Search results for: securing-the-state

Securing the State

Author : David Omand
File Size : 40.26 MB
Format : PDF, ePub
Download : 562
Read : 494
Download »
Governments recognise that national security in the turbulent conditions of the early twenty-first century must centre on the creation of public confidence that normal life can continue even in the face of threats such as terrorism and proliferation, and of natural hazards such as pandemics and climate change. Based on his own experience in government, David Omand argues that while public security is vital for good government, the effects of bad government will result from failure to maintain the right relationship between justice, liberty, privacy, civic harmony and security measures. His book examines in detail how secret intelligence helps governments to deliver security, but also risks raising public concern over its methods. A set of ethical principles is proposed to guide intelligence and security work within the framework of human rights. Securing the State provides a new way of thinking about the cycle of activities that generates secret intelligence, examines the issues that arise from the way that modern intelligence uses technology to access new sources of information, and discusses how the meaning of intelligence can best be elucidated. The limits of intelligence in enabling greater security are explored, especially in guiding government in a world in which we must learn not to be surprised by surprise. Illustrated throughout by historical examples, David Omand provides new perspectives for practitioners and those teaching security and intelligence studies and for a wider readership offers an accessible introduction to pressing issues of public policy.

Securing the State

Author : Christopher P. Gibson
File Size : 51.17 MB
Format : PDF, ePub, Docs
Download : 630
Read : 422
Download »
Focusing on top civilian and military advisors within the national security establishment, this significant book looks at four case studies with a focus on civil-military relations within the US Department of Defense. It investigates whether balanced approaches produce more effective policies and outcomes than dominating structures. The culmination of Gibson's treatise is the advancement of the 'Madisonian approach' to civilian control of the military, a normative framework designed to replace Samuel Huntington's 'Objective Control' model and also the 'Subjective Control' model, initially practised by Defense Secretary Robert McNamara and most recently by Defense Secretary Donald Rumsfeld. The Madisonian approach calls for changes in US law and new norms to guide the interactions of key participants who populate the civil-military nexus. This book is destined to influence US strategic thinking and should be added to the syllabus of courses in civil-military relations, strategic studies and military history. Given the struggling US policy in Iraq, the time is right for a critical review of US civil-military relations and this book provides the departure point for analysis and a potential way forward.

Securing The State

Author : David Omand
File Size : 26.42 MB
Format : PDF
Download : 544
Read : 950
Download »
Governments recognise that national security in the turbulent conditions of the early twenty-first century must centre on the creation of public confidence that normal life can continue even in the face of threats such as terrorism and proliferation, and of natural hazards such as pandemics and climate change. Based on his own experience in government, David Omand argues that while public security is vital for good government, the effects of bad government will result from failure to maintain the right relationship between justice, liberty, privacy, civic harmony and security measures. His book examines in detail how secret intelligence helps governments to deliver security, but also risks raising public concern over its methods. A set of ethical principles is proposed to guide intelligence and security work within the framework of human rights. Securing the State provides a new way of thinking about the cycle of activities that generates secret intelligence, examines the issues that arise from the way that modern intelligence uses technology to access new sources of information, and discusses how the meaning of intelligence can best be elucidated. The limits of intelligence in enabling greater security are explored, especially in guiding government in a world in which we must learn not to be surprised by surprise. Illustrated throughout by historical examples, David Omand provides new perspectives for practitioners and those teaching security and intelligence studies and for a wider readership offers an accessible introduction to pressing issues of public policy.

Human Rights Human Security and State Security The Intersection 3 volumes

Author : Saul Takahashi
File Size : 76.54 MB
Format : PDF, Docs
Download : 608
Read : 569
Download »
This book provides innovative thinking from a variety of perspectives on the important human rights, human security, and national security policy issues of today—and how these issues intersect. • Provides insightful, informed viewpoints by scholars as well as policy makers and practitioners on human rights, human security, and national security, and how these three areas intersect • Supplies innovative, even provocative thinking on the important issues facing national and international policy makers • Offers diverse opinion essays by experts from a wide range of disciplines, supplying a balanced approach to the complex issues rather than a one-dimensional view • Examines the intersections of topics such as poverty, migration, drug control, terrorism, environmental security, and international crime with human rights, human security, and national security policy issues

Securing the Communist State

Author : Liesbeth van de Grift
File Size : 59.86 MB
Format : PDF, ePub
Download : 414
Read : 1207
Download »
From Berlin to Bucharest, from Warsaw to Sofia, Soviet tanks crossed national borders across East Central Europe at the end of the Second World War. The arrival of the Red Army marked an important turn in history. Within only a few years, the often unpopular communist parties developed into political organizations with mass followings. They managed to seize power, eliminate political opposition to their rule, and purge the state apparatus of undesirable personnel. In Securing the Communist State, Liesbeth van de Grift provides a new understanding of these organizations using recently disclosed material from the communist archives in Berlin and Bucharest. She reveals how these communist parties gained control over the security apparatus after 1945 in East Central Europe from a transitional justice perspective, focusing on purges and personnel policies. This book shows that the personal break after 1945 was not as radical as is often thought.

The State of the National Security State

Author :
File Size : 43.45 MB
Format : PDF, ePub, Mobi
Download : 903
Read : 838
Download »
The 1947 National Security Act established the basis for the American national security state in the Cold War. The fundamental framework of that state still exists over a decade after the fall of the Berlin Wall. Should it continue, particularly in the aftermath of the 11 September 2001 terrorist attacks? If not, why not, and how should it be altered? The purpose of this article is to set the stage for answering these questions. Two themes dominate. The first involves the proper mix of change and continuity, a key concern in a transitional period. This theme is examined against the backdrop of three interconnected aspects of American history since 1945: core US national interests; the concept of US national security and its foreign and domestic components envisioned as serving those interests; and the US grand strategy designed to support the concept of national security. The second theme is on the form and function of government: How well since the onset of the Cold War has the form of US government functioned in order to meet the requirements of US grand strategy designed to further America's core interests?

State Security and Regime Security

Author : Y. Hong
File Size : 31.97 MB
Format : PDF
Download : 137
Read : 1049
Download »
This book examines the interaction between state security and regime security in South Korea in the period 1953-60 under the leadership of President Syngman Rhee.

The State and Security in Mexico

Author : Brian J. Bow
File Size : 74.21 MB
Format : PDF, ePub
Download : 728
Read : 1125
Download »
At the turn of the millennium, Mexico seemed to have finally found its path to political and economic modernization; a state which had been deeply embedded in society was being pulled out, with new political leaders allowing market forces to play a greater role in guiding the nation's economic development, and allowing old patron-client networks to crumble. At the same time, many hoped that political and legal reforms would increase the state's capacity to provide prosperity, security, and equity for its citizens. In the midst of this historic transformation, however, Mexico was confronted with an urgent new policy challenge. Internationally recognized experts from the academic and think-tank communities in the United States, Mexico, and Canada consider the origins of the current crisis in Mexico, and the nature and effectiveness of the Calderón government's response. Simply not another book on North American regional security, this volume uses Joel Migdal's concept of "the state in society" to provide a refreshingly clear and accessible exploration of political change in the developing world. The engagement with the US and Canada gives the reader a chance to observe the dynamics of persuasion across the developmental divide. Four key questions structure the study: What does the ongoing security crisis in Mexico tell us about the changing role of the state in society there? What does the changing role of the state tell us about the nature (and intractability) of the crisis? How has the transition to democracy affected the links between the state and organized crime in Mexico, and the state's capacity to contain non-state challengers? What kinds of political and legal reforms are called for, and what effects can we expect them to have on the extent and intensity of violence in Mexico? No other study comprehensively uncovers new conceptual and theoretical insights in each of these areas whilst offering some practical guidance for policy-makers and publics seeking to understand these urgent and complex challenges.

Globalization and the National Security State

Author : Norrin M. Ripsman
File Size : 77.65 MB
Format : PDF, Kindle
Download : 475
Read : 168
Download »
Introduction: national security state in the era of globalization -- Globalization and national security: key propositions -- The global security environment -- The major powers -- States in stable regions -- States in regions of enduring rivalry -- Weak and failing states -- Conclusion: state adaptation to a new global environment.

Whose National Security

Author : Gary William Kinsman
File Size : 30.52 MB
Format : PDF, ePub, Mobi
Download : 470
Read : 1056
Download »
Would you believe that RCMP operatives used to spy on Tupperware parties? In the 1950s and ’60s they did. They also monitored high school students, gays and lesbians, trade unionists, left-wing political groups, feminists, consumer’s associations, Black activists, First Nations people, and Quebec sovereignists. The establishment of a tenacious Canadian security state came as no accident. On the contrary, the highest levels of government and the police, along with non-governmental interests and institutions, were involved in a concerted campaign. The security state grouped ordinary Canadians into dozens of political stereotypes and labelled them as threats. Whose National Security? probes the security state’s ideologies and hidden agendas, and sheds light on threats to democracy that persist to the present day. The contributors’ varied approaches open up avenues for reconceptualizing the nature of spying. Including: * "APEC Days at UBC: Student Protests and National Security in an Era of Trade Liberalization," Karen Pearlston * "Remembering Federal Police Surveillance in Quebec, 1940s-70s," Madeleine Parent * "The Red Petticoat Brigade: Mine Mill Women's Auxiliaries and the Threat from Within, 1940s-70s," Mercedes Steedman * "Spymasters, Spies, and their Subjects: The RCMP and Canadian State Repression, 1914-39," Gregory S. Kealey * "In Whose Public Interest? The Canadian Union of Postal Workers and National Security," Evert Hoogers

Ontological Security in International Relations

Author : Brent J. Steele
File Size : 71.3 MB
Format : PDF
Download : 577
Read : 1261
Download »
The central assertion of this book is that states pursue social actions to serve self-identity needs, even when these actions compromise their physical existence. Three forms of social action, sometimes referred to as ‘motives’ of state behaviour (moral, humanitarian, and honour-driven) are analyzed here through an ontological security approach. Brent J. Steele develops an account of social action which interprets these behaviours as fulfilling a nation-state's drive to secure self-identity through time. The anxiety which consumes all social agents motivates them to secure their sense of being, and thus he posits that transformational possibilities exist in the ‘Self’ of a nation-state. The volume consequently both challenges and complements realist, liberal, constructivist and post-structural accounts to international politics. Using ontological security to interpret three cases - British neutrality during the American Civil War (1861-1865), Belgium’s decision to fight Germany in 1914, and NATO’s (1999) Kosovo intervention - the book concludes by discussing the importance for self-interrogation in both the study and practice of international relations. Ontological Security in International Relations will be of particular interest to students and researchers of international politics, international ethics, international relations and security studies.

Danger Development and Legitimacy in East Asian Maritime Politics

Author : Christian Wirth
File Size : 41.54 MB
Format : PDF, ePub, Docs
Download : 594
Read : 637
Download »
Grounded in extensive empirical research, Danger, Development and Legitimacy in East Asian Maritime Politics addresses the major issues of geopolitics in the region that have been and will continue to shape the international politics of the Asia-Pacific for years to come. Covering the nation-states of China, Japan and South Korea, it includes an examination of the key island disputes, as well as analysis of the North Korea–South Korea clashes in the Yellow Sea, controversies in Japan’s relations with both Koreas and the so-called ‘history disputes’, including recognition of World War II atrocities across the region. In doing so, this book explores a range of themes from the ecological environment to the globalized nature of shipping and therein links the East Asian maritime sphere directly to the dynamics and developments in the domestic politics of each country. Thus, it serves to demonstrate how several controversial debates in the international politics of the Asia-Pacific are ultimately and inextricably intertwined. A timely contribution that furthers our understanding of contemporary politics of the Asia-Pacific, this book will be of great interest to students and scholars of Asian politics, international relations and the Asia-Pacific region in general.

Qatar

Author : David B. Roberts
File Size : 85.96 MB
Format : PDF, ePub, Docs
Download : 814
Read : 459
Download »
Rarely has a state changed its character so completely in so short a period of time. Previously content to play a role befitting its small size, Qatar was a traditional, risk-averse Gulf monarchy until the early 1990s. A bloodless coup in 1995 brought to power an emerging elite with a progressive vision for the future. Financed by gas exports and protected by a US security umbrella, Qatar diversified its foreign relations to include Iran and Israel, established the satellite broadcaster Al Jazeera, assumed a leading role in international mediation, and hosted a number of top-level sporting tournaments, culminating in the successful FIFA World Cup 2022 bid. Qatar's disparate, often misunderstood, policies coalesce to propagate a distinct brand. Whether to counter regional economic competitors or to further tie Qatar to the economies of the world's leading countries, this brand is de- signed innovatively to counter a range of security concerns; in short, Qatar is diversifying its dependencies. Qatar's prominent role in the Arab Spring follows a similar pattern, yet the gamble it is taking in supporting Islamists and ousting dictators is potentially dangerous: not only is it at risk from 'blowback' in dealing with such actors, but a lack of transparency means that clich�s and assumptions threaten to derail "brand Qatar."

Security Governance and State Fragility in South Africa

Author : Edward L Mienie
File Size : 35.23 MB
Format : PDF, Docs
Download : 887
Read : 157
Download »
Do existing measures of state fragility measure fragility accurately? Based on commonly used fragility measures, South Africa (SA) is classified as a relatively stable state, yet rising violent crime, high unemployment, endemic poverty, eroding public trust, identity group based preferential treatment policies, and the rapid rise of the private security sector are all indications that SA may be suffering from latent state fragility. Based on a comprehensive view of security, this study examines the extent to which measures of political legitimacy and good governance, effectiveness in the security system - especially with respect to the police system - and mounting economic challenges may be undermining the stability of SA in ways undetected by commonly used measures of state fragility. Using a mixed-methods approach based on quantitative secondary data analysis and semi-structured interviews with government officials, security practitioners, and leading experts in the field, this study finds that the combination of colonization, apartheid, liberation struggle, transition from autocracy to democracy, high levels of direct and structural violence, stagnating social, political, and economic developments make South Africa a latently fragile state. Conceptually, the results of this research call into question the validity of commonly used measures of state fragility and suggest the need for a more comprehensive approach to assessing state fragility. Practically, this study offers a number of concrete policy recommendations for how South Africa may address mounting levels of latent state fragility.

China s Security State

Author : Xuezhi Guo
File Size : 31.84 MB
Format : PDF, ePub, Docs
Download : 249
Read : 272
Download »
China's Security State describes the creation, evolution, and development of Chinese security and intelligence agencies as well as their role in influencing Chinese Communist Party politics throughout the party's history. Xuezhi Guo investigates patterns of leadership politics from the vantage point of security and intelligence organization and operation by providing new evidence and offering alternative interpretations of major events throughout Chinese Communist Party history. This analysis promotes a better understanding of the CCP's mechanisms for control over both Party members and the general population. This study specifies some of the broader implications for theory and research that can help clarify the nature of Chinese politics and potential future developments in the country's security and intelligence services.

University of California Publications in Political Science

Author : University of California, Berkeley
File Size : 50.89 MB
Format : PDF, Mobi
Download : 850
Read : 910
Download »

The Oxford Handbook of International Security

Author : Alexandra Gheciu
File Size : 60.51 MB
Format : PDF, ePub
Download : 971
Read : 1272
Download »
This Oxford Handbook is the definitive volume on the state of international security and the academic field of security studies. It provides a tour of the most innovative and exciting news areas of research as well as major developments in established lines of inquiry. It presents a comprehensive portrait of an exciting field, with a distinctively forward-looking theme, focusing on the question: what does it mean to think about the future of international security? The key assumption underpinning this volume is that all scholarly claims about international security, both normative and positive, have implications for the future. By examining international security to extract implications for the future, the volume provides clarity about the real meaning and practical implications for those involved in this field. Yet, contributions to this volume are not exclusively forecasts or prognostications, and the volume reflects the fact that, within the field of security studies, there are diverse views on how to think about the future. Readers will find in this volume some of the most influential mainstream (positivist) voices in the field of international security as well as some of the best known scholars representing various branches of critical thinking about security. The topics covered in the Handbook range from conventional international security themes such as arms control, alliances and Great Power politics, to "new security" issues such as global health, the roles of non-state actors, cyber-security, and the power of visual representations in international security. The Oxford Handbooks of International Relations is a twelve-volume set of reference books offering authoritative and innovative engagements with the principal sub-fields of International Relations. The series as a whole is under the General Editorship of Christian Reus-Smith of the University of Queensland and Duncan Snidal of the University of Oxford, with each volume edited by a distinguished pair of specialists in their respective fields. The series both surveys the broad terrain of International Relations scholarship and reshapes it, pushing each sub-field in challenging new directions. Following the example of the original Reus-Smit and Snidal The Oxford Handbook of International Relations, each volume is organized around a strong central thematic by a pair of scholars drawn from alternative perspectives, reading its sub-field in an entirely new way, and pushing scholarship in challenging new directions.

Code of Federal Regulations

Author :
File Size : 57.89 MB
Format : PDF, Docs
Download : 984
Read : 879
Download »
Special edition of the Federal Register, containing a codification of documents of general applicability and future effect ... with ancillaries.

Saving the Security State

Author : Inderpal Grewal
File Size : 82.94 MB
Format : PDF, ePub, Mobi
Download : 732
Read : 1304
Download »
In Saving the Security State Inderpal Grewal traces the changing relations between the US state and its citizens in an era she calls advanced neoliberalism. Marked by the decline of US geopolitical power, endless war, and increasing surveillance, advanced neoliberalism militarizes everyday life while producing the “exceptional citizens”—primarily white Christian men who reinforce the security state as they claim responsibility for protecting the country from racialized others. Under advanced neoliberalism, Grewal shows, others in the United States strive to become exceptional by participating in humanitarian projects that compensate for the security state's inability to provide for the welfare of its citizens. In her analyses of microfinance programs in the global South, security moms, the murders at a Sikh temple in Wisconsin, and the post-9/11 crackdown on Muslim charities, Grewal exposes the fissures and contradictions at the heart of the US neoliberal empire and the centrality of race, gender, and religion to the securitized state.

Israeli Statecraft

Author : Yehezkel Dror
File Size : 80.71 MB
Format : PDF
Download : 588
Read : 799
Download »
This book offers a systematic examination, analysis and evaluation of Israeli national security statecraft in terms of challenges and responses. Providing an in-depth analysis of Israeli statecraft challenges and responses, this interdisciplinary book integrates social science and security studies with public policy approaches within a long-term historical perspective on the Arab-Israeli conflict. These scholarly approaches are synthesized with extensive personal knowledge of the author based on involvement in Israeli political-security policy making. This book makes use of conceptualizations of statecraft such as 'fuzzy gambling' and interventions with critical mass in ultra-dynamic historical processes to help clarify Israel's main statecraft successes and failures, alongside the wider theoretical apparatuses these concepts represent. While focused on Israel, these theoretical frameworks have important implications for the academic study of statecraft and statecraft praxis worldwide. This book will be of much interest to both statecraft practitioners and to students of Israeli politics and security, the Middle Eastern conflict, strategic studies and IR/security studies in general.