Covert Action and Unintended Consequences
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Regime Change Consensus: Iraq in American Politics, 1990-2003
THE REGIME CHANGE CONSENSUS: IRAQ IN AMERICAN POLITICS, 1990-2003 Joseph Stieb A dissertation submitted to the faculty at the University of North Carolina at Chapel Hill in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of History in the College of Arts and Sciences. Chapel Hill 2019 Approved by: Wayne Lee Michael Morgan Benjamin Waterhouse Daniel Bolger Hal Brands ©2019 Joseph David Stieb ALL RIGHTS RESERVED ii ABSTRACT Joseph David Stieb: The Regime Change Consensus: Iraq in American Politics, 1990-2003 (Under the direction of Wayne Lee) This study examines the containment policy that the United States and its allies imposed on Iraq after the 1991 Gulf War and argues for a new understanding of why the United States invaded Iraq in 2003. At the core of this story is a political puzzle: Why did a largely successful policy that mostly stripped Iraq of its unconventional weapons lose support in American politics to the point that the policy itself became less effective? I argue that, within intellectual and policymaking circles, a claim steadily emerged that the only solution to the Iraqi threat was regime change and democratization. While this “regime change consensus” was not part of the original containment policy, a cohort of intellectuals and policymakers assembled political support for the idea that Saddam’s personality and the totalitarian nature of the Baathist regime made Iraq uniquely immune to “management” strategies like containment. The entrenchment of this consensus before 9/11 helps explain why so many politicians, policymakers, and intellectuals rejected containment after 9/11 and embraced regime change and invasion. -
World Powers Rivalry in Afghanistan and Its Effects on Pakistan Muhammad Karim
World Powers Rivalry in Afghanistan and Its Effects on Pakistan Muhammad Karim Abstract Afghanistan, a landlocked country, has been the focus of great powers since 19 th century due to its strategic locations. Soviet Union and Great Briton were engaged in Afghanistan before the World Wars. After Soviet Union invasion of Afghanistan in 1979, the U.S. led West with the support of Muslim countries compelled the Red Army to withdraw in 1988. The country became a battle field of proxy wars among the regional and extra regional powers, creating instability in entire region. In aftermath of the 9/11, Afghanistan once again attracted attention of the world powers. Nature and complexity of Great Powers’ rivalry in Afghanistan has changed overtime. Instead of fighting against a nation state the world powers are fighting against the potential threats of extremism, terrorism and drug trafficking that makes the war more complicated, problematic and challenging. Currently, apart from Al-Qaeda and Taliban, Islamic State (IS) is also becoming an active stakeholder in Afghanistan. These developments make the Afghan problem more complicated and ripening the grounds for another civil war. The study argues that since Pakistan not only shares long borders but also history, culture, interests, happiness and sorrows with Afghanistan, therefore situation in Afghanistan always have direct bearing on the security matrix of Pakistan. US and NATO forces withdrawal from Afghanistan has provided an open field to Al-Qaeda/Taliban and IS in one hand and encourage regional and international players on another, creating security dilemma for Pakistan. Keywords: World powers rivalry, Afghan war, Al-Qaeda, Taliban, Islamic State (IS), Pakistan. -
Power Projection and Force Deployment Under Reagan
Chapman University Chapman University Digital Commons War and Society (MA) Theses Dissertations and Theses Fall 12-20-2019 The Ladle and the Knife: Power Projection and Force Deployment under Reagan Mathew Kawecki Chapman University, [email protected] Follow this and additional works at: https://digitalcommons.chapman.edu/war_and_society_theses Part of the Political History Commons Recommended Citation Kawecki, Mathew. The Ladle and the Knife: Power Projection and Force Deployment under Reagan. 2019. Chapman University, MA Thesis. Chapman University Digital Commons, https://doi.org/10.36837/ chapman.000095 This Thesis is brought to you for free and open access by the Dissertations and Theses at Chapman University Digital Commons. It has been accepted for inclusion in War and Society (MA) Theses by an authorized administrator of Chapman University Digital Commons. For more information, please contact [email protected]. The Ladle and the Knife: Power Projection and Force Deployment under Reagan A Thesis by Mathew D. Kawecki Chapman University Orange, CA Wilkinson College of Arts, Humanities, and Social Sciences Submitted in partial fulfillment of the requirements for the degree of Master of Arts in War and Society Studies December 2019 Committee in charge: Gregory Daddis, Ph.D., Chair Robert Slayton, Ph.D. Alexander Bay, Ph.D. The thesis ofMathew D. Kawecki is approved. Ph.D., Chair Eabert Slalton" Pir.D AlexanderBa_y. Ph.D September 2019 The Ladle and the Knife: Power Projection and Force Deployment under Reagan Copyright © 2019 by Mathew D. Kawecki III ACKNOWLEDGEMENTS I would like to thank my advisor, Dr. Greg Daddis, for his academic mentorship throughout the thesis writing process. -
The First Americans the 1941 US Codebreaking Mission to Bletchley Park
United States Cryptologic History The First Americans The 1941 US Codebreaking Mission to Bletchley Park Special series | Volume 12 | 2016 Center for Cryptologic History David J. Sherman is Associate Director for Policy and Records at the National Security Agency. A graduate of Duke University, he holds a doctorate in Slavic Studies from Cornell University, where he taught for three years. He also is a graduate of the CAPSTONE General/Flag Officer Course at the National Defense University, the Intelligence Community Senior Leadership Program, and the Alexander S. Pushkin Institute of the Russian Language in Moscow. He has served as Associate Dean for Academic Programs at the National War College and while there taught courses on strategy, inter- national relations, and intelligence. Among his other government assignments include ones as NSA’s representative to the Office of the Secretary of Defense, as Director for Intelligence Programs at the National Security Council, and on the staff of the National Economic Council. This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other US government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please email [email protected] or write to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: (Top) Navy Department building, with Washington Monument in center distance, 1918 or 1919; (bottom) Bletchley Park mansion, headquarters of UK codebreaking, 1939 UNITED STATES CRYPTOLOGIC HISTORY The First Americans The 1941 US Codebreaking Mission to Bletchley Park David Sherman National Security Agency Center for Cryptologic History 2016 Second Printing Contents Foreword ................................................................................ -
Won't You Be My Neighbor
Won’t You Be My Neighbor: Syria, Iraq and the Changing Strategic Context in the Middle East S TEVEN SIMON Council on Foreign Relations March 2009 www.usip.org Date www.usip.org UNITED STATES INSTITUTE OF PEACE – WORKING PAPER Won’t You Be My Neighbor UNITED STATES INSTITUTE OF PEACE 1200 17th Street NW, Suite 200 Washington, DC 20036-3011 © 2009 by the United States Institute of Peace. The views expressed in this report do not necessarily reflect the views of the United States Institute of Peace, which does not advocate specific policy positions. This is a working draft. Comments, questions, and permission to cite should be directed to the author ([email protected]) or [email protected]. This is a working draft. Comments, questions, and permission to cite should be directed to the author ([email protected]) or [email protected]. UNITED STATES INSTITUTE OF PEACE – WORKING PAPER Won’t You Be My Neighbor About this Report Iraq's neighbors are playing a major role—both positive and negative—in the stabilization and reconstruction of post-Saddam Iraq. In an effort to prevent conflict across Iraq's borders and in order to promote positive international and regional engagement, USIP has initiated high-level, non-official dialogue between foreign policy and national security figures from Iraq, its neighbors and the United States. The Institute’s "Iraq and its Neighbors" project has also convened a group of leading specialists on the geopolitics of the region to assess the interests and influence of the countries surrounding Iraq and to explain the impact of these transformed relationships on U.S. -
How Interventions Leads to Blowback 1
HOW INTERVENTIONS LEADS TO BLOWBACK 1 How Interventions Leads to blowback Daniel Cervantez California State University Maritime Academy 2018 Dr. Nincic HOW INTERVENTIONS LEADS TO BLOWBACK 2 Abstract The United States is currently involved three conflicts in the Middle East. The outcome of these conflicts did not go for what the United States originally wanted. The Question is why does the United States still keeps finding itself in the same situation that it did not originally wanted? The recurring elements that have continue to plaque the United States in the Middle East is from fear and hubris. The case studies are the Soviet Afghan War, the Iraq War in 2003, and the current Yemen Civil War were the United States is currently supporting Saudi Arabia’s intervention in the country. The cost from these mistakes are that the United States reputation is damage, resources are wasted, and US citizens are harmed. HOW INTERVENTIONS LEADS TO BLOWBACK 3 Introduction The term blowback first appeared in the after a report of Operation Ajax, the operation that overthrew the democratically elected Mohammad Mosaddeq and placed Mohammed Reza Pehlevi, the Shah of Iran, into power. A report by Dr. Wilbur, who was the writing on behalf of the CIA, addresses problems that plagued Operation Ajax, such as the planning of the coup, information collection, and finding forces to carry out the coup. The report states, “Possibilities of blowback against the United States should always be in the back of the minds of all CIA officers involved in this type of operation. Few, if any, operations are as explosive as this type. -
Killing Hope U.S
Killing Hope U.S. Military and CIA Interventions Since World War II – Part I William Blum Zed Books London Killing Hope was first published outside of North America by Zed Books Ltd, 7 Cynthia Street, London NI 9JF, UK in 2003. Second impression, 2004 Printed by Gopsons Papers Limited, Noida, India w w w.zedbooks .demon .co .uk Published in South Africa by Spearhead, a division of New Africa Books, PO Box 23408, Claremont 7735 This is a wholly revised, extended and updated edition of a book originally published under the title The CIA: A Forgotten History (Zed Books, 1986) Copyright © William Blum 2003 The right of William Blum to be identified as the author of this work has been asserted by him in accordance with the Copyright, Designs and Patents Act 1988. Cover design by Andrew Corbett ISBN 1 84277 368 2 hb ISBN 1 84277 369 0 pb Spearhead ISBN 0 86486 560 0 pb 2 Contents PART I Introduction 6 1. China 1945 to 1960s: Was Mao Tse-tung just paranoid? 20 2. Italy 1947-1948: Free elections, Hollywood style 27 3. Greece 1947 to early 1950s: From cradle of democracy to client state 33 4. The Philippines 1940s and 1950s: America's oldest colony 38 5. Korea 1945-1953: Was it all that it appeared to be? 44 6. Albania 1949-1953: The proper English spy 54 7. Eastern Europe 1948-1956: Operation Splinter Factor 56 8. Germany 1950s: Everything from juvenile delinquency to terrorism 60 9. Iran 1953: Making it safe for the King of Kings 63 10. -
Article Presidential Intelligence
VOLUME 129 JANUARY 2016 NUMBER 3 © 2016 by The Harvard Law Review Association ARTICLE PRESIDENTIAL INTELLIGENCE Samuel J. Rascoff CONTENTS INTRODUCTION ............................................................................................................................ 634 I. THE PRESIDENT AND THE INTELLIGENCE COMMUNITY: A BASELINE .............. 646 A. Analysis and Covert Action: Highly Presidentialized .................................................. 646 B. Organization and Budget: Somewhat Presidentialized ................................................ 648 C. Intelligence Collection: Weakly Presidentialized .......................................................... 651 II. THE EMERGENCE OF PRESIDENTIAL INTELLIGENCE ............................................. 659 A. The New Political Economy of Intelligence .................................................................. 660 1. Technology Firms and Economic Misalignment ...................................................... 662 2. Allies and Strategic Misalignment ............................................................................ 665 B. The Shape of Presidential Intelligence .......................................................................... 669 III. ASSESSING PRESIDENTIAL INTELLIGENCE ................................................................. 674 A. The Benefits of Presidential Intelligence ....................................................................... 674 1. Strategically Sound Intelligence ............................................................................... -
The Afghanistan Question and the Reset in US-Russian Relations
The Afghanistan Question and the Reset in U.S.-Russian Relations Richard J. Krickus J. Richard Relations U.S.-Russian and Resetthe in Question Afghanistan The etortThe LPapers THE AFGHANISTAN QUESTION AND THE RESET IN U.S.-RUSSIAN RELATIONS U.S. ARMY WAR COLLEGE Richard J. Krickus Visit our website for other free publication downloads http://www.StrategicStudiesInstitute.army.mil/ To rate this publication click here. U.S. ARMY WAR COLLEGE Strategic Studies Institute U.S. Army War College, Carlisle, PA The Letort Papers In the early 18th century, James Letort, an explorer and fur trader, was instrumental in opening up the Cumberland Valley to settlement. By 1752, there was a garrison on Letort Creek at what is today Carlisle Barracks, Pennsylvania. In those days, Carlisle Barracks lay at the western edge of the American colonies. It was a bastion for the protection of settlers and a departure point for further exploration. Today, as was the case over two centuries ago, Carlisle Barracks, as the home of the U.S. Army War College, is a place of transition and transformation. In the same spirit of bold curiosity that compelled the men and women who, like Letort, settled the American West, the Strategic Studies Institute (SSI) presents The Letort Papers. This series allows SSI to publish papers, retrospectives, speeches, or essays of interest to the defense academic community which may not correspond with our mainstream policy-oriented publications. If you think you may have a subject amenable to publication in our Letort Paper series, or if you wish to comment on a particular paper, please contact Dr. -
How Sunni-Shia Violence Spread from Syria Into Lebanon, 2013-14
Blowback Operations as Rebel Strategy: How Sunni-Shia Violence Spread from Syria into Lebanon, 2013-14 Nils Hägerdal Peter Krause Postdoctoral Fellow Associate Professor, Boston College Center for Strategic Studies, Fletcher School Research Affiliate, MIT Security Studies of Law and Diplomacy [email protected] Tufts University [email protected] When and why do conflict and violence spread across international borders? Existing scholarship mostly focuses on how civil war in one country affects the probability of civil war onset in a neighboring state. We introduce a new theoretical framework for thinking about blowback operations, where a civil war combatant stages terrorist attacks in the home country of a foreign actor to coerce this actor to end a military intervention. We show that blowback can target non- state armed groups as well as states, and that perpetrators of blowback attacks frequently deploy violence in narrowly targeted ways—such as attacking supporters of particular political groups— to maximize their coercive leverage. Using this framework, we explain how military intervention by Hezbollah in Syria sparked a bombing campaign by Sunni jihadi groups inside Lebanon. Novel quantitative and qualitative evidence reveals how attackers primarily targeted Hezbollah political strongholds, rather than indiscriminately attacking Shia civilians. 10,549 words 1 Only three wars in the world caused over 10,000 deaths in 2019: those in Afghanistan, Syria, and Yemen. These three wars share some unfortunate characteristics, including spreading conflict and violence to surrounding states. The seemingly endless war in Afghanistan has led to insurgent violence in Uzbekistan, Tajikistan, and Pakistan over the past three decades; the conflict in Syria triggered a violent bombing campaign in Lebanon in 2013-14 and the rise of Islamic State with its regional ambitions; and the civil war in Yemen has generated drone and missile strikes into neighboring Saudi Arabia since 2015. -
We Wanted Wings: a History of the Aviation Cadet Program
Cover illustration: “Aviation Cadets in Training – 1943” by Dottie Knight. (Courtesy, United States Air Force Art Collection) WE WANTED WINGS: A HISTORY OF THE AVIATION CADET PROGRAM Dr. Bruce A. Ashcroft Staff Historian HQ AETC/HO 2005 OFFICER CODE Duty well performed, Honor in all things, Country before self. AVIATION CADET HONOR CODE Article 1: An Aviation Cadet will not knowingly make any false statement, written or verbal, while acting in any capacity, official or otherwise, or in any situation reflecting on the Aviation Cadet Corps or the Air Force. Article 2: An Aviation Cadet will not take or receive the property of another person, or persons, under any conditions, without specific authority of that person or persons. Article 3: An Aviation Cadet will not impart or receive any unauthorized assistance, either outside or inside the classroom or places of instruction, which would tend to give any Aviation Cadet unfair advantage. Article 4: An Aviation Cadet will not quibble, use evasive statements, or technicalities in order to shield guilt or defeat the ends of justice. Article 5: An Aviation Cadet will report any violation of honor by another Aviation Cadet of which he is witness or has unquestionable knowledge. Article 6: An Aviation Cadet will not commit any act of intentional dishonesty which will reflect in any way on the honor and integrity of the Aviation Cadet Corps and the Air Force. Officer Code and Cadet Honor Code both from brochure, “Aviation Cadet Knowledge,” Preflight Training School, Lackland AFB TX, 1959. ii iii -
Throughout the 1930S, American Airmen Fought the Imperial Japanese Army in China
Throughout the 1930s, American airmen fought the Imperial Japanese Army in China. Before the Flying Tigers By Robert E. van Patten ully 10 years before the advent of Claire Chennault’s Flying Tigers, American pilots and airplanes were involved in an air war over China. What was to become the Sino–Japanese War in 1937 actually began with a Japanese incursion in Manchuria in 1931. This conflict festered for the next six years. In that period, pilots from the US, Britain, France, Italy, Russia, and probably Germany took part in battles in the skies over China. FWith the exception of the Italian and Russian contingents, which were officially sanctioned by their governments, the pilots who trained the Chi- nese and who fought for them were adventurers, soldiers of fortune, and out-of-work military professionals. Most of them were Americans. Many historians consider this hit-or-miss, bloody little air war to be a backwater of events. Yet the battles fought by these early warriors laid the groundwork for a massive air war over China, Southeast Asia, the Mariana Islands, and the Japanese homeland. The fighting history of US–built aircraft in combat inside China actually extends back to 1930, when American–produced light bombers were used in action against two northern warlords. In 1931, 20 light bombing –observation airplanes were ordered from Douglas. These are believed to have been the Type 02MC-4, large two-place, radial-engined biplanes, which were used as trainers at the Nanking flying school. The invasion of Manchuria by Imperial Japanese Army units in Septem- ber 1931 added impetus to the strengthening of the Chinese Air Force, not least because the Japanese attack put an end to a civil war between factions based in Nanking and Canton.