National Security  2005-2015 

Total Page:16

File Type:pdf, Size:1020Kb

National Security  2005-2015  60th Anniversary Edition THE BEST OF FPRI’ S ESSAY S ON National Security 2005-2015 Insert Image Here FOREIGN POLICY RESEARCH INSTITUTE The Best of FPRI’s Essays on National Security, 2005-2015 Program on National Security September 2015 FOREIGN POLICY RESEARCH INSTITUTE www.fpri.org In Memory of Dr. John M. Templeton Jr. 1940-2015 About the Foreign Policy Research Institute The Foreign Policy Research Institute was founded in Philadelphia in 1955 by Robert Strausz- Hupé on the premise that a nation must think before it acts. Thus, FPRI brings the insights of scholarship to bear on the development of policies that advance US national interests. Strausz- Hupé is credited with introducing “geopolitics” into the American vocabulary with the publication in 1942 of his book Geopolitics: The Struggle for Space and Power. Simply put, geopolitics offers a perspective on contemporary international affairs that is anchored in the study of history, geography and culture, or, as FPRI’s James Kurth has put it, in the study of the “realities and mentalities of the localities.” Strausz-Hupé embedded that perspective in FPRI and it remains today our method or, to use the contemporary lingo, our “brand.” With the world in such turmoil, that mission and method have never been more needed than they are today. About FPRI’s Program on National Security More than a decade after the 9/11 attacks the world remains a complicated and dangerous place. The crises in Syria and Iraq and Ukraine are clearly destabilizing and China’s actions in the South and East China Seas have potentially deleterious consequences for Asian regional security. The United States faces dynamic threats from non-state threats (e.g., terrorism, cyber threats, pandemics, etc.) as well as the reassertion of a more competitive international state system. While such matters may not pose as severe a threat as what the Cold War posed, today’s complexities are compounded because of domestic political differences in the U.S. that question what should, or should not, be the Nation’s role in international security and the resources that should, or should not, be allocated to deal with these problems. The FPRI’s Program on National Security seeks to help illuminate and address these issues and trends by examining contemporary and emergent concerns for American and international security through a wide aperture by bringing expertise to bear in publications, media appearances, and briefings. The Institute’s location in Philadelphia outside of the shorter attention span of Washington policy debates allows the Program to look at current and emergent problems with a longer-range view. In particular the program focuses on: • American grand strategy • The current and future global geopolitical environment that affect the U.S. and its interests • The ends (strategies), ways (organization and methods of force employment), and means (force structures and capabilities) that impact the use of military force • Counterterrorism and homeland security • Development, diplomacy, and informational (particularly in the realm of what we describe as competitive soft power) issues that contribute to the holistic implementation of strategy. Volumes of Related Interest FPRI’s has produced several volumes such as this one along the years, focusing on specific issues of perennial interest. Readers of this particular volume on national security may also be interested in: Robert Strausz-Hupé et al., Protracted Conflict: A Challenging Study of Communist Strategy (New York: Harper Colophon Books edition, 1963). John F. Lehman and Harvey Sicherman, eds., America the Vulnerable: Our Military Problems and How to Fix Them (FPRI, 2001). Stephen Gale, Michael Radu, and Harvey Sicherman, eds. The War on Terror: Collected Essays, 2001–2006 (FPRI, 2007). Paul Herbert and Michael P. Noonan, eds. American Military History: A Resource for Teachers and Students (FPRI E-Book, 2013). The Best of FPRI’s Essays on National Security, 2005-2015, which has been compiled in honor of FPRI’s 60th Anniversary, is part of a series being produced by each of FPRI’s research programs throughout 2015. Tally Helfont, ed. The Best of FPRI’s Essays on the Middle East. Philadelphia: FPRI, March 2015. E-book. Maia Otarashvili, ed. The Best of FPRI’s Essays on Democratic Transitions. Philadelphia: FPRI, July 2015. E-book. Ronald Granieri, ed. The Best of FPRI’s Essays on America and the West. Philadelphia: FPRI, July 2015. E-book. FOREWORD By Michael P. Noonan, Director, Program on National Security September 2015 Matters of national security have concerned the Foreign Policy Research Institute (FPRI) ever since its founding in 1955. They are especially concerning during times of war as the United nal security threats are not solely related to matters of terrorism. The contemporary geopolitical environment contains myriad threats and challengers to the United States and its interests. National security is a complex and multifaceted topic. This book demonstrates this reality by presenting both breadth and depth across topics ranging from grand strategy to military culture, from nuclear deterrence to irregular warfare. While the articles offer snapshots of individual events over the past ten years, the overall coverage should, like Janus, allow the reader both to look back in time and also to contemplate the future. Such looking forward and backward will be essential for coping with the challenges the United States confronts against threats and challengers such as, to name just a few, the Islamic State, a priorities should be and what areas of the budget should be well funded and which areas should be less well funded. Those are points of genuine debate. This work will have succeeded if it spurs such debate and promotes civic literacy on the broad topic of national security. This volume honors the 60th anniversary of the Institute by presenting a collection of writings published by FPRI and produced by both FPRI and non-FPRI scholars over the past decade. It is a large collection of writing. It has to be because much has happened. The layout of the sections here should allow those readers not interested in reading the entire volume to jump around to particular authors or subjects of interest. If you enjoy what you find here, visit us on the web to read, see, and hear more or even better, become a member, a member at a higher level, or a partner, and support the sustained production of quality scholarship and analysis on national security. i | FPRI Table of Contents Foreword ............................................................................................................................... i By Michael P. Noonan, Director, Program on National Security Part I: Grand Strategy ............................................................................................................ 1 History and Strategies: Grand, Maritime, and American ........................................................ 2 By Walter McDougall Geopolitics Reborn.............................................................................................................. 18 By Colin Dueck Principle and Prudence in American Foreign Policy .............................................................. 26 By Mackubin Thomas Owens Retrenchment Chic: The Dangers of Offshore Balancing ...................................................... 30 By Hal Brands Part II: Defense Policy.......................................................................................................... 38 Security Challenges Arising from the Global Economic Crisis .............................................. 39 By the Hon. Dov S. Zakheim Towards a Balanced and Stable Defense .............................................................................. 47 By Frank G. Hoffman The 2012 Presidential Election Campaign: Toward a Defensible Defense Budget .................. 53 By Frank G. Hoffman -Pacific ..................................... 62 By Felix K. Chang Part III: Civil-Military Relations .......................................................................................... 71 Mind the Gap: Post-Iraq Civil-Military Relations in America ............................................... 72 By Michael P. Noonan Dereliction of Duty Redux? ................................................................................................. 82 By Frank G. Hoffman U.S. Civil-Military Relations After 9/11: Renegotiating the Civil-Military Bargain................ 88 By Mackubin Thomas Owens What Military Officers Need to Know about Civil-Military Relations.................................. 96 By Mackubin Thomas Owens Part IV: Military Culture .................................................................................................... 106 Next-War-itis, This-War-itis, and the American Military .................................................... 107 By Michael P. Noonan How We Fight: Crusades, Quagmires, and the American Way of War................................. 113 By Dominic Tierney The Marine Mask of War ................................................................................................... 119 By Frank G. Hoffman From Black Boots to Desert Boots: The All-Volunteer Army Experiment Continues ............ 124 By Leonard Wong Part V: Military Instruments ............................................................................................... 133 A Strategic Rationale for Land Force Expansion ................................................................. 134 By Frank G.
Recommended publications
  • Steganography As a Means of Attacking Information Systems
    Scientific and Practical Cyber Security Journal (SPCSJ) 2(4): 75-80 ISSN 2587-4667 Scientific Cyber Security Association (SCSA) STEGANOGRAPHY AS A MEANS OF ATTACKING INFORMATION SYSTEMS Anna Romanova 1, Sergiy Toliupa 2 1Taras Shevchenko University of Kyiv, Faculty of Information Technology, 2 Taras Shevchenko University of Kyiv, Faculty of Information Technology ABSTRACT. An analysis of steganography methods that are can be potentially used as instruments in attacks on information and communication systems is presented. The possible solutions to ensure resilience to such attacks are presented. Keywords: steganography, TEMPEST, covert channel, information protection Cryptography is widely used as one of the most efficient and approbated methods of critical information resources protection. Nevertheless, in particular cases it might be more effective to hide the communication channel itself instead of making the information within it unreadable. Such a practice, namely concealing data within unsuspicious, innocent-looking containers, is called steganography. Any concept might have a double application. While being primarily considered a means of information protection, steganography can be used with ill intentions, as well. In fact, several high-tech attacks are based on the hidden data transmission, and contemporary methods of counteraction do not provide satisfactory level of resilience to those. These attacks are not always considered to be steganography-based, as they, for the most part, use a variety of features, characteristic for information and communication systems – physical effects, transmission protocols, communication infrastructure, specific features of software, cryptography etc. Nevertheless, the attack requires a classical statement of the task of steganography – how to transmit data so that a potential attacker could not acquire them due to not knowing about the presence of a transmission channel, even if he or she has a suspicion about one and the possible methods are known.
    [Show full text]
  • NSA's Efforts to Secure Private-Sector Telecommunications Infrastructure
    Under the Radar: NSA’s Efforts to Secure Private-Sector Telecommunications Infrastructure Susan Landau* INTRODUCTION When Google discovered that intruders were accessing certain Gmail ac- counts and stealing intellectual property,1 the company turned to the National Security Agency (NSA) for help in securing its systems. For a company that had faced accusations of violating user privacy, to ask for help from the agency that had been wiretapping Americans without warrants appeared decidedly odd, and Google came under a great deal of criticism. Google had approached a number of federal agencies for help on its problem; press reports focused on the company’s approach to the NSA. Google’s was the sensible approach. Not only was NSA the sole government agency with the necessary expertise to aid the company after its systems had been exploited, it was also the right agency to be doing so. That seems especially ironic in light of the recent revelations by Edward Snowden over the extent of NSA surveillance, including, apparently, Google inter-data-center communications.2 The NSA has always had two functions: the well-known one of signals intelligence, known in the trade as SIGINT, and the lesser known one of communications security or COMSEC. The former became the subject of novels, histories of the agency, and legend. The latter has garnered much less attention. One example of the myriad one could pick is David Kahn’s seminal book on cryptography, The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet.3 It devotes fifty pages to NSA and SIGINT and only ten pages to NSA and COMSEC.
    [Show full text]
  • IS GOEBBELS on YOUR CAMPUS? Youth Vote Decisive in Defeating Joe Lieberman
    Click here for Full Issue of EIR Volume 33, Number 44, November 3, 2006 EIRInvestigation IS GOEBBELS ON YOUR CAMPUS? Youth Vote Decisive in Defeating Joe Lieberman by Michele Steinberg and an EIR Research Team When Lynne Cheney and her Dick want a dirty job done in can be mobilized to defeat Cheney’s Connecticut fascist (see Washington, they invariably have turned to “neo-con” Joe article, p. 39). And there is every reason to push this campaign Lieberman. The 2006 midterm election, where the Cheneys into high gear. are desperate to destroy the Democratic Party and hold on to This report on Senator Lieberman is a lifeline to American their dictatorship, is no exception. voters, which documents: As the LaRouche Youth Movement organizers in Con- • How Lieberman—along with Big Sister Lynne necticut showed on Oct. 25 and 26, with their blitz of organiz- Cheney—is a key figure in the Nazi-style intimidation and ing on state campuses, the population, especially the youth, repression on college campuses. • How Lieberman was put into the Senate by the financial support of William F. Buckley, and Cuban exiles in Florida linked to terrorist net- works, which have enjoyed the protection of the Bush Administration. • How Lieberman served as Dick Cheney’s “protection racket” in Congress throughout 2002, and with the 2004 founding of the Committee on the Present Danger (CPD), to keep the Demo- cratic Party from investigating Cheney’s crimes in launching the unjustified, and unjustifiable Iraq War. • Lieberman’s role as the right-wing puppet of organized crime/dirty money interests laun- dered through the notorious Democratic Leader- ship Council (DLC) to run a fascist penetration of the Democratic Party.
    [Show full text]
  • Prism Vol. 9, No. 2 Prism About Vol
    2 021 PRISMVOL. 9, NO. 2 | 2021 PRISM VOL. 9, NO. 2 NO. 9, VOL. THE JOURNAL OF COMPLEX OPER ATIONS PRISM ABOUT VOL. 9, NO. 2, 2021 PRISM, the quarterly journal of complex operations published at National Defense University (NDU), aims to illuminate and provoke debate on whole-of-government EDITOR IN CHIEF efforts to conduct reconstruction, stabilization, counterinsurgency, and irregular Mr. Michael Miklaucic warfare operations. Since the inaugural issue of PRISM in 2010, our readership has expanded to include more than 10,000 officials, servicemen and women, and practi- tioners from across the diplomatic, defense, and development communities in more COPYEDITOR than 80 countries. Ms. Andrea L. Connell PRISM is published with support from NDU’s Institute for National Strategic Studies (INSS). In 1984, Secretary of Defense Casper Weinberger established INSS EDITORIAL ASSISTANTS within NDU as a focal point for analysis of critical national security policy and Ms. Taylor Buck defense strategy issues. Today INSS conducts research in support of academic and Ms. Amanda Dawkins leadership programs at NDU; provides strategic support to the Secretary of Defense, Chairman of the Joint Chiefs of Staff, combatant commands, and armed services; Ms. Alexandra Fabre de la Grange and engages with the broader national and international security communities. Ms. Julia Humphrey COMMUNICATIONS INTERNET PUBLICATIONS PRISM welcomes unsolicited manuscripts from policymakers, practitioners, and EDITOR scholars, particularly those that present emerging thought, best practices, or train- Ms. Joanna E. Seich ing and education innovations. Publication threshold for articles and critiques varies but is largely determined by topical relevance, continuing education for national and DESIGN international security professionals, scholarly standards of argumentation, quality of Mr.
    [Show full text]
  • Operations Security for Patriot Units to Successfully Accomplish Their
    CHAPTER 8 Operations Security For Patriot units to successfully accomplish their mission on the air-land battlefield, information about friendly unit activities, plans, and operations must be denied to enemy forces until it is too late for these forces to effectively react. Operations security (OPSEC) and ADA survivability are synonymous for all practical purposes. Generally, OPSEC includes the coordinated application of a wide range of techniques and procedures to deny information to an enemy. It is primarily common sense systematically applied to a unit's situation and mission. Coun- tersuppression actions are taken to protect friendly operations from attack. OPSEC and countersuppression actions and procedures fall into four catego- ries, the first three of which are OPSEC areas: * Countersurveillance - action to protect the true status of friendly operations. * Countermeasures -actions to remove or reduce the enemy intelligence and electronic warfare threat. * Deception - actions to create a false picture of friendly activities and operations. * Countersuppression - actions taken to directly defend or enhance the defensive capability of the unit. CONTENTS page page Section I - COUNTERSURVEILLANCE Section III - DECEPTION AREAS OF COUNTERSURVEILLANCE ..... 8-2 DECEPTION OPERATIONS ............... 8-10 8-10 STANDINGOPERATING PROCEDURES ... 8-6 DUMMY POSITIONS...................... DECOYS ... ... ....................... 8-11 Section II - COUNTERMEASURES Section IV - COUNTERSUPPRESSION MOVEMENT..8-9STINGER AND SMALL ARMS FIRES...... 8-11 RADAR EMISSION CONTROL ............. 8-9 NBC DEFENSE TECHNIQUES.............8-12 8-1 FM 44-15 Section I - COUNTERSURVEILLANCE AREAS OF COUNTERSURVEILLANCE Measures and actions in this subcate- the KG-27 used with the AN/GRC-103 UHF gory are those takei to prevent location of the radio, and the VINSON family of speech unit by visual, electronic, or photographic secure devices.
    [Show full text]
  • Going Nuts in the Nutmeg State?
    Going Nuts in the Nutmeg State? A Thesis Presented to The Division of History and Social Sciences Reed College In Partial Fulfillment of the Requirements for the Degree Bachelor of Arts Daniel Krantz Toffey May 2007 Approved for the Division (Political Science) Paul Gronke Acknowledgements Acknowledgements make me a bit uneasy, considering that nothing is done in isolation, and that there are no doubt dozens—perhaps hundreds—of people responsible for instilling within me the capability and fortitude to complete this thesis. Nonetheless, there are a few people that stand out as having a direct and substantial impact, and those few deserve to be acknowledged. First and foremost, I thank my parents for giving me the incredible opportunity to attend Reed, even in the face of staggering tuition, and an uncertain future—your generosity knows no bounds (I think this thesis comes out to about $1,000 a page.) I’d also like to thank my academic and thesis advisor, Paul Gronke, for orienting me towards new horizons of academic inquiry, and for the occasional swift kick in the pants when I needed it. In addition, my first reader, Tamara Metz was responsible for pulling my head out of the data, and helping me to consider the “big picture” of what I was attempting to accomplish. I also owe a debt of gratitude to the Charles McKinley Fund for providing access to the Cooperative Congressional Elections Study, which added considerable depth to my analyses, and to the Fautz-Ducey Public Policy fellowship, which made possible the opportunity that inspired this work.
    [Show full text]
  • EVENING LEDGER PHOTOPLAY CALENDAR TOT- R
    27, 6 EVENING LEDaER-PHILADELP- HIA, MONDAY, MABOH 1916. other way," he declared, "since tho park P0KEU OAME Hfit GREAT PRICE" MAGISTRATES OP CITY MAY "STRIKE" MINISTERS THREATEN belongs to the people, I, with one or half ENDS mFI&if a doten or more ministers, will go to the THREE PLAYERS LOCKS "JOBS" park and hold services without permis- TO RETAIN PROFITABLE FREE SPEECH FIGHT sion. Then we'll see If they'll nrrest Us, LIKE "THE BIG IDEA" nnd, If they do, wo can light tho matter "Frenzied Finance" a FeatnrMf clusfvo Removing All out In tho courts." SUting Downtown Meeting Called to Protest Against Order Much discussion followed, nnd nevcral They Will V ttfiltnt .tuii. Mabel Taliaferro Charming in i Presbyterians Say called that they wotlld go nlong" to con- rmnnrf.nnf" flnaes to Citv Hall Threaten to anded Clever Metro Meet in Park Without Per- duct such service, but It was finally voted Frederick Sinn. William CfSSl a Hearings to send requests for the privilege of nn ton nnd Frank linm,. i Stop Station House Interview, same to bo regis- it. mit, if Necessary tho mailed by Podernl -- .""','."" "W Feature tered mall, with the hope that the com- .t... iiunva statijfw A "strlko" among tho Magistrates of Itoblnson, who Issued the order to tho missioners would rccclvo the union's com- The KnmA...l 11 nnAnM . 22. order, first promul- In - :: ;.: . w.as MmnA By (he Photoplay Iho city Is browing. pollco March The Threats lo hold religious services mltteo nnd grant the request without nny ....., iu.,' o,nn Editor wero sent out today by Magis- gated January 30, 1916, provides for the Fnlrmount Park without permission from violent methods being employed by the neciarcd tod.
    [Show full text]
  • The Gertrude Sanford Legendre Papers
    The Gertrude Sanford Legendre papers Repository: Special Collections, College of Charleston Libraries Collection number: Mss 0182 Creator: Legendre, Gertrude Sanford, 1902-2000 Title: Gertrude Sanford Legendre papers Date: circa 1800-2013 Extent/Physical description: 171 linear feet (22 cartons, 114 document boxes, 49 slim document boxes, 97 flat storage boxes, 1 roll storage box, 26 negative boxes, 10 oversize folders, 28 audiocassettes, 1 videocassette) Language: English, French, Italian, Arabic, German Abstract: Photograph albums, scrapbooks, photographs, slides, manuscripts, correspondence, ledgers, journals, maps, audiovisual materials, and other papers of Gertrude Sanford Legendre (1902-2000), American socialite, explorer, and author. Materials document Legendre's childhood, education, and travel, including expeditions to Africa and Asia with the American Museum of Natural History and the National Geographic Society, her involvement with the Office of Strategic Services in London and Paris during World War II and her subsequent capture and imprisonment by German forces, and her stewardship, along with her husband, Sidney Legendre, of Medway Plantation (S.C.). Also included are materials related to other members of the Sanford family, their role in politics, and their businesses, including her father, John Sanford (II), and grandfather, Stephen Sanford, who owned Hurricana Farms (later Sanford Stud Farms) and Stephen Sanford & Sons, Inc. Carpet Company (later Bigelow-Sanford); her brother, Stephen "Laddie" Sanford (II), a champion polo player; and her sister, Sarah Jane Cochran Sanford, who married Mario Pansa, an Italian diplomat who served as an advisor to Benito Mussolini before and during World War II. Restrictions on access: This collection is open for research. Copyright notice: The nature of the College of Charleston's archival holdings means that copyright or other information about restrictions may be difficult or even impossible to determine despite reasonable efforts.
    [Show full text]
  • The Florida Historical Quarterly Volume Xlv October 1966 Number 2
    O CTOBER 1966 Published by THE FLORIDA HISTORICAL SOCIETY THE FLORIDA HISTORICAL SOCIETY THE HISTORICAL SOCIETY OF FLORIDA, 1856 THE FLORIDA HISTORICAL SOCIETY, successor, 1902 THE FLORIDA HISTORICAL SOCIETY, incoporated, 1905 by GEORGE R. FAIRBANKS, FRANCIS P. FLEMING, GEORGE W. WILSON, CHARLES M. COOPER, JAMES P. TALIAFERRO, V. W. SHIELDS, WILLIAM A. BLOUNT, GEORGE P. RANEY. OFFICERS WILLIAM M. GOZA, president HERBERT J. DOHERTY, JR., 1st vice president JAMES C. CRAIG, 2nd vice president MRS. RALPH F. DAVID, recording secretary MARGARET L. CHAPMAN, executive secretary DIRECTORS CHARLES O. ANDREWS, JR. MILTON D. JONES EARLE BOWDEN FRANK J. LAUMER JAMES D. BRUTON, JR. WILLIAM WARREN ROGERS MRS. HENRY J. BURKHARDT CHARLTON W. TEBEAU FRANK H. ELMORE LEONARD A. USINA WALTER S. HARDIN JULIAN I. WEINKLE JOHN E. JOHNS JAMES R. KNOTT, ex-officio SAMUEL PROCTOR, ex-officio (and the officers) (All correspondence relating to Society business, memberships, and Quarterly subscriptions should be addressed to Miss Margaret Ch apman, University of South Florida Library, Tampa, Florida 33620. Articles for publication, books for review, and editorial correspondence should be ad- dressed to the Quarterly, Box 14045, University Station, Gainesville, Florida, 32601.) * * * To explore the field of Florida history, to seek and gather up the ancient chronicles in which its annals are contained, to retain the legendary lore which may yet throw light upon the past, to trace its monuments and remains, to elucidate what has been written to disprove the false and support the true, to do justice to the men who have figured in the olden time, to keep and preserve all that is known in trust for those who are to come after us, to increase and extend the knowledge of our history, and to teach our children that first essential knowledge, the history of our State, are objects well worthy of our best efforts.
    [Show full text]
  • 4.0 Historical Overview
    4-1 4.0 HISTORICAL OVERVIEW The following overview traces the historical development of the general study area from the European settlement through the twentieth century. The intent of this overview is to serve as a guide to field investigations by identifying the possible locations of any historic cultural resources within the project area and to provide expectations regarding the potential historic significance of any such sites. It also provides a context with which to interpret any historic resources encountered during the study. 4.1 European Contact and Colonial Period (1513–1821) Three Native American ethnic groups were known to inhabit east central Florida at the time of Spanish contact: the Ais, the Mayaca, and the Jororo. The Ais lived along the Atlantic Coast and were closely involved with the Spanish. They inhabited the coastal strand and Indian River areas at this time. They apparently mixed indigenous hunting/gathering/fishing economy with the salvaging of Spanish shipwrecks (Milanich 1995:64-65). The Mayaca and Jororo peoples occupied an area from north-central Florida to as far south as Lake Okeechobee (Mitchem et al. 1998). The earliest contact between the native populations and the Europeans occurred through slave hunting expeditions. “Slaving expeditions,” which provided workers for the mines of Hispaniola and Cuba, were not recorded in official documents as the Spanish Crown prohibited the enslavement of Caribbean natives. Evidence of these slave raids comes from the familiarity with the Florida coast stated by navigators of the earliest official coastal reconnaissance surveys (Cabeza de Vaca 1922: Chapter 4). The hostile response of the native population to expeditions during the 1520s may confirm this hypothesis.
    [Show full text]
  • A Catalogue of the Collection of American Paintings in the Corcoran Gallery of Art
    A Catalogue of the Collection of American Paintings in The Corcoran Gallery of Art VOLUME I THE CORCORAN GALLERY OF ART WASHINGTON, D.C. A Catalogue of the Collection of American Paintings in The Corcoran Gallery of Art Volume 1 PAINTERS BORN BEFORE 1850 THE CORCORAN GALLERY OF ART WASHINGTON, D.C Copyright © 1966 By The Corcoran Gallery of Art, Washington, D.C. 20006 The Board of Trustees of The Corcoran Gallery of Art George E. Hamilton, Jr., President Robert V. Fleming Charles C. Glover, Jr. Corcoran Thorn, Jr. Katherine Morris Hall Frederick M. Bradley David E. Finley Gordon Gray David Lloyd Kreeger William Wilson Corcoran 69.1 A cknowledgments While the need for a catalogue of the collection has been apparent for some time, the preparation of this publication did not actually begin until June, 1965. Since that time a great many individuals and institutions have assisted in com- pleting the information contained herein. It is impossible to mention each indi- vidual and institution who has contributed to this project. But we take particular pleasure in recording our indebtedness to the staffs of the following institutions for their invaluable assistance: The Frick Art Reference Library, The District of Columbia Public Library, The Library of the National Gallery of Art, The Prints and Photographs Division, The Library of Congress. For assistance with particular research problems, and in compiling biographi- cal information on many of the artists included in this volume, special thanks are due to Mrs. Philip W. Amram, Miss Nancy Berman, Mrs. Christopher Bever, Mrs. Carter Burns, Professor Francis W.
    [Show full text]
  • Political Soldiers: Sources of Iraq War Veteran Support and Opposition to War
    Political Soldiers: Sources of Iraq War Veteran Support and Opposition to War by David Flores A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Sociology) in The University of Michigan 2012 Doctoral Committee: Professor Howard A. Kimeldorf, Chair Professor David G. Winter Professor Alford A. Young Jr. Associate Professor Anthony S. Chen, Northwestern University David Flores © 2012 All Rights Reserved To Ceciclê, and in memory of my mother Estela ii Acknowledgements It is a pleasure to thank those who made this dissertation possible. First, this study would not have happened without the time and effort of Iraq War veterans who volunteered to share their personal experiences of warfare and political activism. Both members of Vets for Freedom and Iraq Veterans Against the War welcomed me into their respective communities as a fellow vet even though I left the military in 2000 and did not participate in the Iraq War. I have worked tirelessly to stay true to their stories and hope that they find this dissertation representative of their views. This intellectual journey began when I met David Ramirez, my counselor at Southwestern Community College who recognized my potential as a scholar from the moment that I walked into his office. He introduced me to research universities and changed the trajectory of my future. Maria Lucero Padilla and Dr. Harold Campbell in the Student Support Service office at the University of California at Berkeley. Maria understands the trials and tribulations of first generation students, but more importantly, she knows how to inspire us to thrive.
    [Show full text]