build partner capacity since the end of the Cold War. The RAND Security Cooperation Prioritization and Propensity Matching Tool applies these findings and results from other existing research to all current and potential security cooperation partners. This customizable diagnostic tool, built in Microsoft Excel®, will help planners preliminarily identify mismatches between the importance of a country to U.S. interests, funding for initiatives, and the propensity for successful U.S. security cooperation with a given country. For each of the world's 195 countries, the tool produces an overall security cooperation propensity score. Planners can then compare these scores with available funding and security cooperation priorities. The tool has the virtues of being systematic, being based on global data, and not relying on subjective assessments. Strategic thinking and nuanced understanding of individual countries remain important, but the tool is useful in helping to identify which countries to scrutinize
    Note: "RAND National Defense Research Institute , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 51-57)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    New York, NY : Columbia University Press
    ISBN: 9780231520003
    Language: English
    Pages: 1 Online-Ressource (xi, 461 Seiten)
    Parallel Title: Erscheint auch als Sjoberg, Laura, 1979 - Gendering global conflict
    RVK:
    RVK:
    RVK:
    RVK:
    Keywords: Women and war ; Feminist theory ; International relations ; SOCIAL SCIENCE ; General ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; Feminist theory ; International relations ; Women and war ; Law, Politics & Government ; International Relations ; Women and war ; Feminist theory ; International relations ; Electronic books ; Krieg ; Theorie ; Konfliktforschung ; Feminismus
    Abstract: Acknowledgments; Introduction; 1. The (Genderless) Study of War in International Relations; 2. Gender Lenses Look at War(s); 3. Anarchy, Structure, Gender, and War(s); 4. Relations International and War(s); 5. Gender, States, and War(s); 6. People, Choices, and War(s); 7. Gendered Strategy; 8. Gendered Tactics; 9. Living Gendered War(s); Conclusion: (A) Feminist Theory/ies of War(s); Notes; Index.
    Abstract: Laura Sjoberg positions gender and gender subordination as key factors in the making and fighting of global conflict. Through the lens ofgender, she examines the meaning, causes, practices, and experiences of war, building a more inclusive approach to the analysis of violent conflict between states. Considering war at the international, state, substate, and individual levels, Sjoberg's feminist perspective gives a number of causal variables significant standing in war decision-making. These include structural gender inequality, cycles of gendered violence, state masculine posturing
    Note: Includes bibliographical references and index , Text in English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Ithaca : Cornell University Press
    ISBN: 0801451868 , 0801468175 , 9780801451867 , 9780801468179
    Language: English
    Pages: 1 Online-Ressource
    Edition: Online-Ausg.
    Series Statement: Cornell studies in security affairs
    Parallel Title: Print version Weisiger, Alex, 1977- Logics of war
    DDC: 355.02
    Keywords: Total war ; Low-intensity conflicts (Military science) ; Limited war ; War Causes ; War Causes ; Limited war ; Low-intensity conflicts (Military science) ; Total war ; Fremder Feind ; Society and social sciences Society and social sciences ; Theory of warfare and military science ; Warfare and defence ; POLITICAL SCIENCE ; Security (National & International) ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; History & Theory ; Limited war ; Low-intensity conflicts (Military science) ; Total war ; War ; Causes ; Totaler Krieg ; Krig ; teori, filosofi ; Electronic books
    Abstract: Explanations for limited and unlimited wars -- Research strategy and statistical tests -- War to the death in Paraguay -- World War II : German expansion and Allied response -- Commitment problem mini-cases : the Crimean, Pacific, and Iran-Iraq wars -- Short wars of optimism : Persian Gulf and Anglo-Iranian -- The limits on leaders : the Falklands War and the Franco-Turkish War -- Recapitulations, implications, and prognostications
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    ISBN: 9780833084217 , 0833084216 , 9780833081643 , 0833084232 , 0833081640 , 0833084224 , 9780833084224 , 9780833084231
    Language: English
    Pages: 1 Online-Ressource (1 online resource)
    Parallel Title: Print version Thaler, David E Improving the U.S. military's understanding of unstable environments vulnerable to violent extremist groups
    DDC: 355.4/230973
    Keywords: Irregular warfare ; Military doctrine ; Social sciences Research ; Insurgency ; Terrorism Prevention ; Political violence ; Irregular warfare ; Military doctrine ; Social sciences ; Insurgency ; Terrorism ; Political violence ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; Insurgency ; Irregular warfare ; Military doctrine ; Political violence ; Social sciences ; Research ; Terrorism ; Prevention ; Law, Politics & Government ; Military & Naval Science ; Military Science - General ; United States ; Electronic books
    Abstract: Introduction -- Gaining Insights into Unstable, Conflict-Prone Environments Through Social Science Lenses -- Factors Associated with Environments Vulnerable to Conflict -- Relationships Among Factors: Peru and Nepal Case Studies -- Utilizing the Factors for Analysis -- Conclusion -- Appendix A: Factors from Joint and Army Doctrine -- Appendix A: Factor Matrix -- Appendix C: Cross-Matching 12 Factors with RAND Case Studies on 30 Counterinsurgencies
    Abstract: Introduction -- Gaining Insights into Unstable, Conflict-Prone Environments Through Social Science Lenses -- Factors Associated with Environments Vulnerable to Conflict -- Relationships Among Factors: Peru and Nepal Case Studies -- Utilizing the Factors for Analysis -- Conclusion -- Appendix A: Factors from Joint and Army Doctrine -- Appendix A: Factor Matrix -- Appendix C: Cross-Matching 12 Factors with RAND Case Studies on 30 Counterinsurgencies
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 9780833077165 , 083307718X , 0833076825 , 0833077171 , 0833077163 , 9780833077172 , 9780833076823 , 9780833077189
    Language: English
    Pages: 1 Online-Ressource
    Parallel Title: Print version Kearn, David W Facing the missile challenge
    Keywords: Treaty Between the United States of America and the Union of Soviet Socialist Republics on the Elimination of Their Intermediate-Range and Shorter-Range Missiles ; Treaty Between the United States of America and the Union of Soviet Socialist Republics on the Elimination of Their Intermediate-Range and Shorter-Range Missiles ; Nuclear arms control ; Security, International ; Nuclear nonproliferation ; Nuclear arms control ; Security, International ; Nuclear nonproliferation ; POLITICAL SCIENCE ; Security (National & International) ; Military policy ; Military readiness ; Nuclear arms control ; Nuclear nonproliferation ; Security, International ; Law, Politics & Government ; International Relations ; United States ; Treaty Between the United States of America and the Union of Soviet Socialist Republics on the Elimination of Their Intermediate-Range and Shorter-Range Missiles (1987 December 8) ; United States Defenses ; United States Military policy ; United States ; United States ; Electronic books
    Abstract: The Intermediate Nuclear Forces Treaty (INF), signed in 1987, eliminated nuclear and conventional ground-launched ballistic and cruise missiles with ranges between 500 and 5,500 kilometers from the United States and Soviet arsenals. The treaty was a diplomatic watershed, signaling the beginning of the end of the Cold War, and has served as a basis for security and stability of Europe. However, the security environment has changed dramatically in the past twenty years. To develop and deploy a new generation of land-based intermediate-range ballistic missiles, the United States would have to withdraw from the Treaty. Such an action would have significant political and military implications. The study attempts to explore and illuminate some potential responses of critical international actors, such as Russia, China, and America's NATO and East Asian allies, to fully understand the expected costs that may be incurred over time. The study concludes with a consideration of potential ways forward for the United States to provide policymakers with guidance on how to proceed in both diplomatic and political-military terms to best address the missile-proliferation threat
    Abstract: The Intermediate Nuclear Forces Treaty (INF), signed in 1987, eliminated nuclear and conventional ground-launched ballistic and cruise missiles with ranges between 500 and 5,500 kilometers from the United States and Soviet arsenals. The treaty was a diplomatic watershed, signaling the beginning of the end of the Cold War, and has served as a basis for security and stability of Europe. However, the security environment has changed dramatically in the past twenty years. To develop and deploy a new generation of land-based intermediate-range ballistic missiles, the United States would have to withdraw from the Treaty. Such an action would have significant political and military implications. The study attempts to explore and illuminate some potential responses of critical international actors, such as Russia, China, and America's NATO and East Asian allies, to fully understand the expected costs that may be incurred over time. The study concludes with a consideration of potential ways forward for the United States to provide policymakers with guidance on how to proceed in both diplomatic and political-military terms to best address the missile-proliferation threat
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833076588 , 0833076566 , 0833076531 , 0833076574 , 0833076582 , 9780833076571 , 9780833076533 , 9780833076564
    Language: English
    Pages: 1 Online-Ressource
    Series Statement: RAND Corporation monograph series
    Parallel Title: Print version Uses and limits of small-scale military interventions
    Keywords: Intervention (International law) ; Counterinsurgency Case studies ; Military assistance Case studies ; Limited war Case studies ; Intervention (International law) ; Counterinsurgency ; Military assistance ; Limited war ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Intervention (International law) ; Limited war ; Military assistance ; Military & Naval Science ; Law, Politics & Government ; Armies ; United States ; Case studies ; United States Armed Forces ; Stability operations ; Evaluation ; United States ; Electronic books
    Abstract: "The authors assess the utility and limitations of "minimalist stabilization"--Small-scale interventions designed to stabilize a partner government engaged in violent conflict. They propose policy recommendations concerning when minimalist stabilization missions may be appropriate and the strategies most likely to make such interventions successful, as well as the implications for U.S. Army force structure debates and partnership strategies. Minimalist stabilization missions do not significantly increase a partner government's odds of victory in a counterinsurgency campaign, but they do dramatically reduce the probability of defeat. Minimalist stabilization typically yields operational successes that degrade rebel capabilities and make it unlikely that the insurgents can topple the government. Such missions typically do not, however, alter the underlying structure of the conflict. They usually do not help foster significant political reforms in the partner government. Nor are they typically able to cut insurgents off from their resource bases. These dynamics suggest that the operational gains attributable to minimalist stabilization can usually be converted into strategic success only if the underlying political or international structure of the conflict can be altered. Military power plays a role, but the infrequency of victory suggests that the role of force is more about creating the framework within which a political process can operate successfully rather than winning per se. These findings do not yield simple policy prescriptions. These findings do, however, caution against viewing minimalist stabilization as a panacea. Modest resource commitments generally yield modest results. In some circumstances, such modest results will be adequate to secure important U.S. interests. In other cases they will not, and in some cases the under-resourcing of interventions may have catastrophic results."--Page 4 of cover
    Abstract: Cover; Title Page; Copyright; Preface; Contents; Figures; Tables; Summary; Acknowledgments; Abbreviations; CHAPTER ONE: Introduction; Background: Weak and Failed States and the Problem of Intervention; Weariness with Large-Scale Nation-Building; The Growing Consensus in Favor of Minimalist Stabilization; Moving Beyond the Current Debate; The Concept of Minimalist Stabilization; Approach; CHAPTER TWO: Arguments For and Against Minimalist Stabilization; Costs and Sustainability; Nationalist Backlashes and Golden Hours; Dependency, Adaptability, and Transformation; Control and Escalation
    Abstract: ConclusionCHAPTER THREE: Overview of the Results of Minimalist Stabilization; Analytic Framework; Empirical Scope of the Research; Military Outcomes: Defining Success; Stabilizing Interventions; Operational Environments; Empirical Results; Outcomes in the Absence of Intervention; Where Do States Intervene?; Consequences of Minimalist Stabilization; Understanding the Role of Operational Environments; Large Interventions; Conclusions; CHAPTER FOUR: Case Studies; El Salvador and the FMLN, 1979-1991; Conflict Narrative; Significant Characteristics of the Operational Environment
    Abstract: Results of the U.S. InterventionConclusions; Colombia and the FARC, 1978 to the Present; Conflict Narrative; Significant Characteristics of the Operational Environment; Conclusions; Operation Enduring Freedom-Philippines, 2002 to the Present; Conflict Narrative; Significant Characteristics of the Operational Environment; Results of the U.S. Intervention; Conclusions; Central African Republic, 1996-1997; Conflict Narrative; Significant Characteristics of the Operational Environment; Conclusions; In Sum; CHAPTER FIVE: Conclusion; The Value of Intervention; Improving the Probability of Success
    Abstract: "The authors assess the utility and limitations of "minimalist stabilization"--Small-scale interventions designed to stabilize a partner government engaged in violent conflict. They propose policy recommendations concerning when minimalist stabilization missions may be appropriate and the strategies most likely to make such interventions successful, as well as the implications for U.S. Army force structure debates and partnership strategies. Minimalist stabilization missions do not significantly increase a partner government's odds of victory in a counterinsurgency campaign, but they do dramatically reduce the probability of defeat. Minimalist stabilization typically yields operational successes that degrade rebel capabilities and make it unlikely that the insurgents can topple the government. Such missions typically do not, however, alter the underlying structure of the conflict. They usually do not help foster significant political reforms in the partner government. Nor are they typically able to cut insurgents off from their resource bases. These dynamics suggest that the operational gains attributable to minimalist stabilization can usually be converted into strategic success only if the underlying political or international structure of the conflict can be altered. Military power plays a role, but the infrequency of victory suggests that the role of force is more about creating the framework within which a political process can operate successfully rather than winning per se. These findings do not yield simple policy prescriptions. These findings do, however, caution against viewing minimalist stabilization as a panacea. Modest resource commitments generally yield modest results. In some circumstances, such modest results will be adequate to secure important U.S. interests. In other cases they will not, and in some cases the under-resourcing of interventions may have catastrophic results."--Page 4 of cover
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    ISBN: 9780833078506 , 0833083155 , 083307850X , 9780833083159
    Language: English
    Pages: 1 Online-Ressource (xxiv, 101 pages)
    Parallel Title: Available in another form
    Parallel Title: Available in another form
    Keywords: Security Assistance Program ; Military assistance, American ; Security Assistance Program ; Military assistance, American ; Military & Naval Science ; Armies ; Law, Politics & Government ; Military assistance, American ; Security Assistance Program ; POLITICAL SCIENCE ; Security (National & International) ; United States ; Military relations ; United States Military relations ; United States ; Electronic books
    Abstract: The United States has a long history of helping other nations develop and improve their military and other security forces. However, changing economic realities and the ongoing reductions in overall defense spending related to the end of more than a decade of war will affect the funding available for these initiatives. How can the U.S. Department of Defense increase the effectiveness of its efforts to build partner capacity while also increasing the efficiency of those efforts? And what can the history of U.S. efforts to build partner capacity reveal about which approaches are likely to be more or less effective under different circumstances? To tackle these complex questions and form a base of evidence to inform policy discussions and investment decisions, a RAND study collected and compared 20 years of data on 29 historical case studies of U.S. involvement in building partner capacity. In the process, it tested a series of validating factors and hypotheses (many of which are rooted in "common knowledge") to determine how they stand up to real-world case examples of partner capacity building. The results reveal nuances in outcomes and context, pointing to solutions and recommendations to increase the effectiveness of current and future U.S. initiatives to forge better relationships, improve the security and stability of partner countries, and meet U.S. policy and security objectives worldwide
    Abstract: The United States has a long history of helping other nations develop and improve their military and other security forces. However, changing economic realities and the ongoing reductions in overall defense spending related to the end of more than a decade of war will affect the funding available for these initiatives. How can the U.S. Department of Defense increase the effectiveness of its efforts to build partner capacity while also increasing the efficiency of those efforts? And what can the history of U.S. efforts to build partner capacity reveal about which approaches are likely to be more or less effective under different circumstances? To tackle these complex questions and form a base of evidence to inform policy discussions and investment decisions, a RAND study collected and compared 20 years of data on 29 historical case studies of U.S. involvement in building partner capacity. In the process, it tested a series of validating factors and hypotheses (many of which are rooted in "common knowledge") to determine how they stand up to real-world case examples of partner capacity building. The results reveal nuances in outcomes and context, pointing to solutions and recommendations to increase the effectiveness of current and future U.S. initiatives to forge better relationships, improve the security and stability of partner countries, and meet U.S. policy and security objectives worldwide
    Note: "RAND National Defense Research Institute , "This research was ... conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , Includes bibliographical references (pages 99-101)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    ISBN: 9780833076311 , 083307637X , 0833076310 , 9780833076373
    Language: English
    Pages: 1 Online-Ressource (xxvi, 180 pages)
    Series Statement: Rand Corporation monograph series MG-1180-TSF
    Parallel Title: Print version Reardon, Robert J Containing Iran
    Keywords: Nuclear weapons Government policy ; Nuclear nonproliferation Government policy ; Nuclear weapons ; Nuclear nonproliferation ; Nuclear weapons ; Nuclear nonproliferation ; Nuclear weapons ; Nuclear nonproliferation ; POLITICAL SCIENCE ; Security (National & International) ; Diplomatic relations ; Nuclear nonproliferation ; Nuclear nonproliferation ; Government policy ; Nuclear weapons ; Nuclear weapons ; Government policy ; Military & Naval Science ; Law, Politics & Government ; Military Science - General ; United States ; POLITICAL SCIENCE ; Government ; International ; Iran ; POLITICAL SCIENCE ; International Relations ; General ; United States Foreign relations ; Iran Foreign relations ; United States ; Iran ; Electronic books
    Abstract: "Iran's nuclear program is one of the most pressing foreign policy issues for the United States. An Iranian nuclear arsenal could further destabilize an already unsettled region and put important U.S. interests at risk. The United States has a strong interest in preventing such an outcome. There is no evidence that Iran has decided to acquire nuclear weapons. However, Iran does seem intent on acquiring the means to do so quickly. It is an open question whether the United States and its allies would be able to prevent Iran from crossing the nuclear threshold, if it so chose, at an acceptable cost. After almost a decade of concerted effort involving economic, diplomatic, and military sources of leverage, there has been little progress toward reversing or substantially slowing Iran's nuclear progress. Despite years of U.S. diplomatic efforts to stall that progress, the Iranians have succeeded in building an extensive enrichment program and likely possess the technical capacity to produce at least one nuclear weapon should they choose to do so. Coercion is unlikely to convince Iran to change course. This study assesses current U.S. policy options on the Iranian nuclear question. It suggests that U.S. goals can be met through patient and forward-looking policymaking. Specifically, the United States can begin to lay the groundwork for an effective containment policy while continuing efforts to forestall Iranian weaponization. A successful containment policy will promote long-term positive political change in Iran while avoiding counterproductive provocation."--Publisher's website
    Abstract: "Iran's nuclear program is one of the most pressing foreign policy issues for the United States. An Iranian nuclear arsenal could further destabilize an already unsettled region and put important U.S. interests at risk. The United States has a strong interest in preventing such an outcome. There is no evidence that Iran has decided to acquire nuclear weapons. However, Iran does seem intent on acquiring the means to do so quickly. It is an open question whether the United States and its allies would be able to prevent Iran from crossing the nuclear threshold, if it so chose, at an acceptable cost. After almost a decade of concerted effort involving economic, diplomatic, and military sources of leverage, there has been little progress toward reversing or substantially slowing Iran's nuclear progress. Despite years of U.S. diplomatic efforts to stall that progress, the Iranians have succeeded in building an extensive enrichment program and likely possess the technical capacity to produce at least one nuclear weapon should they choose to do so. Coercion is unlikely to convince Iran to change course. This study assesses current U.S. policy options on the Iranian nuclear question. It suggests that U.S. goals can be met through patient and forward-looking policymaking. Specifically, the United States can begin to lay the groundwork for an effective containment policy while continuing efforts to forestall Iranian weaponization. A successful containment policy will promote long-term positive political change in Iran while avoiding counterproductive provocation."--Publisher's website
    Note: "Supported by the Stanton Foundation , Includes bibliographical references (pages 163-180)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Washington, DC : Georgetown University Press
    ISBN: 9781589018952 , 1589018958
    Language: English
    Pages: Online Ressource (xii, 315 p.) , ill.
    Edition: Online-Ausg.
    Parallel Title: Erscheint auch als Call, Charles Why peace fails
    DDC: 303.64
    Keywords: Peace Political aspects ; War Causes ; War Case studies ; Causes ; Peace-building Case studies ; Peace-building ; War Causes ; Peace Political aspects ; War Case studies Causes ; Peace-building Case studies ; SOCIAL SCIENCE ; Violence in Society ; POLITICAL SCIENCE ; Security (National & International) ; Peace-building ; Peace ; Political aspects ; War ; Causes ; Bürgerkrieg ; Friedenskonsolidierung ; Friedenssicherung ; Kriegsende ; Case studies ; Electronic books ; Electronic books Case studies ; Fallstudiensammlung ; Electronic books ; Online-Publikation ; Fallstudiensammlung ; Fallstudiensammlung ; Electronic books
    Abstract: Why peace fails: theory -- Examining the cases -- Implications for theory and practice.
    Abstract: Why does peace fail? More precisely, why do some countries that show every sign of having successfully emerged from civil war fall once again into armed conflict? What explains why peace "sticks" after some wars but not others?. In this illuminating study, Charles T. Call examines the factors behind fifteen cases of civil war recurrence in Africa, Asia, the Caucasus, and Latin America. He argues that widely touted explanations of civil war -- such as poverty, conflict over natural resources, and weak states -- are far less important than political exclusion. Call's study shows that i
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833068491 , 0833068490 , 9780833068484 , 0833068482 , 9780833068477 , 0833068504 , 0833068474 , 9780833068507
    Language: English
    Pages: 1 Online-Ressource (xxiii, 115 pages)
    Series Statement: Monograph / Rand Corporation
    Parallel Title: Print version NATO and the challenges of austerity
    DDC: 355/.031091821
    Keywords: North Atlantic Treaty Organization Armed Forces ; Operational readiness ; North Atlantic Treaty Organization Armed Forces ; Appropriations and expenditures ; North Atlantic Treaty Organization ; North Atlantic Treaty Organization ; Armed Forces ; Appropriations and expenditures ; Armed Forces ; Operational readiness ; Military policy ; North Atlantic Treaty Organization ; HISTORY ; Military ; Other ; Europe ; North America ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; Europe Armed Forces ; Appropriations and expenditures ; North America Armed Forces ; Appropriations and expenditures ; Europe Military policy ; North America Military policy ; Europe ; North America ; Europe ; North America ; Electronic books
    Abstract: "In the coming decade, NATO faces growing fiscal austerity and declining defense budgets. This study analyzes the impact of planned defense budget cuts on the capabilities of seven European members of NATO -- the United Kingdom, France, Germany, Italy, Spain, the Netherlands, and Poland -- that together represent more than 80 percent of NATO Europe's defense spending. The result of the anticipated cuts and future financial constraints is that the capacity of the major European powers to project military power will be highly constrained: The air, land, and sea forces of key U.S. European allies are rapidly reaching the point at which they can perform only one moderate-sized operation at a time and will be hard-pressed to meet the rotation requirements of a protracted, small-scale irregular warfare mission. Power projection and sustainment of significant forces outside Europe's immediate neighborhood will be particularly difficult. The authors discuss these challenges in a strategic context, including the operational and planning weaknesses exposed by NATO's intervention in Libya in 2011, and make recommendations for U.S. policy with regard to NATO."--Page 4 of cover
    Abstract: "In the coming decade, NATO faces growing fiscal austerity and declining defense budgets. This study analyzes the impact of planned defense budget cuts on the capabilities of seven European members of NATO -- the United Kingdom, France, Germany, Italy, Spain, the Netherlands, and Poland -- that together represent more than 80 percent of NATO Europe's defense spending. The result of the anticipated cuts and future financial constraints is that the capacity of the major European powers to project military power will be highly constrained: The air, land, and sea forces of key U.S. European allies are rapidly reaching the point at which they can perform only one moderate-sized operation at a time and will be hard-pressed to meet the rotation requirements of a protracted, small-scale irregular warfare mission. Power projection and sustainment of significant forces outside Europe's immediate neighborhood will be particularly difficult. The authors discuss these challenges in a strategic context, including the operational and planning weaknesses exposed by NATO's intervention in Libya in 2011, and make recommendations for U.S. policy with regard to NATO."--Page 4 of cover
    Note: "MG-1196-OSD"--Page 4 of cover , "National Defense Research Institute , Includes bibliographical references (pages 109-115)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    ISBN: 9780833052223 , 0833052225 , 9780833052117 , 0833052241 , 9781283268066 , 128326806X , 9780833052247 , 083305211X
    Language: English
    Pages: 1 Online-Ressource (161 pages)
    Series Statement: Rand Corporation monograph series MG-1066-A
    Keywords: Afghanistan ; Afghanistan ; Internal security ; Internal security ; HISTORY ; Military ; Other ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; Internal security ; Military & Naval Science ; Law, Politics & Government ; Armies ; Afghanistan ; Afghanistan ; Electronic books
    Abstract: Introduction -- Overview of security force assistance during the coalition era, 2001-2009 -- Observations about recent SFA efforts in Afghanistan -- A framework for SFA and assessing SFA during conflict -- Implications of SFA in Afghanistan for the U.S. Army
    Abstract: Introduction -- Overview of security force assistance during the coalition era, 2001-2009 -- Observations about recent SFA efforts in Afghanistan -- A framework for SFA and assessing SFA during conflict -- Implications of SFA in Afghanistan for the U.S. Army
    Note: Includes bibliographical references (pages 125-131) , English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833052490 , 0833052578 , 0833052497 , 9780833052575
    Language: English
    Pages: 1 Online-Ressource (xlix, 332 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Dilemmas of intervention
    Keywords: Peace-building ; Nation-building ; Postwar reconstruction ; Peace-building ; Nation-building ; Postwar reconstruction ; Peace-building ; Postwar reconstruction ; peacebuilding ; peacekeeping operations ; POLITICAL SCIENCE ; Globalization ; POLITICAL SCIENCE ; Security (National & International) ; Nation-building ; Electronic books
    Abstract: Governments intervening in post-conflict states find themselves beset with numerous challenges and profound dilemmas: it is often unclear how best to proceed because measures that may improve conditions in one respect may undermine them in another. This volume reviews and integrates the scholarly social-science literature relevant to stabilization and reconstruction (S & R), with the goal of informing strategic planning at the whole-of-government level. The authors assert that S & R success depends on success in each of four component domains -- political, social, security, and economic. The authors discuss each domain separately but emphasize their interactions and the idea that the failure of any component can doom S & R as a whole. The authors also focus on a number of dilemmas that intervenors in post-conflict states face -- such as between short- and long-term goals and whether to work through or around the state's central government -- and suggest how these dilemmas can be confronted depending on context
    Abstract: Governments intervening in post-conflict states find themselves beset with numerous challenges and profound dilemmas: it is often unclear how best to proceed because measures that may improve conditions in one respect may undermine them in another. This volume reviews and integrates the scholarly social-science literature relevant to stabilization and reconstruction (S & R), with the goal of informing strategic planning at the whole-of-government level. The authors assert that S & R success depends on success in each of four component domains -- political, social, security, and economic. The authors discuss each domain separately but emphasize their interactions and the idea that the failure of any component can doom S & R as a whole. The authors also focus on a number of dilemmas that intervenors in post-conflict states face -- such as between short- and long-term goals and whether to work through or around the state's central government -- and suggest how these dilemmas can be confronted depending on context
    Note: "National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    ISBN: 9780833058270 , 0833058304 , 0833058274 , 9780833058300
    Language: English
    Pages: 1 Online-Ressource (xxi, 85 pages)
    Series Statement: Rand Corporation monograph series MG-1125-OSD
    Parallel Title: Print version Paul, Christopher, 1971- Challenge of violent drug-trafficking organizations
    Keywords: Internal security ; Violent crimes Prevention ; Violence ; Drug traffic ; Drug control ; Internal security ; Violent crimes ; Violence ; Drug traffic ; Drug control ; POLITICAL SCIENCE ; Security (National & International) ; Drug control ; Drug traffic ; Internal security ; Violence ; Violent crimes ; Prevention ; Social Welfare & Social Work ; Social Sciences ; Substance Abuse ; Mexico ; BUSINESS & ECONOMICS ; Infrastructure ; SOCIAL SCIENCE ; General ; Electronic books
    Abstract: Violent drug-trafficking organizations (VDTOs) in Mexico produce, transport, and deliver into the United States tens of billions of dollars worth of narcotics annually, but their activities are not limited to drug trafficking. VDTOs have also engaged in human trafficking, weapon trafficking, kidnapping, money laundering, extortion, bribery, racketeering, and assassinations. In an effort to clarify the scope and details of the challenges posed by VDTOs, a RAND team conducted a Delphi expert elicitation exercise, the results of which offer an assessment of the contemporary security situation in Mexico through the lens of existing RAND research on related issues. The exercise centered around three strands of prior RAND research on urban instability and unrest, historical insurgencies, and defense-sector reform. Although this prior research was not designed specifically for the study of Mexico, all three areas offer applicable insights. Assessment scorecards from these projects were used to obtain input from the expert panel and to guide the resulting discussion. The goal was not to break significant new ground in understanding the dynamics of drug violence in Mexico or to offer a qualitative assessment of these dynamics, but rather to provide an empirically based platform for identifying key areas that merit further investigation
    Abstract: Violent drug-trafficking organizations (VDTOs) in Mexico produce, transport, and deliver into the United States tens of billions of dollars worth of narcotics annually, but their activities are not limited to drug trafficking. VDTOs have also engaged in human trafficking, weapon trafficking, kidnapping, money laundering, extortion, bribery, racketeering, and assassinations. In an effort to clarify the scope and details of the challenges posed by VDTOs, a RAND team conducted a Delphi expert elicitation exercise, the results of which offer an assessment of the contemporary security situation in Mexico through the lens of existing RAND research on related issues. The exercise centered around three strands of prior RAND research on urban instability and unrest, historical insurgencies, and defense-sector reform. Although this prior research was not designed specifically for the study of Mexico, all three areas offer applicable insights. Assessment scorecards from these projects were used to obtain input from the expert panel and to guide the resulting discussion. The goal was not to break significant new ground in understanding the dynamics of drug violence in Mexico or to offer a qualitative assessment of these dynamics, but rather to provide an empirically based platform for identifying key areas that merit further investigation
    Note: "This research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute"--Preface , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 81-85)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 9780833047694 , 0833059866 , 0833047698 , 9780833059864
    Language: English
    Pages: 1 Online-Ressource (xxiii, 131 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Glenn, Russell W Band of brothers or dysfunctional family?
    Keywords: Integrated operations (Military science) ; Counterinsurgency ; Armed Forces Stability operations ; Integrated operations (Military science) ; Counterinsurgency ; Armed Forces ; HISTORY ; Military ; Pictorial ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Stability operations ; Counterinsurgency ; Integrated operations (Military science) ; military operations ; cooperation ; armed forces ; peacekeeping operations ; Electronic books
    Abstract: Counterinsurgency and other stability operations seldom present a nation with trials that threaten its very survival, barring cases in which that nation is the target of insurgents. Bonds between coalition members are therefore weaker than when threat of annihilation reinforces mutual dependence. Such situations are further complicated by the use of force likely not being the primary implement for attaining ultimate success. Devoid of a preeminent threat and denied primary dependence on armed forces, core coalition objectives tend to be political rather than military in character and include counterinsurgency, nation building, developing government capacity, and providing humanitarian assistance -- activities often associated with stability operations. Armed forces are not staffed or trained to meet the long-term demands of many of these tasks. An alliance or coalition must therefore incorporate participation by other government agencies and -- ultimately -- that of the indigenous government and its population more than is expected during conventional combat operations. Recent contingencies have also seen commercial enterprises, militias, intergovernmental organizations, and nongovernmental organizations become key participants in these undertakings. The result is coalitions of a size seldom seen and with a number of affiliations rarely, if ever, approached before the late 20th century. This monograph investigates the dramatic expansion of challenges confronting alliances and coalitions today and thereafter considers potential solutions that include questioning the conception of what constitutes a coalition in today's world
    Abstract: Counterinsurgency and other stability operations seldom present a nation with trials that threaten its very survival, barring cases in which that nation is the target of insurgents. Bonds between coalition members are therefore weaker than when threat of annihilation reinforces mutual dependence. Such situations are further complicated by the use of force likely not being the primary implement for attaining ultimate success. Devoid of a preeminent threat and denied primary dependence on armed forces, core coalition objectives tend to be political rather than military in character and include counterinsurgency, nation building, developing government capacity, and providing humanitarian assistance -- activities often associated with stability operations. Armed forces are not staffed or trained to meet the long-term demands of many of these tasks. An alliance or coalition must therefore incorporate participation by other government agencies and -- ultimately -- that of the indigenous government and its population more than is expected during conventional combat operations. Recent contingencies have also seen commercial enterprises, militias, intergovernmental organizations, and nongovernmental organizations become key participants in these undertakings. The result is coalitions of a size seldom seen and with a number of affiliations rarely, if ever, approached before the late 20th century. This monograph investigates the dramatic expansion of challenges confronting alliances and coalitions today and thereafter considers potential solutions that include questioning the conception of what constitutes a coalition in today's world
    Note: "National Defense Research Institute , Includes bibliographical references (pages 109-131)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Santa Monica, CA : RAND, National Defense Research Institute
    ISBN: 9780833047731 , 0833049305 , 0833047736 , 9780833049308
    Language: English
    Pages: 1 Online-Ressource (xxiii, 144 pages)
    Series Statement: RAND Corporation monograph series
    Parallel Title: Print version Mullahs, Guards, and Bonyads
    Keywords: Islam and politics ; Political leadership ; Civil-military relations ; Political culture ; Islam and politics ; Political leadership ; Civil-military relations ; Political culture ; Political leadership ; Politics and government ; Regions & Countries - Asia & the Middle East ; Middle East ; History & Archaeology ; HISTORY ; General ; POLITICAL SCIENCE ; Security (National & International) ; Iran ; United States ; Iran ; government ; Iran ; internal politics ; Civil-military relations ; Diplomatic relations ; Islam and politics ; Military policy ; Political culture ; Iran Foreign relations ; Iran Military policy ; United States Foreign relations ; Iran Foreign relations ; Iran Politics and government ; Iran ; Iran ; United States ; Iran ; Iran ; Electronic books
    Abstract: The Islamic Republic of Iran poses serious challenges to U.S. interests in the Middle East, and its nuclear program continues to worry, and bring condemnation and sanction from, the international community. Yet the U.S. ability to "read" the regime in Tehran and formulate appropriate policies has been handicapped by the lack of access to Iran experienced by U.S. diplomats and other citizens and by what many observers lament as the opacity of Iranian decisionmaking processes. The objective of this book is to offer a framework to help U.S. policymakers and analysts better understand existing and evolving leadership dynamics driving Iranian decisionmaking. The research herein provides not only a basic primer on the structure, institutions, and personalities of the government and other influential power centers but also a better understanding of Iranian elite behavior as a driver of Iranian policy formulation and execution. The book pays special attention to emerging fissures within the regime, competing centers of power, and the primacy of informal networks-- a particularly important yet not well understood hallmark of the Iranian system
    Abstract: The Islamic Republic of Iran poses serious challenges to U.S. interests in the Middle East, and its nuclear program continues to worry, and bring condemnation and sanction from, the international community. Yet the U.S. ability to "read" the regime in Tehran and formulate appropriate policies has been handicapped by the lack of access to Iran experienced by U.S. diplomats and other citizens and by what many observers lament as the opacity of Iranian decisionmaking processes. The objective of this book is to offer a framework to help U.S. policymakers and analysts better understand existing and evolving leadership dynamics driving Iranian decisionmaking. The research herein provides not only a basic primer on the structure, institutions, and personalities of the government and other influential power centers but also a better understanding of Iranian elite behavior as a driver of Iranian policy formulation and execution. The book pays special attention to emerging fissures within the regime, competing centers of power, and the primacy of informal networks-- a particularly important yet not well understood hallmark of the Iranian system
    Note: "Prepared for the Office of the Secretary of Defense, approved for public release, distribution unlimited , Includes bibliographical references (pages 127-144)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833049520 , 0833049836 , 0833049526 , 9780833049834
    Language: English
    Pages: 1 Online-Ressource (xxiv, 244 pages)
    Series Statement: Rand Corporation monograph series MG-965-MCIA
    Parallel Title: Print version Connable, Ben How insurgencies end
    Keywords: Counterinsurgency Case studies ; Insurgency ; Counterinsurgency ; Insurgency Case studies ; Insurgency Case studies ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Upprorsbekämpning ; Uppror ; Law, Politics & Government ; Political Science ; Political Theory of the State ; insurgency ; Insurgency ; Counterinsurgency ; Case studies ; Statistics ; Electronic books
    Abstract: "This study tested conventional wisdom about how insurgencies end against the evidence from 89 insurgencies. It compares a quantitative and qualitative analysis of 89 insurgency case studies with lessons from insurgency and counterinsurgency (COIN) literature. While no two insurgencies are the same, the authors find that modern insurgencies last about ten years and that a government's chances of winning may increase slightly over time. Insurgencies are suited to hierarchical organization and rural terrain, and sanctuary is vital to insurgents. Insurgent use of terrorism often backfires, and withdrawal of state sponsorship can cripple an insurgency, typically leading to its defeat. Inconsistent support to either side generally presages defeat for that side, although weak insurgencies can still win. Anocracies (pseudodemocracies) rarely succeed against insurgencies. Historically derived force ratios are neither accurate nor predictive, and civil defense forces are very useful for both sides. Key indicators of possible trends and tipping points in an insurgency include changes in desertions, defections, and the flow of information to the COIN effort. The more parties in an insurgency, the more likely it is to have a complex and protracted ending. There are no COIN shortcuts."--Rand web site
    Abstract: "This study tested conventional wisdom about how insurgencies end against the evidence from 89 insurgencies. It compares a quantitative and qualitative analysis of 89 insurgency case studies with lessons from insurgency and counterinsurgency (COIN) literature. While no two insurgencies are the same, the authors find that modern insurgencies last about ten years and that a government's chances of winning may increase slightly over time. Insurgencies are suited to hierarchical organization and rural terrain, and sanctuary is vital to insurgents. Insurgent use of terrorism often backfires, and withdrawal of state sponsorship can cripple an insurgency, typically leading to its defeat. Inconsistent support to either side generally presages defeat for that side, although weak insurgencies can still win. Anocracies (pseudodemocracies) rarely succeed against insurgencies. Historically derived force ratios are neither accurate nor predictive, and civil defense forces are very useful for both sides. Key indicators of possible trends and tipping points in an insurgency include changes in desertions, defections, and the flow of information to the COIN effort. The more parties in an insurgency, the more likely it is to have a complex and protracted ending. There are no COIN shortcuts."--Rand web site
    Note: Includes bibliographical references (pages 223-244)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    ISBN: 9780833049612 , 0833050788 , 9781282940536 , 1282940538 , 9780833050786 , 0833049615
    Language: English
    Pages: 1 Online-Ressource (xxx, 153 pages)
    Series Statement: Rand Corporation monograph series MG-964-OSD
    Parallel Title: Print version Paul, Christopher, 1971- Victory has a thousand fathers
    Keywords: Insurgency Case studies ; Counterinsurgency Case studies ; Insurgency ; Counterinsurgency ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Insurgency ; Military & Naval Science ; Law, Politics & Government ; Military Science - General ; TECHNOLOGY & ENGINEERING ; Military Science ; Case studies ; Electronic books
    Abstract: Insurgency has been the most prevalent form of armed conflict since at least 1949, as well as the subject of countless historical and contemporary studies. Contemporary discourse on the subject is voluminous and often contentious, but to date there has been a dearth of systematic evidence supporting the counterinsurgency (COIN) approaches, practices, and tenets that make for successful operations. Relying on a collection of the 30 most recent resolved insurgencies, along with a bank of factors that helped or hindered the COIN force in each case and in each phase of each case, several commonalities emerge. For instance, the data show that good COIN practices tend to "run in packs" and that the balance of selected good and bad practices perfectly predicts the outcome of a conflict. The importance of popular support is confirmed, but the ability to interdict tangible support (such as new personnel, materiel, and financing) is the single best predictor of COIN force success. Twenty distinct approaches to COIN are rigorously tested against the historical record, providing valuable lessons for U.S. engagement in and support for COIN operations
    Abstract: Insurgency has been the most prevalent form of armed conflict since at least 1949, as well as the subject of countless historical and contemporary studies. Contemporary discourse on the subject is voluminous and often contentious, but to date there has been a dearth of systematic evidence supporting the counterinsurgency (COIN) approaches, practices, and tenets that make for successful operations. Relying on a collection of the 30 most recent resolved insurgencies, along with a bank of factors that helped or hindered the COIN force in each case and in each phase of each case, several commonalities emerge. For instance, the data show that good COIN practices tend to "run in packs" and that the balance of selected good and bad practices perfectly predicts the outcome of a conflict. The importance of popular support is confirmed, but the ability to interdict tangible support (such as new personnel, materiel, and financing) is the single best predictor of COIN force success. Twenty distinct approaches to COIN are rigorously tested against the historical record, providing valuable lessons for U.S. engagement in and support for COIN operations
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Santa Monica, CA : RAND National Defense Research Institute
    ISBN: 9780833049889 , 083305080X , 0833049887 , 9780833050809
    Language: English
    Pages: 1 Online-Ressource (xv, 97 pages)
    Series Statement: Rand Corporation monograph series MG-1002-MCIA
    Parallel Title: Print version Jones, Seth G., 1972- Afghanistan's local war
    Keywords: National security ; Internal security ; National security ; Internal security ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; Internal security ; Afghanistan ; National security ; Politics and government ; Armed Forces ; Military readiness ; Military policy ; Afghanistan ; Afghanistan ; Afghanistan Military policy 21st century ; Afghanistan Armed Forces 21st century ; Afghanistan Armed Forces ; Afghanistan Politics and government 2001- ; Electronic books
    Abstract: Security in Afghanistan has historically required a combination of top-down efforts from the central government and bottom-up efforts from local communities. Since 2001, U.S. and broader international efforts have focused on establishing security solely from the top down through Afghan national security forces and other central government institutions. But local security forces are a critical complement to these efforts, especially in rural areas of the country. The Afghan government and NATO forces need to move quickly to establish a more-effective bottom-up strategy to complement top-down efforts by better leveraging local communities. The Afghan government can work with existing community structures that oppose insurgents to establish village-level policing entities, such as arbakai and chalweshtai, with support from NATO. Effectively leveraging local communities should significantly improve counterinsurgency prospects and can facilitate mobilization of the population against insurgents. This analysis documents lessons about the viability of establishing local security in Afghanistan and addresses concerns about the wisdom of such policies
    Abstract: Security in Afghanistan has historically required a combination of top-down efforts from the central government and bottom-up efforts from local communities. Since 2001, U.S. and broader international efforts have focused on establishing security solely from the top down through Afghan national security forces and other central government institutions. But local security forces are a critical complement to these efforts, especially in rural areas of the country. The Afghan government and NATO forces need to move quickly to establish a more-effective bottom-up strategy to complement top-down efforts by better leveraging local communities. The Afghan government can work with existing community structures that oppose insurgents to establish village-level policing entities, such as arbakai and chalweshtai, with support from NATO. Effectively leveraging local communities should significantly improve counterinsurgency prospects and can facilitate mobilization of the population against insurgents. This analysis documents lessons about the viability of establishing local security in Afghanistan and addresses concerns about the wisdom of such policies
    Note: Includes bibliographical references (pages 89-97)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    The Australian National University, A.C.T. : ANU E Press
    ISBN: 9781921666193 , 1921666196 , 9781921666186 , 1921666188
    Language: English
    Series Statement: SDSC Canberra papers on strategy and defence 176
    Parallel Title: Erscheint auch als Huisken, Ronald, 1946 - Introducing China
    Parallel Title: Print version Huisken, Ronald Introducing China
    Keywords: Großmacht ; Internationale Beziehungen ; Internationale Sicherheit ; Militärpolitik ; China ; Society and social sciences Society and social sciences ; Economic history ; Diplomatic relations ; Politics and government ; Regions & Countries - Asia & the Middle East ; History & Archaeology ; East Asia ; China ; foreign policy ; China ; defence policy ; China ; POLITICAL SCIENCE ; Security (National & International) ; Politics and government ; China Politics and government, 21st century. ; China Economic conditions, 2000- ; China Foreign relations. ; China Foreign relations ; China Politics and government 21st century ; China Economic conditions 2000- ; China ; China ; China ; Electronic book ; China ; Sicherheitspolitik
    Abstract: China's transformation has been patiently, methodically and very deliberately constructed by a leadership group that has equally carefully protected its monopoly on power. Today's China is proceeding with great seriousness and determination to become a first-rank state with a balanced portfolio of power and no major vulnerabilities. China takes itself very seriously and is inviting the world to overlook the formidable hard power assets it is determined to acquire in favour of simply enjoying the fruits of its market and trusting in the sincerity of its rhetoric on being determined to become a benign and peaceful new-age major power
    Description / Table of Contents: 1. Imperial China: Practice Makes Perfect? -- China's first rise -- The tribute system -- The Imperial legacy -- 2. The People's Republic of China: Early Foreign and Security Policy Choices -- The Mao era -- US-China re-engagement -- Post-Cold War: The United States repositions China in its worldview -- China re-calibrates -- The 11 September 2001 terrorist attacks -- Taiwan and Korea: continuing flashpoints -- Taiwan -- Korea -- 3. China's Military Modernisation -- The transparency question -- Defence Doctrine and Force Posture -- Nuclear forces -- Assessment.
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Acton, A.C.T. : ANU E Press
    ISBN: 9781921666575 , 1921666579 , 9781921666568 , 1921666560
    Language: English
    Pages: 1 Online-Ressource (1 volume)
    Series Statement: Canberra papers on strategy and defence no. 176
    Keywords: Politics and government ; Politics and government ; Society and social sciences Society and social sciences ; POLITICAL SCIENCE ; Security (National & International) ; Australia ; Timor-Leste ; Diplomatic relations ; Australia Politics and government. ; Australia Foreign relations ; Timor-Leste. ; Timor-Leste Foreign relations ; Australia. ; Australia Foreign relations ; Timor-Leste Foreign relations ; Australia Politics and government ; Australia ; Timor-Leste ; Australia ; Electronic books
    Abstract: "East Timor's violent transition to independence, which began early in 1999, presented the Australian Government with a significant foreign policy crisis. This crisis was not sudden, totally unexpected or ultimately threatening to Australia's survival. But the crisis consumed the attention of Australian leaders, saw significant national and international resources employed, and led to the largest operational deployment for the Australian Defence Force since the Vietnam War. This crisis also created a significant rupture in the hitherto carefully-managed relationships between Australia and its important neighbor, Indonesia. The events of September 1999 ultimately led to the birth of a new nation and the deaths of many people who might have otherwise expected to enjoy that independence. In this major study, David Connery examines how the Australian Government--at the political and bureaucratic levels--developed and managed national security policy in the face of this crisis. The events, and the policymaking processes that both led and followed, are reconstructed using sixty interviews with key participants. This study identifies certain characteristics of crisis policymaking in Australia that include a dominant executive, secrecy, external actors and complexity."--Publisher's description.
    Description / Table of Contents: Australian Policymaking and the East Timor Crisis -- A Brief Outline of the East Timor Crisis: The View from Canberra -- Initiating the Policy Cycle -- Bringing Policy Advice Together -- Decision and Beyond -- Conclusion: East Timor and the Characteristics of Crisis Policymaking.
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Santa Monica, CA : RAND National Defense Research Institute
    ISBN: 9780833049674 , 0833050796 , 0833049674 , 9780833050793
    Language: English
    Pages: 1 Online-Ressource (xxi, 327 pages)
    Series Statement: Rand Corporation monograph series MG-964-1 OSD
    Parallel Title: Print version Paul, Christopher, 1971- Victory has a thousand fathers
    Keywords: Counterinsurgency Case studies ; Insurgency Case studies ; Counterinsurgency ; Insurgency ; Insurgency ; TECHNOLOGY & ENGINEERING ; Military Science ; Case studies ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Electronic books
    Abstract: Detailed overviews of 30 counterinsurgency cases -- Nicaragua (Somoza), 1978-1979 -- Afghanistan (anti-Soviet), 1978-1992 -- Kampuchea, 1978-1992 -- El Salvador, 1979-1992 -- Somalia, 1980-1991 -- Peru, 1980-1992 -- Nicaragua (Contras), 1981-1990 -- Senegal, 1982-2002 -- Turkey (PKK), 1984-1999 -- Sudan (SPLA), 1984-2004 -- Uganda (ADF), 1986-2000 -- Papua New Guinea, 1988-1998 -- Liberia, 1989-1997 -- Rwanda, 1990-1994 -- Moldova, 1990-1992 -- Sierra Leone, 1991-2002 -- Algeria (GIA), 1992-2004 -- Croatia, 1992-1995 -- Afghanistan (post-Soviet), 1992-1996 -- Tajikistan, 1992-1997 -- Georgia/Abkhazia, 1992-1994 -- Nagorno-Karabakh, 1992-1994 --Bosnia, 1992-1995 -- Burundi, 1993-2003 -- Chechnya I, 1994-1996 -- Afghanistan (Taliban), 1996-2001 -- Zaire (anti-Mobutu), 1996-1997 -- Kosovo, 1996-1999 -- Nepal, 1997-2006 --Democratic Republic of the Congo (anti-Kabila), 1998-2003
    Abstract: Detailed overviews of 30 counterinsurgency cases -- Nicaragua (Somoza), 1978-1979 -- Afghanistan (anti-Soviet), 1978-1992 -- Kampuchea, 1978-1992 -- El Salvador, 1979-1992 -- Somalia, 1980-1991 -- Peru, 1980-1992 -- Nicaragua (Contras), 1981-1990 -- Senegal, 1982-2002 -- Turkey (PKK), 1984-1999 -- Sudan (SPLA), 1984-2004 -- Uganda (ADF), 1986-2000 -- Papua New Guinea, 1988-1998 -- Liberia, 1989-1997 -- Rwanda, 1990-1994 -- Moldova, 1990-1992 -- Sierra Leone, 1991-2002 -- Algeria (GIA), 1992-2004 -- Croatia, 1992-1995 -- Afghanistan (post-Soviet), 1992-1996 -- Tajikistan, 1992-1997 -- Georgia/Abkhazia, 1992-1994 -- Nagorno-Karabakh, 1992-1994 --Bosnia, 1992-1995 -- Burundi, 1993-2003 -- Chechnya I, 1994-1996 -- Afghanistan (Taliban), 1996-2001 -- Zaire (anti-Mobutu), 1996-1997 -- Kosovo, 1996-1999 -- Nepal, 1997-2006 --Democratic Republic of the Congo (anti-Kabila), 1998-2003
    Note: Includes bibliographical references (pages 313-327)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Cambridge, Mass : MIT Press
    ISBN: 9780262266086 , 0262266083
    Language: English
    Pages: Online Ressource (xiii, 285 p.) , ill., maps.
    Edition: Online-Ausg.
    Series Statement: Belfer Center studies in international security
    Parallel Title: Erscheint auch als Rethinking violence
    DDC: 303.6
    Keywords: Ethnic conflict Prevention ; Political violence Prevention ; War Moral and ethical aspects ; Conflict management ; Forced migration ; Political violence Prevention ; Ethnic conflict Prevention ; War Moral and ethical aspects ; POLITICAL SCIENCE ; Security (National & International) ; Conflict management ; Ethnic conflict ; Prevention ; Forced migration ; Political violence ; Prevention ; War ; Moral and ethical aspects ; SOCIAL SCIENCE ; Violence in Society ; Electronic books ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    Abstract: Although major wars between sovereign states have become rare contemporary world politics has been rife with internal conflict, ethnic cleansing, and violence against civilians. This book asks how, why, and when states and non-state actors use violence against one another
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833049803 , 0833050745 , 0833049801 , 9780833050748
    Language: English
    Pages: 1 Online-Ressource (xv, 37 pages)
    Series Statement: Occasional paper OP-298-RC
    Parallel Title: Print version Treverton, Gregory F Making policy in the shadow of the future
    DDC: 327.73
    Keywords: National security ; Political planning ; National security ; Political planning ; POLITICAL SCIENCE ; Government ; International ; POLITICAL SCIENCE ; International Relations ; General ; POLITICAL SCIENCE ; Security (National & International) ; Diplomatic relations ; National security ; Political planning ; United States ; United States Foreign relations ; United States ; Electronic books
    Abstract: The National Intelligence Council's (NIC's) 2008 report Global Trends 2025: A Transformed World projects what the world will look like in 2025 based on recent trends. However, as an intelligence organization, the NIC limits its report to describing the impacts of future trends on the United States -- it cannot explore the important question: How should U.S. policy adapt now to account for these trends and the future that will result from them? This paper takes on that task. It focuses on important issues for which a long-term perspective leads to different immediate choices for U.S. policy than would result from only a short-term perspective. These include energy and climate change; defense policy, including the diffusion of nuclear weapons and the movement to abolish them; the reshaping of international law and institutions; the structure of the federal government; and the U.S. relationship with Mexico. For some other issues, long- and short-term thinking produce similar conclusions; yet for still others, the two perspectives seem difficult to reconcile
    Abstract: The National Intelligence Council's (NIC's) 2008 report Global Trends 2025: A Transformed World projects what the world will look like in 2025 based on recent trends. However, as an intelligence organization, the NIC limits its report to describing the impacts of future trends on the United States -- it cannot explore the important question: How should U.S. policy adapt now to account for these trends and the future that will result from them? This paper takes on that task. It focuses on important issues for which a long-term perspective leads to different immediate choices for U.S. policy than would result from only a short-term perspective. These include energy and climate change; defense policy, including the diffusion of nuclear weapons and the movement to abolish them; the reshaping of international law and institutions; the structure of the federal government; and the U.S. relationship with Mexico. For some other issues, long- and short-term thinking produce similar conclusions; yet for still others, the two perspectives seem difficult to reconcile
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    ISBN: 9781921666117 , 1921666110 , 9781921666100 , 1921666102
    Language: English
    Series Statement: Canberra papers on strategy and defence 175
    Parallel Title: Erscheint auch als Mitchell, Cameron Scott Phoenix from the ashes?
    Parallel Title: Print version Phoenix from the ashes?
    Keywords: 1992-2008 ; Militärisch-industrieller Komplex ; Rüstungsgüter ; Export ; China ; Indien ; Schwellenländer ; Rüstungsindustrie ; Industriegeschichte ; Russland ; Weapons industry Russia. ; Weapons industry ; Weapons industry ; Rüstungsindustrie ; Waffenhandel ; Internationale Kooperation ; Vereinbarung ; Politische Führung ; Entscheidungsprozess ; Entwicklung ; Tendenz ; POLITICAL SCIENCE ; Security (National & International) ; Economic history ; Economics ; Russia ; Russia (Federation) ; Social conditions ; Weapons industry ; Russia (Federation) Social conditions. ; Russia (Federation) Economic aspects. ; Russia (Federation) Economic conditions. ; Russia (Federation) Economic aspects ; Russia (Federation) Economic conditions ; Russia (Federation) Social conditions ; Russia (Federation) ; Russia (Federation) ; Russia (Federation) ; Russland ; Electronic book ; Russland ; Rüstungsindustrie ; Geschichte 1992-2008
    Abstract: Phoenix from the ashes? --The origins and the nature of the Russian OPK --Domestic drivers for Russian OPK success --External drivers for OPK success: arms transfers to China --External drivers for OPK success: arms transfers to India --External drivers for OPK success: emerging markets.
    Description / Table of Contents: Phoenix from the ashes? -- The origins and the nature of the Russian OPK -- Domestic drivers for Russian OPK success -- External drivers for OPK success: arms transfers to China -- External drivers for OPK success: arms transfers to India -- External drivers for OPK success: emerging markets.
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    ISBN: 9780833047939 , 0833049046 , 0833047930 , 9780833049049
    Language: English
    Pages: 1 Online-Ressource (xiii, 7 pages)
    Series Statement: Conference proceedings
    Parallel Title: Print version Chalk, Peter Countering piracy in the modern era
    Keywords: Merchant marine Security measures ; Piracy Economic aspects ; Piracy Prevention ; Piracy ; Shipping Security measures ; Merchant marine ; Piracy ; Piracy ; Piracy ; Shipping ; Piracy ; Piracy ; Prevention ; Shipping ; Security measures ; TRUE CRIME ; General ; Indian Ocean ; Gulf of Aden ; POLITICAL SCIENCE ; Security (National & International) ; Merchant marine ; Security measures ; Navigation ; Safety measures ; Aden, Gulf of Navigation ; Safety measures ; Aden, Gulf of ; Electronic books
    Abstract: In March 2009, the RAND Corporation convened a small group of experts from the U.S. government, allied partner nations, the maritime industry, and other academic organizations to discuss piracy in the modern era. The premise of the workshop was that reconsidering the underlying factors that drive maritime piracy in the 21st century might provide valuable insights to decisionmakers and policymakers into how best to address the problem within the wider context of fostering greater order at sea. This document summarizes the main points and conclusions that emerged from the workshop; it should serve as a useful resource to workshop participants as well as others interested in understanding the challenges associated with maritime disorder, violence at sea, and piracy in particular
    Abstract: In March 2009, the RAND Corporation convened a small group of experts from the U.S. government, allied partner nations, the maritime industry, and other academic organizations to discuss piracy in the modern era. The premise of the workshop was that reconsidering the underlying factors that drive maritime piracy in the 21st century might provide valuable insights to decisionmakers and policymakers into how best to address the problem within the wider context of fostering greater order at sea. This document summarizes the main points and conclusions that emerged from the workshop; it should serve as a useful resource to workshop participants as well as others interested in understanding the challenges associated with maritime disorder, violence at sea, and piracy in particular
    Note: Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Canberra : ANU E Press
    ISBN: 9781921666032 , 192166603X , 9781921666025 , 1921666021
    Language: English
    Pages: 1 Online-Ressource (xiii, 131 pages)
    Series Statement: Canberra papers on strategy and defence no. 174
    Parallel Title: Erscheint auch als The architecture of security in the Asia-Pacific
    Parallel Title: Print version Architecture of security in the Asia-Pacific
    Keywords: National security Asia ; Congresses. ; National security Pacific Area ; Congresses. ; National security Congresses ; National security Congresses ; National security ; National security ; Conference papers and proceedings ; Pacific Area ; POLITICAL SCIENCE ; Security (National & International) ; National security ; Asia ; Electronic books ; Aufsatzsammlung ; Asiatisch-Pazifischer Raum ; Sicherheitspolitik
    Abstract: Papers prepared for a workshop organised by the Strategic and Defence Studies Centre (SDSC) in partnership with the China Foundation for International and Strategic Studies (CFISS).
    Note: Includes bibliographical references and index , Introduction , Developing East Asia's Security Architecture: An Australian perspective on ASEAN processes , The ASEAN Power , The SCO's Success in Security Architecture , Shifting Tides: China and North Korea , 'The Six-Party Talks Process: Towards an Asian Concert?' , The US Role in the Future Security Architecture for East Asia , The Role of the United States in the Future Security Architecture for East Asia--from the Perspective of China-US Military-to-Military Interaction , Potential Strategic Risks in China-US Relations , Changes in China-Japan Relations and East Asian Security
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    ISBN: 9781921536656 , 1921536659
    Language: English
    Parallel Title: Erscheint auch als Greener, Peter Timing is everything
    Keywords: New Zealand. Ministry of Defence ; New Zealand. Defence Force ; New Zealand ; New Zealand ; Defense contracts New Zealand. ; Government purchasing New Zealand. ; Military supplies. ; Military supplies ; Government purchasing ; Defense contracts ; Sicherheitspolitik ; Militär ; Beschaffungsorganisation ; Militärausgaben ; Politischer Prozess ; Politische Führung ; Entscheidungsprozess ; Geschichte ; Einflussgröße ; Militärische Kooperation ; Armed Forces ; Procurement ; Defense contracts ; Government purchasing ; Military supplies ; New Zealand ; New Zealand ; New Zealand ; POLITICAL SCIENCE ; Security (National & International) ; New Zealand Armed Forces ; Procurement. ; New Zealand ; Neuseeland ; Electronic books
    Abstract: "This book identifies the critical factors that shaped and influenced New Zealand's defence acquisition decision-making processes from the election of the Fourth Labour Government in 1984 and the subsequent ANZUS crisis, through to the 11 September 2001 terrorist attacks on the United States and the following 'war on terror'. It explores and analyses decision-making processes in relation to the ANZAC frigates, the military sealift ship HMNZS Charles Upham, the F-16 strike aircraft, the P-3C Orion maritime patrol aircraft upgrade, and the LAV IIIs."--Publisher's description.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corp
    ISBN: 9780833045652 , 0833046748 , 9781282081628 , 1282081624 , 0833045652 , 9780833046741 , 6612081627 , 9786612081620
    Language: English
    Pages: 1 Online-Ressource (vii, 162 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Film piracy, organized crime, and terrorism
    Keywords: Product counterfeiting ; Piracy (Copyright) ; Terrorism Social aspects ; Video recordings Pirated editions ; Organized crime Social aspects ; Product counterfeiting ; Piracy (Copyright) ; Terrorism ; Video recordings ; Organized crime ; POLITICAL SCIENCE ; Political Freedom & Security ; International Security ; POLITICAL SCIENCE ; Security (National & International) ; Organized crime ; Social aspects ; Piracy (Copyright) ; Product counterfeiting ; Terrorism ; Social aspects ; Video recordings ; Pirated editions ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic book
    Abstract: This report presents the findings of research into the involvement of organized crime and terrorist groups in counterfeiting products ranging from watches to automobile parts, from pharmaceuticals to computer software. It presents detailed case studies from around the globe in one area of counterfeiting, film piracy, to illustrate the broader problem of criminal -- and perhaps terrorist -- groups finding a new and not-much-discussed way of funding their activities. Piracy is high in payoff and low in risk, often taking place under the radar of law enforcement. The case studies provide compelling evidence of a broad, geographically dispersed, and continuing connection between film piracy and organized crime, as well as evidence that terrorist groups have used the proceeds of film piracy to finance their activities. Counterfeiting is a threat not only to the global information economy, but also to public safety and national security. Cooperation among law enforcement and governments around the world is needed in the battle against intellectual-property theft, and meaningful progress will require increased political will, strong legislation, consistent enforcement, deterrent sentencing, and innovative solutions. The report lays out an agenda of measures. Increased global intelligence-gathering and sharing is needed to further illuminate the scope and nature of the connections between piracy and organized crime, and policymakers and law enforcement worldwide should reexamine the common but erroneous assumption that counterfeiting is a victimless crime
    Abstract: This report presents the findings of research into the involvement of organized crime and terrorist groups in counterfeiting products ranging from watches to automobile parts, from pharmaceuticals to computer software. It presents detailed case studies from around the globe in one area of counterfeiting, film piracy, to illustrate the broader problem of criminal -- and perhaps terrorist -- groups finding a new and not-much-discussed way of funding their activities. Piracy is high in payoff and low in risk, often taking place under the radar of law enforcement. The case studies provide compelling evidence of a broad, geographically dispersed, and continuing connection between film piracy and organized crime, as well as evidence that terrorist groups have used the proceeds of film piracy to finance their activities. Counterfeiting is a threat not only to the global information economy, but also to public safety and national security. Cooperation among law enforcement and governments around the world is needed in the battle against intellectual-property theft, and meaningful progress will require increased political will, strong legislation, consistent enforcement, deterrent sentencing, and innovative solutions. The report lays out an agenda of measures. Increased global intelligence-gathering and sharing is needed to further illuminate the scope and nature of the connections between piracy and organized crime, and policymakers and law enforcement worldwide should reexamine the common but erroneous assumption that counterfeiting is a victimless crime
    Note: "Rand Safety and Justice Program and the Global Risk and Security Center , Includes bibliographical references (pages 151-162) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    ISBN: 9781921536458 , 1921536454 , 9781921536441 , 1921536446
    Language: English
    Pages: 1 Online-Ressource (xi, 79 pages)
    Series Statement: Canberra papers on strategy and defence 172
    Parallel Title: Erscheint auch als
    Parallel Title: Print version
    Keywords: Politics and government ; Society and social sciences Society and social sciences ; POLITICAL SCIENCE ; Security (National & International) ; Australia ; China ; United States ; International economic relations ; Diplomatic relations ; Australien ; Politics and government ; Außenpolitik ; China ; Chinabild ; History & Archaeology ; Regions & Countries - Australia & Pacific Islands - Oceania ; Howard, John W ; Australia Politics and government, 1996- ; Australia Foreign economic relations ; China. ; China Foreign economic relations ; Australia. ; Australia Foreign relations ; China. ; China Foreign relations ; Australia. ; Australia Foreign relations ; United States. ; United States Foreign relations ; Australia. ; United States Foreign relations ; China. ; China Foreign relations ; United States. ; Australia Foreign relations ; United States Foreign relations ; United States Foreign relations ; Australia Politics and government 1996- ; Australia Foreign economic relations ; China Foreign relations ; China Foreign economic relations ; Australia Foreign relations ; China Foreign relations ; Australia ; United States ; United States ; Australia ; Australia ; China ; China ; Australia ; China ; Electronic books
    Abstract: "Australia's strategic depiction of China has assumed increased importance as it attempts to harmonise economic interests (focusing on China) with security interests (primarily the United States). In this period of strategic transition, how Australia incorporates the rise of China into its existing security commitment under ANZUS has become a delicate issue. This investigation follows the intriguing evolution of the Howard Government's depictions of China, and reveals a complex and calculated strategy that successfully transformed a potentially volatile conflict of interests into a functional foreign policy."--Publisher's description.
    Description / Table of Contents: Setting the Vision amongst a Sea of Troubles: March-December 1996 -- Relationship Restoration and Expansion: January 1997-December 2002 -- Friendly Unease: January 2003-December 2006.
    Note: Includes bibliographical references and index
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Ithaca : Cornell University Press
    ISBN: 9780801459214 , 0801459214
    Language: English
    Pages: Online Ressource (xi, 201 p.) , ill., maps.
    Edition: Online-Ausg.
    Parallel Title: Erscheint auch als Salehyan, Idean Rebels without borders
    DDC: 303.64
    Keywords: World politics 1989- ; Insurgency ; Civil war ; Non-state actors (International relations) ; Transnational sanctuaries (Military science) ; Ethnic conflict ; Transborder ethnic groups ; World politics 1989- ; Affrontements ethniques ; Guerre civile ; Relations internationales - 1989- ; Révoltes ; Non-state actors (International relations) ; Transborder ethnic groups ; Transnational sanctuaries (Military science) ; World politics ; Bürgerkrieg ; Minderheitenfrage ; Aufstand ; Transnationale Politik ; Ethnic conflict ; SOCIAL SCIENCE ; General ; POLITICAL SCIENCE ; Security (National & International) ; Civil war ; Insurgency ; Electronic book ; Electronic books
    Abstract: "Rebellion, insurgency, or civil war-conflict within a society is customarily treated as a matter of domestic politics and analysts generally focus their attention on local causes. Yet fighting between governments and opposition groups is rarely confined to the domestic arena. "Internal" wars often spill across national boundaries, rebel organizations frequently find sanctuaries in neighboring countries, and insurgencies give rise to disputes between states. In Rebels without Borders, which will appeal to students of international and civil war and those developing policies to contain the regional diffusion of conflict, Idean Salehyan examines transnational rebel organizations in civil conflicts, using cross-national data sets as well as in-depth case studies. He shows how external Contra bases in Honduras and Costa Rica facilitated the Nicaraguan civil war and how the Rwandan civil war spilled over into the Democratic Republic of the Congo, fostering a regional war. He also looks at other cross-border insurgencies, such as those of the Kurdish PKK and Taliban fighters in Pakistan. Salehyan reveals that external sanctuaries feature in the political history of more than half of the world's armed insurgencies since 1945 and are also important in fostering state-to-state conflicts." "Rebels who are unable to challenge the state on its own turf look for mobilization opportunities abroad. Neighboring states that are too weak to prevent rebel access, states that wish to foster instability in their rivals, and large refugee diasporas provide important opportunities for insurgent groups to establish external bases. Such sanctuaries complicate intelligence gathering, counterinsurgency operations, and efforts at peacemaking. States that host rebels intrude into negotiations between governments and opposition movements and can block progress toward peace when they pursue their own agendas." -- Book jacket
    Note: Includes bibliographical references and index. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833039583 , 0833046012 , 083303958X , 9780833046017
    Language: English
    Pages: 1 Online-Ressource (xix, 54 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Technical report TR-293
    Parallel Title: Print version Treverton, Gregory F Assessing the tradecraft of intelligence analysis
    Keywords: Intelligence service ; National security ; Intelligence service ; National security ; TRUE CRIME ; Espionage ; POLITICAL SCIENCE ; Political Freedom & Security ; Intelligence ; POLITICAL SCIENCE ; Security (National & International) ; Intelligence service ; National security ; United States ; Electronic books
    Abstract: This report assesses the tradecraft of intelligence analysis across the main U.S. intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, and recommends improvements. The report makes a number of recommendations for improving analysis for a world of threats very different from that of the Cold War. It focuses on the two essentials of analysis-first, people; second, the tools they have available. The December 2004 intelligence reform legislation set in motion initiatives that move in the right direction. The creation of a Deputy Director of National Intelligence for Analysis will provide a real hub for developing tradecraft and tools and for framing critical tradeoffs. The establishment of a National Intelligence University will provide a focal point for training in analysis. The creation of a National Counterterrorism Center will shift intelligence analysis toward problems or issues, not agencies or sources. The building of a Long Term Analysis Unit at the National Intelligence Council can lead away from the prevailing dominance of current intelligence. And the formation of an Open Source Center can create a seed bed for making more creative use of open-source materials. These specific initiatives are promising but they are just the beginnings. For all the language about the importance of intelligence analysis, data-sharing, fusion, and the like, the national and Intelligence Community leadership today devalues intelligence analysis. A fundamental change is also needed in attitudes and existing organizational cultures
    Abstract: This report assesses the tradecraft of intelligence analysis across the main U.S. intelligence agencies, such as the Central Intelligence Agency and the National Security Agency, and recommends improvements. The report makes a number of recommendations for improving analysis for a world of threats very different from that of the Cold War. It focuses on the two essentials of analysis-first, people; second, the tools they have available. The December 2004 intelligence reform legislation set in motion initiatives that move in the right direction. The creation of a Deputy Director of National Intelligence for Analysis will provide a real hub for developing tradecraft and tools and for framing critical tradeoffs. The establishment of a National Intelligence University will provide a focal point for training in analysis. The creation of a National Counterterrorism Center will shift intelligence analysis toward problems or issues, not agencies or sources. The building of a Long Term Analysis Unit at the National Intelligence Council can lead away from the prevailing dominance of current intelligence. And the formation of an Open Source Center can create a seed bed for making more creative use of open-source materials. These specific initiatives are promising but they are just the beginnings. For all the language about the importance of intelligence analysis, data-sharing, fusion, and the like, the national and Intelligence Community leadership today devalues intelligence analysis. A fundamental change is also needed in attitudes and existing organizational cultures
    Note: Includes bibliographical references (pages 53-54) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Canberra, ACT. : ANU E Press
    ISBN: 9781921313868 , 1921313862 , 9781921313851
    Language: English
    Pages: 1 Online-Ressource (1 online resource (xiii, 149 pages)
    Series Statement: Canberra papers on strategy and defence 169
    Parallel Title: Erscheint auch als Tange, Arthur, 1914 - 2001 Defence policy-making
    Parallel Title: Print version
    Keywords: Tange, Arthur ; Tange, Arthur ; Australia. Department of Defence ; Australia Biography Officials and employees ; Australia ; Civil service Australia ; Biography. ; National security Australia ; History. ; National security History ; Civil service Biography ; Civil service ; National security ; Humanities ; Military history ; Civil service ; Employees ; Military policy ; National security ; Australia ; Australia ; POLITICAL SCIENCE ; Security (National & International) ; Biographies ; History ; Biography and True Stories ; Tange, Arthur ; History ; Australia Military policy ; History. ; Australia Military policy ; History ; Australia ; Electronic book ; Australien ; Sicherheitspolitik ; Militärpolitik ; Geschichte 1950-1980
    Abstract: "Sir Arthur Tange was perhaps the most powerful Secretary of the Australian Defence Department and one of the most powerful of the great 'mandarins' who dominated the Commonwealth Public Service between the 1940s and the 1970s. He served as Secretary of the Defence Department from 1970 to 1979, the last decade of his career, having previously served as Secretary of the Department of External Affairs (later renamed Foreign Affairs) from 1954 to 1965. Tange wrote this account in his last years. Controversies from his time in Defence, including those associated with 'the Tange report' and 'the Tange reforms', echo to this day, and it is still easy to identify both staunch admirers and vitriolic critics in defence and public service circles. One of the major themes implicit in this memoir is the extent to which his administrative decisions and policy advice in Defence in the 1970s were based on his experience in External Affairs in the 1950s and 1960s. This account shows what lessons he derived from that experience and how he applied those lessons when he, rather unexpectedly, became Secretary of the Defence Department."--Provided by publisher.
    Description / Table of Contents: 1. The Road to Russell -- External Affairs 1945 -- International Security Issues: 1950 and beyond -- Defence Management in the 1950s: A view from Canberra -- External Affairs and Defence cooperation -- The grip of the past in the strategic outlook -- America's definition of the ANZUS obligation -- Interlude in India -- After India: Where to move? -- The Defence Department appointment -- Defence Minister Fraser: His strategic outlook -- The scope of the Defence Group empire -- Five Defence Group Ministries: Previous unsuccessful reforms -- Managing the Department with limited powers -- Fraser's initiatives--and conflicts with Gorton -- Gorton the Defence Minister -- Fairbairn: Minister for Defence 1971 -- The Department's 1972 'Defence Review': New ideas -- Final months of McMahon's Coalition Government -- 2. Labor in Office -- Labor's policies -- Consultations and plans for merging five Departments -- Strategy for making the changes -- Abolition of the Service Boards: Reasons -- Direct discussion--The Secretary and four Service Chiefs: Conclusions reached -- Civilians and Service Officers: Their relative authority -- Ministerial acceptance of the Recommendations -- Members of Parliament and others: Reactions in Parliament and elsewhere--extent of command power -- Some objectives not achieved -- Interim arrangements--changes needed in the Department -- Managing the Department--The 1973 political environment -- Disclosure of the American presence--Conflict with Labor Left -- The Joint US-Australian Defence Facilities -- Limited disclosure on Pine Gap and Nurrungar -- Labor's problem with the North West Cape Naval Communications Station -- The Lloyd affair--Barnard's rebuke of Tange -- Redefining the threat basis for Defence planning -- Barnard's negotiations with Washington -- Other decisions for Barnard -- New problems for the Defence Department under Labor -- Reshaping the force structure under Barnard -- The Darwin cyclone -- A retrospect on Barnard -- Whitlam's Royal Commission: Enquiry into Intelligence Services -- Reflections looking back: Whitlam and the Central Intelligence Agency -- The 1975 changes: A new Minister, Chiefs of Staff and 'the Dismissal' -- 3. The Early Fraser Ministry -- James Killen, Minister for Defence -- Problems to overcome in the new system -- Public perceptions in the politics of Defence -- Differing views on our strategic interests -- President Carter and the Indian Ocean -- Inflation: Its consequences for Defence in the 1970s -- Differences with the Royal Commission on Intelligence -- Experiences serving Malcolm Fraser -- A refuge in the mountains -- The Defence Science Laboratories: Management -- Planning the Defence Force Academy: Obstacles -- Using soldiers in support of police -- Final months in the Department -- The gap between the strategic guidance and Defence preparations -- Personnel policies and practices in the Services -- Defamatory media fabrications -- Post retirement experiences -- On serving Ministers -- Reflections on a personal journey.
    Note: Includes bibliographical references (pages 141-142) and index , Title from PDF title page (viewed July 21, 2008)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    ISBN: 9780833045621 , 0833046721 , 0833045628 , 9780833046727
    Language: English
    Pages: 1 Online-Ressource (xxix, 202 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version How domestic trends in the U.S., China, and Iran could influence U.S. Navy strategic planning
    Keywords: United States Planning ; United States ; Strategic planning ; Social prediction ; Economic forecasting ; Social prediction ; Economic forecasting ; Social prediction ; Economic forecasting ; Strategic planning ; Social prediction ; Economic forecasting ; Social prediction ; Economic forecasting ; Social prediction ; Economic forecasting ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; TECHNOLOGY & ENGINEERING ; Marine & Naval ; POLITICAL SCIENCE ; Security (National & International) ; Economic forecasting ; Armed Forces ; Planning ; Social prediction ; Strategic planning ; Military & Naval Science ; Law, Politics & Government ; Naval Science - General ; China ; Iran ; United States ; USA ; social conditions ; economic conditions ; Iran ; social conditions ; economic conditions ; China ; social conditions ; economic conditions ; Electronic books
    Abstract: Introduction and objectives -- Strategic trends in the United States -- The United States' near abroad -- Strategic trends in people's republic of China -- China's near abroad -- Strategic trends in Iran -- Iran's near abroad -- Japan's near abroad -- Russia's near abroad -- Conclusions -- Appendixes: A. Comparisons -- B. China's coal future
    Abstract: Introduction and objectives -- Strategic trends in the United States -- The United States' near abroad -- Strategic trends in people's republic of China -- China's near abroad -- Strategic trends in Iran -- Iran's near abroad -- Japan's near abroad -- Russia's near abroad -- Conclusions -- Appendixes: A. Comparisons -- B. China's coal future
    Note: Includes bibliographical references (pages 191-202) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Acton, A.C.T. : ANU E Press
    ISBN: 9781921313806 , 1921313803 , 9781921313790 , 192131379X
    Language: English
    Series Statement: Canberra papers on strategy and defence no. 168
    Keywords: Information warfare Australia. ; Command and control systems Australia. ; Military telecommunication ; Military telecommunication. ; Information warfare ; Command and control systems ; Military telecommunication ; Information warfare ; Command and control systems ; War and defence operations ; Warfare and defence ; POLITICAL SCIENCE ; Security (National & International) ; Command and control systems ; Information warfare ; Military telecommunication ; Law, Politics & Government ; Military & Naval Science ; Military Science - General ; Australia ; Society and social sciences Society and social sciences ; Electronic books
    Abstract: "This book explores Australia's prospective cyber-warfare requirements and challenges. It describes the current state of planning and thinking within the Australian Defence Force with respect to Network Centric Warfare, and discusses the vulnerabilities that accompany the use by Defence of the National Information Infrastructure (NII), as well as Defences responsibility for the protection of the NII. It notes the multitude of agencies concerned in various ways with information security, and argues that mechanisms are required to enhance coordination between them. It also argues that Australia has been laggard with respect to the development of offensive cyber-warfare plans and capabilities. Finally, it proposes the establishment of an Australian Cyber-warfare Centre responsible for the planning and conduct of both the defensive and offensive dimensions of cyber-warfare, for developing doctrine and operational concepts, and for identifying new capability requirements. It argues that the matter is urgent in order to ensure that Australia will have the necessary capabilities for conducting technically and strategically sophisticated cyber-warfare activities by the 2020s. The Foreword has been contributed by the Hon. Kim C. Beazley, former Minister of Defence (198490), who describes it as a timely book which transcends old debates on priorities for the defence of Australia or forward commitments, [and] debates about globalism and regionalism, and as an invaluable compendium to the current process of refining the strategic guidance for Australias future defence policies and capabilities."--Provided by publisher.
    Note: Foreword , Introduction: Australia and Cyber-warfare ; The Australian Defence Force and Network Centric Warfare ; Information Warfare--Attack and Defence ; Targeting Information Infrastructures ; Protecting Information Infrastructures ; An Australian Cyber-warfare Centre. , English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833045089 , 0833046454 , 9781282033306 , 1282033301 , 9780833046451 , 0833045083
    Language: English
    Pages: 1 Online-Ressource (xxx, 195 pages)
    Parallel Title: Print version More freedom, less terror?
    Keywords: Political violence Case studies ; Terrorism ; Democratization Case studies ; Political violence ; Terrorism ; Democratization ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; POLITICAL SCIENCE ; Security (National & International) ; Democratization ; Politics and government ; Political violence ; Terrorism ; Government - Asia ; Government - Non-U.S ; Law, Politics & Government ; Arab countries ; Middle East ; regional politics ; Case studies ; Arab countries Politics and government ; Arab countries ; Electronic books
    Abstract: Preface -- Figures -- Table -- Summary -- Acknowledgements -- Abbreviations -- "Democracy" and terrorism in the Arab world: a framework for analysis -- Introduction -- Democracy in the Middle East: "liberalized autocracies" or genuine democratization? -- Understanding terrorism -- The democracy-terrorism debate -- Post 9/11 "draining the swamp" logic -- The democracy backlash -- Democracy-terrorism hypotheses -- Empirical application to the Arab world: case selection and methods -- Egypt -- Introduction -- Liberalization in the Mubarak era -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Repression and destabilization -- Conclusion -- Jordan -- Liberalization trends -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Normative effects -- Institutional effects -- Legitimacy -- Conclusion -- Bahrain -- Introduction -- Liberalization trends -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Perceptions of regime legitimacy -- Norms of tolerance and pluralism -- Institutional logic -- Conclusions and implications -- Saudi Arabia -- Introduction -- Liberalization trends -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Regime legitimacy -- Normative and institutional effects: the municipal council elections -- Conclusion -- Algeria -- Trends in liberalization -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Institutional effects -- Normative effects -- The effects of state actions on perceptions of regime legitimacy -- Summary and implications -- Morocco -- Introduction -- Trends in liberalization -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Institutional effects -- Normative effects -- Legitimacy -- Conclusion -- Conclusion -- Liberalization in the Arab world can both contain and exacerbate political violence -- Policy implications: a return to realism or realistic democracy promotion? -- Policy recommendations -- Bibliography
    Abstract: Preface -- Figures -- Table -- Summary -- Acknowledgements -- Abbreviations -- "Democracy" and terrorism in the Arab world: a framework for analysis -- Introduction -- Democracy in the Middle East: "liberalized autocracies" or genuine democratization? -- Understanding terrorism -- The democracy-terrorism debate -- Post 9/11 "draining the swamp" logic -- The democracy backlash -- Democracy-terrorism hypotheses -- Empirical application to the Arab world: case selection and methods -- Egypt -- Introduction -- Liberalization in the Mubarak era -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Repression and destabilization -- Conclusion -- Jordan -- Liberalization trends -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Normative effects -- Institutional effects -- Legitimacy -- Conclusion -- Bahrain -- Introduction -- Liberalization trends -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Perceptions of regime legitimacy -- Norms of tolerance and pluralism -- Institutional logic -- Conclusions and implications -- Saudi Arabia -- Introduction -- Liberalization trends -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Regime legitimacy -- Normative and institutional effects: the municipal council elections -- Conclusion -- Algeria -- Trends in liberalization -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Institutional effects -- Normative effects -- The effects of state actions on perceptions of regime legitimacy -- Summary and implications -- Morocco -- Introduction -- Trends in liberalization -- Trends in violent activity -- Comparing levels of freedom and terrorism -- Assessing effects -- Institutional effects -- Normative effects -- Legitimacy -- Conclusion -- Conclusion -- Liberalization in the Arab world can both contain and exacerbate political violence -- Policy implications: a return to realism or realistic democracy promotion? -- Policy recommendations -- Bibliography
    Note: Includes bibliographical references (pages 177-195)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    ISBN: 9781921536090 , 1921536098 , 9781921536083 , 192153608X
    Language: English
    Pages: 1 Online-Ressource (xvi, 231 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Canberra papers on strategy and defence 171
    Parallel Title: Erscheint auch als Breen, Bob.; Struggling for self reliance.
    Parallel Title: Print version Breen, Bob Struggling for self reliance
    Keywords: Australia Armed Forces ; Australia ; Australia ; National security Australia. ; National security ; National security ; Military history ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Military readiness ; National security ; Armies ; Military & Naval Science ; Law, Politics & Government ; Australia ; Case studies ; Australia Defenses ; Case studies. ; Australia Case studies Defenses ; Electronic books
    Abstract: "Military force projection is the self-reliant capacity to strike from mainland ports, bases and airfields to protect Australia's sovereignty as well as more distant national interests. Force projection is not just a flex of military muscle in times of emergency or the act of dispatching forces. It is a cycle of force preparation, command, deployment, protection, employment, sustainment, rotation, redeployment and reconstitution. If the Australian Defence Force consistently gets this cycle wrong, then there is something wrong with Australia's defence. This monograph is a force projection audit of four Australian regional force projections in the late 1980s and the 1990s."--Provided by publisher.
    Description / Table of Contents: Relevance, theory and practice of force projection for Australia's defence -- Australian force projection 1885-1985 -- Lead up to operation Morris Dance -- Responses to crisis -- Lessons and observations -- Lead-up to operation lagoon -- Conduct and aftermath of operation lagoon -- Search for joint command and control -- Lead up to operation Bel Isi -- Challenges during the first 12 months -- Projection to East Timor -- Reflections and observations.
    Note: Includes bibliographical references and index , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. , English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    ISBN: 9780833044617 , 0833045326 , 9781282033139 , 1282033131 , 9780833045324 , 0833044613
    Language: English
    Pages: 1 Online-Ressource (xviii, 51 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Hall, Katharine Argument for documenting casualties
    Keywords: Violent deaths Statistics ; Counterinsurgency ; Iraq War, 2003-2011 Casualties ; Civilian war casualties Statistics ; Violent deaths ; Counterinsurgency ; Iraq War, 2003-2011 ; Civilian war casualties ; HISTORY ; Military ; POLITICAL SCIENCE ; Security (National & International) ; Battle casualties ; Civilian war casualties ; Counterinsurgency ; Violent deaths ; Unruhen ; Zivilbevölkerung ; Toter ; Statistik ; Iraq War (2003-2011) ; Irak ; Iraq ; Statistics ; Electronic book
    Abstract: Protecting the civilian population is one of the central tenets of U.S. counterinsurgency doctrine. Until very recently, however, the U.S. military has not had a formal system for documenting the level of violence directed against Iraqi civilians. Therefore, other groups (such as nongovernmental organizations, the United Nations, and Iraqi ministries) have filled the vacuum in reporting, relying on media accounts, surveys, death certificates, and other open-source information to generate datasets of varying transparency and quality. The resulting statistics have generated widespread debate over sources, methods, and political biases. This study examines available open-source data on Iraqi civilian fatalities and assesses problems associated with previous collection and analysis efforts. The authors present a more robust RAND Corporation Iraqi civilian violence dataset from which they derive new observations about trends in targeting and weapons in 2006. RAND's dataset reveals that the majority of attacks in the year 2006 against civilians were directed against individuals without any identifiable affiliation, and that most attacks were carried out using firearms (rather than via improvised explosive devices or suicide attacks). These findings lead to a proposed framework for future civilian fatality data-collection efforts in Iraq and beyond
    Abstract: Protecting the civilian population is one of the central tenets of U.S. counterinsurgency doctrine. Until very recently, however, the U.S. military has not had a formal system for documenting the level of violence directed against Iraqi civilians. Therefore, other groups (such as nongovernmental organizations, the United Nations, and Iraqi ministries) have filled the vacuum in reporting, relying on media accounts, surveys, death certificates, and other open-source information to generate datasets of varying transparency and quality. The resulting statistics have generated widespread debate over sources, methods, and political biases. This study examines available open-source data on Iraqi civilian fatalities and assesses problems associated with previous collection and analysis efforts. The authors present a more robust RAND Corporation Iraqi civilian violence dataset from which they derive new observations about trends in targeting and weapons in 2006. RAND's dataset reveals that the majority of attacks in the year 2006 against civilians were directed against individuals without any identifiable affiliation, and that most attacks were carried out using firearms (rather than via improvised explosive devices or suicide attacks). These findings lead to a proposed framework for future civilian fatality data-collection efforts in Iraq and beyond
    Note: Includes bibliographical references (pages 49-51) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    Santa Monica, CA : Rand National Defense Research Institute
    ISBN: 9780833044709 , 0833045350 , 0833044702 , 9780833045355
    Language: English
    Pages: 1 Online-Ressource (xii, 34 pages)
    Series Statement: Rand counterinsurgency study. Paper 6
    Series Statement: Occasional paper OP-200-OSD
    Parallel Title: Print version Long, Austin G Doctrine of eternal recurrence
    Keywords: Military doctrine ; Counterinsurgency ; Military doctrine ; Counterinsurgency ; HISTORY ; Revolutionary ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Military doctrine ; United States ; Electronic books
    Abstract: Cover; Preface; Contents; Summary; Acknowledgments; Abbreviations; Doctrine of Eternal Recurrence-The U.S. Military and Counterinsurgency Doctrine; Doctrine and Counterinsurgency: Defining the Terms; Small Wars Before COIN: U.S. Experiences Prior to 1960; The Kennedy Years: The Birth of COIN Doctrine; Limits of Doctrine: Vietnam, 1961 to 1963; Attempts to Put Doctrine into Practice: The PROVN Study, 1965 to 1966; COIN as Practiced: Vietnam, 1965 to 1968; Doctrine in the Late 1960s; COIN as Practiced: Vietnam, 1969 to 1972; Interlude: COIN and the Military, 1973 to 2003
    Abstract: COIN Doctrine, 2003 to 2005COIN Operations, 2003 to 2005; Doctrine and Operations in 2006; Getting It Right? COIN in Iraq, 2007; Komer's Lament: COIN Doctrine vs. COIN Practice; Conclusion; References
    Abstract: This paper tests and ultimately disproves the assumption that doctrine as written and operations as conducted are tightly linked. Ingrained organizational concepts and beliefs have a much greater influence on operations than written doctrine
    Note: "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 31-34)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    ISBN: 9780833044075 , 0833045954 , 0833044079 , 9780833045959
    Language: English
    Pages: 1 Online-Ressource (xx, 70 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Increasing aircraft carrier forward presence
    DDC: 359.9/4835
    Keywords: United States Operational readiness ; United States ; Aircraft carriers Maintenance and repair ; Aircraft carriers ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; International Security ; POLITICAL SCIENCE ; Political Freedom & Security ; General ; TECHNOLOGY ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Operational readiness ; United States ; Electronic book
    Abstract: The U.S. Navy's aircraft carriers allow the nation to deter adversaries, bring airpower to bear against opponents, engage friends and allies, and provide humanitarian assistance. However, these powerful and versatile systems need continuous and regularly scheduled maintenance, and their crews require a great deal of training to attain and sustain readiness levels. The length of the carrier's training, readiness, deployment, and maintenance cycle, the type of maintenance needed, and the timing of events within the cycle affect the carrier's availability to meet operational needs. Over the past two decades, the proportion of time in a cycle that a carrier spends deployed has decreased, making it difficult for Navy planners to meet the forward-presence requirements of theater commanders. In future years, as the number of carriers in the fleet fluctuates, this challenge will be compounded. In this study, RAND examines the technical feasibility of different cycle lengths and their effect on the forward presence of Nimitz-class aircraft carriers. The authors assess several one- and two-deployment cycles, assuming a deployment length of six months and a time-between-deployments length equal to twice the duration of the previous deployment. The study also presents an analysis of the impact of different cycles on managing shipyard workloads. Among many findings, RAND concludes that shorter cycles can increase the forward presence of the carrier fleet and help level shipyard workloads. However, these shorter cycles will decrease fleet surge readiness. Longer, two-deployment cycles can increase forward presence, but may result in shipyard workload complications and deferred-work backlogs
    Abstract: The U.S. Navy's aircraft carriers allow the nation to deter adversaries, bring airpower to bear against opponents, engage friends and allies, and provide humanitarian assistance. However, these powerful and versatile systems need continuous and regularly scheduled maintenance, and their crews require a great deal of training to attain and sustain readiness levels. The length of the carrier's training, readiness, deployment, and maintenance cycle, the type of maintenance needed, and the timing of events within the cycle affect the carrier's availability to meet operational needs. Over the past two decades, the proportion of time in a cycle that a carrier spends deployed has decreased, making it difficult for Navy planners to meet the forward-presence requirements of theater commanders. In future years, as the number of carriers in the fleet fluctuates, this challenge will be compounded. In this study, RAND examines the technical feasibility of different cycle lengths and their effect on the forward presence of Nimitz-class aircraft carriers. The authors assess several one- and two-deployment cycles, assuming a deployment length of six months and a time-between-deployments length equal to twice the duration of the previous deployment. The study also presents an analysis of the impact of different cycles on managing shipyard workloads. Among many findings, RAND concludes that shorter cycles can increase the forward presence of the carrier fleet and help level shipyard workloads. However, these shorter cycles will decrease fleet surge readiness. Longer, two-deployment cycles can increase forward presence, but may result in shipyard workload complications and deferred-work backlogs
    Note: "MG-706-NAVY"--Page 4 of cover , "Prepared for the United States Navy , Includes bibliographical references (pages 67-70) , Research conducted within the Rand National Defense Research Institute , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833044563 , 0833045261 , 0833044567 , 9780833045263
    Language: English
    Pages: 1 Online-Ressource (xxv, 57 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Perry, Walt L Analytic support to intelligence in counterinsurgencies
    DDC: 355.3/4320973
    Keywords: Military intelligence ; Insurgency ; Counterinsurgency ; Military intelligence ; Insurgency ; Counterinsurgency ; HISTORY ; Military ; Biological & Chemical Warfare ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Insurgency ; Military intelligence ; Bekämpfung ; Unruhen ; United States ; Irak ; USA ; Electronic books
    Abstract: Operations in Iraq and Afghanistan have shown that U.S. forces need more-effective techniques and procedures to conduct counterinsurgency. It is likely that U.S. forces will face similar, irregular warfare tactics from future enemies that are unwilling to engage in conventional combat with U.S. forces. This monograph examines the nature of the contemporary insurgent threat and provides insights on using operational analysis techniques to support intelligence operations in counterinsurgencies. The authors examine the stages of an insurgency and discuss the kinds of intelligence that are needed at each stage. A number of techniques--pattern discernment and predictive analysis, for example--appear to show promise of being useful to intelligence analysis. The authors also explore two closely connected methods in depth to examine the interactions between friendly and enemy forces: game theory and change detection
    Abstract: Operations in Iraq and Afghanistan have shown that U.S. forces need more-effective techniques and procedures to conduct counterinsurgency. It is likely that U.S. forces will face similar, irregular warfare tactics from future enemies that are unwilling to engage in conventional combat with U.S. forces. This monograph examines the nature of the contemporary insurgent threat and provides insights on using operational analysis techniques to support intelligence operations in counterinsurgencies. The authors examine the stages of an insurgency and discuss the kinds of intelligence that are needed at each stage. A number of techniques--pattern discernment and predictive analysis, for example--appear to show promise of being useful to intelligence analysis. The authors also explore two closely connected methods in depth to examine the interactions between friendly and enemy forces: game theory and change detection
    Note: "MG-682-OSD"--Page of cover , Includes bibliographical references (pages 55-57) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Santa Monica, CA : RAND National Security Research Division
    ISBN: 9780833041876 , 0833042386 , 9781281180810 , 1281180815 , 9780833042385 , 0833041878
    Language: English
    Pages: 1 Online-Ressource (xvii, 87 pages)
    Edition: [S.l.] HathiTrust Digital Library
    Series Statement: Conference proceedings
    Parallel Title: Erscheint auch als Dobbins, James, 1942- Coping with Iran
    Keywords: Diplomatic relations ; POLITICAL SCIENCE ; Government ; International ; POLITICAL SCIENCE ; International Relations ; General ; Iran ; United States ; POLITICAL SCIENCE ; Security (National & International) ; Conference papers and proceedings ; United States Congresses Foreign relations ; Iran Congresses Foreign relations ; United States ; Iran ; Electronic books ; USA ; Iran ; Internationale Politik
    Abstract: On March 21, 2007, the RAND Corporation held a public conference on Capitol Hill,?Coping with Iran: Confrontation, Containment, or Engagement?? featuring high-level experts and hosted by the director of the RAND International Security and Defense Policy Center. More than 300 guests attended, including former ambassadors, members of Congress and senior staffers, senior journalists, Pentagon officials, and numerous well-known Middle East analysts. Two high-level officials, Ambassador R. Nicholas Burns, Under Secretary of State for Political Affairs, and Ambassador Mohammad Javad Zarif, Iranian
    Abstract: On March 21, 2007, the RAND Corporation held a public conference on Capitol Hill,?Coping with Iran: Confrontation, Containment, or Engagement?? featuring high-level experts and hosted by the director of the RAND International Security and Defense Policy Center. More than 300 guests attended, including former ambassadors, members of Congress and senior staffers, senior journalists, Pentagon officials, and numerous well-known Middle East analysts. Two high-level officials, Ambassador R. Nicholas Burns, Under Secretary of State for Political Affairs, and Ambassador Mohammad Javad Zarif, Iranian
    Note: "CF-237-NSRD"--Page 4 of cover , Includes bibliographical references (page 87) , Summary of a conference held by the RAND Corporation on Mar. 21, 2007 in Washington, D.C , Use copy Restrictions unspecified star MiAaHDL
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833042507 , 0833042505 , 1281180939 , 9781281180933 , 0833039628 , 9780833039620
    Language: English
    Pages: 1 Online-Ressource (xxvi, 112 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Project Air Force
    Parallel Title: Druckausg. New division of labor.
    Parallel Title: Print version New division of labor
    Keywords: World politics, 21st century. ; World politics 21st century ; World politics ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Reorganization ; Military policy ; World politics ; United States ; United States Military policy. ; United States Armed Forces ; Reorganization. ; United States Armed Forces ; Reorganization ; United States Military policy ; United States ; United States ; Electronic book
    Abstract: A new U.S. grand strategy has been emerging, one that requires not only resources but patience and commitment: the promotion of democracy and freedom abroad. The U.S. armed forces will continue to be among the myriad contributors necessary to achieve this goal. In the face of increasing complexity, changing tactics, and tight budgets, the defense establishment will need to change in multiple ways, yet must also not risk its historic strengths. This volume draws together and integrates insights derived from a wide range of research efforts undertaken at RAND over the past few years. Some of the.
    Abstract: Promoting democracy and freedom abroad -- America's new grand strategy? -- New friends, new commitments, new tensions -- What does this mean for America's Armed Forces? -- Conflict in the post Post-Cold War world -- Terrorism and insurgency -- The new nuclear equation -- The rise of China -- Welcome to the post Post-Cold War world -- Toward a new division of labor -- Countering terrorists and insurgent groups abroad -- Supporting new democracies -- Deterring and defeating regional adversaries -- Dissuading military competition in Asia -- Defending the homeland -- Countering the proliferation of nuclear weapons -- Setting aggregate levels of capability -- Implications for forces and posture -- What will it mean to be joint? -- Different demands for joint warfighting prowess -- Maintaining strategic focus -- Achieving joint tactical proficiency -- A new joint division of labor -- Implications for the Armed Forces -- Building the "inform and act" system -- A strategically decisive Army: winning at peace as well as war -- A new air-ground partnership -- Integrating air, space, and maritime power -- Getting more from the Corps -- Security cooperation in the new security environment -- Potential actions for the DoD's leadership
    Note: "MG-499-AF"--Page 4 of cover , Includes bibliographical references (pages 105-112) , RAND Project Air Force , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Santa Monica, CA : RAND National Defense Research Institute
    ISBN: 9780833040213 , 0833042807 , 0833040219 , 9780833042804
    Language: English
    Pages: 1 Online-Ressource (xvii, 62 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Rand counterinsurgency study paper 1
    Series Statement: Occasional paper OP-168-OSD
    Parallel Title: Print version Gompert, David C Heads we win
    Keywords: Jihad ; Terrorism Prevention ; Counterinsurgency Psychological aspects ; Jihad ; Terrorism ; Counterinsurgency ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Jihad ; Military policy ; Terrorism ; Prevention ; Militärpsychologie ; Aufstand ; Bekämpfung ; United States ; USA ; United States Military policy ; United States ; Electronic books
    Abstract: Current U.S. counterinsurgency (COIN) strategy has relied heavily on the use of force against Islamist insurgents-a tactic that has increased their ranks. What is needed instead are stronger cognitive capabilities that will enable more effective COIN against an elusive, decentralized, and highly motivated insurgency-capabilities that will enable the United States to "fight smarter." Cognitive COIN goes beyond information technology and encompasses comprehension, reasoning, and decisionmaking, the components that are most effective against an enemy that is quick to adapt, transform, and regener
    Abstract: Current U.S. counterinsurgency (COIN) strategy has relied heavily on the use of force against Islamist insurgents-a tactic that has increased their ranks. What is needed instead are stronger cognitive capabilities that will enable more effective COIN against an elusive, decentralized, and highly motivated insurgency-capabilities that will enable the United States to "fight smarter." Cognitive COIN goes beyond information technology and encompasses comprehension, reasoning, and decisionmaking, the components that are most effective against an enemy that is quick to adapt, transform, and regener
    Note: Includes bibliographical references (pages 59-62) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    [Santa Monica, Calif.] : RAND National Security Research Division | [Zurich] : CSS, an ETH Center
    ISBN: 9780833040473 , 0833042378 , 0833040472 , 9780833042378
    Language: English
    Pages: 1 Online-Ressource (xi, 41 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Rand Corporation conference proceedings series
    Parallel Title: Print version Radicalization of diasporas and terrorism
    Keywords: Terrorism Congresses Religious aspects ; Islam ; Muslim diaspora Congresses ; Terrorism Congresses Prevention ; Islamic fundamentalism Congresses ; Jihad Congresses ; Terrorism ; Muslim diaspora ; Terrorism ; Islamic fundamentalism ; Jihad ; Islamic fundamentalism ; Jihad ; Muslim diaspora ; Terrorism ; Prevention ; Terrorism ; Religious aspects ; Islam ; Europe ; European Union countries ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; Conference papers and proceedings ; POLITICAL SCIENCE ; Security (National & International) ; Electronic books
    Abstract: Cover; Preface; Contents; Executive Summary; Conference Summary; Bruce Hoffman, The RAND Corporation -- Radicalization, Terrorism, and Diasporas; Doron Zimmermann, CSS -- Terrorism, Diasporas and the EU Response; Paul Bagguley and Yasmin Hussain, Leeds University -- Non-Muslim Responses to the 7th July Bombing in London and the Muslim Diaspora in Britain and its Responses to the London Bombings of 7th July 2005; Berto Jongman, Dutch Ministry of Defense -- Terrorism and Diasporas in the Netherlands; Stewart Bell, National Post -- Terrorism and Diasporas in Canada
    Abstract: Cover; Preface; Contents; Executive Summary; Conference Summary; Bruce Hoffman, The RAND Corporation -- Radicalization, Terrorism, and Diasporas; Doron Zimmermann, CSS -- Terrorism, Diasporas and the EU Response; Paul Bagguley and Yasmin Hussain, Leeds University -- Non-Muslim Responses to the 7th July Bombing in London and the Muslim Diaspora in Britain and its Responses to the London Bombings of 7th July 2005; Berto Jongman, Dutch Ministry of Defense -- Terrorism and Diasporas in the Netherlands; Stewart Bell, National Post -- Terrorism and Diasporas in Canada
    Note: "CF-229"--Page 4 of cover , Includes bibliographical references , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833040169 , 0833042602 , 9781281181022 , 1281181021 , 9780833042606 , 0833040162
    Language: English
    Pages: 1 Online-Ressource (xxiv, 152 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Hosmer, Stephen T Why the Iraqi resistance to the coalition invasion was so weak
    Keywords: Iraq War, 2003-2011 ; Iraq War, 2003-2011 ; Iraq War (2003-2011) ; HISTORY ; Military ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Operational readiness ; Iraq ; History ; Iraq Armed Forces ; Operational readiness ; Iraq History 1991-2003 ; Iraq ; Iraq ; Electronic books
    Abstract: Draws upon information derived primarily from interviews with and interrogations of senior Iraqi military and civilian officials to examine why the Iraqi resistance in March and April 2003 was so weak. It focuses on two questions: (1) Why did the Iraqi Regular Army and Republican Guard forces do so little fighting? and (2) Why did Iraqi leaders fail to adopt certain defensive measures that would have made the Coalition's task more difficult?
    Abstract: Draws upon information derived primarily from interviews with and interrogations of senior Iraqi military and civilian officials to examine why the Iraqi resistance in March and April 2003 was so weak. It focuses on two questions: (1) Why did the Iraqi Regular Army and Republican Guard forces do so little fighting? and (2) Why did Iraqi leaders fail to adopt certain defensive measures that would have made the Coalition's task more difficult?
    Note: Includes bibliographical references (pages 145-152) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Canberra, ACT, Australia : ANU E Press
    ISBN: 9781921313561 , 1921313560 , 9781921313554 , 1921313552
    Language: English
    Pages: 1 Online-Ressource (1 online resource (xv, 201 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Canberra papers on strategy and defence no. 167
    Parallel Title: Erscheint auch als History as policy
    Parallel Title: Print version
    Keywords: National security Australia. ; National security ; National security ; Sicherheitspolitik ; Armies ; Law, Politics & Government ; Military & Naval Science ; Military history ; Diplomatic relations ; Australien ; Military policy ; Military readiness ; Australia ; National security ; Strategic aspects of individual places ; Außenpolitik ; POLITICAL SCIENCE ; Security (National & International) ; Australia Military policy. ; Australia Foreign relations. ; Australia Defenses. ; Australia Strategic aspects. ; Australia Military policy ; Australia Foreign relations ; Australia Defenses ; Australia Strategic aspects ; Australia ; Australia ; Australia ; Australia ; Electronic book ; Australien ; Sicherheitspolitik ; Militärpolitik
    Abstract: "The fortieth anniversary of the Strategic and Defence Studies Centre's founding provided the opportunity to assemble many of Australia's leading analysts and commentators to review some of the more significant issues that should define Australian defence policy. ... The papers collected in this volume are not informed by a common view of where Australia should focus its defence policy, but all address themes that should figure prominently in this difficult but essential task"--Provided by publisher.
    Note: Includes bibliographical references and index , Title from PDF title page (viewed July 28, 2008) , Use copy Restrictions unspecified star MiAaHDL , Self-Reliant Defence: The First Cut. The Self-Reliant Defence of Australia: The History of an Idea , Global Issues. Global Change and Strategic Priorities , Restoring Utility to Armed Force in the 21st Century , The Rise of China: History as Policy , Whither the United States and Unipolarity? , Regional Issues. The 'Arc of Instability': The History of an Idea , Jihadism and 'The Battle of Ideas' in Indonesia: Critiquing Australian Counterterrorism , Security Cooperation in the Asia-Pacific Region , Australian Strategic and Defence Issues. The Challenge of Coherence: Strategic Guidance, Capability, and Budgets , The Higher Command Structure for Joint ADF Operations , Four Decades of the Defence of Australia: Reflections on Australian Defence Policy over the Past 40 Years , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. , English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041364 , 0833042823 , 0833041363 , 9780833042828
    Language: English
    Pages: 1 Online-Ressource (xiii, 60 pages)
    Series Statement: Rand counterinsurgency study paper 3
    Series Statement: Occasional paper (Rand Corporation) OP-178
    Parallel Title: Print version Byman, Daniel, 1967- Understanding proto-insurgencies
    DDC: 355.02/18
    Keywords: Insurgency ; Terrorism Prevention ; Counterinsurgency ; Insurgency ; Terrorism ; Counterinsurgency ; Counterinsurgency ; Influence (Literary, artistic, etc.) ; Insurgency ; Diplomatic relations ; Terrorism ; Prevention ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; United States ; POLITICAL SCIENCE ; Security (National & International) ; United States Foreign relations ; United States Influence ; United States ; United States ; Electronic books
    Abstract: To gain the size and capabilities of an insurgency, a would-be insurgent movement must create a politically relevant identity; it must espouse a cause that is popular beyond the group; it must gain dominance over rival organizations; and it must find a sanctuary that provides respite from police, intelligence, and military services. Violence is instrumental in all the tasks proto-insurgencies seek to accomplish. However, violence can also backfire on them, since few people support it. Support from outside states offers numerous advantages to groups seeking to become insurgencies. It can provide safe haven, money, training, and help with political mobilization. It can also help groups overcome logistical difficulties, hinder intelligence-gathering against them, and legitimize them, making government delegitimization efforts almost impossible. Outside states, however, often deliberately try to control or even weaken the group and at times can reduce its political popularity. The reaction of the state is often the most important factor in a movement's overall success. Perhaps the best and most efficient way to prevent proto-insurgents from gaining ground is through in-group policing, since groups know their own members and can enable arrests or other forms of pressure. The government can also promote rival identities. Governments must, however, recognize the proto-insurgents' weaknesses and avoid overreaction that may inadvertently strengthen them. The most obvious action for the United States is to anticipate the possibility of an insurgency developing before it materializes. It can also provide behind-the-scenes training and advisory programs and can help inhibit outside support
    Abstract: To gain the size and capabilities of an insurgency, a would-be insurgent movement must create a politically relevant identity; it must espouse a cause that is popular beyond the group; it must gain dominance over rival organizations; and it must find a sanctuary that provides respite from police, intelligence, and military services. Violence is instrumental in all the tasks proto-insurgencies seek to accomplish. However, violence can also backfire on them, since few people support it. Support from outside states offers numerous advantages to groups seeking to become insurgencies. It can provide safe haven, money, training, and help with political mobilization. It can also help groups overcome logistical difficulties, hinder intelligence-gathering against them, and legitimize them, making government delegitimization efforts almost impossible. Outside states, however, often deliberately try to control or even weaken the group and at times can reduce its political popularity. The reaction of the state is often the most important factor in a movement's overall success. Perhaps the best and most efficient way to prevent proto-insurgents from gaining ground is through in-group policing, since groups know their own members and can enable arrests or other forms of pressure. The government can also promote rival identities. Governments must, however, recognize the proto-insurgents' weaknesses and avoid overreaction that may inadvertently strengthen them. The most obvious action for the United States is to anticipate the possibility of an insurgency developing before it materializes. It can also provide behind-the-scenes training and advisory programs and can help inhibit outside support
    Note: "RAND National Defense Research Institute , "Prepared for the Office of the Secretary of Defense , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833042118 , 083304429X , 0833042114 , 9780833044297
    Language: English
    Pages: 1 Online-Ressource (xxii, 100 pages)
    Parallel Title: Print version Building partner capabilities for coalition operations
    DDC: 355.4/6
    Keywords: United States Organization ; United States ; Multinational armed forces Organization ; Military planning ; Combined operations (Military science) ; Multinational armed forces ; Military planning ; Combined operations (Military science) ; HISTORY ; Military ; Strategy ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Organization ; Combined operations (Military science) ; Military planning ; Military relations ; United States ; United States ; Case studies ; United States Military relations ; United States ; Electronic book
    Abstract: Ongoing operations and emerging mission requirements place a heavy burden on Army resources, resulting in capability gaps that the Army is unable to fill by itself. This report argues that one way to fill those gaps is by building the appropriate capabilities in allies and partner armies through focused security cooperation. It argues that U.S. Army planners need a more comprehensive understanding of the types of capability gaps that partner armies might fill and a process for matching those gaps with candidate partner armies. The report begins by providing a theoretical context for building partner capacity and capabilities. It then discusses seven illustrative train and equip programs (TEPs) to identify specific lessons to inform Army planning and execution of TEPs in the future. It gives insights on the importance of developing and implementing metrics for security cooperation, an essential step in ensuring that Army activities are successful. The report then identifies U.S. Army capability gaps through a review of strategic and operational guidance documents and Army and joint studies. It outlines a five-step process for matching U.S. Army capability gaps with candidate partner armies, which include (1) determining the relative importance of capability gaps to the U.S. Army in specific situations, (2) considering the level of effort required to build the capability in a partner army, (3) identifying capabilities of shared interest to the U.S. Army and the partner army, (4) identifying candidate partner armies based on past participation in U.S.-led operations, and (5) determining existing partner army capabilities. The process aims to help Army planners identify which capabilities are of mutual benefit to the United States and partner nations. The report concludes with specific recommendations for Headquarters, Department of the Army, which should, at a minimum, include adopting this five-step process and focusing its efforts on those capability gaps that best support joint requirements
    Abstract: Ongoing operations and emerging mission requirements place a heavy burden on Army resources, resulting in capability gaps that the Army is unable to fill by itself. This report argues that one way to fill those gaps is by building the appropriate capabilities in allies and partner armies through focused security cooperation. It argues that U.S. Army planners need a more comprehensive understanding of the types of capability gaps that partner armies might fill and a process for matching those gaps with candidate partner armies. The report begins by providing a theoretical context for building partner capacity and capabilities. It then discusses seven illustrative train and equip programs (TEPs) to identify specific lessons to inform Army planning and execution of TEPs in the future. It gives insights on the importance of developing and implementing metrics for security cooperation, an essential step in ensuring that Army activities are successful. The report then identifies U.S. Army capability gaps through a review of strategic and operational guidance documents and Army and joint studies. It outlines a five-step process for matching U.S. Army capability gaps with candidate partner armies, which include (1) determining the relative importance of capability gaps to the U.S. Army in specific situations, (2) considering the level of effort required to build the capability in a partner army, (3) identifying capabilities of shared interest to the U.S. Army and the partner army, (4) identifying candidate partner armies based on past participation in U.S.-led operations, and (5) determining existing partner army capabilities. The process aims to help Army planners identify which capabilities are of mutual benefit to the United States and partner nations. The report concludes with specific recommendations for Headquarters, Department of the Army, which should, at a minimum, include adopting this five-step process and focusing its efforts on those capability gaps that best support joint requirements
    Note: Includes bibliographical references (pages 97-100)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    ISBN: 9780833041906 , 0833044311 , 0833041908 , 9780833044310
    Language: English
    Pages: 1 Online-Ressource (xxviii, 247 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Szayna, Thomas S., 1960- Preparing the Army for stability operations
    DDC: 355.02/80973
    Keywords: United States Civic action ; United States ; Interagency coordination ; Military doctrine ; Interagency coordination ; Military doctrine ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Civic action ; Armed Forces ; Stability operations ; Interagency coordination ; Military doctrine ; Wiederaufbau ; Militär ; Friedenssichernde Maßnahme ; Militärpolitik ; USA ; Strategie ; USA ; Militärische Ausbildung ; Konfliktmanagement ; USA ; Konfliktmanagement ; Militärische Ausbildung ; USA ; United States ; USA ; United States ; United States Armed Forces ; Stability operations ; United States ; Electronic book
    Abstract: "This monograph presents the results of a project entitled Improving Army Doctrine and Planning for Stability Operations. A great deal of activity has been aimed at revising the approach to the planning and implementation of Stabilization, Security, Transition, and Reconstruction (SSTR) operations. The primary emphasis of the changes is on ensuring a common U.S. strategy rather than a collection of individual departmental and agency efforts and on mobilizing and involving all available U.S. government assets in the effort. However, using a template to assess the extent of progress in building collaborative interagency capacity for SSTR operations, the authors find that some elements essential to the success of the process are not yet in place. They provide a series of recommendations on how the Army, as a major stakeholder, can act to advance the interagency process. The authors also assess the ongoing development of Army doctrine on SSTR operations and compare it to the emerging guidelines for SSTR operations at the interagency level. They provide specific recommendations for the Army to consider in revising its doctrine on SSTR operations, to bring it further in line with interagency guidelines. They also point out omissions in the security sector of the emerging interagency task list for SSTR operations."--Publisher's website
    Note: "MG-646-A"--Page 4 of cover , "Prepared for the United States Army , Includes bibliographical references (pages 241-247) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041593 , 0833042831 , 0833041592 , 9780833042835
    Language: English
    Pages: 1 Online-Ressource (xxi, 80 pages)
    Series Statement: Rand counterinsurgency study. Paper 4
    Series Statement: Occasional paper
    Parallel Title: Print version Money in the bank
    DDC: 355.02/18
    Keywords: Counterinsurgency Case studies ; Counterinsurgency ; Counterinsurgency ; Counterinsurgency ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Counterinsurgency ; Case studies ; Electronic books ; Fallstudiensammlung
    Abstract: As insurgent threats evolve and assume new forms, the United States must also evolve in its ability to counter potentially prolonged threats in several parts of the world. Because of the potential for global reach in contemporary insurgencies, the ability to draw on lessons learned from past counterinsurgency (COIN) campaigns using different historical cases can be valuable, helping current and future leaders prevent a repetition of mistakes and building a foundation on which to build contemporary responses. To this end, six historic COIN operations from the 19th and 20th centuries are examine
    Abstract: As insurgent threats evolve and assume new forms, the United States must also evolve in its ability to counter potentially prolonged threats in several parts of the world. Because of the potential for global reach in contemporary insurgencies, the ability to draw on lessons learned from past counterinsurgency (COIN) campaigns using different historical cases can be valuable, helping current and future leaders prevent a repetition of mistakes and building a foundation on which to build contemporary responses. To this end, six historic COIN operations from the 19th and 20th centuries are examine
    Note: "Prepared for the Office of the Secretary of Defense , Includes bibliographical references (pages 77-80)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833042095 , 083304432X , 9781281430137 , 1281430137 , 9780833044327 , 0833042092
    Language: English
    Pages: 1 Online-Ressource (xxii, 105 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Rand project Air Force
    Parallel Title: Print version Lambeth, Benjamin S Combat pair
    DDC: 358.424
    Keywords: United States ; United States Aviation ; United States Aviation ; United States ; United States ; United States ; Air warfare History ; Unified operations (Military science) ; Air warfare ; Unified operations (Military science) ; United States ; United States ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Aviation ; Air warfare ; Unified operations (Military science) ; History ; Electronic books
    Abstract: A backdrop of apartness -- The watershed of Desert Storm -- Post-Gulf War Navy adjustments to new demands -- First steps toward integrated strike-warfare training -- Continued sources of Navy-Air Force friction -- A convergence of integration over Afghanistan -- Further convergence in Operation Iraqi Freedom -- Emergent trends in Air Force-Navy integration -- A new synergy of land- and sea-based strike warfare -- Further challenges and opportunities
    Abstract: A backdrop of apartness -- The watershed of Desert Storm -- Post-Gulf War Navy adjustments to new demands -- First steps toward integrated strike-warfare training -- Continued sources of Navy-Air Force friction -- A convergence of integration over Afghanistan -- Further convergence in Operation Iraqi Freedom -- Emergent trends in Air Force-Navy integration -- A new synergy of land- and sea-based strike warfare -- Further challenges and opportunities
    Note: Includes bibliographical references (pages 99-105) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Corp
    ISBN: 9780833041890 , 0833042882 , 0833041894 , 9780833042880
    Language: English
    Pages: 1 Online-Ressource (xxxiv, 159 pages)
    Series Statement: Rand counterinsurgency study v. 1
    Parallel Title: Print version Byting back
    DDC: 322.42
    Keywords: Military art and science ; Afghan War, 2001- ; Insurgency ; Iraq War, 2003-2011 ; Military art and science ; Afghan War, 2001- ; Insurgency ; Iraq War, 2003-2011 ; POLITICAL SCIENCE ; Security (National & International) ; Insurgency ; Military art and science ; Political Science ; Military & Naval Science ; Law, Politics & Government ; Political Theory of the State ; Military Administration ; Iraq War (2003-2011) ; Iraq ; United States ; POLITICAL SCIENCE ; Political Process ; Political Advocacy ; Afghan War (2001- ) ; Electronic books
    Abstract: U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusi ...
    Abstract: U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government and an armed opposition movement, the key to exploiting information power is to connect with and learn from the population itself, increasing the effectiveness of both the local government and the U.S. military and civilian services engaged in supporting it. Utilizing mostly available networking technology, the United States could achieve early, affordable, and substantial gains in the effectiveness of counterinsurgency by more open, integrated, and inclusive information networking with the population, local authorities, and coalition partners. The most basic information link with the population would be an information technology (IT)-enhanced, fraud-resistant registry-census. The most promising link would come from utilizing local cell phone networks, which are proliferating even among poor countries. Access to data routinely collected by such networks can form the basis for security services such as enhanced-911 and forensics. The cell phones of a well-wired citizenry can be tantamount to sensor fields in settled areas. They can link indigenous forces with each other and with U.S. forces without interoperability problems; they can also track the responses of such forces to emergencies. Going further, outfitting weaponry with video cameras would bolster surveillance, provide lessons learned, and guard against operator misconduct. Establishing a national Wiki can help citizens describe their neighborhoods to familiarize U.S. forces with them and can promote accountable service delivery. All such information can improve counterinsurgency operations by making U.S. forces and agencies far better informed than they are at present. The authors argue that today's military and intelligence networks -- being closed, compartmentalized, controlled by information providers instead of users, and limited to U.S. war fighters -- hamper counterinsurgency and deprive the United States of what ought to be a strategic advantage. In contrast, based on a review of 160 requirements for counterinsurgency, the authors call for current networks to be replaced by an integrated counterinsurgency operating network (ICON) linking U.S. and indigenous operators, based on principles of inclusi ...
    Note: "RAND National Defense Research Institute , Includes bibliographical references (pages 157-159)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Santa Monica, CA : RAND Corp
    ISBN: 9780833039651 , 0833042874 , 9781281181268 , 1281181269 , 9780833042873 , 0833039652
    Language: English
    Pages: 1 Online-Ressource (xxvii, 126 pages)
    Parallel Title: Print version Stealing the sword
    DDC: 363.325/16
    Keywords: Terrorism Prevention ; Terrorism Prevention ; Arms control ; Weapons systems ; Terrorism ; Terrorism ; Arms control ; Weapons systems ; POLITICAL SCIENCE ; Security (National & International) ; Arms control ; Terrorism ; Prevention ; Weapons systems ; Armies ; Military & Naval Science ; Law, Politics & Government ; United States ; POLITICAL SCIENCE ; Political Freedom & Security ; Terrorism ; Electronic books
    Abstract: Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems i
    Abstract: Part of a series examining the technology competition between security organizations and terrorist organizations, this report focuses on understanding how terrorist groups make technology choices and consequently how the United States can discourage their adoption of advanced conventional weapons. Five types of advanced conventional weapons are identified that could provide terrorists with a new and qualitatively different weapon capability: sniper rifles, squad-level weapons, antitank missiles, large limpet mines, and mortar systems. Two key methods of limiting the threat from these systems i
    Note: "MG-510"--Page 4 of cover , Includes bibliographical references (pages 117-126)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    ISBN: 9780833039767 , 0833042556 , 9781281180971 , 1281180971 , 9780833042552 , 0833039768
    Language: English
    Pages: 1 Online-Ressource (xviii, 54 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Wolf, Charles, 1924- Russia's economy
    Keywords: Wirtschaftsentwicklung ; Economic History ; Business & Economics ; Russia (Federation) ; Russland ; POLITICAL SCIENCE ; Security (National & International) ; Economic history ; Economic policy ; POLITICAL SCIENCE ; Political Freedom & Security ; International Security ; Russia (Federation) Economic policy 1991- ; Russia (Federation) Economic conditions 1991- ; Russia (Federation) ; Russia (Federation) ; Electronic books
    Abstract: The good news and the bad news about the Russian economy's movement toward becoming a market economy are both abundant; however, the Russian economy can still -- 16 years after the Soviet Union's demise -- be appropriately characterized as transitional. It is the second largest of the economies considered to be transitional (China is the largest), but its position on the broad spectrum of transitional economies is not entirely clear, and neither are the pace and direction of its movement. The authors shed light on ambiguities surrounding Russia's status as a transitional economy by attempting to answer four key questions that relate to issues of interest to government decisionmakers about what Russia's economic growth can be attributed to and how transitional changes in the Russian economy have affected Russia's defense spending, defense industry, arms exports, and economic transitions with several of its trading partners
    Abstract: The good news and the bad news about the Russian economy's movement toward becoming a market economy are both abundant; however, the Russian economy can still -- 16 years after the Soviet Union's demise -- be appropriately characterized as transitional. It is the second largest of the economies considered to be transitional (China is the largest), but its position on the broad spectrum of transitional economies is not entirely clear, and neither are the pace and direction of its movement. The authors shed light on ambiguities surrounding Russia's status as a transitional economy by attempting to answer four key questions that relate to issues of interest to government decisionmakers about what Russia's economic growth can be attributed to and how transitional changes in the Russian economy have affected Russia's defense spending, defense industry, arms exports, and economic transitions with several of its trading partners
    Note: Includes bibliographical references (pages 53-54)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    ISBN: 9780833038036 , 0833042408 , 0833038036 , 9780833042408
    Language: English
    Pages: 1 Online-Ressource (xxx, 142 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Assessing the value of U.S. Army international activities
    Keywords: United States Foreign service ; United States ; United States ; United States ; Military assistance, American ; Security, International ; Military art and science International cooperation ; Military policy International cooperation ; Military assistance, American ; Security, International ; Military art and science ; Military policy ; Militärhilfe ; Sicherheitspolitik ; Internationale Politik ; Military & Naval Science ; Law, Politics & Government ; Armies ; United States ; BUSINESS & ECONOMICS ; Human Resources & Personnel Management ; USA ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Foreign service ; Military art and science ; International cooperation ; Military assistance, American ; Military policy ; International cooperation ; Military relations ; United States ; Security, International ; POLITICAL SCIENCE ; Political Freedom & Security ; International Security ; United States Military relations ; United States ; Electronic books
    Abstract: A number of important steps have been taken in recent years to improve the planning and management of Army International Activities (AIA). Still, a need remains, and is widely recognized, for a high-level assessment mechanism to allocate AIA resources more efficiently, execute AIA programs more effectively, and highlight the contributions of AIA to the National Military Strategy, the DoD Security Cooperation Guidance, and The Army Plan. This report presents a framework for assessing the value of the Army's non-combat interactions with other militaries. It provides an overview of AIA programs and establishes their connection to the U.S. government's current strategy for security cooperation. It also provides a matrix of eight AIA "ends," derived from top-level national and Army guidance, and eight AIA "ways," which summarize the various capabilities inherent in AIA programs. Next, the report presents a method for linking AIA "ends" and "ways" that involves a theoretical rationale for security cooperation, selection criteria for AIA "output" and "outcome" indicators, and related measures of performance and effectiveness. The report also describes the new online AIA Knowledge Sharing System (AIAKSS) that is being used to solicit programmatic and assessment data from AIA officials in the Army's Major Commands. In addition, the report includes the results of three test cases-involving the Army Medical Department, the National Guard Bureau, and U.S. Army South-that helped to identify potential problems in evaluating AIA and to suggest improvements in the proposed AIA assessment mechanism. Finally, the report contains an extensive list of "output" and "outcome" indicators that have been reviewed by AIA officials throughout the Army
    Abstract: A number of important steps have been taken in recent years to improve the planning and management of Army International Activities (AIA). Still, a need remains, and is widely recognized, for a high-level assessment mechanism to allocate AIA resources more efficiently, execute AIA programs more effectively, and highlight the contributions of AIA to the National Military Strategy, the DoD Security Cooperation Guidance, and The Army Plan. This report presents a framework for assessing the value of the Army's non-combat interactions with other militaries. It provides an overview of AIA programs and establishes their connection to the U.S. government's current strategy for security cooperation. It also provides a matrix of eight AIA "ends," derived from top-level national and Army guidance, and eight AIA "ways," which summarize the various capabilities inherent in AIA programs. Next, the report presents a method for linking AIA "ends" and "ways" that involves a theoretical rationale for security cooperation, selection criteria for AIA "output" and "outcome" indicators, and related measures of performance and effectiveness. The report also describes the new online AIA Knowledge Sharing System (AIAKSS) that is being used to solicit programmatic and assessment data from AIA officials in the Army's Major Commands. In addition, the report includes the results of three test cases-involving the Army Medical Department, the National Guard Bureau, and U.S. Army South-that helped to identify potential problems in evaluating AIA and to suggest improvements in the proposed AIA assessment mechanism. Finally, the report contains an extensive list of "output" and "outcome" indicators that have been reviewed by AIA officials throughout the Army
    Note: "RAND Arroyo Center , "This report was ... conducted in RAND Arroyo Center's Strategy, Doctrine, and Resources Program"--Preface , Includes bibliographical references (pages 139-142) , Supersedes RAND/DRR-3219-A , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    ISBN: 9780833039637 , 0833042548 , 9781281180964 , 1281180963 , 9780833042545 , 0833039636
    Language: English
    Pages: 1 Online-Ressource (xxiv, 180 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Air power in the new counterinsurgency era
    DDC: 358.4/1425
    Keywords: United States ; United States ; Air power ; Military assistance, American ; Military missions ; World politics 21st century ; Counterinsurgency ; Air power ; Military assistance, American ; Military missions ; World politics ; Counterinsurgency ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; POLITICAL SCIENCE ; Security (National & International) ; Air power ; Counterinsurgency ; Military assistance, American ; Military missions ; World politics ; United States ; Electronic books
    Abstract: Often treated by Americans as an exceptional form of warfare, insurgency is anything but. Spanning the globe, centuries, and societies, insurgency is quite common. Given the threat insurgency presents to U.S. interests and allies around the world, the importance of counterinsurgency is no surprise. However, history has shown that insurgencies are rarely defeated by outside powers. Rather, the best role for outsiders is an indirect one: training, advising, and equipping the local nation, which must win the war politically and militarily. And while counterinsurgency might seem to be a task most suited to ground forces, air power has much to contribute. These facts combine to suggest that advising, training, and equipping partner air forces will be a key component of U.S. counterinsurgency efforts worldwide. The authors note that, if the Air Force is to participate in these tasks, it will need to make counterinsurgency an institutional priority, developing the capabilities of its personnel both as advisors and trainers and as combatants, as well as developing the necessary institutional support structures
    Abstract: Often treated by Americans as an exceptional form of warfare, insurgency is anything but. Spanning the globe, centuries, and societies, insurgency is quite common. Given the threat insurgency presents to U.S. interests and allies around the world, the importance of counterinsurgency is no surprise. However, history has shown that insurgencies are rarely defeated by outside powers. Rather, the best role for outsiders is an indirect one: training, advising, and equipping the local nation, which must win the war politically and militarily. And while counterinsurgency might seem to be a task most suited to ground forces, air power has much to contribute. These facts combine to suggest that advising, training, and equipping partner air forces will be a key component of U.S. counterinsurgency efforts worldwide. The authors note that, if the Air Force is to participate in these tasks, it will need to make counterinsurgency an institutional priority, developing the capabilities of its personnel both as advisors and trainers and as combatants, as well as developing the necessary institutional support structures
    Note: "Prepared for the United States Air Force , "MG-509 , Includes bibliographical references (pages 159-180) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Santa Monica, CA : Rand
    ISBN: 9780833038166 , 0833040898 , 9781601290205 , 1601290209 , 9780833040893 , 0833038168
    Language: English
    Pages: 1 Online-Ressource (xxi, 101 pages)
    Parallel Title: Print version Stretched thin
    Keywords: United States Appropriations and expenditures ; United States Personnel management ; United States Cost control ; United States Recruiting, enlistment, etc ; United States ; United States ; United States ; United States ; United States ; TECHNOLOGY & ENGINEERING ; Military Science ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Appropriations and expenditures ; Armed Forces ; Cost control ; Armed Forces ; Personnel management ; Recruiting and enlistment ; Military Administration ; Military & Naval Science ; Law, Politics & Government ; Electronic books
    Abstract: The nation has difficult trade-offs in facing calls on Army forces for operations in Iraq and Afghanistan. This report describes the effects of large deployments on the Army's ability to provide forces for other contingencies, to ensure that soldiers are trained, and to continue to recruit and retain soldiers. The authors found that Army plans for transformation and employing reserves at reasonable rates still fall short. Steps to improve the situation all involve high risks or costs. Unless requirements recede, the nation faces an Army stretched thin, with no quick fix or easy solution
    Abstract: The nation has difficult trade-offs in facing calls on Army forces for operations in Iraq and Afghanistan. This report describes the effects of large deployments on the Army's ability to provide forces for other contingencies, to ensure that soldiers are trained, and to continue to recruit and retain soldiers. The authors found that Army plans for transformation and employing reserves at reasonable rates still fall short. Steps to improve the situation all involve high risks or costs. Unless requirements recede, the nation faces an Army stretched thin, with no quick fix or easy solution
    Note: "MG-362 , Includes bibliographical references (pages 97-101)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    ISBN: 9780833038364 , 0833040820 , 9781433709494 , 143370949X , 9780833040824 , 0833038362
    Language: English
    Pages: 1 Online-Ressource (xxxii, 167 pages)
    Parallel Title: Print version Karoly, Lynn A., 1961- Early childhood interventions
    DDC: 362.7/0973
    Keywords: Early childhood education ; Child care services ; Public welfare ; Child welfare Evaluation ; Children with social disabilities Services for ; Children with social disabilities Services for ; Evaluation ; Early childhood education ; Child care services ; Public welfare ; Child welfare ; Children with social disabilities ; Children with social disabilities ; POLITICAL SCIENCE ; Public Policy ; Social Services & Welfare ; POLITICAL SCIENCE ; Public Policy ; Social Security ; POLITICAL SCIENCE ; Security (National & International) ; Child care services ; Child welfare ; Evaluation ; Children with social disabilities ; Services for ; Early childhood education ; Public welfare ; Social Welfare & Social Work - General ; Social Welfare & Social Work ; Social Sciences ; United States ; Electronic books
    Abstract: Parents, policymakers, business leaders, and the general public increasingly recognize the importance of the first few years in the life of a child for promoting healthy physical, emotional, social, and intellectual development. Nonetheless, many children face deficiencies between ages 0 and 5 that can impede their ability to develop to their fullest potential. The PNC Grow Up Great initiative, a program financed by PNC Financial, Inc., asked RAND to prepare a thorough, objective review and synthesis of current research that addresses the potential for various forms of early childhood intervention to improve outcomes for participating children and their families. The authors consider the potential consequences of not investing additional resources in the lives of children, the range of early intervention programs, the demonstrated benefits of interventions with high-quality evaluations, the features associated with successful programs, and the returns to society associated with investing early in the lives of disadvantaged children. Their findings indicate that a body of sound research exists that can guide resource allocation decisions. This evidence base sheds light on the types of programs that have been demonstrated to be effective, the features associated with effective programs, and the potential for returns to society that exceed the resources invested in program delivery
    Abstract: Parents, policymakers, business leaders, and the general public increasingly recognize the importance of the first few years in the life of a child for promoting healthy physical, emotional, social, and intellectual development. Nonetheless, many children face deficiencies between ages 0 and 5 that can impede their ability to develop to their fullest potential. The PNC Grow Up Great initiative, a program financed by PNC Financial, Inc., asked RAND to prepare a thorough, objective review and synthesis of current research that addresses the potential for various forms of early childhood intervention to improve outcomes for participating children and their families. The authors consider the potential consequences of not investing additional resources in the lives of children, the range of early intervention programs, the demonstrated benefits of interventions with high-quality evaluations, the features associated with successful programs, and the returns to society associated with investing early in the lives of disadvantaged children. Their findings indicate that a body of sound research exists that can guide resource allocation decisions. This evidence base sheds light on the types of programs that have been demonstrated to be effective, the features associated with effective programs, and the potential for returns to society that exceed the resources invested in program delivery
    Note: Includes bibliographical references (pages 149-167)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Santa Monica, CA : RAND/Project Air Force
    ISBN: 9780833032904 , 083303619X , 0833032909 , 9780833036193
    Language: English
    Pages: 1 Online-Ressource (xix, 345 pages)
    Parallel Title: Print version Future security environment in the Middle East
    Keywords: Military policy ; Strategic aspects of individual places ; Toekomstverwachtingen ; Politieke hervormingen ; Veiligheidspolitiek ; TECHNOLOGY & ENGINEERING ; Military Science ; Middle East ; United States ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Middle East Strategic aspects ; United States Military policy ; Middle East ; United States ; Electronic books
    Abstract: The security environment in the Middle East has become increasingly complicated during the past decade. This report identifies several important trends that are shaping regional security and identifies their implications for the United States. Many traditional security concerns, such as energy security and the proliferation of weapons of mass destruction, will remain significant factors in the future. However, ongoing domestic changes throughout the region will become increasingly important as well. Issues such as political reform, economic reform, civil-military relations, leadership change, and the information revolution are all affecting regional security dynamics. This report examines each of these issue areas and identifies some of the challenges that they pose for U.S. foreign policy
    Note: "Prepared for the United States Air Force , Includes bibliographical references (pages 317-345) , Introduction , Political reform in the Middle East , Economic reform in the Middle East : the challenge to governance , Civil-military relations in the Middle East , The implications of leadership change in the Arab world , Energy and Middle Eastern security : new dimensions and strategic implications , The information revolution and the Middle East , Weapons of mass destruction in the Middle East : proliferation dynamics and strategic consequences
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Santa Monica, Calif : RAND Corp
    ISBN: 9780833035202 , 0833048171 , 9781598754131 , 1598754130 , 9781282451223 , 1282451227 , 9780833048172 , 0833035207
    Language: English
    Pages: 1 Online-Ressource (xxx, 155 pages)
    Parallel Title: Print version Out of the ordinary
    Keywords: Criminal methods ; Terrorism Forecasting ; Terrorism Psychological aspects ; Intelligence service ; National security ; Crime forecasting ; Criminal behavior, Prediction of ; Criminal methods ; Terrorism ; Terrorism ; Intelligence service ; National security ; Crime forecasting ; Criminal behavior, Prediction of ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; POLITICAL SCIENCE ; Security (National & International) ; Crime forecasting ; Criminal behavior, Prediction of ; Criminal methods ; Intelligence service ; National security ; Terrorism ; Forecasting ; Terrorism ; Psychological aspects ; United States ; Electronic books
    Abstract: Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
    Abstract: Presents a unique appraoch to selecting and assembling disparate pieces of information to produce a general understanding of a threat. The Atypical Signal Analysis and Processing schema identifies atypical behavior potentially related to terror actvity; puts it into context; generates and tests hypotheses; and focuses analysts' attention on the most significant findings. A supporting conceptual architecture and specific techniques for identifying and analyzing out-of-the-ordinary information are also described
    Note: "MG-126-RC , Includes bibliographical references (pages 151-155) and appendices , Title from title screen (viewed 11/23/2004)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    ISBN: 9780833036827 , 0833040588 , 9781598754605 , 1598754602 , 9780833040589 , 0833036823
    Language: English
    Pages: 1 Online-Ressource (xxi, 150 pages)
    Series Statement: Rand Corporation monograph series
    Parallel Title: Print version Fair, C. Christine Urban battle fields of South Asia
    DDC: 355.4/26/0954
    Keywords: Terrorism Prevention ; Terrorism Prevention ; War on Terrorism, 2001-2009 ; Urban warfare ; Terrorism Prevention ; Urban warfare ; Urban warfare ; Terrorism ; Terrorism ; War on Terrorism, 2001-2009 ; Urban warfare ; Terrorism ; Urban warfare ; Urban warfare ; HISTORY ; Military ; Strategy ; POLITICAL SCIENCE ; Security (National & International) ; Terrorism ; Prevention ; Urban warfare ; War on Terrorism (2001-2009) ; Pakistan ; Sri Lanka ; India
    Abstract: This study examines several case studies of sustained campaigns of urban terrorism perpetrated by various domestic groups in the countries of India, Pakistan and Sri Lanka. One focus of this research addresses the modus operandi of the militant outfits. It describes the tactics they employ, their targeting means and objectives, and the ways in which these groups have innovated and evolved over time. This report illuminates, where possible, links that militant groups forge with other such organizations within South Asia and beyond. This work also examines the ways in which the three states respond to the menace of urban terrorism. It explains how each state mobilizes its security apparatuses (military, paramilitary, police), intelligence agencies as well as legislative and judicial bodies to counter the emerging threats. Finally, this research identifies key insights from these country-specific case studies that may inform U.S. stability operations in the cities of Afghanistan, Iraq and elsewhere
    Abstract: This study examines several case studies of sustained campaigns of urban terrorism perpetrated by various domestic groups in the countries of India, Pakistan and Sri Lanka. One focus of this research addresses the modus operandi of the militant outfits. It describes the tactics they employ, their targeting means and objectives, and the ways in which these groups have innovated and evolved over time. This report illuminates, where possible, links that militant groups forge with other such organizations within South Asia and beyond. This work also examines the ways in which the three states respond to the menace of urban terrorism. It explains how each state mobilizes its security apparatuses (military, paramilitary, police), intelligence agencies as well as legislative and judicial bodies to counter the emerging threats. Finally, this research identifies key insights from these country-specific case studies that may inform U.S. stability operations in the cities of Afghanistan, Iraq and elsewhere
    Note: Includes bibliographical references (pages 139-150)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Santa Monica, CA : Rand Arroyo Center
    ISBN: 9780833037022 , 0833040561 , 0833037021 , 9780833040565
    Language: English
    Pages: 1 Online-Ressource (xxiv, 150 pages)
    Parallel Title: Print version Helmus, Todd C Steeling the mind
    DDC: 616.85/212
    Keywords: Urban warfare ; War neuroses ; Urban warfare ; War neuroses ; Cities ; Warfare ; Combat Disorders ; Urban warfare ; War neuroses ; PSYCHOLOGY ; Psychopathology ; Post-Traumatic Stress Disorder (PTSD) ; POLITICAL SCIENCE ; Security (National & International) ; United States ; Electronic books
    Abstract: Combat stress casualties can severely reduce unit strength, and these types of losses may be accentuated during operations in cities. Commanders and NCOs need to have the skills to treat and prevent stress casualties and understand their implications for urban operations. The authors review the known precipitants of combat stress reaction, its battlefield treatment, and the preventive steps commanders can take to limit its extent and severity
    Abstract: Combat stress casualties can severely reduce unit strength, and these types of losses may be accentuated during operations in cities. Commanders and NCOs need to have the skills to treat and prevent stress casualties and understand their implications for urban operations. The authors review the known precipitants of combat stress reaction, its battlefield treatment, and the preventive steps commanders can take to limit its extent and severity
    Note: "MG-191-A"--Page 4 of cover , "Prepared for the United States Army , Includes bibliographical references (pages 133-150)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Santa Monica, CA : RAND
    ISBN: 9780833033475 , 0833034138 , 0833033476 , 9780833034137
    Language: English
    Pages: 1 Online-Ressource (xxi, 307 pages)
    Series Statement: MR/Rand Corporation MR-1657-A
    Parallel Title: Print version U.S. Army and the new national security strategy
    Keywords: United States ; United States ; National security ; World politics 21st century ; National security ; World politics ; World politics ; HISTORY ; Military ; United States ; POLITICAL SCIENCE ; Security (National & International) ; Military policy ; National security ; United States ; United States Military policy ; United States ; Electronic books
    Abstract: How is the U.S. Army changing to fulfill its role in light of the new national security strategy? How must it change further to better accomplish its manifold and varied missions? How did the attacks of September 11, 2001, alter or accelerate the need for change? Is the Army's far-reaching program for change known as the Army Transformation on the right track? Fourteen RAND analysts with broad experience in strategic and Army planning have undertaken to answer these questions. In this book, the authors use nine chapters to examine the Army's role in the offensive war on terrorism; the Army's homeland security needs; the implications for the Army of the increase in emphasis on the Asia-Pacific region; the Army's role in coalition operations; the unfinished business of jointness-the lessons to be learned from recent Army operations and how the Army can better prepare for the future; the Army's deployability, logistical, and personnel challenges; and whether the Army can afford the Transformation as currently envisaged. These chapters are bracketed by a concise introduction, a description of the new national security strategy and the Army's place in it, and a succinct summary of the authors' conclusions. This book is nothing less than a call for the Army to change and a prescription for what needs to be done
    Note: "MR-1657-A"--Page 4 of cover , "Prepared for the United States Army , Includes bibliographical references , ch. 1. Introduction , ch. 2. New national security strategy , ch. 3. U.S. Army and the offensive war on terrorism , ch. 4. Defining the Army's homeland security needs , ch. 5. Shift to Asia, implications for U.S. land power , ch. 6. Preparing for coalition operations , ch. 7. Transformation and the unfinished business of jointness, lessons for the Army from the Persian Gulf, Kosovo, and Afghanistan , ch. 8. Preparing the Army for joint operations , ch. 9. Moving rapidly to the fight , ch. 10. Taking care of people, the future of Army personnel , ch. 11. Making the power projection Army a reality , ch. 12. Resourcing the twenty-first century Army , ch. 13. Refining Army transformation
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    ISBN: 9780833034441 , 0833036122 , 0833034448 , 9780833036124
    Language: English
    Pages: 1 Online-Ressource (xvi, 71 pages)
    Parallel Title: Print version Bensahel, Nora, 1971- Counterterror coalitions
    DDC: 363.32
    Keywords: North Atlantic Treaty Organization ; North Atlantic Treaty Organization ; War on Terrorism, 2001-2009 ; European Union ; Terrorism Prevention ; War on Terrorism, 2001-2009 ; European Union ; Terrorism ; POLITICAL SCIENCE ; Security (National & International) ; Military policy ; Military relations ; Terrorism ; Prevention ; North Atlantic Treaty Organization ; Europe ; United States ; War on Terrorism (2001-2009) ; POLITICAL SCIENCE ; Political Freedom & Security ; Law Enforcement ; United States Military relations ; Europe Military relations ; United States Military policy ; United States ; Europe ; United States ; Electronic books
    Abstract: The long-term success of the counterterror campaign will depend on concerted cooperation from European states, but a key question is the extent to which that cooperation should be pursued through European multilateral institutions. This study argues that the United States should pursue military and intelligence cooperation on a bilateral basis, and it should increasingly pursue financial and law enforcement cooperation on a multilateral basis. The United States should adopt a nuanced strategy in its counterterror relations with Europe
    Abstract: The long-term success of the counterterror campaign will depend on concerted cooperation from European states, but a key question is the extent to which that cooperation should be pursued through European multilateral institutions. This study argues that the United States should pursue military and intelligence cooperation on a bilateral basis, and it should increasingly pursue financial and law enforcement cooperation on a multilateral basis. The United States should adopt a nuanced strategy in its counterterror relations with Europe
    Note: "MR-1746-AF"--Page 4 of cover , Includes bibliographical references (pages 65-71)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    ISBN: 9780833030955 , 0833033840 , 0833030957 , 9780833033840
    Language: English
    Pages: 1 Online-Ressource (xvi, 136 pages)
    Parallel Title: Print version Oliker, Olga Assessing Russia's decline
    Keywords: United States ; United States ; Military & Naval Science ; Law, Politics & Government ; Armies ; Russia (Federation) ; HISTORY ; POLITICAL SCIENCE ; Security (National & International) ; Strategic aspects of individual places ; United States ; Russia (Federation) Strategic aspects ; Russia (Federation) ; Electronic books
    Abstract: PREFACE; CONTENTS; FIGURES; SUMMARY; ACKNOWLEDGMENTS; Chapter One INTRODUCTION: STRATEGIC IMPLICATIONS OF RUSSIA'S DECLINE; Chapter Two REGIONAL AUTONOMY OR INCREASED CENTRALIZATION?; Chapter Three THE RUSSIAN ECONOMY; Chapter Four RUSSIA'S POLITICAL FUTURE: WHITHER DEMOCRACY AND FREEDOM?; Chapter Five THE PEOPLE OF RUSSIA: ASSET OR LIABILITY?; Chapter Six THE RUSSIAN MILITARY; Chapter Seven WEAK LINKS: ROAD, RAIL, AND NUCLEAR POWER; Chapter Eight ILLUSTRATIVE SCENARIOS; Chapter Nine NEXT STEPS: PLANNING FOR AND PREVENTING CONTINGENCIES; Chapter Ten THE AIR FORCE ROLE; SELECTED BIBLIOGRAPHY
    Abstract: PREFACE; CONTENTS; FIGURES; SUMMARY; ACKNOWLEDGMENTS; Chapter One INTRODUCTION: STRATEGIC IMPLICATIONS OF RUSSIA'S DECLINE; Chapter Two REGIONAL AUTONOMY OR INCREASED CENTRALIZATION?; Chapter Three THE RUSSIAN ECONOMY; Chapter Four RUSSIA'S POLITICAL FUTURE: WHITHER DEMOCRACY AND FREEDOM?; Chapter Five THE PEOPLE OF RUSSIA: ASSET OR LIABILITY?; Chapter Six THE RUSSIAN MILITARY; Chapter Seven WEAK LINKS: ROAD, RAIL, AND NUCLEAR POWER; Chapter Eight ILLUSTRATIVE SCENARIOS; Chapter Nine NEXT STEPS: PLANNING FOR AND PREVENTING CONTINGENCIES; Chapter Ten THE AIR FORCE ROLE; SELECTED BIBLIOGRAPHY
    Note: "Prepared for the United States Air Force , "MR-1442-AF"--Page 4 of cover , Includes bibliographical references (pages 127-136)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    ISBN: 9780833031174 , 0833032283 , 0833031171 , 9780833032287
    Language: English
    Pages: 1 Online-Ressource (xxvi, 179 pages)
    Parallel Title: Print version Hunter, Robert Edwards, 1940- European Security and Defense Policy
    Keywords: North Atlantic Treaty Organization ; North Atlantic Treaty Organization ; Armies ; Military & Naval Science ; Law, Politics & Government ; TECHNOLOGY & ENGINEERING ; Military Science ; Europe ; United States ; HISTORY ; Military ; Other ; POLITICAL SCIENCE ; Security (National & International) ; Military policy ; Military readiness ; North Atlantic Treaty Organization ; Military relations ; United States Military relations ; Europe Defenses ; Europe Military relations ; Europe Military policy ; United States ; Europe ; Europe ; Europe ; Electronic books
    Abstract: The Grand Bargain of Berlin and Brussels -- Beyond Berlin: Devil in the Details (I) -- St. Malo and Beyond -- The Three Ds, and a Fourth -- Defense Capabilities and the Defense Capabilities Initiative -- From Washington to Cologne -- Congress Responds -- The Helsinki Watershed -- After Helsinki: Getting the NATO-EU Relationship Right -- Practical Arrangements: Devil in the Details (II) -- Parallel Tracks -- U.S. Concerns Crystallize -- Nice and Beyond -- The New U.S. Administration -- Sorting It Out -- Striking the Balance: A U.S. View -- Practical Steps: Building a Transatlantic Bridge, Not a Barrier -- Looking to the Future
    Abstract: The Grand Bargain of Berlin and Brussels -- Beyond Berlin: Devil in the Details (I) -- St. Malo and Beyond -- The Three Ds, and a Fourth -- Defense Capabilities and the Defense Capabilities Initiative -- From Washington to Cologne -- Congress Responds -- The Helsinki Watershed -- After Helsinki: Getting the NATO-EU Relationship Right -- Practical Arrangements: Devil in the Details (II) -- Parallel Tracks -- U.S. Concerns Crystallize -- Nice and Beyond -- The New U.S. Administration -- Sorting It Out -- Striking the Balance: A U.S. View -- Practical Steps: Building a Transatlantic Bridge, Not a Barrier -- Looking to the Future
    Note: "Research conducted jointly by RAND Europe and the International Security and Defense Policy Center of RAND's National Defense Research Institute ..."--Page vi , "MR-1463-NDRI/RE , Includes bibliographical references
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Santa Monica, Calif : Rand
    ISBN: 9780833030962 , 0833032313 , 0833030965 , 9780833032317
    Language: English
    Pages: 1 Online-Ressource (xiii, 147 pages)
    Parallel Title: Print version Disjointed war
    Keywords: North Atlantic Treaty Organization Armed Forces ; North Atlantic Treaty Organization ; Kosovo War, 1998-1999 Campaigns ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Military campaigns ; Kosovo (Republic) ; Yugoslavia ; North Atlantic Treaty Organization ; HISTORY ; General ; History ; Kosovo (Republic) ; Electronic books
    Abstract: The 1999 military operation in Kosovo had several deficiencies in joint military operations. This study examines all aspects of the conflict, including its political and historical underpinnings, in an attempt to understand these deficiences and to recommend improvements
    Abstract: The 1999 military operation in Kosovo had several deficiencies in joint military operations. This study examines all aspects of the conflict, including its political and historical underpinnings, in an attempt to understand these deficiences and to recommend improvements
    Note: "MR-1406 , Includes bibliographical references (pages 127-147)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    ISBN: 9780833029546 , 0833032461 , 0833029541 , 9780833032461
    Language: English
    Pages: 1 Online-Ressource (xxviii, 481 pages)
    Parallel Title: Print version Strategic appraisal
    Keywords: United States ; United States ; Astronautics, Military ; World politics 21st century ; Air power ; Astronautics, Military ; World politics ; Air power ; POLITICAL SCIENCE ; Security (National & International) ; United States ; Air power ; Astronautics, Military ; World politics ; United States ; Electronic books
    Abstract: Change--in international relations, in technology, and in society as a whole--has become the idiom of our age. One example of these changes has been an increasing recognition of the value of air and space assets for handling nearly every contingency from disaster relief to war and, consequently, increasing demand for such assets. These developments have created both challenges and opportunities for the U.S. Air Force. This, the fourth volume in the Strategic Appraisal series, draws on the expertise of researchers from across RAND to explore both the challenges and opportunities that the U.S. Air Force faces as it strives to support the nation's interests in a challenging technological and security environment. Contributors examine the changing roles of air and space forces in U.S. national security strategy, the implications of new systems and technologies for military operations, and the role of nuclear weapons in U.S. security strategy. Contributors also discuss the status of major modernization efforts within the Air Force, and the "bill of health" of the Air Force, as measured by its readiness to undertake its missions both today and in the future
    Note: "Prepared for the United States Air Force , "MR-1314-AF , Includes bibliographical references , Title from first screen of 495 in PDF file (viewed Oct. 22, 2003) , Introduction: The Price of Success , Forces for What? Geopolitical Context and Air Force Capabilities , The Future of U.S. Coercive Airpower , Modernizing the Combat Forces: Near-Term Options , Space Challenges , U.S. Military Opportunities: Information-Warfare Concepts of Operation , Nuclear Weapons and U.S. National Security Strategy for a New Century , Countering Weapons of Mass Destruction and Ballistic Missiles , Providing Adequate Access for Expeditionary Aerospace Forces , A Vision for an Evolving Agile Combat Support System , Strategic Sourcing in the Air Force , Ready for War but Not for Peace: The Apparent Paradox of Military Preparedness
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    ISBN: 0833034022 , 9780833034021
    Language: English
    Pages: xxvi, 157 p , map , 23 cm
    Edition: Boulder, Colo NetLibrary 2003 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Erscheint auch als Rabasa, Angel Military and democracy in Indonesia
    Parallel Title: Erscheint auch als Rabasa, Angel Military and democracy in Indonesia
    Keywords: Civil-military relations ; Civil-military relations Indonesia ; Civil-military relations ; Civil-military relations ; Civil-military relations Indonesia ; Politics and government ; Democratisering ; Militairen ; Politieke activiteit ; Civil-military relations ; Military relations ; POLITICAL SCIENCE ; Political Process ; Political Advocacy ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Political activity ; Demokratie ; Militärpolitik ; Indonesia Politics and government 20th century. ; Indonesia Armed Forces ; Reorganization. ; Indonesia Armed Forces ; Political activity. ; United States Military relations ; Indonesia Military relations ; Indonesia Politics and government ; 20th century ; Indonesia Armed Forces ; Political activity ; United States Military relations ; Indonesia ; Indonesia Military relations ; United States ; Indonesia ; United States ; Indonesia ; Indonesia ; Indonesia Armed Forces ; Political activity ; United States Military relations ; Indonesia Military relations ; Indonesia Politics and government 20th century. ; Indonesia Armed Forces ; Reorganization. ; Indonesia Armed Forces ; Political activity. ; United States Military relations ; Indonesia Military relations ; Indonesia Armed Forces ; Political activity ; Indonesia Military relations ; United States ; Indonesia ; United States ; Indonesia Politics and government ; 20th century ; United States Military relations ; Indonesia ; Indonesia ; United States ; Indonesien ; Electronic books. ; Electronic books. ; Electronic books ; Indonesien ; Demokratie ; Militärpolitik ; Indonesien ; Demokratie ; Militärpolitik
    Abstract: The Indonesian military, with its tradition of secular nationalism, is one of the few institutions that cut across the divides of Indonesian society. As it continues to play a critical part in determining Indonesia's future development, the military itself is undergoing profound change. The authors of this book explore the role of the military in politics and society since the fall of President Suharto in 1998. They examine key research issues that are central to the strategic interests of the United States in Asia: Will the Indonesian military be a constructive force supporting democratic processes or will it opt for authoritarian solutions? What are some realistic goals for further progress on military reform? And how can the United States engage the Indonesian military most effectively to help bring about positive change? To answer these questions, the authors present several strategic scenarios for Indonesia, each of which has important implications for U.S.-Indonesian relations, and propose goals for Indonesian military reform and elements of a U.S. engagement policy
    Abstract: Introduction -- Part I: The TNI -- Origins and Institutional Development of the Armed Forces -- Doctrinal Change: from "Total People'S Defense and Security" to the "New Paradigm" -- Changes in the Intelligence Function -- The Changing Political Role of the Military -- Inside the TNI: Career Patterns, Factionalism, and Military Cohesion -- The Military's Funding and Economic Interests -- Part II: Security Challenges -- The Challenge of Terrorism and Religious Extremism -- Communal Conflict in Eastern and Central Indonesia -- Separatist Movements in Aceh and Papua -- Part III: The Future of U.S.-Indonesian Military Relations -- The Rocky Course of U.S.-Indonesian Military Relations -- Strategic Scenarios for Indonesia and Their Implications -- Goals for Indonesian Military Reform and Elements of a U.S. Engagement Strategy -- Appendix: Can Indonesia Meet the Leahy Amendment Conditions?. - The Indonesian military, with its tradition of secular nationalism, is one of the few institutions that cut across the divides of Indonesian society. As it continues to play a critical part in determining Indonesia's future development, the military itself is undergoing profound change. The authors of this book explore the role of the military in politics and society since the fall of President Suharto in 1998. They examine key research issues that are central to the strategic interests of the United States in Asia: Will the Indonesian military be a constructive force supporting democratic processes or will it opt for authoritarian solutions? What are some realistic goals for further progress on military reform? And how can the United States engage the Indonesian military most effectively to help bring about positive change? To answer these questions, the authors present several strategic scenarios for Indonesia, each of which has important implications for U.S.-Indonesian relations, and propose goals for Indonesian military reform and elements of a U.S. engagement policy
    Note: "MR-1599-SRF." , Includes bibliographical references (p. 143-155) , Electronic reproduction, Boulder, Colo : NetLibrary, 2003 , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    ISBN: 9780833031815 , 0833034014 , 0833031813 , 9780833034014
    Language: English
    Pages: 1 Online-Ressource (xv, 211 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Wolf, Charles, 1924- Straddling economics and politics
    DDC: 330.9
    Keywords: Globalization Political aspects ; Free enterprise ; International economic relations ; Financial crises ; Globalization Economic aspects ; Globalization ; Free enterprise ; International economic relations ; Financial crises ; Globalization ; POLITICAL SCIENCE ; Security (National & International) ; Economic history ; Economic policy ; Financial crises ; Free enterprise ; Globalization ; Economic aspects ; Globalization ; Political aspects ; International economic relations ; Politics and government ; POLITICAL SCIENCE ; Economic Conditions ; BUSINESS & ECONOMICS ; Economics ; Comparative ; Asia ; United States ; BUSINESS & ECONOMICS ; Economic Conditions ; BUSINESS & ECONOMICS ; Economic History ; United States Economic policy 1993-2001 ; Asia Economic policy 20th century ; Asia Economic conditions 20th century ; Asia Politics and government 20th century ; United States Economic conditions 20th century ; United States Politics and government 20th century ; United States ; Asia ; Asia ; Asia ; United States ; United States ; Electronic books
    Abstract: The Global Economy -- Globalization: Meaning and Measurement -- Globalization: Less Than Meets the Eye -- Financial Crises and the Challenge of "Moral Hazard" -- The Morning After -- Financial Flu Isn't Contagious -- History Hasn't Ended: The Struggle Between Markets and Governments Resumes -- The WTO Controversy: Exaggerated Fears and Unrealistic Hopes -- Economic Facts Point to a Weak Euro -- E Pluribus Incertum Unum -- The Crisis of George Soros -- The U.S. Economy and Foreign Policy -- Whether and When to Intervene -- Tax Cuts, Debt Reduction, and "Fairness": Why Tax Reduction Is No More "Unfair" Than Debt Reduction -- False Alarms About the U.S. Trade Deficit -- Two Deficits That Just Don't Matter / co-authored with Walter Wriston -- Taxes, Trade, and Growth -- Asian Economics and Politics -- Are "Asian Values" Really That Unique? -- Through a Hazy Crystal Ball: Asia's Economic Outlook, 1997-2020 -- Asia in 2015 -- The Accumulation of Military Capital in Asia and the United States, 1997-2015 -- Too Much Government Control -- The End of Asia's Economic Crisis -- When Good News Isn't Newsworthy -- Asia's Dramatic Recovery -- China After Deng -- Why China's 8 Percent Growth Target Is Not Good News -- China's Devaluation: Whether, When, How Much? -- China's Hierarchs Face a Critical Dilemma -- Communists and Capitalists in China: Who Will Co-Opt Whom? -- China Continues Its Fitful March Toward Capitalism -- One China, Three Systems? -- Restarting Cross-Strait Relations: Beyond the Dialogue of the Deaf / co-authored with Jonathan Pollack -- Curing Japan's Economic Malaise -- Long-Term Prospects for Japan -- New Therapies for Japan's Economic Sclerosis / co-authored with Mark Buchman -- Japan's Comfortable Stagnation -- How to Defend Japan While "Engaging" China -- When a Balance of Power Can Be Destabilizing -- Managing the Costs of Korean Unification: If It Occurs
    Abstract: The Global Economy -- Globalization: Meaning and Measurement -- Globalization: Less Than Meets the Eye -- Financial Crises and the Challenge of "Moral Hazard" -- The Morning After -- Financial Flu Isn't Contagious -- History Hasn't Ended: The Struggle Between Markets and Governments Resumes -- The WTO Controversy: Exaggerated Fears and Unrealistic Hopes -- Economic Facts Point to a Weak Euro -- E Pluribus Incertum Unum -- The Crisis of George Soros -- The U.S. Economy and Foreign Policy -- Whether and When to Intervene -- Tax Cuts, Debt Reduction, and "Fairness": Why Tax Reduction Is No More "Unfair" Than Debt Reduction -- False Alarms About the U.S. Trade Deficit -- Two Deficits That Just Don't Matter / co-authored with Walter Wriston -- Taxes, Trade, and Growth -- Asian Economics and Politics -- Are "Asian Values" Really That Unique? -- Through a Hazy Crystal Ball: Asia's Economic Outlook, 1997-2020 -- Asia in 2015 -- The Accumulation of Military Capital in Asia and the United States, 1997-2015 -- Too Much Government Control -- The End of Asia's Economic Crisis -- When Good News Isn't Newsworthy -- Asia's Dramatic Recovery -- China After Deng -- Why China's 8 Percent Growth Target Is Not Good News -- China's Devaluation: Whether, When, How Much? -- China's Hierarchs Face a Critical Dilemma -- Communists and Capitalists in China: Who Will Co-Opt Whom? -- China Continues Its Fitful March Toward Capitalism -- One China, Three Systems? -- Restarting Cross-Strait Relations: Beyond the Dialogue of the Deaf / co-authored with Jonathan Pollack -- Curing Japan's Economic Malaise -- Long-Term Prospects for Japan -- New Therapies for Japan's Economic Sclerosis / co-authored with Mark Buchman -- Japan's Comfortable Stagnation -- How to Defend Japan While "Engaging" China -- When a Balance of Power Can Be Destabilizing -- Managing the Costs of Korean Unification: If It Occurs
    Note: "The 38 essays in this book were written between the end of 1996 and the middle of 2001, and published in the Wall Street journal [and others]"--Foreword , "MR-1571 , Includes bibliographical references and index , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    ISBN: 9780833032195 , 0833034022 , 0833032194 , 9780833034021
    Language: English
    Pages: 1 Online-Ressource (xxvi, 157 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Online version Rabasa, Angel Military and democracy in Indonesia
    Parallel Title: Print version Rabasa, Angel Military and democracy in Indonesia
    DDC: 322/.5/09598
    Keywords: Civil-military relations ; Civil-military relations ; Politics and government ; Democratisering ; Militairen ; Politieke activiteit ; Indonesia ; United States ; POLITICAL SCIENCE ; Political Process ; Political Advocacy ; POLITICAL SCIENCE ; Security (National & International) ; Armed Forces ; Political activity ; Civil-military relations ; Military relations ; Indonesia Armed Forces ; Political activity ; United States Military relations ; Indonesia Military relations ; Indonesia ; Indonesia Politics and government 20th century ; Indonesia ; United States ; Indonesia ; Indonesia ; Indonesia ; Electronic books
    Abstract: The Indonesian military, with its tradition of secular nationalism, is one of the few institutions that cut across the divides of Indonesian society. As it continues to play a critical part in determining Indonesia's future development, the military itself is undergoing profound change. The authors of this book explore the role of the military in politics and society since the fall of President Suharto in 1998. They examine key research issues that are central to the strategic interests of the United States in Asia: Will the Indonesian military be a constructive force supporting democratic processes or will it opt for authoritarian solutions? What are some realistic goals for further progress on military reform? And how can the United States engage the Indonesian military most effectively to help bring about positive change? To answer these questions, the authors present several strategic scenarios for Indonesia, each of which has important implications for U.S.-Indonesian relations, and propose goals for Indonesian military reform and elements of a U.S. engagement policy
    Abstract: The Indonesian military, with its tradition of secular nationalism, is one of the few institutions that cut across the divides of Indonesian society. As it continues to play a critical part in determining Indonesia's future development, the military itself is undergoing profound change. The authors of this book explore the role of the military in politics and society since the fall of President Suharto in 1998. They examine key research issues that are central to the strategic interests of the United States in Asia: Will the Indonesian military be a constructive force supporting democratic processes or will it opt for authoritarian solutions? What are some realistic goals for further progress on military reform? And how can the United States engage the Indonesian military most effectively to help bring about positive change? To answer these questions, the authors present several strategic scenarios for Indonesia, each of which has important implications for U.S.-Indonesian relations, and propose goals for Indonesian military reform and elements of a U.S. engagement policy
    Note: "MR-1599-SRF , Includes bibliographical references (pages 143-155) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    ISBN: 9780833031594 , 0833033891 , 0833031597 , 9780833033895
    Language: English
    Pages: 1 Online-Ressource (xx, 78 pages, [4] pages of plates)
    Parallel Title: Print version Gerwehr, Scott, 1968- Unweaving the web
    DDC: 355.4/26
    Keywords: Urban warfare ; Deception (Military science) ; Urban warfare ; Deception (Military science) ; POLITICAL SCIENCE ; Security (National & International) ; HISTORY ; Military ; Strategy ; Deception (Military science) ; Urban warfare ; Guerre urbaine ; Déception (Science militaire) ; Electronic books
    Abstract: Despite the realization that an urban environment can intensify the effects of deception in military operations, many important research questions remain unanswered, and even unasked. The authors use the well-developed literature on deception in animal biology to begin asking and answering those questions. This was done with the aim of improving the ability of U.S. forces to both conduct friendly deception and counter adversary deception in urban operations of all sorts. Using animal biology and military science as the source materials, the authors undertook to elaborate on existing deception theory and to propose new paths for technological, doctrinal, educational, and experimental development. The study concludes that in urban settings, there is great room for improvement in how U.S. forces do deception, and that it is imperative for them to better counter adversary deception. The study notes that deception methods are a preeminent form of adaptation in both biology and military operations, with the concluding chapter exploring this cross-disciplinary relationship (with a particular focus on counteradaptation as counterdeception)
    Abstract: Despite the realization that an urban environment can intensify the effects of deception in military operations, many important research questions remain unanswered, and even unasked. The authors use the well-developed literature on deception in animal biology to begin asking and answering those questions. This was done with the aim of improving the ability of U.S. forces to both conduct friendly deception and counter adversary deception in urban operations of all sorts. Using animal biology and military science as the source materials, the authors undertook to elaborate on existing deception theory and to propose new paths for technological, doctrinal, educational, and experimental development. The study concludes that in urban settings, there is great room for improvement in how U.S. forces do deception, and that it is imperative for them to better counter adversary deception. The study notes that deception methods are a preeminent form of adaptation in both biology and military operations, with the concluding chapter exploring this cross-disciplinary relationship (with a particular focus on counteradaptation as counterdeception)
    Note: "United States Army , Includes bibliographical references (pages 65-78) , English
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    ISBN: 9780833032386 , 0833032380 , 9780833030030 , 0585425388 , 0833030035 , 9780585425382
    Language: English
    Pages: 1 Online-Ressource (xxxi, 155 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Online Rand research documents
    Parallel Title: Print version Hosmer, Stephen T Conflict over Kosovo
    Keywords: Milošević, Slobodan ; Milošević, Slobodan ; Kosovo War, 1998-1999 ; Milošević, Slobodan ; Milošević, Slobodan ; Milosevic, Slobodan ; Organisation du traité de l'Atlantique nord ; HISTORY ; General ; POLITICAL SCIENCE ; Security (National & International) ; Guerre du Kosovo (1998-1999) ; Balkan Peninsula ; Europe / Baltic States ; HISTORY ; Regions & Countries - Europe ; History & Archaeology ; Kosovo (Republic) ; History ; Kosovo (Republic) ; Electronic books
    Abstract: This report examines the reasons Slobodan Milosevic, then president of the Federal Republic of Yugoslavia, decided on June 3, 1999, to accept NATO's conditions for terminating the conflict over Kosovo. Drawing upon the testimony of Milosevic and other senior Serb and foreign officials who directly interacted with Milosevic, the report analyzes (1) the assumptions and other calculations that underlay Milosevic's initial decision to defy NATO's demands with regard to Kosovo, and (2) the political, economic, and military developments and pressures, and the resulting expectations and concerns that most importantly influenced his subsequent decision to come to terms. While several interrelated factors, including Moscow's eventual endorsement of NATO's terms, helped shape Milosevic's decision to yield, it was the cumulative effect of NATO air power that proved most decisive. The allied bombing of Serbia's infrastructure targets, as it intensified, stimulated a growing interest among both the Serbian public and Belgrade officials to end the conflict. Milosevic's belief that the bombing that would follow a rejection of NATO's June 2 peace terms would be massively destructive and threatening to his continued rule made a settlement seem imperative. Also examined are some implications for future U.S. and allied military capabilities and operations
    Abstract: This report examines the reasons Slobodan Milosevic, then president of the Federal Republic of Yugoslavia, decided on June 3, 1999, to accept NATO's conditions for terminating the conflict over Kosovo. Drawing upon the testimony of Milosevic and other senior Serb and foreign officials who directly interacted with Milosevic, the report analyzes (1) the assumptions and other calculations that underlay Milosevic's initial decision to defy NATO's demands with regard to Kosovo, and (2) the political, economic, and military developments and pressures, and the resulting expectations and concerns that most importantly influenced his subsequent decision to come to terms. While several interrelated factors, including Moscow's eventual endorsement of NATO's terms, helped shape Milosevic's decision to yield, it was the cumulative effect of NATO air power that proved most decisive. The allied bombing of Serbia's infrastructure targets, as it intensified, stimulated a growing interest among both the Serbian public and Belgrade officials to end the conflict. Milosevic's belief that the bombing that would follow a rejection of NATO's June 2 peace terms would be massively destructive and threatening to his continued rule made a settlement seem imperative. Also examined are some implications for future U.S. and allied military capabilities and operations
    Note: "Prepared for the United States Air Force. Approved for public release, distribution unlimited , At head of title: Project Air Force , Includes bibliographical references (pages 139-155) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Santa Monica, Calif : Rand
    ISBN: 9780833030429 , 083303233X , 0833030426 , 9780833032331
    Language: English
    Pages: 1 Online-Ressource (xx, 123 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Parallel Title: Print version Greece's new geopolitics
    Keywords: Geopolitics ; Geopolitics ; POLITICAL SCIENCE ; Government ; International ; POLITICAL SCIENCE ; International Relations ; General ; POLITICAL SCIENCE ; Security (National & International) ; Geopolitics ; Geopolitik ; Regions & Countries - Europe ; History & Archaeology ; Greece ; Griechenland ; Greece ; Electronic books
    Abstract: Introduction -- Greece's New Strategic Environment -- Balkan Security After the Fall of Milosevic: Challenges and Implications for Greece -- The Political Economy of Infrastructure Development In and Around Southeastern Europe -- Conclusions and Policy Directions
    Abstract: Introduction -- Greece's New Strategic Environment -- Balkan Security After the Fall of Milosevic: Challenges and Implications for Greece -- The Political Economy of Infrastructure Development In and Around Southeastern Europe -- Conclusions and Policy Directions
    Note: Includes bibliographical references (pages 113-123) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Santa Monica, CA : Rand
    ISBN: 9780833030528 , 0833032321 , 0833030523 , 9780833032324
    Language: English
    Pages: 1 Online-Ressource (xxiv, 138 pages)
    Edition: [S.l.] HathiTrust Digital Library 2010 Electronic reproduction
    Series Statement: Online Rand research documents
    Parallel Title: Print version Trends in outside support for insurgent movements
    DDC: 322.4/2
    Keywords: World politics 1989- ; Insurgency ; World politics ; Insurgency ; POLITICAL SCIENCE ; Security (National & International) ; Insurgency ; World politics ; Révolutions ; 1970-2000 ; Relations internationales ; 1989- ; Révoltes ; Political Theory of the State ; Political Science ; Law, Politics & Government ; POLITICAL SCIENCE ; Political Process ; Political Advocacy ; Electronic books
    Abstract: State Support For Insurgencies -- Diaspora Support For Insurgencies -- Refugee Support For Insurgencies -- Other Non-State Supporters Of Insurgencies -- Assessing The Impact Of External Support -- Implications For The Analysis Of Insurgency -- Appendix A. Outside Support For Insurgencies, 1991-2000 -- Appendix B. The LTTE's Military-Related Procurement
    Abstract: State Support For Insurgencies -- Diaspora Support For Insurgencies -- Refugee Support For Insurgencies -- Other Non-State Supporters Of Insurgencies -- Assessing The Impact Of External Support -- Implications For The Analysis Of Insurgency -- Appendix A. Outside Support For Insurgencies, 1991-2000 -- Appendix B. The LTTE's Military-Related Procurement
    Note: "MR-1405-OTI"--Page 4 of cover , "Prepared for the Office of Transnational Issues, National Security Research Division , Includes bibliographical references (pages 123-138) , Use copy Restrictions unspecified star MiAaHDL , Electronic reproduction , Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...