Harvey Molotch
- Published in print:
- 2014
- Published Online:
- October 2017
- ISBN:
- 9780691163581
- eISBN:
- 9781400852338
- Item type:
- book
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691163581.001.0001
- Subject:
- Political Science, Security Studies
The inspections we put up with at airport gates and the endless warnings we get at train stations, on buses, and all the rest are the way we encounter the vast apparatus of U.S. security. Like the ...
More
The inspections we put up with at airport gates and the endless warnings we get at train stations, on buses, and all the rest are the way we encounter the vast apparatus of U.S. security. Like the wars fought in its name, these measures are supposed to make us safer in a post-9/11 world. But do they? This book explains how these regimes of command-and-control not only annoy and intimidate but are counterproductive. The book takes the reader through the sites, the gizmos, and the politics to urge greater trust in basic citizen capacities—along with smarter design of public spaces. The book criticizes a range of security structures and protocols: airport security that requires body searches while generating long lines of queuing people; New Orleans water projects that precipitated the Hurricane Katrina flood, and the militarized disaster response that further endangered residents; even gender-segregated public restrooms. The book recommends simple improvements, from better structural design and signage to assist evacuations to customer-service procedures that help employees to spot trouble. More so, it argues for a shift away from command and control toward a security philosophy that empowers ordinary people to handle crises. The result is a far-reaching re-examination of the culture of public fear.Less
The inspections we put up with at airport gates and the endless warnings we get at train stations, on buses, and all the rest are the way we encounter the vast apparatus of U.S. security. Like the wars fought in its name, these measures are supposed to make us safer in a post-9/11 world. But do they? This book explains how these regimes of command-and-control not only annoy and intimidate but are counterproductive. The book takes the reader through the sites, the gizmos, and the politics to urge greater trust in basic citizen capacities—along with smarter design of public spaces. The book criticizes a range of security structures and protocols: airport security that requires body searches while generating long lines of queuing people; New Orleans water projects that precipitated the Hurricane Katrina flood, and the militarized disaster response that further endangered residents; even gender-segregated public restrooms. The book recommends simple improvements, from better structural design and signage to assist evacuations to customer-service procedures that help employees to spot trouble. More so, it argues for a shift away from command and control toward a security philosophy that empowers ordinary people to handle crises. The result is a far-reaching re-examination of the culture of public fear.
Stig Jarle Hansen
- Published in print:
- 2013
- Published Online:
- September 2014
- ISBN:
- 9780199327874
- eISBN:
- 9780199388103
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780199327874.001.0001
- Subject:
- Political Science, Security Studies
This book explores the history of the Somalia based Al Harakat Al Shabaab from 2005 to 2012, offering the first in-detail history of one of the most important Al-Qaeda affiliates today and the first ...
More
This book explores the history of the Somalia based Al Harakat Al Shabaab from 2005 to 2012, offering the first in-detail history of one of the most important Al-Qaeda affiliates today and the first to conquer large territories. It anchors the organization in its local context, describing it as set in the nexus of global and local streams of influence, employing terror strategically, often in order to offset diplomatic and military defeats. Al-Shabaab gained popularity because of its emphasis on justice, and its alignment with Somali nationalism, but still was influenced by global trends within Islamism and jihadism. This book follows Al-Shabaab in all its phases: as an early network, through its membership in the Sharia courts, through its guerrilla wars against the Ethiopians, through its expansion and attempts to govern central Somalia, into the post-2010 phase where it struggles against a superior enemy but still remains an actor to be reckoned with. The book concludes in 2013 and thus gives excellent background the Westgate attack in 2013. A separate chapter tackles the increasing regional influence of Al-Shabaab, tracing the trend back to 2009 when it employed a large number of Kenyans, through the gradual increase of Swahili propaganda, and the wave of terror attacks inside Kenya since Kenya intervened in Somalia In 2011. It also studies Al-Shabaab activities in Ethiopia, Uganda and Tanzania.Less
This book explores the history of the Somalia based Al Harakat Al Shabaab from 2005 to 2012, offering the first in-detail history of one of the most important Al-Qaeda affiliates today and the first to conquer large territories. It anchors the organization in its local context, describing it as set in the nexus of global and local streams of influence, employing terror strategically, often in order to offset diplomatic and military defeats. Al-Shabaab gained popularity because of its emphasis on justice, and its alignment with Somali nationalism, but still was influenced by global trends within Islamism and jihadism. This book follows Al-Shabaab in all its phases: as an early network, through its membership in the Sharia courts, through its guerrilla wars against the Ethiopians, through its expansion and attempts to govern central Somalia, into the post-2010 phase where it struggles against a superior enemy but still remains an actor to be reckoned with. The book concludes in 2013 and thus gives excellent background the Westgate attack in 2013. A separate chapter tackles the increasing regional influence of Al-Shabaab, tracing the trend back to 2009 when it employed a large number of Kenyans, through the gradual increase of Swahili propaganda, and the wave of terror attacks inside Kenya since Kenya intervened in Somalia In 2011. It also studies Al-Shabaab activities in Ethiopia, Uganda and Tanzania.
Frank L. III Smith
- Published in print:
- 2014
- Published Online:
- August 2016
- ISBN:
- 9780801452710
- eISBN:
- 9780801455162
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801452710.001.0001
- Subject:
- Political Science, Security Studies
Biological weapons have threatened U.S. national security since at least World War II. Historically, however, the U.S. military has neglected research, development, acquisition, and doctrine for ...
More
Biological weapons have threatened U.S. national security since at least World War II. Historically, however, the U.S. military has neglected research, development, acquisition, and doctrine for biodefense. Following September 11 and the anthrax letters of 2001, the United States started spending billions of dollars per year on medical countermeasures and biological detection systems. But most of this funding now comes from the Department of Health and Human Services rather than the Department of Defense. Why has the U.S. military neglected biodefense and allowed civilian organizations to take the lead in defending the country against biological attacks? This book addresses this puzzling and largely untold story about science, technology, and national security. The book argues that organizational frames and stereotypes have caused both military neglect and the rise of civilian biodefense. In the armed services, influential ideas about kinetic warfare have undermined defense against biological warfare. The influence of these ideas on science and technology challenges the conventional wisdom that national security policy is driven by threats or bureaucratic interests. Given the ideas at work inside the U.S. military, the book explains how the lessons learned from biodefense can help solve other important problems that range from radiation weapons to cyber attacks.Less
Biological weapons have threatened U.S. national security since at least World War II. Historically, however, the U.S. military has neglected research, development, acquisition, and doctrine for biodefense. Following September 11 and the anthrax letters of 2001, the United States started spending billions of dollars per year on medical countermeasures and biological detection systems. But most of this funding now comes from the Department of Health and Human Services rather than the Department of Defense. Why has the U.S. military neglected biodefense and allowed civilian organizations to take the lead in defending the country against biological attacks? This book addresses this puzzling and largely untold story about science, technology, and national security. The book argues that organizational frames and stereotypes have caused both military neglect and the rise of civilian biodefense. In the armed services, influential ideas about kinetic warfare have undermined defense against biological warfare. The influence of these ideas on science and technology challenges the conventional wisdom that national security policy is driven by threats or bureaucratic interests. Given the ideas at work inside the U.S. military, the book explains how the lessons learned from biodefense can help solve other important problems that range from radiation weapons to cyber attacks.
Robert Pfaltzgraff and Jacquelyn Davis
- Published in print:
- 2013
- Published Online:
- November 2015
- ISBN:
- 9780231166225
- eISBN:
- 9780231535946
- Item type:
- book
- Publisher:
- Columbia University Press
- DOI:
- 10.7312/columbia/9780231166225.001.0001
- Subject:
- Political Science, Security Studies
This volume offers alternative models for assessing the challenges of a nuclear Iran for U.S. security. It is based on the assumption that Iran will soon obtain nuclear weapons. Through three ...
More
This volume offers alternative models for assessing the challenges of a nuclear Iran for U.S. security. It is based on the assumption that Iran will soon obtain nuclear weapons. Through three different scenarios, the book explores the political, strategic, and operational challenges facing the United States in a post-Cold War world. It assesses the type of nuclear capability Iran might develop and the conditions under which Iran might resort to threatening or actually to using such weapons. It looks at the extent to which Iran's military strategy and declaratory policy might embolden Iran and its proxies to pursue more aggressive policies in the region and vis-à-vis the United States. It also assesses Iran's ability to transfer nuclear materials to others within and outside the region, which might spark a nuclear cascade. Drawing on recent post-Cold War deterrence theory, it considers Iran's nuclear ambitions as they relate to its foreign policy objectives, domestic politics and role in the Islamic world. It also suggests specific approaches to improve U.S. defense and deterrence planning.Less
This volume offers alternative models for assessing the challenges of a nuclear Iran for U.S. security. It is based on the assumption that Iran will soon obtain nuclear weapons. Through three different scenarios, the book explores the political, strategic, and operational challenges facing the United States in a post-Cold War world. It assesses the type of nuclear capability Iran might develop and the conditions under which Iran might resort to threatening or actually to using such weapons. It looks at the extent to which Iran's military strategy and declaratory policy might embolden Iran and its proxies to pursue more aggressive policies in the region and vis-à-vis the United States. It also assesses Iran's ability to transfer nuclear materials to others within and outside the region, which might spark a nuclear cascade. Drawing on recent post-Cold War deterrence theory, it considers Iran's nuclear ambitions as they relate to its foreign policy objectives, domestic politics and role in the Islamic world. It also suggests specific approaches to improve U.S. defense and deterrence planning.
Dina Rezk
- Published in print:
- 2017
- Published Online:
- January 2018
- ISBN:
- 9780748698912
- eISBN:
- 9781474435253
- Item type:
- book
- Publisher:
- Edinburgh University Press
- DOI:
- 10.3366/edinburgh/9780748698912.001.0001
- Subject:
- Political Science, Security Studies
This book addresses a critical question embedded within a heated debate about the ‘failure’ of American intelligence in a post 9/11 age: have Western experts in some fundamental way failed to ...
More
This book addresses a critical question embedded within a heated debate about the ‘failure’ of American intelligence in a post 9/11 age: have Western experts in some fundamental way failed to understand the dynamics, leaders and culture of the Middle East? Looking back in recent history through a series of seminal case studies culminating in Sadat’s dramatic assassination, this monograph explores whether, how and why the most knowledgeable and powerful intelligence agencies in the world have been so notoriously caught off guard in this region.
The story begins after the tripartite invasion of the Suez Canal in 1956 which triggered a ripple of ideological and geopolitical transformations that continue to shape the politics and borders of the modern Middle East. Revolutions swept across Syria, Iraq and Yemen; the three devastating Arab-Israeli wars ravaged the holy lands; and finally, a fraught and contested bilateral treaty bound Egypt and Israel to uneasy peace. The West and the Soviet Union vied for control over the Middle East’s destiny through its political centre, Egypt. The transition from Gamal Abdel Nasser to Anwar el Sadat witnessed the decline of an ardently anti-imperialist Arab nationalism, supplanted by a radical quest to realign Egypt’s identity towards the Western world.
As revolutionary turmoil and conflict continue to unfold throughout the Middle East today, The Arab World and Western Intelligence is the untold story of how the British and American intelligence services have anticipated and reacted to crisis and upheaval in the region’s recent history.Less
This book addresses a critical question embedded within a heated debate about the ‘failure’ of American intelligence in a post 9/11 age: have Western experts in some fundamental way failed to understand the dynamics, leaders and culture of the Middle East? Looking back in recent history through a series of seminal case studies culminating in Sadat’s dramatic assassination, this monograph explores whether, how and why the most knowledgeable and powerful intelligence agencies in the world have been so notoriously caught off guard in this region.
The story begins after the tripartite invasion of the Suez Canal in 1956 which triggered a ripple of ideological and geopolitical transformations that continue to shape the politics and borders of the modern Middle East. Revolutions swept across Syria, Iraq and Yemen; the three devastating Arab-Israeli wars ravaged the holy lands; and finally, a fraught and contested bilateral treaty bound Egypt and Israel to uneasy peace. The West and the Soviet Union vied for control over the Middle East’s destiny through its political centre, Egypt. The transition from Gamal Abdel Nasser to Anwar el Sadat witnessed the decline of an ardently anti-imperialist Arab nationalism, supplanted by a radical quest to realign Egypt’s identity towards the Western world.
As revolutionary turmoil and conflict continue to unfold throughout the Middle East today, The Arab World and Western Intelligence is the untold story of how the British and American intelligence services have anticipated and reacted to crisis and upheaval in the region’s recent history.
Paul D. Miller
- Published in print:
- 2013
- Published Online:
- August 2016
- ISBN:
- 9780801451492
- eISBN:
- 9780801469541
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801451492.001.0001
- Subject:
- Political Science, Security Studies
Since 1898, the United States and the United Nations have deployed military force more than three dozen times in attempts to rebuild failed states. Currently there are more state-building campaigns ...
More
Since 1898, the United States and the United Nations have deployed military force more than three dozen times in attempts to rebuild failed states. Currently there are more state-building campaigns in progress than at any time in the past century—including Afghanistan, Bosnia, Kosovo, the Democratic Republic of Congo, Haiti, Sudan, Liberia, Cote d’Ivoire, and Lebanon—and the number of candidate nations for such campaigns in the future is substantial. Even with a broad definition of success, earlier campaigns failed more than half the time. This book looks at the question of what causes armed, international state-building campaigns by liberal powers to succeed or fail. The United States successfully rebuilt the West German and Japanese states after World War II but failed to build a functioning state in South Vietnam. After the Cold War the United Nations oversaw relatively successful campaigns to restore order, hold elections, and organize post-conflict reconstruction in Mozambique, Namibia, Nicaragua, and elsewhere, but those successes were overshadowed by catastrophes in Angola, Liberia, and Somalia. The recent effort in Iraq and the ongoing one in Afghanistan are yielding mixed results, despite the high levels of resources dedicated and the long duration of the missions there. The book outlines different types of state failure, analyzes various levels of intervention that liberal states have tried in the state-building process, and distinguishes among the various failures and successes those efforts have provoked.Less
Since 1898, the United States and the United Nations have deployed military force more than three dozen times in attempts to rebuild failed states. Currently there are more state-building campaigns in progress than at any time in the past century—including Afghanistan, Bosnia, Kosovo, the Democratic Republic of Congo, Haiti, Sudan, Liberia, Cote d’Ivoire, and Lebanon—and the number of candidate nations for such campaigns in the future is substantial. Even with a broad definition of success, earlier campaigns failed more than half the time. This book looks at the question of what causes armed, international state-building campaigns by liberal powers to succeed or fail. The United States successfully rebuilt the West German and Japanese states after World War II but failed to build a functioning state in South Vietnam. After the Cold War the United Nations oversaw relatively successful campaigns to restore order, hold elections, and organize post-conflict reconstruction in Mozambique, Namibia, Nicaragua, and elsewhere, but those successes were overshadowed by catastrophes in Angola, Liberia, and Somalia. The recent effort in Iraq and the ongoing one in Afghanistan are yielding mixed results, despite the high levels of resources dedicated and the long duration of the missions there. The book outlines different types of state failure, analyzes various levels of intervention that liberal states have tried in the state-building process, and distinguishes among the various failures and successes those efforts have provoked.
Matthew Fuhrmann
- Published in print:
- 2012
- Published Online:
- August 2016
- ISBN:
- 9780801450907
- eISBN:
- 9780801465758
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801450907.001.0001
- Subject:
- Political Science, Security Studies
Nuclear technology is dual use in nature, meaning that it can be used to produce nuclear energy or to build nuclear weapons. Despite security concerns about proliferation, the United States and other ...
More
Nuclear technology is dual use in nature, meaning that it can be used to produce nuclear energy or to build nuclear weapons. Despite security concerns about proliferation, the United States and other nuclear nations have regularly shared with other countries nuclear technology, materials, and knowledge for peaceful purposes. This book argues that governments use peaceful nuclear assistance as a tool of economic statecraft. Nuclear suppliers hope that they can reap the benefits of foreign aid—improving relationships with their allies, limiting the influence of their adversaries, enhancing their energy security by gaining favorable access to oil supplies—without undermining their security. By providing peaceful nuclear assistance, however, countries inadvertently help spread nuclear weapons. This book draws on several cases of “Atoms for Peace,” including U.S. civilian nuclear assistance to Iran from 1957 to 1979; Soviet aid to Libya from 1975 to 1986; French, Italian, and Brazilian nuclear exports to Iraq from 1975 to 1981; and U.S. nuclear cooperation with India from 2001 to 2008. It also explores decision making in countries such as Japan, North Korea, Pakistan, South Africa, and Syria to determine why states began (or did not begin) nuclear weapons programs and why some programs succeeded while others failed. The book concludes that, on average, countries receiving higher levels of peaceful nuclear assistance are more likely to pursue and acquire the bomb—especially if they experience an international crisis after receiving aid.Less
Nuclear technology is dual use in nature, meaning that it can be used to produce nuclear energy or to build nuclear weapons. Despite security concerns about proliferation, the United States and other nuclear nations have regularly shared with other countries nuclear technology, materials, and knowledge for peaceful purposes. This book argues that governments use peaceful nuclear assistance as a tool of economic statecraft. Nuclear suppliers hope that they can reap the benefits of foreign aid—improving relationships with their allies, limiting the influence of their adversaries, enhancing their energy security by gaining favorable access to oil supplies—without undermining their security. By providing peaceful nuclear assistance, however, countries inadvertently help spread nuclear weapons. This book draws on several cases of “Atoms for Peace,” including U.S. civilian nuclear assistance to Iran from 1957 to 1979; Soviet aid to Libya from 1975 to 1986; French, Italian, and Brazilian nuclear exports to Iraq from 1975 to 1981; and U.S. nuclear cooperation with India from 2001 to 2008. It also explores decision making in countries such as Japan, North Korea, Pakistan, South Africa, and Syria to determine why states began (or did not begin) nuclear weapons programs and why some programs succeeded while others failed. The book concludes that, on average, countries receiving higher levels of peaceful nuclear assistance are more likely to pursue and acquire the bomb—especially if they experience an international crisis after receiving aid.
Alexander Lanoszka
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9781501729188
- eISBN:
- 9781501729195
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501729188.001.0001
- Subject:
- Political Science, Security Studies
How do alliances curb potential or actual cases of nuclear proliferation, if at all? Many scholars assert that alliances are effective tools for bridling the nuclear ambitions of states and that the ...
More
How do alliances curb potential or actual cases of nuclear proliferation, if at all? Many scholars assert that alliances are effective tools for bridling the nuclear ambitions of states and that the United States can especially take credit for suppressing nuclear proliferation among its allies around the world. This book challenges this widely-held view by arguing that alliances can be most useful for preventing potential nuclear proliferation but much less useful for curbing actual nuclear proliferation. Drawing on deep archival research it shows how allied decision-makers often evaluate American security guarantees with reference to in-theater conventional military deployments. It also demonstrates the significant difficulties in mounting alliance coercion in order to extract non-proliferation commitments. The book mainly explores the three cases of supposed alliance non-proliferation success--West Germany, Japan, and South Korea—while examining in lesser detail the case of Great Britain, France, Norway, Australia, and Taiwan.Less
How do alliances curb potential or actual cases of nuclear proliferation, if at all? Many scholars assert that alliances are effective tools for bridling the nuclear ambitions of states and that the United States can especially take credit for suppressing nuclear proliferation among its allies around the world. This book challenges this widely-held view by arguing that alliances can be most useful for preventing potential nuclear proliferation but much less useful for curbing actual nuclear proliferation. Drawing on deep archival research it shows how allied decision-makers often evaluate American security guarantees with reference to in-theater conventional military deployments. It also demonstrates the significant difficulties in mounting alliance coercion in order to extract non-proliferation commitments. The book mainly explores the three cases of supposed alliance non-proliferation success--West Germany, Japan, and South Korea—while examining in lesser detail the case of Great Britain, France, Norway, Australia, and Taiwan.
Sonia Ben Ouagrham-Gormley
- Published in print:
- 2014
- Published Online:
- August 2016
- ISBN:
- 9780801452888
- eISBN:
- 9780801471933
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801452888.001.0001
- Subject:
- Political Science, Security Studies
There exists the belief that with sufficient motivation and material resources, states or terrorist groups can produce bioweapons easily, cheaply, and successfully. This book challenges this ...
More
There exists the belief that with sufficient motivation and material resources, states or terrorist groups can produce bioweapons easily, cheaply, and successfully. This book challenges this perception by showing that bioweapons development is a difficult, protracted, and expensive endeavor, rarely achieving the expected results whatever the magnitude of investment. The book's findings are based on extensive interviews conducted with former U.S. and Soviet-era bioweapons scientists and on careful analysis of archival data and other historical documents related to various state and terrorist bioweapons programs. Bioweapons development relies on living organisms that are sensitive to their environment and handling conditions, and therefore behave unpredictably. These features place a greater premium on specialized knowledge. The book posits that lack of access to such intellectual capital constitutes the greatest barrier to the making of bioweapons. It integrates theories drawn from economics, the sociology of science, organization, and management with empirical research. The resulting theoretical framework rests on the idea that the pace and success of a bioweapons development program can be measured by its ability to ensure the creation and transfer of scientific and technical knowledge. The specific organizational, managerial, social, political, and economic conditions necessary for success are difficult to achieve, particularly in covert programs where the need to prevent detection imposes managerial and organizational conditions that conflict with knowledge production.Less
There exists the belief that with sufficient motivation and material resources, states or terrorist groups can produce bioweapons easily, cheaply, and successfully. This book challenges this perception by showing that bioweapons development is a difficult, protracted, and expensive endeavor, rarely achieving the expected results whatever the magnitude of investment. The book's findings are based on extensive interviews conducted with former U.S. and Soviet-era bioweapons scientists and on careful analysis of archival data and other historical documents related to various state and terrorist bioweapons programs. Bioweapons development relies on living organisms that are sensitive to their environment and handling conditions, and therefore behave unpredictably. These features place a greater premium on specialized knowledge. The book posits that lack of access to such intellectual capital constitutes the greatest barrier to the making of bioweapons. It integrates theories drawn from economics, the sociology of science, organization, and management with empirical research. The resulting theoretical framework rests on the idea that the pace and success of a bioweapons development program can be measured by its ability to ensure the creation and transfer of scientific and technical knowledge. The specific organizational, managerial, social, political, and economic conditions necessary for success are difficult to achieve, particularly in covert programs where the need to prevent detection imposes managerial and organizational conditions that conflict with knowledge production.
Rosemary A. Kelanic
- Published in print:
- 2020
- Published Online:
- January 2021
- ISBN:
- 9781501748295
- eISBN:
- 9781501749216
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501748295.001.0001
- Subject:
- Political Science, Security Studies
This book seeks to explain why great powers adopt such different strategies to protect their oil access from politically motivated disruptions. In extreme cases, such as Imperial Japan in 1941, great ...
More
This book seeks to explain why great powers adopt such different strategies to protect their oil access from politically motivated disruptions. In extreme cases, such as Imperial Japan in 1941, great powers fought wars to grab oil territory in anticipation of a potential embargo by the Allies; in other instances, such as Germany in the early Nazi period, states chose relatively subdued measures like, oil alliances or domestic policies, to conserve oil. What accounts for this variation? Fundamentally, it is puzzling that great powers fear oil coercion at all because the global market makes oil sanctions very difficult to enforce. This book argues that two variables determine what strategy a great power will adopt: the petroleum deficit, which measures how much oil the state produces domestically compared to what it needs for its strategic objectives; and disruptibility, which estimates the susceptibility of a state's oil imports to military interdiction—that is, blockade. Because global markets undercut the effectiveness of oil sanctions, blockade is in practice the only true threat to great power oil access. That, combined with the devastating consequences of oil deprivation to a state's military power, explains why states fear oil coercion deeply despite the adaptive functions of the market. Together, these two variables predict a state's coercive vulnerability, which determines how willing the state will be to accept the costs and risks attendant on various potential strategies. Only those great powers with large deficits and highly disruptible imports will adopt the most extreme strategy: direct control of oil through territorial conquest.Less
This book seeks to explain why great powers adopt such different strategies to protect their oil access from politically motivated disruptions. In extreme cases, such as Imperial Japan in 1941, great powers fought wars to grab oil territory in anticipation of a potential embargo by the Allies; in other instances, such as Germany in the early Nazi period, states chose relatively subdued measures like, oil alliances or domestic policies, to conserve oil. What accounts for this variation? Fundamentally, it is puzzling that great powers fear oil coercion at all because the global market makes oil sanctions very difficult to enforce. This book argues that two variables determine what strategy a great power will adopt: the petroleum deficit, which measures how much oil the state produces domestically compared to what it needs for its strategic objectives; and disruptibility, which estimates the susceptibility of a state's oil imports to military interdiction—that is, blockade. Because global markets undercut the effectiveness of oil sanctions, blockade is in practice the only true threat to great power oil access. That, combined with the devastating consequences of oil deprivation to a state's military power, explains why states fear oil coercion deeply despite the adaptive functions of the market. Together, these two variables predict a state's coercive vulnerability, which determines how willing the state will be to accept the costs and risks attendant on various potential strategies. Only those great powers with large deficits and highly disruptible imports will adopt the most extreme strategy: direct control of oil through territorial conquest.
Amelia Hoover Green
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9781501726477
- eISBN:
- 9781501726484
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501726477.001.0001
- Subject:
- Political Science, Security Studies
Why do some military and rebel groups commit many types of violence, creating an impression of senseless chaos, whereas others carefully control violence against civilians? A classic catch-22 faces ...
More
Why do some military and rebel groups commit many types of violence, creating an impression of senseless chaos, whereas others carefully control violence against civilians? A classic catch-22 faces the leaders of armed groups. Leaders need large groups of people willing to kill and maim—but to do so only under strict control. How can commanders control violence when fighters who are not under direct supervision experience extraordinary stress, fear, and anger? This book argues that discipline is not enough in wartime. Restraint occurs when fighters know why they are fighting and believe in the cause—that is, when commanders invest in political education. Drawing on evidence about state and non-state groups in El Salvador, and extending the argument to the Mano River wars in Liberia and Sierra Leone, the book shows that investments in political education can improve human rights outcomes even where rational incentives for restraint are weak—and that groups whose fighters lack a sense of purpose may engage in massive violence even where incentives for restraint are strong. It concludes that high levels of violence against civilians should be considered a “default setting,” not an aberration.Less
Why do some military and rebel groups commit many types of violence, creating an impression of senseless chaos, whereas others carefully control violence against civilians? A classic catch-22 faces the leaders of armed groups. Leaders need large groups of people willing to kill and maim—but to do so only under strict control. How can commanders control violence when fighters who are not under direct supervision experience extraordinary stress, fear, and anger? This book argues that discipline is not enough in wartime. Restraint occurs when fighters know why they are fighting and believe in the cause—that is, when commanders invest in political education. Drawing on evidence about state and non-state groups in El Salvador, and extending the argument to the Mano River wars in Liberia and Sierra Leone, the book shows that investments in political education can improve human rights outcomes even where rational incentives for restraint are weak—and that groups whose fighters lack a sense of purpose may engage in massive violence even where incentives for restraint are strong. It concludes that high levels of violence against civilians should be considered a “default setting,” not an aberration.
Marina E Henke
- Published in print:
- 2019
- Published Online:
- May 2020
- ISBN:
- 9781501739699
- eISBN:
- 9781501739705
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501739699.001.0001
- Subject:
- Political Science, Security Studies
How do states overcome problems of collective action in the face of human atrocities, terrorism and the threat of weapons of mass destruction? How does international burden-sharing in this context ...
More
How do states overcome problems of collective action in the face of human atrocities, terrorism and the threat of weapons of mass destruction? How does international burden-sharing in this context look like? This book addresses these questions. It demonstrates that coalitions do not emerge naturally; rather, pivotal states deliberately build them. They develop operational plans and bargain suitable third parties into the coalition. Pulling apart the strategy behind multilateral military coalition-building, the book looks at the ramifications and side effects as well. Via these ties, pivotal states have access to private information on the deployment preferences of potential coalition participants. Moreover, they facilitate issue-linkages and side-payments and allow states to overcome problems of credible commitments. Finally, pivotal states can use common institutional contacts as cooperation brokers, and they can convert common institutional venues into fora for negotiating coalitions. The theory and evidence presented force us to revisit the conventional wisdom on how cooperation in multilateral military operations comes about. The book generates new insights with respect to who is most likely to join a given multilateral intervention, what factors influence the strength and capacity of individual coalitions, and what diplomacy and diplomatic ties are good for. Moreover, as the Trump administration promotes an “America First” policy and withdraws from international agreements and the United Kingdom completes Brexit, this book is an important reminder that international security cannot be delinked from more mundane forms of cooperation; multilateral military coalitions thrive or fail depending on the breadth and depth of existing social and diplomatic networks.Less
How do states overcome problems of collective action in the face of human atrocities, terrorism and the threat of weapons of mass destruction? How does international burden-sharing in this context look like? This book addresses these questions. It demonstrates that coalitions do not emerge naturally; rather, pivotal states deliberately build them. They develop operational plans and bargain suitable third parties into the coalition. Pulling apart the strategy behind multilateral military coalition-building, the book looks at the ramifications and side effects as well. Via these ties, pivotal states have access to private information on the deployment preferences of potential coalition participants. Moreover, they facilitate issue-linkages and side-payments and allow states to overcome problems of credible commitments. Finally, pivotal states can use common institutional contacts as cooperation brokers, and they can convert common institutional venues into fora for negotiating coalitions. The theory and evidence presented force us to revisit the conventional wisdom on how cooperation in multilateral military operations comes about. The book generates new insights with respect to who is most likely to join a given multilateral intervention, what factors influence the strength and capacity of individual coalitions, and what diplomacy and diplomatic ties are good for. Moreover, as the Trump administration promotes an “America First” policy and withdraws from international agreements and the United Kingdom completes Brexit, this book is an important reminder that international security cannot be delinked from more mundane forms of cooperation; multilateral military coalitions thrive or fail depending on the breadth and depth of existing social and diplomatic networks.
David Ucko and Robert Egnell
- Published in print:
- 2015
- Published Online:
- November 2015
- ISBN:
- 9780231164276
- eISBN:
- 9780231535410
- Item type:
- book
- Publisher:
- Columbia University Press
- DOI:
- 10.7312/columbia/9780231164276.001.0001
- Subject:
- Political Science, Security Studies
This book provides a detailed account of the British army's involvement in the Basra and Helmand campaigns. It looks at the contributions and limitations of traditional tactics in such settings, and ...
More
This book provides a detailed account of the British army's involvement in the Basra and Helmand campaigns. It looks at the contributions and limitations of traditional tactics in such settings, and exposes a disconcerting gap between ambitions and resources, intent and commitment. The book recounts how the British military, long considered the masters of counterinsurgency, has encountered significant problems in Iraq and Afghanistan when confronted with insurgent violence. It shows how, in its effort to apply the principles and doctrines of past campaigns, the British army has failed to prevent Basra and Helmand from descending into lawlessness, criminality, and violence. Building upon this detailed account of the Basra and Helmand campaigns, this volume provides an assessment of British military institutional adaptation in response to operations gone awry. It calls attention to the enduring effectiveness of insurgent methods and the threat posed by under-governed spaces. It underscores the need for military organizations to meet the irregular challenges of future wars in new ways.Less
This book provides a detailed account of the British army's involvement in the Basra and Helmand campaigns. It looks at the contributions and limitations of traditional tactics in such settings, and exposes a disconcerting gap between ambitions and resources, intent and commitment. The book recounts how the British military, long considered the masters of counterinsurgency, has encountered significant problems in Iraq and Afghanistan when confronted with insurgent violence. It shows how, in its effort to apply the principles and doctrines of past campaigns, the British army has failed to prevent Basra and Helmand from descending into lawlessness, criminality, and violence. Building upon this detailed account of the Basra and Helmand campaigns, this volume provides an assessment of British military institutional adaptation in response to operations gone awry. It calls attention to the enduring effectiveness of insurgent methods and the threat posed by under-governed spaces. It underscores the need for military organizations to meet the irregular challenges of future wars in new ways.
Michael Desch
- Published in print:
- 2019
- Published Online:
- September 2019
- ISBN:
- 9780691181219
- eISBN:
- 9780691184906
- Item type:
- book
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181219.001.0001
- Subject:
- Political Science, Security Studies
To mobilize America's intellectual resources to meet the security challenges of the post-9/11 world, US Secretary of Defense Robert M. Gates observed that “we must again embrace eggheads and ideas.” ...
More
To mobilize America's intellectual resources to meet the security challenges of the post-9/11 world, US Secretary of Defense Robert M. Gates observed that “we must again embrace eggheads and ideas.” But the gap between national security policymakers and international relations scholars has become a chasm. This book traces the history of the relationship between the Beltway and the Ivory Tower from World War I to the present day. Recounting key Golden Age academic strategists such as Thomas Schelling and Walt Rostow, the book shows that social science research became most oriented toward practical problem-solving during times of war and that scholars returned to less relevant work during peacetime. Social science disciplines like political science rewarded work that was methodologically sophisticated over scholarship that engaged with the messy realities of national security policy, and academic culture increasingly turned away from the job of solving real-world problems. In the name of scientific objectivity, academics today frequently engage only in basic research that they hope will somehow trickle down to policymakers. Drawing on the lessons of this history as well as a unique survey of current and former national security policymakers, the book offers concrete recommendations for scholars who want to shape government work. The result is a rich intellectual history and an essential wake-up call to a field that has lost its way.Less
To mobilize America's intellectual resources to meet the security challenges of the post-9/11 world, US Secretary of Defense Robert M. Gates observed that “we must again embrace eggheads and ideas.” But the gap between national security policymakers and international relations scholars has become a chasm. This book traces the history of the relationship between the Beltway and the Ivory Tower from World War I to the present day. Recounting key Golden Age academic strategists such as Thomas Schelling and Walt Rostow, the book shows that social science research became most oriented toward practical problem-solving during times of war and that scholars returned to less relevant work during peacetime. Social science disciplines like political science rewarded work that was methodologically sophisticated over scholarship that engaged with the messy realities of national security policy, and academic culture increasingly turned away from the job of solving real-world problems. In the name of scientific objectivity, academics today frequently engage only in basic research that they hope will somehow trickle down to policymakers. Drawing on the lessons of this history as well as a unique survey of current and former national security policymakers, the book offers concrete recommendations for scholars who want to shape government work. The result is a rich intellectual history and an essential wake-up call to a field that has lost its way.
Ben Buchanan
- Published in print:
- 2017
- Published Online:
- June 2017
- ISBN:
- 9780190665012
- eISBN:
- 9780190686543
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/acprof:oso/9780190665012.001.0001
- Subject:
- Political Science, Security Studies
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on ...
More
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the “security dilemma”. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.Less
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the “security dilemma”. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
Jennifer M. Dixon
- Published in print:
- 2018
- Published Online:
- May 2019
- ISBN:
- 9781501730245
- eISBN:
- 9781501730252
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501730245.001.0001
- Subject:
- Political Science, Security Studies
Over the past two decades, many states have been called on to recognize and apologize for historic wrongs. In response, some states have apologized for past crimes, while others continue to silence, ...
More
Over the past two decades, many states have been called on to recognize and apologize for historic wrongs. In response, some states have apologized for past crimes, while others continue to silence, deny, and relativize dark pasts. What explains this tremendous variation? When and why do states change the stories they tell about dark pasts? Based on a comparative analysis of the trajectories of Turkey’s narrative of the 1915-17 Armenian Genocide and Japan’s narrative of the 1937-8 Nanjing Massacre, Dark Pasts argues that international pressures increase the likelihood of change in official narratives of dark pasts, but domestic considerations determine the content of such change. Rather than simply changing with the passage of time, persistence, or rightness, official narratives of dark pasts are shaped by interactions between domestic and international politics. Combining historical richness and analytical rigor, Dark Pasts unravels the complex processes through which such narratives are constructed and contested, and offers an innovative way to analyze the content of and changes in historical memories. The book sheds light on the persistent presence of the past and reveals how domestic politics functions as a filter that shapes the ways in which states’ narratives change – or don’t – over time.Less
Over the past two decades, many states have been called on to recognize and apologize for historic wrongs. In response, some states have apologized for past crimes, while others continue to silence, deny, and relativize dark pasts. What explains this tremendous variation? When and why do states change the stories they tell about dark pasts? Based on a comparative analysis of the trajectories of Turkey’s narrative of the 1915-17 Armenian Genocide and Japan’s narrative of the 1937-8 Nanjing Massacre, Dark Pasts argues that international pressures increase the likelihood of change in official narratives of dark pasts, but domestic considerations determine the content of such change. Rather than simply changing with the passage of time, persistence, or rightness, official narratives of dark pasts are shaped by interactions between domestic and international politics. Combining historical richness and analytical rigor, Dark Pasts unravels the complex processes through which such narratives are constructed and contested, and offers an innovative way to analyze the content of and changes in historical memories. The book sheds light on the persistent presence of the past and reveals how domestic politics functions as a filter that shapes the ways in which states’ narratives change – or don’t – over time.
John M. Schuessler
- Published in print:
- 2015
- Published Online:
- August 2016
- ISBN:
- 9780801453595
- eISBN:
- 9781501701627
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801453595.001.0001
- Subject:
- Political Science, Security Studies
This book examines how U.S. presidents have deceived the American public about fundamental decisions of war and peace. Deception has been deliberate, it suggests, as presidents have sought to shift ...
More
This book examines how U.S. presidents have deceived the American public about fundamental decisions of war and peace. Deception has been deliberate, it suggests, as presidents have sought to shift blame for war onto others in some cases and oversell its benefits in others. The book views that such deceit is a natural outgrowth of the democratic process because elected leaders have powerful incentives to maximize domestic support for war and retain considerable ability to manipulate domestic audiences. They can exploit information and propaganda advantages to frame issues in misleading ways, cherry-pick supporting evidence, suppress damaging revelations, and otherwise skew the public debate to their benefit. These tactics are particularly effective before the outbreak of war, when the information gap between leaders and the public is greatest. When resorting to deception, leaders take a calculated risk that the outcome of war will be favorable, expecting the public to adopt a forgiving attitude after victory is secured. The three cases featured in the book—Franklin Roosevelt and World War II, Lyndon Johnson and the Vietnam War, and George W. Bush and the Iraq War—test these claims. The book concludes that democracies are not as constrained in their ability to go to war as we might believe and that deception cannot be ruled out in all cases as contrary to the national interest.Less
This book examines how U.S. presidents have deceived the American public about fundamental decisions of war and peace. Deception has been deliberate, it suggests, as presidents have sought to shift blame for war onto others in some cases and oversell its benefits in others. The book views that such deceit is a natural outgrowth of the democratic process because elected leaders have powerful incentives to maximize domestic support for war and retain considerable ability to manipulate domestic audiences. They can exploit information and propaganda advantages to frame issues in misleading ways, cherry-pick supporting evidence, suppress damaging revelations, and otherwise skew the public debate to their benefit. These tactics are particularly effective before the outbreak of war, when the information gap between leaders and the public is greatest. When resorting to deception, leaders take a calculated risk that the outcome of war will be favorable, expecting the public to adopt a forgiving attitude after victory is secured. The three cases featured in the book—Franklin Roosevelt and World War II, Lyndon Johnson and the Vietnam War, and George W. Bush and the Iraq War—test these claims. The book concludes that democracies are not as constrained in their ability to go to war as we might believe and that deception cannot be ruled out in all cases as contrary to the national interest.
Michael Ryan
- Published in print:
- 2013
- Published Online:
- November 2015
- ISBN:
- 9780231163842
- eISBN:
- 9780231533270
- Item type:
- book
- Publisher:
- Columbia University Press
- DOI:
- 10.7312/columbia/9780231163842.001.0001
- Subject:
- Political Science, Security Studies
This book provides an effective framework for analyzing al-Qaeda's plans against America and encourages strategists and researchers to devote greater attention to jihadi ideas rather than jihadist ...
More
This book provides an effective framework for analyzing al-Qaeda's plans against America and encourages strategists and researchers to devote greater attention to jihadi ideas rather than jihadist military operations. It constructs a counter narrative to the West's supposed “war on Islam,” finding that jihadist terrorism strategy has more in common with the principles of Maoist guerrilla warfare than mainstream Islam. The book examines the Salafist roots of al-Qaeda ideology and the contributions of its most famous founders, Osama Bin Laden and Ayman al-Zawahiri. It also looks at the Arabic-language works of lesser known theoreticians who have played an instrumental role in framing al-Qaeda's so-called war of the oppressed. It shows that these authors readily cite the guerrilla strategies of Mao, Che Guevara, and the mastermind of the Vietnam War, General Giap, and also shows that they incorporate the arguments of American theorists writing on “fourth-generation warfare.” The book argues that al-Qaeda's political-military strategy is a revolutionary and largely secular departure from the classic Muslim conception of jihad. In this way, the book adds new dimensions to the operational, psychological, and informational strategies already deployed by America's military in the region.Less
This book provides an effective framework for analyzing al-Qaeda's plans against America and encourages strategists and researchers to devote greater attention to jihadi ideas rather than jihadist military operations. It constructs a counter narrative to the West's supposed “war on Islam,” finding that jihadist terrorism strategy has more in common with the principles of Maoist guerrilla warfare than mainstream Islam. The book examines the Salafist roots of al-Qaeda ideology and the contributions of its most famous founders, Osama Bin Laden and Ayman al-Zawahiri. It also looks at the Arabic-language works of lesser known theoreticians who have played an instrumental role in framing al-Qaeda's so-called war of the oppressed. It shows that these authors readily cite the guerrilla strategies of Mao, Che Guevara, and the mastermind of the Vietnam War, General Giap, and also shows that they incorporate the arguments of American theorists writing on “fourth-generation warfare.” The book argues that al-Qaeda's political-military strategy is a revolutionary and largely secular departure from the classic Muslim conception of jihad. In this way, the book adds new dimensions to the operational, psychological, and informational strategies already deployed by America's military in the region.
Abbey Steele
- Published in print:
- 2017
- Published Online:
- September 2018
- ISBN:
- 9781501713736
- eISBN:
- 9781501709753
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9781501713736.001.0001
- Subject:
- Political Science, Security Studies
Civilian displacement is a regular, massive feature of civil war violence. This book provides a new way to think about displacement, by connecting it to how armed groups target violence against ...
More
Civilian displacement is a regular, massive feature of civil war violence. This book provides a new way to think about displacement, by connecting it to how armed groups target violence against civilians, and how civilians respond. Individuals escape selective violence, civilians relocate together to avoid indiscriminate violence, and groups experience political cleansing following collective violence. Political cleansing is the expulsion of civilians from their communities based on a shared identity or trait. While it is difficult to detect civilians’ loyalties, the book shows that elections can both facilitate and incentivize displacement by revealing civilians’ political preferences; and giving elites a stake in the electoral composition of a community, motivating them to ally with armed groups. The book traces how democratic reforms triggered both processes in Colombia, leading to a major intensification of the war and to one of the highest populations of internally displaced people in the world. Combining evidence collected from remote archives, interviews with ex-combatants and displaced people, and quantitative data from the government’s displacement registry during nearly two years of fieldwork, the book connects Colombia’s political development and the course of its civil war to displacement.Less
Civilian displacement is a regular, massive feature of civil war violence. This book provides a new way to think about displacement, by connecting it to how armed groups target violence against civilians, and how civilians respond. Individuals escape selective violence, civilians relocate together to avoid indiscriminate violence, and groups experience political cleansing following collective violence. Political cleansing is the expulsion of civilians from their communities based on a shared identity or trait. While it is difficult to detect civilians’ loyalties, the book shows that elections can both facilitate and incentivize displacement by revealing civilians’ political preferences; and giving elites a stake in the electoral composition of a community, motivating them to ally with armed groups. The book traces how democratic reforms triggered both processes in Colombia, leading to a major intensification of the war and to one of the highest populations of internally displaced people in the world. Combining evidence collected from remote archives, interviews with ex-combatants and displaced people, and quantitative data from the government’s displacement registry during nearly two years of fieldwork, the book connects Colombia’s political development and the course of its civil war to displacement.
Brian C. Rathbun
- Published in print:
- 2014
- Published Online:
- August 2016
- ISBN:
- 9780801453182
- eISBN:
- 9780801455063
- Item type:
- book
- Publisher:
- Cornell University Press
- DOI:
- 10.7591/cornell/9780801453182.001.0001
- Subject:
- Political Science, Security Studies
What is the value of diplomacy? How does it affect the course of foreign affairs independent of the distribution of power and foreign policy interests? Theories of international relations too often ...
More
What is the value of diplomacy? How does it affect the course of foreign affairs independent of the distribution of power and foreign policy interests? Theories of international relations too often implicitly reduce the dynamics and outcomes of diplomacy to structural factors rather than the subtle qualities of negotiation. If diplomacy is an independent effect on the conduct of world politics, it has to add value, and we have to be able to show what that value is. This book sets forth a comprehensive theory of diplomacy, based on understanding that political leaders have distinct diplomatic styles—coercive bargaining, reasoned dialogue, and pragmatic statecraft. Drawing on work in the psychology of negotiation, the book explains how diplomatic styles are a function of the psychological attributes of leaders and the party coalitions they represent. The combination of these styles creates a certain spirit of negotiation that facilitates or obstructs agreement. The book applies the argument to relations among France, Germany, and Great Britain during the 1920s as well as Palestinian–Israeli negotiations since the 1990s. The book shows how different diplomatic styles can successfully resolve apparently intractable dilemmas and equally, how they can thwart agreements that were seemingly within reach.Less
What is the value of diplomacy? How does it affect the course of foreign affairs independent of the distribution of power and foreign policy interests? Theories of international relations too often implicitly reduce the dynamics and outcomes of diplomacy to structural factors rather than the subtle qualities of negotiation. If diplomacy is an independent effect on the conduct of world politics, it has to add value, and we have to be able to show what that value is. This book sets forth a comprehensive theory of diplomacy, based on understanding that political leaders have distinct diplomatic styles—coercive bargaining, reasoned dialogue, and pragmatic statecraft. Drawing on work in the psychology of negotiation, the book explains how diplomatic styles are a function of the psychological attributes of leaders and the party coalitions they represent. The combination of these styles creates a certain spirit of negotiation that facilitates or obstructs agreement. The book applies the argument to relations among France, Germany, and Great Britain during the 1920s as well as Palestinian–Israeli negotiations since the 1990s. The book shows how different diplomatic styles can successfully resolve apparently intractable dilemmas and equally, how they can thwart agreements that were seemingly within reach.