Regional Cooperation and Its Enemies in Northeast Asia: The

Total Page:16

File Type:pdf, Size:1020Kb

Regional Cooperation and Its Enemies in Northeast Asia: The Downloaded by [University of Defence] at 20:40 09 May 2016 Regional Cooperation and its Enemies in Northeast Asia Northeast Asia is a region of both extraordinary economic growth and dangerous tensions which could explode in war. This book examines how domestic politics in all the countries of the region – China, Japan, Russia, Taiwan, North Korea and South Korea and, of course, the USA – intensifies the forces of both mutually beneficial prosperity and also war-prone tensions. It goes on to provide policy suggestions for making the better prospects more likely and the worse outcomes less likely. The book, highlighting how domestic imperatives shape foreign poli- cies, will be an important contribution to the literature on Northeast Asian region- alism and the prospects for its future development. Edward Friedman is Professor in the Department of Political Science at the University of Wisconsin-Madison. He is the co-author of Chinese Village Socialist State, and Revolution, Resistance and Reform in Village China; editor of China’s Rise, Taiwan’s Dilemmas and International Peace; and co-editor of Asia’s Giants: Comparing India and China. Sung Chull Kim is Associate Professor at Hiroshima Peace Institute, Hiroshima City University. He is the author of North Korea under Kim Jong Il: From Consolidation to Systemic Dissonance. He has also contributed a number of arti- cles on political theory and North Korea in journals including Systems Research and Behavioural Science and Communist Studies and Transition Politics. Downloaded by [University of Defence] at 20:40 09 May 2016 Routledge Security in Asia Pacific Series Series editors: Leszek Buszynski International University of Japan and William Tow Australian National University Security issues have become more prominent in the Asia Pacific region because of the presence of global players, rising great powers, and confident middle pow- ers, which intersect in complicated ways. This series puts forward important new work on key security issues in the region. It embraces the roles of the major actors, their defense policies and postures and their security interaction over the key issues of the region. It includes coverage of the United States, China, Japan, Russia, the Koreas, as well as the middle powers of ASEAN and South Asia. It also covers issues relating to environmental and economic security as well as transnational actors and regional groupings. 1 Bush and Asia America’s evolving relations with East Asia Edited by Mark Beeson 2 Japan, Australia and Asia–Pacific Security Edited by Brad Williams and Andrew Newman 3 Regional Cooperation and its Enemies in Northeast Asia The impact of domestic forces Edited by Edward Friedman and Sung Chull Kim Downloaded by [University of Defence] at 20:40 09 May 2016 Regional Cooperation and its Enemies in Northeast Asia The impact of domestic forces Edited by Edward Friedman and Sung Chull Kim Downloaded by [University of Defence] at 20:40 09 May 2016 First published 2006 by Routledge 2 Park Square, Milton Park, Abingdon, Oxon OX14 4RN Simultaneously published in the USA and Canada by Routledge 270 Madison Ave, New York, NY10016 Routledge is an imprint of the Taylor & Francis Group, an informa business This edition published in the Taylor & Francis e-Library, 2007. “To purchase your own copy of this or any of Taylor & Francis or Routledge’s collection of thousands of eBooks please go to www.eBookstore.tandf.co.uk.” ©2006 Editorial selection and matter, Edward Friedman and Sung Chull Kim; Individual chapters, the contributors All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers. British Library Cataloguing in Publication Data A catalogue record for this book is available from the British Library Library of Congress Cataloging in Publication Data A catalogue record for this book has been requested ISBN 0–203–96870–0 Master e-book ISBN ISBN10: 0-415-39922-X (hbk) Downloaded by [University of Defence] at 20:40 09 May 2016 ISBN10: 0-203-96870-0 (ebk) ISBN13: 978-0-415-39922-7 (hbk) ISBN13: 978-0-203-96870-3 (ebk) Contents About the editors and contributors vii Acknowledgements ix List of acronyms xi Introduction: multilayered domestic-regional linkages 1 Sung Chull Kim PART I Contextualizing the Northeast Asian region 15 1 Domestic politics and regional cooperation in Southeast and Northeast Asia 17 Etel Solingen 2 Envisioning a Northeast Asian community: regional and domestic factors to consider 38 Haruki Wada PART II Domestic dimension of regional interaction 59 Downloaded by [University of Defence] at 20:40 09 May 2016 3 Washington’s policies toward North Korea and the Taiwan Strait: the role of US domestic politics 61 Tun-jen Cheng 4 The two Koreas in Northeast Asia: linkages between domestic, inter-Korean, and regional politics 85 Yong-Pyo Hong 5 The transformation of Chinese foreign policy 101 Lowell Dittmer vi Contents 6 The fragility of China’s regional cooperation 125 Edward Friedman 7 State consolidation and foreign policy in Russia 143 Leszek Buszynski 8 Mediating geopolitics, markets and regionalism: domestic politics in Japan’s post-Cold War relations with China 165 Peng Er Lam PART III Non-governmental sources of regional cooperation 183 9 Transnational cooperation among NGOs in Northeast Asia: from re-thinking development towards re-thinking security 185 Daehoon Lee Conclusion 205 Edward Friedman and Sung Chull Kim Index 214 Downloaded by [University of Defence] at 20:40 09 May 2016 About the editors and contributors Leszek Buszynski is Professor in the Graduate School of International Relations at the International University of Japan. He was previously Dean of the Graduate School of International Relations and Director of the IUJ Research Institute. He authored Asia Pacific Security: Values and Identity (RoutledgeCurzon, 2004), Russian Foreign Policy after the Cold War (Praeger, 1996), and Gorbachev and Southeast Asia (Routledge, 1992). Tun-jen Cheng is Class of 1935 Professor in the Department of Government at the College of William and Mary. His primary interests are in comparative political economy and East Asian development. He has published numerous journal articles and book chapters and coauthored and coedited many volumes including Religious Organizations and Democracy in Contemporary Asia (M. E. Sharpe, 2006) and China Under Hu Jintao (World Scientific Co., 2006). Lowell Dittmer is Professor in the Department of Political Science at the University of California, Berkeley, and the editor of Asian Survey. His pub- lished books include South Asia’s Nuclear Security Dilemma (M. E. Sharpe, 2005, edited), Informal Politics in East Asia (Cambridge University Press, 2000, coedited with Haruhiro Fukui and Peter N. S. Lee), Liu Shaoqi and the Chinese Cultural Revolution (M. E. Sharpe, 1998), and China Under Reform (Westview Press, 1994). Edward Friedman is Professor in the Department of Political Science at the University of Wisconsin-Madison. He is coauthor of Chinese Village Socialist State (New Haven: Yale University Press, 1993). In 2005 he published three Downloaded by [University of Defence] at 20:40 09 May 2016 books: Revolution, Resistance and Reform in Village China (Yale); China’s Rise, Taiwan’s Dilemmas, and International Peace (Routledge); Asia’s Giants: Comparing India and China (Palgrave). Yong-Pyo Hong is Associate Professor in the Department of Political Science at Hanyang University, Seoul. He is the author of State Security and Regime Security: President Syngman Rhee and the Insecurity Dilemma in South Korea (Macmillan, 2000) and Kim Jung Il’s Security Dilemma and Policies towards the US and South Korea (KINU, 1997 in Korean). viii About the editors and contributors Sung Chull Kim is Associate Professor at the Hiroshima Peace Institute, Hiroshima City University. He is the author of North Korea Under Kim Jong Il: From Consolidation to Systemic Dissonance (SUNY Press, 2006). He has also contributed a number of articles on political theory and North Korea in scholarly journals, including Systems Research and Behavioral Science and Communist Studies and Transition Politics. Peng Er Lam is Senior Research Fellow at the East Asian Institute, National University of Singapore. Lam has published many articles on Japanese dom- estic politics and foreign affairs in scholarly journals including Pacific Affairs, Asian Survey, Japan Forum and Asian Affairs. His books include: Green Politics in Japan (Routledge, 1999) and Japan’s Relations with China: Facing a Rising Power (Routledge, 2006, edited). Daehoon Lee is Lecturer in peace studies at Songkonghoe University, Seoul, and the deputy secretary of a non-governmental organization, People’s Solidarity for Participatory Democracy. He is the author of Global Issues of the 21st Century (1999, in Korean), and has contributed articles to human rights journals in Korea and to Inter-Asia Cultural Studies and Searching for Peace in Asia Pacific. Etel Solingen is Professor in the Department of Political Science at the University of California, Irvine, and also serves as Chair of the Steering Committee of the University of California’s system-wide Institute on Global Conflict and Cooperation. She authored Regional Orders at Century’s Dawn: Global and Domestic Influences on Grand Strategy (Princeton University Press, 1998),
Recommended publications
  • The Evolution of North Korean Cyber Threats
    The Evolution of North Korean Cyber Threats 2019-03 Chong Woo Kim, Senior Fellow The Asan Institute for Policy Studies Carolina Polito1 University of Bologna 2019.02.19 Introduction In North Korea, only a few people are allowed access to Kwangmyong, the national intranet service, as global internet access is restricted to a group of selected people, and the country has one of the weakest internet infrastructures in the world.2 Nonetheless, North Korea is a formidable cyber power, standing alongside major players like the United States, China, Russia, the United Kingdom, Israel and Iran.3 North Korea has been increasing resources to enhance and expand its cyber capabilities, as testified by the intensification of the regime-sponsored attacks that the world has witnessed in the last 10 years. Amongst the most blatant offensive cyber-attacks allegedly linked to hacker groups close to North Korea are the Sony Pictures attack, the WannaCry attack, and the DarkSeoul attack, despite the North’s constant denial of any involvement with these attacks or the damage suffered by them. North Korea’s cyber army consists of approximately 7,000 hackers,4 performing a wide range of activities including theft, denial of service (DDoS), espionage and sabotage. 5 These types of operations have proved to be very useful as part of North Korea’s asymmetric strategy towards the ROK-U.S. Combined Forces Command. Cyber operations are low-cost and low-risk, allowing North Korea to counter countries which have highly computer-dependent infrastructure, with little fear of retaliation. Due to their low-intensity, these attacks often lie beneath the threshold of an armed attack, reducing the risk of escalating the conflict to an unaffordable level.
    [Show full text]
  • Journal of Current Chinese Affairs
    3/2006 Data Supplement PR China Hong Kong SAR Macau SAR Taiwan CHINA aktuell Journal of Current Chinese Affairs Data Supplement People’s Republic of China, Hong Kong SAR, Macau SAR, Taiwan ISSN 0943-7533 All information given here is derived from generally accessible sources. Publisher/Distributor: Institute of Asian Affairs Rothenbaumchaussee 32 20148 Hamburg Germany Phone: (0 40) 42 88 74-0 Fax:(040)4107945 Contributors: Uwe Kotzel Dr. Liu Jen-Kai Christine Reinking Dr. Günter Schucher Dr. Margot Schüller Contents The Main National Leadership of the PRC LIU JEN-KAI 3 The Main Provincial Leadership of the PRC LIU JEN-KAI 22 Data on Changes in PRC Main Leadership LIU JEN-KAI 27 PRC Agreements with Foreign Countries LIU JEN-KAI 30 PRC Laws and Regulations LIU JEN-KAI 34 Hong Kong SAR Political Data LIU JEN-KAI 36 Macau SAR Political Data LIU JEN-KAI 39 Taiwan Political Data LIU JEN-KAI 41 Bibliography of Articles on the PRC, Hong Kong SAR, Macau SAR, and on Taiwan UWE KOTZEL / LIU JEN-KAI / CHRISTINE REINKING / GÜNTER SCHUCHER 43 CHINA aktuell Data Supplement - 3 - 3/2006 Dep.Dir.: CHINESE COMMUNIST Li Jianhua 03/07 PARTY Li Zhiyong 05/07 The Main National Ouyang Song 05/08 Shen Yueyue (f) CCa 03/01 Leadership of the Sun Xiaoqun 00/08 Wang Dongming 02/10 CCP CC General Secretary Zhang Bolin (exec.) 98/03 PRC Hu Jintao 02/11 Zhao Hongzhu (exec.) 00/10 Zhao Zongnai 00/10 Liu Jen-Kai POLITBURO Sec.-Gen.: Li Zhiyong 01/03 Standing Committee Members Propaganda (Publicity) Department Hu Jintao 92/10 Dir.: Liu Yunshan PBm CCSm 02/10 Huang Ju 02/11
    [Show full text]
  • An Assessment of North Korean Threats and Vulnerabilities in Cyberspace
    BearWorks MSU Graduate Theses Fall 2017 An Assessment of North Korean Threats and Vulnerabilities in Cyberspace Jeremiah van Rossum Missouri State University, [email protected] As with any intellectual project, the content and views expressed in this thesis may be considered objectionable by some readers. However, this student-scholar’s work has been judged to have academic value by the student’s thesis committee members trained in the discipline. The content and views expressed in this thesis are those of the student-scholar and are not endorsed by Missouri State University, its Graduate College, or its employees. Follow this and additional works at: https://bearworks.missouristate.edu/theses Part of the Defense and Security Studies Commons Recommended Citation van Rossum, Jeremiah, "An Assessment of North Korean Threats and Vulnerabilities in Cyberspace" (2017). MSU Graduate Theses. 3212. https://bearworks.missouristate.edu/theses/3212 This article or document was made available through BearWorks, the institutional repository of Missouri State University. The work contained in it may be protected by copyright and require permission of the copyright holder for reuse or redistribution. For more information, please contact [email protected]. AN ASSESSMENT OF NORTH KOREAN THREATS AND VULNERABILITIES IN CYBERSPACE A Master’s Thesis Presented to The Graduate College of Missouri State University In Partial Fulfillment Of the Requirements for the Degree Master of Science, Defense and Strategic Studies By Jeremiah Adam van Rossum December 2017 Copyright 2017 by Jeremiah Adam van Rossum ii AN ASSESSMENT OF NORTH KOREAN THREATS AND VULNERABILITIES IN CYBERSPACE Defense and Strategic Studies Missouri State University, December 2017 Master of Science Jeremiah Adam van Rossum ABSTRACT This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these.
    [Show full text]
  • Journal of Current Chinese Affairs
    China Data Supplement May 2007 J People’s Republic of China J Hong Kong SAR J Macau SAR J Taiwan ISSN 0943-7533 China aktuell Data Supplement – PRC, Hong Kong SAR, Macau SAR, Taiwan 1 Contents The Main National Leadership of the PRC .......................................................................... 2 LIU Jen-Kai The Main Provincial Leadership of the PRC ..................................................................... 30 LIU Jen-Kai Data on Changes in PRC Main Leadership ...................................................................... 37 LIU Jen-Kai PRC Agreements with Foreign Countries ......................................................................... 42 LIU Jen-Kai PRC Laws and Regulations .............................................................................................. 44 LIU Jen-Kai Hong Kong SAR ................................................................................................................ 45 LIU Jen-Kai Macau SAR ....................................................................................................................... 52 LIU Jen-Kai Taiwan .............................................................................................................................. 56 LIU Jen-Kai ISSN 0943-7533 All information given here is derived from generally accessible sources. Publisher/Distributor: GIGA Institute of Asian Studies Rothenbaumchaussee 32 20148 Hamburg Germany Phone: +49 (0 40) 42 88 74-0 Fax: +49 (040) 4107945 2 May 2007 The Main National Leadership of the PRC
    [Show full text]
  • Blas, Zach. 2016. Contra-Internet. E-Flux Journal, 74, ISSN 2164-1625
    Blas, Zach. 2016. Contra-Internet. e-flux journal, 74, ISSN 2164-1625 [Article] https://research.gold.ac.uk/id/eprint/18595/ The version presented here may differ from the published, performed or presented work. Please go to the persistent GRO record above for more information. If you believe that any material held in the repository infringes copyright law, please contact the Repository Team at Goldsmiths, University of London via the following email address: [email protected]. The item will be removed from the repository while any claim is being investigated. For more information, please contact the GRO team: [email protected] Zach Blas 1 of 5 e-flux journal #74 (2016) CONTRA-INTERNET 1. Killing the Internet On January 28th, 2011, only a few days after protests had broken out in Egypt demanding the overthrow of then President Hosni Mubarak, the Egyptian government terminated national access to the internet. This state-sponsored shutdown became known as flipping the internet’s“kill switch.” Intentions motivating the killing of the internet in Egypt were to block protestors from coordinating with one another and the dissemination of any media about the uprising, especially to those outside of the country. Peculiarly, it is a death that only lasted five days, as internet access was soon reinstated. More precisely, the internet kill switch unfolded as a series of political demands and technical operations. Egyptian Internet Service Providers, such as Telecom Egypt, Raya, and Link Egypt, were ordered to cancel their routing services, which had the effect of stymying internet connectivity through these major companies.
    [Show full text]
  • Journal of Current Chinese Affairs
    China Data Supplement October 2006 J People’s Republic of China J Hong Kong SAR J Macau SAR J Taiwan ISSN 0943-7533 China aktuell Data Supplement – PRC, Hong Kong SAR, Macau SAR, Taiwan 1 Contents The Main National Leadership of the PRC 2 LIU Jen-Kai The Main Provincial Leadership of the PRC 30 LIU Jen-Kai Data on Changes in PRC Main Leadership 37 LIU Jen-Kai PRC Agreements with Foreign Countries 44 LIU Jen-Kai PRC Laws and Regulations 48 LIU Jen-Kai Hong Kong SAR 49 Political, Social and Economic Data LIU Jen-Kai Macau SAR 56 Political, Social and Economic Data LIU Jen-Kai Taiwan 60 Political, Social and Economic Data LIU Jen-Kai ISSN 0943-7533 All information given here is derived from generally accessible sources. Publisher/Distributor: GIGA Institute of Asian Affairs Rothenbaumchaussee 32 20148 Hamburg Germany Phone: +49 (0 40) 42 88 74-0 Fax: +49 (040) 4107945 2 October 2006 The Main National Leadership of the PRC LIU Jen-Kai Abbreviations and Explanatory Notes CCP CC Chinese Communist Party Central Committee CCa Central Committee, alternate member CCm Central Committee, member CCSm Central Committee Secretariat, member PBa Politburo, alternate member PBm Politburo, member Cdr. Commander Chp. Chairperson CPPCC Chinese People’s Political Consultative Conference CYL Communist Youth League Dep. P.C. Deputy Political Commissar Dir. Director exec. executive f female Gen.Man. General Manager Gen.Sec. General Secretary Hon.Chp. Honorary Chairperson H.V.-Chp. Honorary Vice-Chairperson MPC Municipal People’s Congress NPC National People’s Congress PCC Political Consultative Conference PLA People’s Liberation Army Pol.Com.
    [Show full text]
  • Newsletter February 2018
    Embassy of India, Tokyo NEWSLETTER February 2018 Index Ambassador HE Sujan R Chinoy’s Meetings 3 Seminar on India’s Budget 4 Visit of Parliamentary Delegation from India 4 Visit of Chief Minister of Bihar Shri Nitish Kumar 4 Biannual Reception of Japan India Association 5 Seminars on Economic Opportunities in India 5 Workshop on Arctic Governance 5 Outreach events and Seminar in Kagawa and Ehime Prefectures 5 Meeting with senior management and Indian engineers of Toyo Engineering Corporation 5 Forum 21 Alumni of 2016 batch 6 Visit of Addl DGF(FC) of Ministry of Environment, Forest & Climate Change 6 Interactions by Commerce Wing with Senior Officials of Japanese Companies 6 Japan India High Speed Rail Civil Works and Turnouts Workshop 6 1 Visit to JR-East Staff Training Center and Shinkansen General Rolling Stock Center 7 Interactions with Dedicated Freight Corridor Corporation of India Ltd. (DFCCIL) & JICA 7 QCI examination for Yoga 7 Saraswati Puja 7 School Familiarization Visit by Fourth grade students from Taimei Elementary School 7 School visit by Kudan Junior High School 8 Veda and Sanskrit workshop 8 ICCR Scholarship 2018-19 test 8 Luncheon meeting with Ministry of Internal Affairs and Communication, "Curry Club" 8 Public yoga session in Kitanomaru Park 8 Press Release on the Demise of Padma Bhushan Awardee Mr. Saichiro Misumi 9 Automobile Industry in India 10 Udaipur in Rajasthan – a popular tourist destination in India 12 State Profile: Bihar 23 Trade Fairs & Business Exhibitions in India in February – April 2018 25 Trade Queries from India 27 Photo Gallery 30 “Beauty doesn't need ornaments.
    [Show full text]
  • Monday, November 28, 2016 the Opening of the North Korean Mind Pyongyang Versus the Digital Underground Jieun Baek
    12/2/2016 The Opening of the North Korean Mind Home > The Opening of the North Korean Mind Monday, November 28, 2016 The Opening of the North Korean Mind Pyongyang Versus the Digital Underground Jieun Baek JIEUN BAEK is the author of North Korea’s Hidden Revolution: How the Information Underground Is Transforming a Closed Society (Yale University Press, 2016), from which this essay is adapted. From 2014 to 2016, she was a Fellow at the Belfer Center for Science and International Affairs at Harvard University. Follow her on Twitter @JieunBaek1. On a cold, clear night in September 2014, a man I’ll call Ahn walked up to the edge of the Tumen River on the Chinese side of the heavily guarded border between China and North Korea. At its narrowest points, the Tumen measures a little over 150 feet wide, and Ahn could easily see the North Korean side from where he stood. In two bags, he was carrying 100 USB drives filled with films, television shows, music, and e­books from around the world. Almost anywhere else, such material would be considered completely innocuous. At this border, however, it constitutes highly illicit, dangerous contraband. In the totalitarian state of North Korea, citizens are allowed to see and hear only those media products created or sanctioned by the government. Pyongyang considers foreign information of any kind a threat and expends great effort keeping it out. The regime’s primary fear is that exposure to words, images, and sounds from the outside world could make North Koreans disillusioned with the state of affairs in their own country, which could lead them to desire—or even demand—change.
    [Show full text]
  • Brazil, Japan, and Turkey
    BRAZIL | 1 BRAZIL, JAPAN, AND TURKEY With articles by Marcos C. de Azambuja Henri J. Barkey Matake Kamiya Edited By Barry M. Blechman September 2009 2 | AZAMBUJA Copyright ©2009 The Henry L. Stimson Center Cover design by Shawn Woodley Photograph on the front cover from the International Atomic Energy Agency All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means without prior written consent from The Henry L. Stimson Center. The Henry L. Stimson Center 1111 19th Street, NW 12th Floor Washington, DC 20036 phone: 202-223-5956 fax: 202-238-9604 www.stimson.org BRAZIL | 3 PREFACE I am pleased to present Brazil, Japan, and Turkey, the sixth in a series of Stimson publications addressing questions of how the elimination of nuclear weapons might be achieved. The Stimson project on nuclear security explores the practical dimensions of this critical 21st century debate, to identify both political and technical obstacles that could block the road to “zero,” and to outline how each of these could be removed. Led by Stimson's co-founder and Distinguished Fellow Dr. Barry Blechman, the project provides useful analyses that can help US and world leaders make the elimination of nuclear weapons a realistic and viable option. The series comprises country assessments, published in a total of six different monographs, and a separate volume on such technical issues as verification and enforcement of a disarmament regime, to be published in the fall. This sixth monograph in the series, following volumes on France and the United Kingdom, China and India, Israel and Pakistan, Iran and North Korea, and Russia and the United States, examines three countries without nuclear weapons of their own, but which are nonetheless key states that would need to be engaged constructively in any serious move toward eliminating nuclear weapons.
    [Show full text]
  • Documento De Apoyo
    DOCUMENTO DE APOYO CON MOTIVO DEL PROCESO DE RATIFICACIÓN DEL H. SENADO DE LA REPÚBLICA, AL NOMBRAMIENTO DE LA C. MELBA MARÍA PRÍA OLAVARRIETA COMO EMBAJADORA EXTRAORDINARIA Y PLENIPOTENCIARIA DE MÉXICO EN JAPÓN Abril de 2019 Japón Abril de 2019 1 Japón Abril de 2019 Contenido I. Introducción ......................................................................................................... 3 II. Características de la adscripción ..................................................................4 a. Datos básicos......................................................................................................................... 4 b. Panorama político y social ........................................................................................... 4 c. Panorama económico.................................................................................................... 13 III. Relación bilateral ...............................................................................................16 a. Relación con México en la actualidad.................................................................16 b. Comercio.................................................................................................................................27 c. Inversiones.............................................................................................................................30 d. Oportunidades de negocios ...................................................................................... 31 e. Cooperación ........................................................................................................................
    [Show full text]
  • AN ANALYSIS of VLADIMIR PUTIN and HIS POLITICAL PROJECT (II) UNISCI Discussion Papers, Núm
    UNISCI Discussion Papers ISSN: 1696-2206 [email protected] Universidad Complutense de Madrid España MORALES, JAVIER WHO RULES RUSSIA TODAY? AN ANALYSIS OF VLADIMIR PUTIN AND HIS POLITICAL PROJECT (II) UNISCI Discussion Papers, núm. 4, enero, 2004, pp. 1-11 Universidad Complutense de Madrid Madrid, España Available in: http://www.redalyc.org/articulo.oa?id=76712465010 How to cite Complete issue Scientific Information System More information about this article Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Journal's homepage in redalyc.org Non-profit academic project, developed under the open access initiative UNISCI DISCUSSION PAPERS Enero de 2004 WHO RULES RUSSIA TODAY? AN ANALYSIS OF VLADIMIR PUTIN AND HIS POLITICAL PROJECT (II) AUTOR 1: JAVIER MORALES UNISCI FECHA: Enero de 2004 Introduction This is the second part of an article that appeared in the previous issue of this journal.2 There we dealt with the first years of Putin’s career, concluding that there are many missing points in the official accounts of his service as a KGB officer. We also referred to his transition to politics beside Anatoli Sobchak, in the last months before the Soviet Union collapsed. Here, in section one, we are going to consider his positions at Yeltsin’s administration, and later at the Federal Security Service (FSB), the Security Council, and the cabinet. In section two, we will analyze the main ideas in Putin’s political program, as outlined in the 2000 presidential campaign. Finally, in section three, we will see how this project has been put into practice, contrasting several explanations of the president’s aims and decisions that have been suggested by the media and the scholarly literature.
    [Show full text]
  • BASEES Sampler
    R O U T L E D G E . TAYLOR & FRANCIS Slavonic & East European Studies A Chapter and Journal Article Sampler www.routledge.com/carees3 Contents Art and Protest in Putin's Russia by Laurien 1 Crump Introduction Freedom of Speech in Russia edited by Piotr 21 Dutkiewicz, Sakwa Richard, Kulikov Vladimir Chapter 8: The Putin regime: patrimonial media The Capitalist Transformation of State 103 Socialism by David Lane Chapter 11: The move to capitalism and the alternatives Europe-Asia Studies 115 Identity in transformation: Russian speakers in Post- Soviet Ukrane by Volodymyr Kulyk Post-Soviet Affairs 138 The logic of competitive influence-seeking: Russia, Ukraine, and the conflict in Donbas by Tatyana Malyarenko and Stefan Wolff 20% Discount Available Enjoy a 20% discount across our entire portfolio of books. Simply add the discount code FGT07 at the checkout. Please note: This discount code cannot be combined with any other discount or offer and is only valid on print titles purchased directly from www.routledge.com. www.routledge.com/carees4 Copyright Taylor & Francis Group. Not for distribution. 1 Introduction It was freezing cold in Moscow on 24 December 2011 – the day of the largest mass protest in Russia since 1993. A crowd of about 100 000 people had gathered to protest against electoral fraud in the Russian parliamentary elections, which had taken place nearly three weeks before. As more and more people joined the demonstration, their euphoria grew to fever pitch. Although the 24 December demonstration changed Russia, the period of euphoria was tolerated only until Vladimir Putin was once again installed as president in May 2012.
    [Show full text]