In the Common Defense


Book Description

The United States faces the realistic and indefinite threat of terrorist attack with nuclear weapons. Whether the United States is successful in preventing such an attack will depend on whether we effectively wield the instruments of security. It will also depend on whether we effectively manage national security processes and apply the law in a manner that both enhances security and upholds our core values. As a result, lawyers, not just presidents, generals, and spies, will decide the outcome of this conflict. This book, first published in 2007, is essential for anyone wanting an understanding of national security law and process. The book includes chapters on constitutional law, the use of force, and homeland security, presented in the context of today's threats and as applied to issues like rendition and electronic surveillance.




For the Common Defense


Book Description

1. A Dangerous New World, 1607-1689. 2. The Colonial Wars, 1689-1763. 3. The American Revolution, 1763-1783. 4. Preserving the New Republic's Independence, 1783-1815. 5. The Armed Forces and National Expansion, 1815-1860. 6. The Civil War, 1861-1862. 7. The Civil War, 1863-1865. 8. From Postwar Demobilization Toward Great Power Status, 1865-1898. 9. The Birth of an American Empire, 1898-1902. 10. Building the Military Forces of a World Power, 1899-1917. 11. The United States Fights in the "War to End All Wars", 1917-1918. 12. Military Policy Between the Two World Wars, 1919-1939. 13. The United States and World War II. From the Edge of Defeat to the Edge of Victory, 1939-1943. 14. The United States of World War II: The Road to Victory, 1943-1945. 15. Cold War and Hot War: The United States Enters the Ages of Nuclear Deterrence and Collective Security, 1945-1953. 16. Waging Cold War: American Defense Policy for Extended Deterrence and Containment, 1953-1965. 17. In Dubious Battle: The War for Vietnam and the Erosion of American Mmilitary Power, 1961-1975. 18. The Common Defense and the End of the Cold War, 1976-1993. Appendixes: A. Participation and Losses, Major Wars, 1775-1991. B. The Armed Forces and National Expansion. C. The Armed Forces of the Cold War.




Command, Control, and the Common Defense


Book Description

One of the challenges facing the writer is keeping up with developments in the information age. While Command, Control, and the Common Defense provides a historical perspective on a contemporary problem, it was written in the late l980s; since then, the end of the Cold War and the American experience in the Gulf War have provided some fundamentally new perspectives of their own. Re-written history has its own pitfalls; a better solution was to leave the original content intact and to add as an epilogue a chapter which originally appeared in a 1995 anthology on the Gulf War. Both works have, of course, been edited for consistency. Finally, there is reason to ponder in the light of more contemporary developments one of the major points in that original work: that the tight integration demanded by emerging command and control technologies often runs afoul of existing command structures and theories of warfare. As I completed the revisions to this edition while serving on special assignment with the NATO Implementation Force in Bosnia, there were daily reminders of the truth of that statement.




The Common Defense


Book Description




The Common Defense


Book Description

The author of the national bestseller 38 North Yankee offers a chilling story of snowballing terrorism. The elite counter-terrorist unit Delta Force races against time to stop a notorious German terrorist group who have moved their base of operations from Europe to Mexico--and are attacking the U.S. with bombs and nerve gas.




Provide for the Common Defense


Book Description

The military clauses were perhaps the most contentious in the drafting of the constitution. The old Continental Congress had had an abysmal record in taking care of the army. Promises made to soldiers during the war remained unfulfilled. At the same time, American distrust of European-style professional armies ran deep.This masterful account of the creation of the Constitution shows our founding fathers at work and brings them to life.







Popular Defense & Ecological Struggles


Book Description

"Ecological catastrophes are ony terrifying for civilians. For the military, they are but a simulation of chaos, an opportunity to justify an art of warfare which is the more autonomous as the political State dies out. At this point, all civilian populations are helpless victims of the scam, of this ransacking of the world's resources."




US Defense Politics


Book Description

This new textbook seeks to explain how US defense and national security policy is formulated and conducted. The focus is on the role of the President, Congress, political partisans, defense industries, lobbies, science, the media, and interest groups, including the military itself, in shaping policies. It examines the following key themes: US grand strategy; who joins America's military; how and why weapons are bought; the management of defense; public attitudes toward the military and casualties; the roles of the President and the Congress in controlling the military; the effects of 9/11 on security policy, homeland security, government reorganizations, and intra- and inter-service relations. The book shows how political and organizational interests determine US defense policy, and warns against the introduction of centralising reforms. In emphasizing the process of defense policy-making, rather than just the outcomes of that process, this book signals a departure from the style of many existing textbooks.




The Centaur's Dilemma


Book Description

Assessing the legal and practical questions posed by the use of artificial intelligence in national security matters The increasing use of artificial intelligence poses challenges and opportunities for nearly all aspects of society, including the military and other elements of the national security establishment. This book addresses how national security law can and should be applied to artificial intelligence, which enables a wide range of decisions and actions not contemplated by current law. James Baker, an expert in national security law and process, adopts a realistic approach in assessing how the law—even when not directly addressing artificial intelligence—can be used, or even misused, to regulate this new technology. His new book covers, among other topics, national security process, constitutional law, the law of armed conflict, arms control, and academic and corporate ethics. With his own background as a judge, he examines potential points of contention and litigation in an area where the law is still evolving and might not yet provide clear and certain answers. The Centaur's Dilemma also analyzes potential risks associated with the use of artificial intelligence in the realm of national security—including the challenges of machine-human interface, operating (or not operating) the national-security decision-making process at machine speed, and the perils of a technology arms race. Written in plain English, The Centaur's Dilemma will help guide policymakers, lawyers, and technology experts as they deal with the many legal questions that will arise when using artificial intelligence to plan and carry out the actions required for the nation's defense.