In From Mandate to Blueprint, Thomas Fingar offers a guide for new federal government appointees faced with the complex task of rebuilding institutions and transitioning to a new administration. Synthesizing his own experience implementing the most comprehensive reforms to the national security establishment since 1947, Fingar provides crucial guidance to newly appointed officials. When Fingar was appointed the first Deputy Director of National Intelligence for Analysis in 2005, he discovered the challenges of establishing a new federal agency and implementing sweeping reforms of intelligence procedure and performance. The mandate required prompt action but provided no guidance on how to achieve required and desirable changes. Fingar describes how he defined and prioritized the tasks involved in building and staffing a new organization, integrating and improving the work of sixteen agencies, and contending with pressure from powerful players. For appointees without the luxury of taking command of fully staffed and well-functioning federal agencies, From Mandate to Blueprint is an informed and practical guide for the challenges ahead.
A practical, global-centric view of how to make the worldwide supply chain safer, more resilient, and efficient. With more and more enterprises managing supply operations that reach farther and farther from headquarters, Supply Chain Security: International Practices and Innovations in Moving Goods Safely and Efficiently could not be more timely or well-targeted. This comprehensive two-volume set is the first look at the present and future of supply chain management, and the full range of threats to supply chain security. Each volume of Supply Chain Security focuses on a specific area: the first explores the historic context and current operational environment in which supply chain security must function. Volume Two is a look at emerging issues that includes proven, innovative steps companies and governments can take to counter the inherent risks of moving goods and people more safely and efficiently. Reflecting its subject, this resource is truly global in perspective, with contributions from 18 countries and over two-thirds of its contributors from outside the United States. No company that does business internationally should be without this essential resource.
This book provides the first systematic comparative analysis of climate security discourses. It analyses the securitisation of climate change in four different countries: USA, Germany, Turkey, and Mexico. The empirical analysis traces how specific climate-security discourses have become dominant, which actors have driven this process, what political consequences this has had and what role the broader context has played in enabling these specific securitisations. In doing so, the book outlines a new and systematic theoretical framework that distinguishes between different referent objects of securitisation (territorial, individual and planetary) and between a security and risk dimension. It thereby clarifies the ever-increasing literature on different forms of securitisation and the relationship between security, risk and politics. Whereas securitisation studies have traditionally focused on either a single country case study or a global overview, consequently failing to reconstruct detailed securitisation dynamics, this is the first book to provide a systematic comparative analysis of climate security discourses in four countries and thus closes an empirical gap in the present literature. In addition, this comparative framework allows the drawing of conclusions about the conditions for and consequences of successful securitisation based on empirical and comparative analysis rather than theoretical debate only. This book will of interest to students of climate change, environmental studies, critical security, global governance, and IR in general.
Canada is a key member of the world's most important international intelligence-sharing partnership, the Five Eyes, along with the US, the UK, New Zealand, and Australia. Until now, few scholars have looked beyond the US to study how effectively intelligence analysts support policy makers, who rely on timely, forward-thinking insights to shape high-level foreign, national security, and defense policy. Intelligence Analysis and Policy Making provides the first in-depth look at the relationship between intelligence and policy in Canada. Thomas Juneau and Stephanie Carvin, both former analysts in the Canadian national security sector, conducted seventy in-depth interviews with serving and retired policy and intelligence practitioners, at a time when Canada's intelligence community underwent sweeping institutional changes. Juneau and Carvin provide critical recommendations for improving intelligence performance in supporting policy—with implications for other countries that, like Canada, are not superpowers but small or mid-sized countries in need of intelligence that supports their unique interests.
War 2.0: Irregular Warfare in the Information Age argues that two intimately connected grassroots trends—the rise of insurgencies and the rise of the web—are putting modern armies under huge pressure to adapt new forms of counterinsurgency to new forms of social war. After the U.S. military—transformed into a lean, lethal, computerized force—faltered in Iraq after 2003, a robust insurgency arose. Counterinsurgency became a social form of war—indeed, the U.S. Army calls it "armed social work"—in which the local population was the center of gravity and public opinion at home the critical vulnerability. War 2.0 traces the contrasting ways in which insurgents and counterinsurgents have adapted irregular conflict to novel media platforms. It examines the public affairs policies of the U.S. land forces, the British Army, and the Israel Defense Forces. Then, it compares the media-related counterinsurgency methods of these conventional armies with the methods devised by their irregular adversaries, showing how such organizations as al-Qaeda, the Taliban, and Hezbollah use the web, not merely to advertise their political agenda and influence public opinion, but to mobilize a following and put violent ideas into action.
For more than forty years, the United States has maintained a public commitment to nuclear disarmament, and every president from Ronald Reagan to Barack Obama has gradually reduced the size of America's nuclear forces. Yet even now, over two decades after the end of the Cold War, the United States maintains a huge nuclear arsenal on high alert and ready for war. The Americans, like the Russians, the Chinese, and other major nuclear powers, continue to retain a deep faith in the political and military value of nuclear force, and this belief remains enshrined at the center of U.S. defense policy regardless of the radical changes that have taken place in international politics. In No Use, national security scholar Thomas M. Nichols offers a lucid, accessible reexamination of the role of nuclear weapons and their prominence in U.S. security strategy. Nichols explains why strategies built for the Cold War have survived into the twenty-first century, and he illustrates how America's nearly unshakable belief in the utility of nuclear arms has hindered U.S. and international attempts to slow the nuclear programs of volatile regimes in North Korea and Iran. From a solid historical foundation, Nichols makes the compelling argument that to end the danger of worldwide nuclear holocaust, the United States must take the lead in abandoning unrealistic threats of nuclear force and then create a new and more stable approach to deterrence for the twenty-first century.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.