Autumn 2015 Full Issue

Total Page:16

File Type:pdf, Size:1020Kb

Autumn 2015 Full Issue Naval War College Review Volume 68 Number 4 Autumn Article 1 2015 Autumn 2015 Full Issue The U.S. Naval War College Follow this and additional works at: https://digital-commons.usnwc.edu/nwc-review Recommended Citation Naval War College, The U.S. (2015) "Autumn 2015 Full Issue," Naval War College Review: Vol. 68 : No. 4 , Article 1. Available at: https://digital-commons.usnwc.edu/nwc-review/vol68/iss4/1 This Full Issue is brought to you for free and open access by the Journals at U.S. Naval War College Digital Commons. It has been accepted for inclusion in Naval War College Review by an authorized editor of U.S. Naval War College Digital Commons. For more information, please contact [email protected]. Naval War College: Autumn 2015 Full Issue Autumn 2015 Volume 68, Number 4 Autumn 2015 Published by U.S. Naval War College Digital Commons, 2015 1 6868_Cover.indd C M Y K June 25, 2015 8:58 AM Naval War College Review, Vol. 68 [2015], No. 4, Art. 1 NAVAL WAR COLLEGE REVIEW Autumn 2015 Volume 68, Number 4 NAVAL WAR COLLEGE PRESS 686 Cushing Road Newport, RI 02841-1207 https://digital-commons.usnwc.edu/nwc-review/vol68/iss4/1 2 Naval War College: Autumn 2015 Full Issue NAVAL WAR COLLEGE PRESS ADVISORY BOARD PRESIDENT, NAVAL WAR COLLEGE Adam Bellow Rear Adm. P. Gardner Howe III, USN Seth Cropsey PROVOST Jeffrey Kline Dr. Lewis M. Duncan Gale A. Mattox Robert A. Silano DEAN OF NAVAL WARFARE STUDIES Marin Strmecki Thomas J. Culora Dov S. Zakheim NAVAL WAR COLLEGE PRESS Carnes Lord, Editor NAVAL WAR COLLEGE REVIEW EDITORIAL BOARD Timothy J. Demy and Brad Carter, Book Review Donald Chisholm Editors Audrey Kurth Cronin Lori A. Almeida, Administrative Assistant and Stephen Downes-Martin Circulation Manager Andrew Erickson Frank Uhlig, Jr., Editor Emeritus Col. Theodore L. Gatchel, USMC (Ret.) Sean Henseler Naval War College Review James Kraska Code 32, Naval War College Thomas Mangold 686 Cushing Rd., Newport, RI 02841-1207 John Maurer Fax: 401.841.1071 Col. Mackubin Owens, USMC (Ret.) DSN exchange, all lines: 841 Cdr. Derek S. Reveron, USN Website: www.usnwc.edu/press Capt. Peter M. Swartz, USN (Ret.) http://twitter.com/NavalWarCollege Capt. David Teska, USCGR Editor, Circulation, or Business Scott C. Truver 401.841.2236 James J. Wirtz [email protected] Managing Editor 401.841.4552 [email protected] Book Reviews [email protected] Other Naval War College Offices 401.841.3089 Published by U.S. Naval War College Digital Commons, 2015 3 6813_FrontMatter.indd 2 8/18/15 1:35 PM Naval War College Review, Vol. 68 [2015], No. 4, Art. 1 The Naval War College Review was established in 1948 as a forum for discussion of public policy matters of interest to the maritime services. The thoughts and opinions expressed in this publication are those of the authors and are not necessarily those of the U.S. government, the U.S. Navy Department, or the Naval War College. The journal is published quarterly. Distribution is limited generally to commands and activities of the U.S. Navy, Marine Corps, and Coast Guard; regular and reserve officers of U.S. services; foreign officers and civilians having a present or previous affiliation with the Naval War College; selected U.S. government officials and agencies; and selected U.S. and international libraries, research centers, publica- tions, and educational institutions. Contributors Please request the standard contributors’ guidance from the managing editor or access it online before submitting manuscripts. The Naval War College Review nei- ther offers nor makes compensation for articles or book reviews, and it assumes no responsibility for the return of manuscripts, although every effort is made to return those not accepted. In submitting work, the sender warrants that it is original, that it is the sender’s property, and that neither it nor a similar work by the sender has been accepted or is under consideration elsewhere. Permissions Reproduction and reprinting are subject to the Copyright Act of 1976 and appli- cable treaties of the United States. To obtain permission to reproduce material bearing a copyright notice, or to reproduce any material for commercial pur- poses, contact the editor for each use. Material not bearing a copyright notice may be freely reproduced for academic or other noncommercial use; however, it is requested that the author and Naval War College Review be credited and that the editor be informed. Periodicals postage paid at Newport, R.I. POSTMASTERS, send address changes to: Naval War College Review, Code 32S, Naval War College, 686 Cushing Rd., Newport, R.I. 02841-1207. ISSN 0028-1484 https://digital-commons.usnwc.edu/nwc-review/vol68/iss4/1 4 6813_FrontMatter.indd 3 8/18/15 1:35 PM Naval War College: Autumn 2015 Full Issue Published by U.S. Naval War College Digital Commons, 2015 5 Naval War College Review, Vol. 68 [2015], No. 4, Art. 1 CONTENTS From the Editors . 5 President’s Forum . 9 Israeli Targeting A Legal Appraisal. 15 Major John J. Merriam, U.S. Army, and Michael N. Schmitt A review of Israel’s sometimes controversial positions on targeting law within the law of armed conflict shows that they are generally reasonable and consistent with mainstream contemporary state practice. The New U.S. Maritime Strategy Another View from Outside . 34 Geoffrey Till The refreshed “Cooperative Strategy for 21st Century Seapower” raises a number of questions: What is this new “strategy,” whom is it for, what has changed, and how will other navies and their nations react? Connecting the Dots Capital Ships, the Littoral, Command of the Sea, and the World Order . 46 Robert C. Rubel The geopolitical competitors of the United States are seeking ways to nullify the American capabil- ity to influence and intervene that the aircraft carrier confers. Understanding the linkages helps us refine and enhance the debate about what to do. China’s Aircraft Carrier Program Drivers, Developments, Implications . 65 Andrew Scobell, Michael McMahon, and Cortez A. Cooper III China’s carrier program will not fundamentally transform the balance of military power in the western Pacific. But it does signal both China’s unmistakable intent to project military power beyond the nation’s “near seas” and its aspirations to become a global naval power. A General Review of the History of China’s Sea-Power Theory Development. 80 Zhang Wei Translated by Shazeda Ahmed Chinese sea power, writes an officer of the People’s Liberation Army Navy, must have Chinese characteristics and not follow the path that Western powers took to maritime hegemony. https://digital-commons.usnwc.edu/nwc-review/vol68/iss4/1 6 NWC_Autumn2015Reivew.indb 1 8/13/15 3:51 PM 2 NAVAL WAR COLLEGE REVIEWNaval War College: Autumn 2015 Full Issue Fernando Oliveira’s Art of War at Sea (1555) A Pioneering Treatise on Naval Strategy. 94 Luis Nuno Sardinha Monteiro Although written more than 450 years ago, Art of War at Sea is a treatise that was ahead of its time, establishing in part the basis of modern naval strategy. Yet it has remained in obscurity, as it was never translated from sixteenth-century Portuguese. Research & Debate The New Young Turks . 108 Commander Benjamin F. Armstrong, U.S. Navy Book Reviews Restraint: A New Foundation for U.S. Grand Strategy, by Barry R. Posen reviewed by David T. Burbach. 115 The Accidental Admiral: A Sailor Takes Command at NATO, by James G. Stavridis reviewed by Christopher Nelson. 117 The Battle of the Denmark Strait: A Critical Analysis of the Bismarck’s Singular Triumph, by Robert J. Winklareth reviewed by Holger H. Herwig . 118 Inside Reagan’s Navy: The Pentagon Journals, by Chase Untermeyer reviewed by Carnes Lord . 119 21st Century Sims: Innovation, Education, and Leadership for the Modern Era, edited by Benjamin F. Armstrong reviewed by Yvonne R. Masakowski . 121 No End Save Victory: How FDR Led the Nation into War, by David Kaiser reviewed by Douglas Peifer . 122 Morality and War: Can War Be Just in the Twenty-First Century?, by David Fisher reviewed by Joseph M. Hatfield . 124 Published by U.S. Naval War College Digital Commons, 2015 7 6909_TOC.indd 2 8/18/15 1:36 PM Naval War College Review, Vol. 68 [2015], No. 4, Art. 1 CONTENTS 3 The Battle for Mozambique: The Frelimo-Renamo Struggle, 1977–1992, by Stephen A. Emerson reviewed by Roger H. Ducey . 126 Torpedo: Inventing the Military-Industrial Complex in the United States and Great Britain, by Katherine Epstein reviewed by John T. Kuehn . 127 21st Century Ellis: Operational Art and Strategic Prophecy for the Modern Era, edited by B. A. Friedman reviewed by David C. Fuquea . 129 Fighting the Great War at Sea: Strategy, Tactics and Technology, by Norman Friedman reviewed by Angus Ross . 130 Post-war Japan as a Sea Power: Imperial Legacy, Wartime Experience and the Making of a Navy, by Alessio Patalano reviewed by Carlos Rosende and John Bradford. 132 Against the Tide: Rickover’s Leadership Principles and the Rise of the Nuclear Navy, by Dave Oliver reviewed by Richard J. Norton. 133 America’s U-boats: Terror Trophies of World War I, by Chris Dubbs reviewed by William F. Bundy. 135 Underdogs: The Making of the Modern Marine Corps, by Aaron B. O’Connell reviewed by William A. Taylor . 137 In My View . 141 Reflections on Reading . 143 https://digital-commons.usnwc.edu/nwc-review/vol68/iss4/1 8 NWC_Autumn2015Reivew.indb 3 8/13/15 3:51 PM Naval War College: Autumn 2015 Full Issue Published by U.S. Naval War College Digital Commons, 2015 9 NWC_Autumn2015Reivew.indb 4 8/13/15 3:06 PM Naval War College Review, Vol.
Recommended publications
  • The Bow and Arrow in the Book of Mormon
    The Bow and Arrow in the Book of Mormon William J. Hamblin The distinctive characteristic of missile weapons used in combat is that a warrior throws or propels them to injure enemies at a distance.1 The great variety of missiles invented during the thousands of years of recorded warfare can be divided into four major technological categories, according to the means of propulsion. The simplest, including javelins and stones, is propelled by unaided human muscles. The second technological category — which uses mechanical devices to multiply, store, and transfer limited human energy, giving missiles greater range and power — includes bows and slings. Beginning in China in the late twelfth century and reaching Western Europe by the fourteenth century, the development of gunpowder as a missile propellant created the third category. In the twentieth century, liquid fuels and engines have led to the development of aircraft and modern ballistic missiles, the fourth category. Before gunpowder weapons, all missiles had fundamental limitations on range and effectiveness due to the lack of energy sources other than human muscles and simple mechanical power. The Book of Mormon mentions only early forms of pregunpowder missile weapons. The major military advantage of missile weapons is that they allow a soldier to injure his enemy from a distance, thereby leaving the soldier relatively safe from counterattacks with melee weapons. But missile weapons also have some signicant disadvantages. First, a missile weapon can be used only once: when a javelin or arrow has been cast, it generally cannot be used again. (Of course, a soldier may carry more than one javelin or arrow.) Second, control over a missile weapon tends to be limited; once a soldier casts a missile, he has no further control over the direction it will take.
    [Show full text]
  • Defense Transformation: Background and Oversight Issues for Congress
    Order Code RL32238 CRS Report for Congress Received through the CRS Web Defense Transformation: Background and Oversight Issues for Congress Updated November 9, 2006 Ronald O’Rourke Specialist in National Defense Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Defense Transformation: Background and Oversight Issues for Congress Summary The Bush Administration identified transformation as a major goal for the Department of Defense (DOD) soon after taking office, and has justified many of its initiatives for DOD in connection with the concept. Defense transformation can be defined as large-scale, discontinuous, and possibly disruptive changes in military weapons, concepts of operations (i.e., approaches to warfighting), and organization. The issue for Congress is how to take the concept of defense transformation into account in assessing and acting on Administration proposals for DOD. The Administration argues that new technologies make defense transformation possible and that new threats to U.S. security make defense transformation necessary. The Administration’s vision for defense transformation calls for placing increased emphasis in U.S. defense planning on irregular warfare, including terrorism, insurgencies, and civil war; potential catastrophic security threats, such as the possession and possible use of weapons of mass destruction by terrorists and rogue states; and potential disruptive events, such as the emergence of new technologies that could undermine current U.S. military advantages. The Administration’s vision for defense transformation calls for shifting U.S. military forces toward a greater reliance on joint operations, network-centric warfare, effects-based operations, speed and agility, and precision application of firepower. Transformation could affect the defense industrial base by transferring funding from “legacy” systems to transformational systems, and from traditional DOD contractors to firms that previously have not done much defense work.
    [Show full text]
  • 10. Soviet Hardware Supplied to the Republic I
    Stalin and the Spanish Civil War: Chapter 10 2/23/04 1:48 PM Email this citation Introduction 10. Soviet Hardware Supplied to the Republic I. Diplomacy 1 1. Pre-July 1936 Ascertaining the day of arrival of the first Soviet weapons in Spain has proved, for most 2. Civil War 3. To Moscow historians of the civil war, a slippery task. The problem is due to two separate factors. On II. Soviet Aid the one hand, pro-Franco propagandists, in part to justify the rebellion itself, long held that 4. Solidarity Russian weapons were present in Spain, in large amounts, from a very early date— 5. Children according to some accounts, before July 18. 1 By the late 1950s, most of these claims had III. Cultural Policy been largely dismissed by Western researchers, 2 though until quite recently, historians 6. Pre-War would still occasionally refer to Soviet military aid to the Republic as dating from July 1936. 7. Agit-prop 8. Home Front 3 It is significant that, in his memoir of the war, the American ambassador to Madrid sought IV. Military Aid to refute both the erroneous Franquista propaganda claims of pre-war Soviet shipments as 9. Operation X well as the gross exaggerations of the quantity of Russian hardware deployed in Spain: 10. Hardware 11. Spanish Gold Up until that time [October 1936] I invariably asked war correspondents from the V. Soviet Advisors 12. Command front about foreign war material, and, without exception, they all said they had 13. Activities seen many Italian and German planes, tanks, guns, and soldiers, but they had 14.
    [Show full text]
  • Firearms Laws of Vietnam
    Firearms Laws of Vietnam by Tien Thuy Dinh1 IP-5-2017 | November 2017 727 East 16th Avenue | Denver, Colorado 80203 www.IndependenceInstitute.org | 303-279-6536 | 303-279-4176 fax Introduction Vietnam has one of the strictest gun This Issue Paper provides an overview of laws in the world. The policy reflects the the history of firearm laws in Vietnam and cultural and historical influences that a translation of the current laws. Part I have shaped the nation. Little has been surveys arms laws in Vietnam from 1427 written on Vietnamese gun control, in to the present. Part II provides an English part because of the inaccessibility and loss translation of the current law, which was of documents as a result of the country’s issued in 2011. Part III is the Vietnamese violent history. text of that law. 1. Brief History of Arms in Vietnam The first recorded firearms in Đại Việt (Divine Lightning) because of the power were used against the Champa king Chế of their firearms. The Lê revolution Bồng Nga in 1390. (Đại Việt means Great greatly shifted the balance of power in Viet, and was the name of Vietnam from Southeast Asia away from China, and 1054 to 1400, and from 1428 to 1804.) towards Vietnam. The book Đại Việt sử ký toàn thư (Complete Vietnam has one Book of the Historical Record of Đại Việt) Further improvements on firearms were of the strictest attributes the king’s death to a cannon made under the Nguyễn Dynasty. Emperor gun laws in the called houchong.2 Gia Long, thanks to a considerable supply world.
    [Show full text]
  • Fasciculi Archaeologiae Historicae T. 29 (2016), Blade Weapon As a Part of an Equipment of the Mercenaries of the Kingdom Of
    Fasciculi Archaeologiae Historicae, 2016, 29, s. 49-55 FASCICULI ARCHAEOLOGIAE HISTORICAE FASC. XXIX, PL ISSN 0860-0007 TADEUSZ GRABARCZYK BLADE WEAPON AS A PART OF AN EQUIPMENT OF THE MERCENARIES OF THE KINGDOM OF POLAND IN THE SECOND HALF OF THE 15TH C. Abstract: Sources from the second half of 15th c. contain a lot of information about arming of mercenaries of Kingdom of Poland. Those materials are located in the Central Archives of Historical Records in Warsaw. Those are mostly lists of taken soldiers with weapons and also lists of weapons lost during war campaigns. Mentions about blade weapon are found in records from the period of the Thirteen Years’ War with Teutonic Order (1454-1466). Most of the information con- cerns infantry, only in records from 1471, 1880 soldiers were recorded to have been using blade weapon. According to the analysis, the most popular blade weapons were swords – used by 51% of infantryman. Slightly fewer was the number of used sabers – 47% of soldiers used them in 1471. Sometimes mercenaries were equipped in falchions, estocs, daggers and sharshoons – which is the name for heavy sword. Sources concerning cavalry blade weapon occurs very rarely. According to those few mentions it can only be told, that horseman used both swords and sabers. Keywords: Kingdom of Poland, Middle Ages, mercenaries, blade weapon, armour Blade weapons, such as swords, sabres, estocs, fal- appear in them not very often. Such mentions have auxiliary chions and daggers were basic elements of an equipment character, because they confirm the fact that soldiers were of a medieval soldier.
    [Show full text]
  • Yemen: a Conflict Behind Closed Doors
    4th Issue – March 2017 p. 12-33 Yemen: a conflict behind closed doors Francis Frison-Roche • Chercheur au CNRS (Centre national de la recherche scientifique), Université Paris 2-CERSA, ancien directeur du projet « Aide à la transition démocratique au Yémen » In the shadow of Syria, Yemen has been dragged over the last two years into an increasingly radical and deadly war in which the international community and the media have shown very little interest. François Frison-Roche helps us to understand the causes and origins of this conflict in the hope of saving it from the oblivion into which it is sinking. t has been almost seven years now since Yemen first became caught up in this complex conflict, the brutality of which is only now becoming obvious. Why so complex? Because it I is made up of a several wars all happening at the same time. One conflict, several wars First there is the war between the “Houthi rebels*1”, part of the Ansar Allah* movement, and the Sunni “coalition” led by Saudi Arabia. This is the war we hear a bit about, as it is seen as a new battleground for two regional powers, Saudi Arabia and Iran, who are both seeking to preserve or regain hegemonic influence in the Middle East. But there is also a war going on between the current president, Abd Rabbuh Mansour al-Hadi, who spent a long time in exile in Riyadh (Saudi Arabia) and is recognised and supported by the international community, and the elites of the former regime of the autocrat, Ali Abdallah Saleh*.
    [Show full text]
  • International Arms Flows: Monitoring, Sources and Obstacles
    International arms flows: monitoring, sources and obstacles Clingendael Report Pieter D. Wezeman International arms flows: monitoring, sources and obstacles Pieter D. Wezeman Clingendael Report January 2018 Disclaimer: This report was commissioned by the Netherlands’ ministries of Foreign Affairs and Defence within the PROGRESS framework agreement, lot 5, 2017. Responsibility for the contents and for the opinions expressed rests solely with the authors. Publication does not constitute an endorsement by the Netherlands’ ministries of Foreign Affairs and Defence. This report is part of Clingendael’s political violence program on information gathering, analysis and recognition of (data) bias by policy-makers. January 2018 © Netherlands Institute of International Relations ‘Clingendael’. Cover photo: Aviation Ordnancemen aboard USS Carl Vinson © Flickr / Commander, U.S. 7th Fleet Unauthorised use of any materials violates copyright, trademark and / or other laws. Should a user download material from the website or any other source related to the Netherlands Institute of International Relations ‘Clingendael’, or the Clingendael Institute, for personal or non-commercial use, the user must retain all copyright, trademark or other similar notices contained in the original material or on any copies of this material. Material on the website of the Clingendael Institute may be reproduced or publicly displayed, distributed or used for any public and non-commercial purposes, but only by mentioning the Clingendael Institute as its source. Permission is required to use the logo of the Clingendael Institute. This can be obtained by contacting the Communication desk of the Clingendael Institute ([email protected]). The following web link activities are prohibited by the Clingendael Institute and may present trademark and copyright infringement issues: links that involve unauthorised use of our logo, framing, inline links, or metatags, as well as hyperlinks or a form of link disguising the URL.
    [Show full text]
  • Cadernos Do IUM N.º22
    INSTITUTO UNIVERSITÁRIO MILITAR STORM WATCHING. A NEW LOOK AT WORLD WAR ONE 1 Autor Coronel Nuno Correia Neves IUM – Centro de Investigação e Desenvolvimento (CIDIUM) Novembro 2017 1 The contents of this IUM Notebooks are the sole responsibility of the author and do not necessarily reflect the official views of the Military University Institute.... Cadernos do IUM N.º 22 Os Cadernos do IUM têm como principal objetivo divulgar os resultados da in- vestigação desenvolvida no/sob a égide IUM, autonomamente ou em parcerias, que não tenha dimensão para ser publicada em livro. A sua publicação não deverá ter uma periodicidade definida. Contudo, deverão ser publicados, pelo menos, seis números anualmente. Os temas devem estar em consonância com as linhas de investigação prioritárias do CID/IUM. Devem ser publicados em papel e eletronicamente no sítio do IUM. Consideram-se como objeto de publicação pelos Cadernos do IUM: • Trabalhos de investigação dos investigadores do CID/IUM ou de outros in- vestigadores nacionais ou estrangeiros; • Trabalhos de investigação individual ou de grupo de reconhecida qualidade, efetuados pelos discentes, em particular pelos do CEMC e pelos auditores do CPOG que tenham sido indicados para publicação e que se enquadrem no âm- bito das Ciências Militares, da Segurança e Defesa Nacional e Internacional; • Papers , ensaios e artigos de reflexão produzidos pelos docentes; • Comunicações de investigadores do IUM efetuadas em eventos científicos (e.g., seminários, conferências, workshops , painéis, mesas redondas), de
    [Show full text]
  • Europe and the Challenge of Proliferation
    EUROPE AND THE CHALLENGE OF PROLIFERATION Yves Boyer, Christophe Carle, Joachim Krause, Harald Müller and Geoffrey Van Orden Edited by Paul Cornish, Peter van Ham and Joachim Krause May 1996 © Institute for Security Studies of WEU 1996. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photo-copying, recording or otherwise without the prior permission of the Institute for Security Studies of WEU. ISSN 1017-7566 TABLE OF CONTENTS List of abbreviations Introduction(Paul Cornish, Peter van Ham and Joachim Krause) The proliferation of weapons of mass destruction: the risks for Europe(Joachim Krause) The proliferation of conventional arms and dual-use technologies(Yves Boyer) European nuclear non-proliferation after the NPT extension(Harald Müller) Conventional arms transfers(Christophe Carle) European arms export controls(Geoffrey Van Orden) LIST OF ABBREVIATIONS ACRS (Middle East) Arms Control and Regional Security APM anti-personnel mine(s) BW biological warfare/weapons CAT Conventional Arms Transfer CD Conference on Disarmament in Europe CEP circular error probable (a measure of missile accuracy) CFSP Common Foreign and Security Policy CIS Commonwealth of Independent States COCOM Coordinating Committee for Multilateral Export Controls COREPER Committee of member states' Permanent Representatives to the European Community COREU European Union communications CTBT Comprehensive Test-Ban Treaty CW chemical warfare/weapons CWC
    [Show full text]
  • An Analysis on Joe Mason's Crime Motives in Baldacci's
    PLAGIATPLAGIAT MERUPAKAN MERUPAKAN TINDAKAN TINDAKAN TIDAK TIDAK TERPUJI TERPUJI AN ANALYSIS ON JOE MASON’S CRIME MOTIVES IN BALDACCI’S ZERO DAY A SARJANA PENDIDIKAN THESIS Presented as Partial Fulfillment of the Requirements to Obtain the Sarjana Pendidikan Degree in English Language Education By Marliana Lindrisari Putri Magong Student Number: 101214187 ENGLISH LANGUAGE EDUCATION STUDY PROGRAM DEPARTMENT OF LANGUAGE AND ARTS EDUCATION FACULTY OF TEACHERS AND TRAINING EDUCATION SANATA DHARMA UNIVERSITY YOGYAKARTA 2015 i PLAGIATPLAGIAT MERUPAKAN MERUPAKAN TINDAKAN TINDAKAN TIDAK TIDAK TERPUJI TERPUJI PLAGIATPLAGIAT MERUPAKAN MERUPAKAN TINDAKAN TINDAKAN TIDAK TIDAK TERPUJI TERPUJI PLAGIATPLAGIAT MERUPAKAN MERUPAKAN TINDAKAN TINDAKAN TIDAK TIDAK TERPUJI TERPUJI “Live as if you Were to die tomorrow Learn as if you Were to live forever” (Mahatma Gandhi) iv PLAGIATPLAGIAT MERUPAKAN MERUPAKAN TINDAKAN TINDAKAN TIDAK TIDAK TERPUJI TERPUJI This thesis is dedicated to: my beloved parents and my beloved brothers v PLAGIATPLAGIAT MERUPAKAN MERUPAKAN TINDAKAN TINDAKAN TIDAK TIDAK TERPUJI TERPUJI STATEMENT OF WORK’S ORIGINALITY I honestly declare that this thesis, which I have written, does not contain the work or parts of the work of other people, except those cited in the quotations and the references, as a scientific paper should. Yogyakarta, 10 June 2015 The writer Marliana Lindrisari Putri Magong 101214187 vi PLAGIATPLAGIAT MERUPAKAN MERUPAKAN TINDAKAN TINDAKAN TIDAK TIDAK TERPUJI TERPUJI LEMBAR PERNYATAAN PERSETUJUAN PUBLIKASI KARYA ILMIAH UNTUK KEPENTINGAN AKADEMIS Yang bertanda tangan di bawah ini, saya mahasiswa Universitas Sanata Dharma: Nama : Marliana Lindrisari Putri Magong Nomor Mahasiswa : 101214187 Demi kepentingan ilmu pengetahuan, saya memberikan kepada Perpustakaan Universitas Sanata Dharma karya ilmiah saya yang berjudul : AN ANALYSIS ON JOE MASON’S CRIME MOTIVES IN BALDACCI’S ZERO DAY beserta perangkat yang diperlukan (bila ada).
    [Show full text]
  • Iran and Nuclear Weapons
    CSIS_______________________________ Center for Strategic and International Studies 1800 K Street N.W. Washington, DC 20006 (202) 775-3270 Fax: (202) 466-4740 (For Updates see CSIS.ORG) Iran and Nuclear Weapons Background Paper for the Senate Foreign Relations Committee Anthony H. Cordesman Senior Fellow for Strategic Assessment Center for Strategic and International Studies March 24, 2000 Copyright Anthony H. Cordesman, all rights reserved. Iran and Nuclear Weapons 4/10/00 Page ii Table of Contents IRANIAN STATEMENTS AND DENIALS REGARDING NUCLEAR WEAPONS............................................................ 2 NUCLEAR WEAPONS EFFORTS UNDER THE SHAH.............................................................................................. 4 THE REVITALIZATION OF IRAN’S NUCLEAR WEAPONS EFFORT........................................................................ 5 CREEPING PROLIFERATION UNDER RAFSANJANI .............................................................................................. 7 Chinese Reactor Deals................................................................................................................................... 8 Russian Reactor Deals................................................................................................................................. 10 Longer-term Reactor Programs ................................................................................................................... 13 Reactors and Proliferation..........................................................................................................................
    [Show full text]
  • Background and Oversight Issues for Congress
    Order Code RL32238 CRS Report for Congress Received through the CRS Web Defense Transformation: Background and Oversight Issues for Congress Updated February 17, 2006 Ronald O’Rourke Specialist in National Defense Foreign Affairs, Defense, and Trade Division Congressional Research Service ˜ The Library of Congress Defense Transformation: Background and Oversight Issues for Congress Summary The Bush Administration identified transformation as a major goal for the Department of Defense (DOD) soon after taking office and emphasized the concept during the period 2001-2004. Defense transformation can be defined as large-scale, discontinuous, and possibly disruptive changes in military weapons, concepts of operations (i.e., approaches to warfighting), and organization. The issue for the 2nd session of the 109th Congress is how to take the concept of defense transformation into account in assessing and acting on Administration proposals for DOD. The Administration argues that new technologies make defense transformation possible and that new threats to U.S. security make defense transformation necessary. The Administration’s vision for defense transformation calls for placing increased emphasis in U.S. defense planning on irregular warfare, including terrorism, insurgencies, and civil war; potential catastrophic security threats, such as the possession and possible use of weapons of mass destruction by terrorists and rogue states; and potential disruptive events, such as the emergence of new technologies that could undermine current U.S. military advantages. The Administration’s vision for defense transformation calls for shifting U.S. military forces toward a greater reliance on joint operations, network-centric warfare, effects-based operations, speed and agility, and precision application of firepower.
    [Show full text]