Harvey Molotch
- Published in print:
- 2014
- Published Online:
- October 2017
- ISBN:
- 9780691163581
- eISBN:
- 9781400852338
- Item type:
- book
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691163581.001.0001
- Subject:
- Political Science, Security Studies
The inspections we put up with at airport gates and the endless warnings we get at train stations, on buses, and all the rest are the way we encounter the vast apparatus of U.S. security. Like the ...
More
The inspections we put up with at airport gates and the endless warnings we get at train stations, on buses, and all the rest are the way we encounter the vast apparatus of U.S. security. Like the wars fought in its name, these measures are supposed to make us safer in a post-9/11 world. But do they? This book explains how these regimes of command-and-control not only annoy and intimidate but are counterproductive. The book takes the reader through the sites, the gizmos, and the politics to urge greater trust in basic citizen capacities—along with smarter design of public spaces. The book criticizes a range of security structures and protocols: airport security that requires body searches while generating long lines of queuing people; New Orleans water projects that precipitated the Hurricane Katrina flood, and the militarized disaster response that further endangered residents; even gender-segregated public restrooms. The book recommends simple improvements, from better structural design and signage to assist evacuations to customer-service procedures that help employees to spot trouble. More so, it argues for a shift away from command and control toward a security philosophy that empowers ordinary people to handle crises. The result is a far-reaching re-examination of the culture of public fear.Less
The inspections we put up with at airport gates and the endless warnings we get at train stations, on buses, and all the rest are the way we encounter the vast apparatus of U.S. security. Like the wars fought in its name, these measures are supposed to make us safer in a post-9/11 world. But do they? This book explains how these regimes of command-and-control not only annoy and intimidate but are counterproductive. The book takes the reader through the sites, the gizmos, and the politics to urge greater trust in basic citizen capacities—along with smarter design of public spaces. The book criticizes a range of security structures and protocols: airport security that requires body searches while generating long lines of queuing people; New Orleans water projects that precipitated the Hurricane Katrina flood, and the militarized disaster response that further endangered residents; even gender-segregated public restrooms. The book recommends simple improvements, from better structural design and signage to assist evacuations to customer-service procedures that help employees to spot trouble. More so, it argues for a shift away from command and control toward a security philosophy that empowers ordinary people to handle crises. The result is a far-reaching re-examination of the culture of public fear.
Stig Jarle Hansen
- Published in print:
- 2013
- Published Online:
- September 2014
- ISBN:
- 9780199327874
- eISBN:
- 9780199388103
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199327874.001.0001
- Subject:
- Political Science, Security Studies
This book explores the history of the Somalia based Al Harakat Al Shabaab from 2005 to 2012, offering the first in-detail history of one of the most important Al-Qaeda affiliates today and the first ...
More
This book explores the history of the Somalia based Al Harakat Al Shabaab from 2005 to 2012, offering the first in-detail history of one of the most important Al-Qaeda affiliates today and the first to conquer large territories. It anchors the organization in its local context, describing it as set in the nexus of global and local streams of influence, employing terror strategically, often in order to offset diplomatic and military defeats. Al-Shabaab gained popularity because of its emphasis on justice, and its alignment with Somali nationalism, but still was influenced by global trends within Islamism and jihadism. This book follows Al-Shabaab in all its phases: as an early network, through its membership in the Sharia courts, through its guerrilla wars against the Ethiopians, through its expansion and attempts to govern central Somalia, into the post-2010 phase where it struggles against a superior enemy but still remains an actor to be reckoned with. The book concludes in 2013 and thus gives excellent background the Westgate attack in 2013. A separate chapter tackles the increasing regional influence of Al-Shabaab, tracing the trend back to 2009 when it employed a large number of Kenyans, through the gradual increase of Swahili propaganda, and the wave of terror attacks inside Kenya since Kenya intervened in Somalia In 2011. It also studies Al-Shabaab activities in Ethiopia, Uganda and Tanzania.Less
This book explores the history of the Somalia based Al Harakat Al Shabaab from 2005 to 2012, offering the first in-detail history of one of the most important Al-Qaeda affiliates today and the first to conquer large territories. It anchors the organization in its local context, describing it as set in the nexus of global and local streams of influence, employing terror strategically, often in order to offset diplomatic and military defeats. Al-Shabaab gained popularity because of its emphasis on justice, and its alignment with Somali nationalism, but still was influenced by global trends within Islamism and jihadism. This book follows Al-Shabaab in all its phases: as an early network, through its membership in the Sharia courts, through its guerrilla wars against the Ethiopians, through its expansion and attempts to govern central Somalia, into the post-2010 phase where it struggles against a superior enemy but still remains an actor to be reckoned with. The book concludes in 2013 and thus gives excellent background the Westgate attack in 2013. A separate chapter tackles the increasing regional influence of Al-Shabaab, tracing the trend back to 2009 when it employed a large number of Kenyans, through the gradual increase of Swahili propaganda, and the wave of terror attacks inside Kenya since Kenya intervened in Somalia In 2011. It also studies Al-Shabaab activities in Ethiopia, Uganda and Tanzania.
Frank L. III Smith
- Published in print:
- 2014
- Published Online:
- August 2016
- ISBN:
- 9780801452710
- eISBN:
- 9780801455162
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801452710.001.0001
- Subject:
- Political Science, Security Studies
Biological weapons have threatened U.S. national security since at least World War II. Historically, however, the U.S. military has neglected research, development, acquisition, and doctrine for ...
More
Biological weapons have threatened U.S. national security since at least World War II. Historically, however, the U.S. military has neglected research, development, acquisition, and doctrine for biodefense. Following September 11 and the anthrax letters of 2001, the United States started spending billions of dollars per year on medical countermeasures and biological detection systems. But most of this funding now comes from the Department of Health and Human Services rather than the Department of Defense. Why has the U.S. military neglected biodefense and allowed civilian organizations to take the lead in defending the country against biological attacks? This book addresses this puzzling and largely untold story about science, technology, and national security. The book argues that organizational frames and stereotypes have caused both military neglect and the rise of civilian biodefense. In the armed services, influential ideas about kinetic warfare have undermined defense against biological warfare. The influence of these ideas on science and technology challenges the conventional wisdom that national security policy is driven by threats or bureaucratic interests. Given the ideas at work inside the U.S. military, the book explains how the lessons learned from biodefense can help solve other important problems that range from radiation weapons to cyber attacks.Less
Biological weapons have threatened U.S. national security since at least World War II. Historically, however, the U.S. military has neglected research, development, acquisition, and doctrine for biodefense. Following September 11 and the anthrax letters of 2001, the United States started spending billions of dollars per year on medical countermeasures and biological detection systems. But most of this funding now comes from the Department of Health and Human Services rather than the Department of Defense. Why has the U.S. military neglected biodefense and allowed civilian organizations to take the lead in defending the country against biological attacks? This book addresses this puzzling and largely untold story about science, technology, and national security. The book argues that organizational frames and stereotypes have caused both military neglect and the rise of civilian biodefense. In the armed services, influential ideas about kinetic warfare have undermined defense against biological warfare. The influence of these ideas on science and technology challenges the conventional wisdom that national security policy is driven by threats or bureaucratic interests. Given the ideas at work inside the U.S. military, the book explains how the lessons learned from biodefense can help solve other important problems that range from radiation weapons to cyber attacks.
Robert Pfaltzgraff and Jacquelyn Davis
- Published in print:
- 2013
- Published Online:
- November 2015
- ISBN:
- 9780231166225
- eISBN:
- 9780231535946
- Item type:
- book
- Publisher:
- Columbia University Press
- DOI:
- 10.7312/columbia/9780231166225.001.0001
- Subject:
- Political Science, Security Studies
This volume offers alternative models for assessing the challenges of a nuclear Iran for U.S. security. It is based on the assumption that Iran will soon obtain nuclear weapons. Through three ...
More
This volume offers alternative models for assessing the challenges of a nuclear Iran for U.S. security. It is based on the assumption that Iran will soon obtain nuclear weapons. Through three different scenarios, the book explores the political, strategic, and operational challenges facing the United States in a post-Cold War world. It assesses the type of nuclear capability Iran might develop and the conditions under which Iran might resort to threatening or actually to using such weapons. It looks at the extent to which Iran's military strategy and declaratory policy might embolden Iran and its proxies to pursue more aggressive policies in the region and vis-à-vis the United States. It also assesses Iran's ability to transfer nuclear materials to others within and outside the region, which might spark a nuclear cascade. Drawing on recent post-Cold War deterrence theory, it considers Iran's nuclear ambitions as they relate to its foreign policy objectives, domestic politics and role in the Islamic world. It also suggests specific approaches to improve U.S. defense and deterrence planning.Less
This volume offers alternative models for assessing the challenges of a nuclear Iran for U.S. security. It is based on the assumption that Iran will soon obtain nuclear weapons. Through three different scenarios, the book explores the political, strategic, and operational challenges facing the United States in a post-Cold War world. It assesses the type of nuclear capability Iran might develop and the conditions under which Iran might resort to threatening or actually to using such weapons. It looks at the extent to which Iran's military strategy and declaratory policy might embolden Iran and its proxies to pursue more aggressive policies in the region and vis-à-vis the United States. It also assesses Iran's ability to transfer nuclear materials to others within and outside the region, which might spark a nuclear cascade. Drawing on recent post-Cold War deterrence theory, it considers Iran's nuclear ambitions as they relate to its foreign policy objectives, domestic politics and role in the Islamic world. It also suggests specific approaches to improve U.S. defense and deterrence planning.
Dina Rezk
- Published in print:
- 2017
- Published Online:
- January 2018
- ISBN:
- 9780748698912
- eISBN:
- 9781474435253
- Item type:
- book
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9780748698912.001.0001
- Subject:
- Political Science, Security Studies
This book addresses a critical question embedded within a heated debate about the ‘failure’ of American intelligence in a post 9/11 age: have Western experts in some fundamental way failed to ...
More
This book addresses a critical question embedded within a heated debate about the ‘failure’ of American intelligence in a post 9/11 age: have Western experts in some fundamental way failed to understand the dynamics, leaders and culture of the Middle East? Looking back in recent history through a series of seminal case studies culminating in Sadat’s dramatic assassination, this monograph explores whether, how and why the most knowledgeable and powerful intelligence agencies in the world have been so notoriously caught off guard in this region.
The story begins after the tripartite invasion of the Suez Canal in 1956 which triggered a ripple of ideological and geopolitical transformations that continue to shape the politics and borders of the modern Middle East. Revolutions swept across Syria, Iraq and Yemen; the three devastating Arab-Israeli wars ravaged the holy lands; and finally, a fraught and contested bilateral treaty bound Egypt and Israel to uneasy peace. The West and the Soviet Union vied for control over the Middle East’s destiny through its political centre, Egypt. The transition from Gamal Abdel Nasser to Anwar el Sadat witnessed the decline of an ardently anti-imperialist Arab nationalism, supplanted by a radical quest to realign Egypt’s identity towards the Western world.
As revolutionary turmoil and conflict continue to unfold throughout the Middle East today, The Arab World and Western Intelligence is the untold story of how the British and American intelligence services have anticipated and reacted to crisis and upheaval in the region’s recent history.Less
This book addresses a critical question embedded within a heated debate about the ‘failure’ of American intelligence in a post 9/11 age: have Western experts in some fundamental way failed to understand the dynamics, leaders and culture of the Middle East? Looking back in recent history through a series of seminal case studies culminating in Sadat’s dramatic assassination, this monograph explores whether, how and why the most knowledgeable and powerful intelligence agencies in the world have been so notoriously caught off guard in this region.
The story begins after the tripartite invasion of the Suez Canal in 1956 which triggered a ripple of ideological and geopolitical transformations that continue to shape the politics and borders of the modern Middle East. Revolutions swept across Syria, Iraq and Yemen; the three devastating Arab-Israeli wars ravaged the holy lands; and finally, a fraught and contested bilateral treaty bound Egypt and Israel to uneasy peace. The West and the Soviet Union vied for control over the Middle East’s destiny through its political centre, Egypt. The transition from Gamal Abdel Nasser to Anwar el Sadat witnessed the decline of an ardently anti-imperialist Arab nationalism, supplanted by a radical quest to realign Egypt’s identity towards the Western world.
As revolutionary turmoil and conflict continue to unfold throughout the Middle East today, The Arab World and Western Intelligence is the untold story of how the British and American intelligence services have anticipated and reacted to crisis and upheaval in the region’s recent history.
Paul D. Miller
- Published in print:
- 2013
- Published Online:
- August 2016
- ISBN:
- 9780801451492
- eISBN:
- 9780801469541
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801451492.001.0001
- Subject:
- Political Science, Security Studies
Since 1898, the United States and the United Nations have deployed military force more than three dozen times in attempts to rebuild failed states. Currently there are more state-building campaigns ...
More
Since 1898, the United States and the United Nations have deployed military force more than three dozen times in attempts to rebuild failed states. Currently there are more state-building campaigns in progress than at any time in the past century—including Afghanistan, Bosnia, Kosovo, the Democratic Republic of Congo, Haiti, Sudan, Liberia, Cote d’Ivoire, and Lebanon—and the number of candidate nations for such campaigns in the future is substantial. Even with a broad definition of success, earlier campaigns failed more than half the time. This book looks at the question of what causes armed, international state-building campaigns by liberal powers to succeed or fail. The United States successfully rebuilt the West German and Japanese states after World War II but failed to build a functioning state in South Vietnam. After the Cold War the United Nations oversaw relatively successful campaigns to restore order, hold elections, and organize post-conflict reconstruction in Mozambique, Namibia, Nicaragua, and elsewhere, but those successes were overshadowed by catastrophes in Angola, Liberia, and Somalia. The recent effort in Iraq and the ongoing one in Afghanistan are yielding mixed results, despite the high levels of resources dedicated and the long duration of the missions there. The book outlines different types of state failure, analyzes various levels of intervention that liberal states have tried in the state-building process, and distinguishes among the various failures and successes those efforts have provoked.Less
Since 1898, the United States and the United Nations have deployed military force more than three dozen times in attempts to rebuild failed states. Currently there are more state-building campaigns in progress than at any time in the past century—including Afghanistan, Bosnia, Kosovo, the Democratic Republic of Congo, Haiti, Sudan, Liberia, Cote d’Ivoire, and Lebanon—and the number of candidate nations for such campaigns in the future is substantial. Even with a broad definition of success, earlier campaigns failed more than half the time. This book looks at the question of what causes armed, international state-building campaigns by liberal powers to succeed or fail. The United States successfully rebuilt the West German and Japanese states after World War II but failed to build a functioning state in South Vietnam. After the Cold War the United Nations oversaw relatively successful campaigns to restore order, hold elections, and organize post-conflict reconstruction in Mozambique, Namibia, Nicaragua, and elsewhere, but those successes were overshadowed by catastrophes in Angola, Liberia, and Somalia. The recent effort in Iraq and the ongoing one in Afghanistan are yielding mixed results, despite the high levels of resources dedicated and the long duration of the missions there. The book outlines different types of state failure, analyzes various levels of intervention that liberal states have tried in the state-building process, and distinguishes among the various failures and successes those efforts have provoked.
Kevin P. Gallagher
- Published in print:
- 2012
- Published Online:
- August 2016
- ISBN:
- 9780801450907
- eISBN:
- 9780801465758
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801450907.001.0001
- Subject:
- Political Science, Security Studies
Nuclear technology is dual use in nature, meaning that it can be used to produce nuclear energy or to build nuclear weapons. Despite security concerns about proliferation, the United States and other ...
More
Nuclear technology is dual use in nature, meaning that it can be used to produce nuclear energy or to build nuclear weapons. Despite security concerns about proliferation, the United States and other nuclear nations have regularly shared with other countries nuclear technology, materials, and knowledge for peaceful purposes. This book argues that governments use peaceful nuclear assistance as a tool of economic statecraft. Nuclear suppliers hope that they can reap the benefits of foreign aid—improving relationships with their allies, limiting the influence of their adversaries, enhancing their energy security by gaining favorable access to oil supplies—without undermining their security. By providing peaceful nuclear assistance, however, countries inadvertently help spread nuclear weapons. This book draws on several cases of “Atoms for Peace,” including U.S. civilian nuclear assistance to Iran from 1957 to 1979; Soviet aid to Libya from 1975 to 1986; French, Italian, and Brazilian nuclear exports to Iraq from 1975 to 1981; and U.S. nuclear cooperation with India from 2001 to 2008. It also explores decision making in countries such as Japan, North Korea, Pakistan, South Africa, and Syria to determine why states began (or did not begin) nuclear weapons programs and why some programs succeeded while others failed. The book concludes that, on average, countries receiving higher levels of peaceful nuclear assistance are more likely to pursue and acquire the bomb—especially if they experience an international crisis after receiving aid.Less
Nuclear technology is dual use in nature, meaning that it can be used to produce nuclear energy or to build nuclear weapons. Despite security concerns about proliferation, the United States and other nuclear nations have regularly shared with other countries nuclear technology, materials, and knowledge for peaceful purposes. This book argues that governments use peaceful nuclear assistance as a tool of economic statecraft. Nuclear suppliers hope that they can reap the benefits of foreign aid—improving relationships with their allies, limiting the influence of their adversaries, enhancing their energy security by gaining favorable access to oil supplies—without undermining their security. By providing peaceful nuclear assistance, however, countries inadvertently help spread nuclear weapons. This book draws on several cases of “Atoms for Peace,” including U.S. civilian nuclear assistance to Iran from 1957 to 1979; Soviet aid to Libya from 1975 to 1986; French, Italian, and Brazilian nuclear exports to Iraq from 1975 to 1981; and U.S. nuclear cooperation with India from 2001 to 2008. It also explores decision making in countries such as Japan, North Korea, Pakistan, South Africa, and Syria to determine why states began (or did not begin) nuclear weapons programs and why some programs succeeded while others failed. The book concludes that, on average, countries receiving higher levels of peaceful nuclear assistance are more likely to pursue and acquire the bomb—especially if they experience an international crisis after receiving aid.
Sonia Ben Ouagrham-Gormley
- Published in print:
- 2014
- Published Online:
- August 2016
- ISBN:
- 9780801452888
- eISBN:
- 9780801471933
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801452888.001.0001
- Subject:
- Political Science, Security Studies
There exists the belief that with sufficient motivation and material resources, states or terrorist groups can produce bioweapons easily, cheaply, and successfully. This book challenges this ...
More
There exists the belief that with sufficient motivation and material resources, states or terrorist groups can produce bioweapons easily, cheaply, and successfully. This book challenges this perception by showing that bioweapons development is a difficult, protracted, and expensive endeavor, rarely achieving the expected results whatever the magnitude of investment. The book's findings are based on extensive interviews conducted with former U.S. and Soviet-era bioweapons scientists and on careful analysis of archival data and other historical documents related to various state and terrorist bioweapons programs. Bioweapons development relies on living organisms that are sensitive to their environment and handling conditions, and therefore behave unpredictably. These features place a greater premium on specialized knowledge. The book posits that lack of access to such intellectual capital constitutes the greatest barrier to the making of bioweapons. It integrates theories drawn from economics, the sociology of science, organization, and management with empirical research. The resulting theoretical framework rests on the idea that the pace and success of a bioweapons development program can be measured by its ability to ensure the creation and transfer of scientific and technical knowledge. The specific organizational, managerial, social, political, and economic conditions necessary for success are difficult to achieve, particularly in covert programs where the need to prevent detection imposes managerial and organizational conditions that conflict with knowledge production.Less
There exists the belief that with sufficient motivation and material resources, states or terrorist groups can produce bioweapons easily, cheaply, and successfully. This book challenges this perception by showing that bioweapons development is a difficult, protracted, and expensive endeavor, rarely achieving the expected results whatever the magnitude of investment. The book's findings are based on extensive interviews conducted with former U.S. and Soviet-era bioweapons scientists and on careful analysis of archival data and other historical documents related to various state and terrorist bioweapons programs. Bioweapons development relies on living organisms that are sensitive to their environment and handling conditions, and therefore behave unpredictably. These features place a greater premium on specialized knowledge. The book posits that lack of access to such intellectual capital constitutes the greatest barrier to the making of bioweapons. It integrates theories drawn from economics, the sociology of science, organization, and management with empirical research. The resulting theoretical framework rests on the idea that the pace and success of a bioweapons development program can be measured by its ability to ensure the creation and transfer of scientific and technical knowledge. The specific organizational, managerial, social, political, and economic conditions necessary for success are difficult to achieve, particularly in covert programs where the need to prevent detection imposes managerial and organizational conditions that conflict with knowledge production.
David Ucko and Robert Egnell
- Published in print:
- 2015
- Published Online:
- November 2015
- ISBN:
- 9780231164276
- eISBN:
- 9780231535410
- Item type:
- book
- Publisher:
- Columbia University Press
- DOI:
- 10.7312/columbia/9780231164276.001.0001
- Subject:
- Political Science, Security Studies
This book provides a detailed account of the British army's involvement in the Basra and Helmand campaigns. It looks at the contributions and limitations of traditional tactics in such settings, and ...
More
This book provides a detailed account of the British army's involvement in the Basra and Helmand campaigns. It looks at the contributions and limitations of traditional tactics in such settings, and exposes a disconcerting gap between ambitions and resources, intent and commitment. The book recounts how the British military, long considered the masters of counterinsurgency, has encountered significant problems in Iraq and Afghanistan when confronted with insurgent violence. It shows how, in its effort to apply the principles and doctrines of past campaigns, the British army has failed to prevent Basra and Helmand from descending into lawlessness, criminality, and violence. Building upon this detailed account of the Basra and Helmand campaigns, this volume provides an assessment of British military institutional adaptation in response to operations gone awry. It calls attention to the enduring effectiveness of insurgent methods and the threat posed by under-governed spaces. It underscores the need for military organizations to meet the irregular challenges of future wars in new ways.Less
This book provides a detailed account of the British army's involvement in the Basra and Helmand campaigns. It looks at the contributions and limitations of traditional tactics in such settings, and exposes a disconcerting gap between ambitions and resources, intent and commitment. The book recounts how the British military, long considered the masters of counterinsurgency, has encountered significant problems in Iraq and Afghanistan when confronted with insurgent violence. It shows how, in its effort to apply the principles and doctrines of past campaigns, the British army has failed to prevent Basra and Helmand from descending into lawlessness, criminality, and violence. Building upon this detailed account of the Basra and Helmand campaigns, this volume provides an assessment of British military institutional adaptation in response to operations gone awry. It calls attention to the enduring effectiveness of insurgent methods and the threat posed by under-governed spaces. It underscores the need for military organizations to meet the irregular challenges of future wars in new ways.
Ben Buchanan
- Published in print:
- 2017
- Published Online:
- June 2017
- ISBN:
- 9780190665012
- eISBN:
- 9780190686543
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780190665012.001.0001
- Subject:
- Political Science, Security Studies
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on ...
More
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the “security dilemma”. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.Less
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the “security dilemma”. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.