Query Result Set
Skip Navigation Links
   ActiveUsers:939Hits:18537344Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
PREEMPTION (17) answer(s).
 
SrlItem
1
ID:   189909


Assessing threatening uncertainties: Counterterrorism and everyday practices of preemptive policing in Ghana / Christensen, Maya Mynster   Journal Article
Christensen, Maya Mynster Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The preemptive turn in counterterrorism has turned future uncertainties into key objects of contemporary security governance. From an empirically grounded perspective, this article contributes with novel insight into the everyday practices of preemptive politics. Focusing on Ghana as a unique case through which to trace how the mobilization of affect accelerates the transnational proliferation of counterterrorism measures and the commodification of future uncertainty, it shows how the global War on Terror has shaped the emergence of counterterrorism in a context characterized by the absence of terrorist attacks on home soil. Exploring how preemption animates outreach activities, simulation exercises, and nighttime patrols, it shows how police officers attempt to make uncertain futures tangible and actionable through practices of imagination and performance. Aimed at assessing terrorist threats that have not (yet) materialized, the article argues that preemptive policing practices cause a conflation of ordinary crime and extraordinary terror that inflates already existing uncertainties and subverts the institutional security logics of preemption.
        Export Export
2
ID:   127803


Beyond the erotics of orientalism: lawfare, torture and the racial-sexual grammars of legitimate suffering / Richter-Montpetit, Melanie   Journal Article
Richter-Montpetit, Melanie Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Contrary to commonsense understandings of torture as a form of information-gathering, confessions elicited through the use of torture produce notoriously unreliable data, and most interrogation experts oppose it as a result. With a focus on the US carceral regime in the War on Terror, this article explores the social relations and structures of feelings that make torture and other seemingly ineffective and absurd carceral practices possible and desirable as technologies of security. While much of international relations scholarship has focused on the ways in which affective and material economies of Orientalism are central to representations of the 'terrorist' threat, this article connects the carceral violences in the racialized lawfare against Muslimified people and spaces to the capture and enslavement of Africans and the concomitant production of the figure of the Black body as the site of enslaveability and openness to gratuitous violence. The article further explores how these carceral security practices are not simply rooted in racial-sexual logics of Blackness, but themselves constitute key sites and technologies of gendered and sexualized race-making in this era of 'post-racial triumph' (HoSang and LaBennett, 2012: 5).
Key Words Security  Torture  Race  Biopolitics  Preemption  Terror 
Sexuality  Affect  Lawfare  Liberal War 
        Export Export
3
ID:   077884


Breaking and making norms: american revisionism and crises of legitimacy / Hurd, Ian   Journal Article
Hurd, Ian Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Summary/Abstract International norms are influential when they are seen as legitimate, and recent American behaviour may undermine the legitimacy of norms on the use of force. I examine three kinds of legitimacy crisis that might arise from American revisionism. First, the US threatens to delegitimate the norms that it challenges, particularly on military preemption. Second, it threatens to undermine its own influence by disassociating American power from one source of legitimation. Finally, it may negate the basic idea of American hegemony as that term is understood in constructivist scholarship and so transform the structure of the international system. Any of these might lead to a crisis, though of different kinds. The American challenge to the customary law on preemption threatens to delegitimize both the existing norms and the social basis of US power, while also attempting to legitimize American interests and new understandings of the norms. It therefore shows the productive and destructive aspects of the power of legitimation in world politics. Legitimation is the link between states and the normative structures of international society
        Export Export
4
ID:   157756


Changing nuclear capabilities and strategy between the United States and North Korea / Cho, Kwan Haeng   Journal Article
Cho, Kwan Haeng Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Continuous development of North Korea’s nuclear capabilities and the accompanying concern about the possible decoupling of the alliance between the Republic of Korea (ROK) and the United States have produced numerous opinions on what should be done about North Korea’s nuclear program. While there are discussions on conceptual possibilities of deterrent or compellent use of nuclear weapons by North Korea, these discussions often fall short of making specific connections between the relational nuclear capabilities between North Korea and the United States, and their nuclear strategies. Such connection is necessary in grasping a clear picture of the nuclear security environment of the Korean Peninsula, and formulating possible policy responses the ROK should adopt as a result. This article seeks to make this connection by analyzing the nuclear capabilities and strategy of North Korea and the United States. It argues that North Korea will be able to pressure alliance decoupling only if it is able to field submarine–based ballistic missiles with an inter-continental range. The ROK should seek to avoid this outcome by strengthening its own deterrence measures against North Korea, seeking assurances on the U.S. alliance commitment, and seeking measures that could reverse North Korea’s potential second–strike capability.
        Export Export
5
ID:   087483


Geography of fear: Regional ethnic diversity, the security dilemma and ethnic war / Melander, Erik   Journal Article
Melander, Erik Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract This article explores to what extent the security dilemma through geographically induced first-strike advantages is a contributing cause of ethnic warfare. If there are possibly decisive advantages to be gained from striking the first blow, both temptation and fear may shortcut efforts to resolve a conflict in less costly ways, and trigger massive violence. Theoretical work and case studies suggest that in ethnic conflicts intermingled settlement patterns give rise to such first-strike advantages. I test whether ethnic groups in conflict are more likely to become involved in ethnic warfare if their main region of settlement is ethnically diverse. I also include controls intended to capture other aspects of the security dilemma. In robustness tests, I add indicators of group concentration and local majority status that have been found to increase the risk of ethnic violence in previous quantitative studies. I find a strong, statistically significant association between regional ethnic diversity and ethnic warfare.
        Export Export
6
ID:   114439


New standard for preemptive military action against WMD threats / Wehling, Fred   Journal Article
Wehling, Fred Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract International law clearly requires an imminent threat of attack as a justification for the preemptive use of military force. However, the standard definition of an imminent threat was derived centuries before the development of nuclear, chemical, or biological weapons or ballistic missiles and other delivery systems that can reach their targets in a matter of minutes. Any use of force to alleviate threats posed by weapons of mass destruction (WMD) prior to tactical warning of the actual launch of such weapons falls into the legally and ethically controversial category of "anticipatory self-defense," leaving decision makers potentially liable to prosecution for war crimes. Effective and ethical enforcement of nonproliferation therefore demands a standard for imminence of threat broad enough to allow military action as a last resort but sufficiently restrictive to prohibit indiscriminate action against suspected WMD programs. Following a critical review of selected literature and cases on preemption, the author proposes a new standard for preemptive military action: the existence of operational WMD, or a clandestine program to develop WMD, in contravention of international law. The author discusses the implications of this new proposed standard, which at the time of writing would permit preemptive attack against WMD-armed terrorist groups but prohibit it against all states except Iran and possibly North Korea.
        Export Export
7
ID:   074703


North Korea: the case against preemption / Collins, John M   Journal Article
Collins, John M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Key Words United States  North Korea  Nuclear Crisis  Preemption 
        Export Export
8
ID:   154702


Nuclear deterrence and cyber warfare: coexistence or competition? / Cimbala, Stephen J   Journal Article
Cimbala, Stephen J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.
        Export Export
9
ID:   080894


Politics of preemption and the war on terror in Europe / De Goede, Marieke   Journal Article
De Goede, Marieke Journal Article
0 Rating(s) & 0 Review(s)
Publication 2008.
Summary/Abstract In the midst of the war on terror and unilateral US security politics, many observers look to Europe for alternatives. It is argued that Europe is particularly opposed to preemptive security practice, and prefers instead to rely on the rule of law. This article examines the meaning of preemption in the war on terror, and analyses three aspects of European counter-terror policy. It becomes clear that, with respect to a number of policies that play a key role in preemptive security practice, including criminalizing terrorist support, data retention, and asset freezing, the European Union is world leader rather than reluctant follower. Instead of relying on images that position Europe as inherently critical of preemptive security, debate concerning the legitimacy and desirability of such practices must be actively fostered within European public space
Key Words Security  Europe  Risk  War on Terror  Preemption 
        Export Export
10
ID:   112737


Preempting the next disaster: catastrophe insurance and the financialization of disaster management / Grove, Kevin   Journal Article
Grove, Kevin Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract The 2007 launch of the Caribbean Catastrophic Risk Insurance Facility (CCRIF) introduced a new mechanism of state security against the uncertainties of climate change. Proponents argue that increasing the ability of member-states to finance disaster recovery through catastrophe insurance mitigates the effects of increasingly frequent and intense hurricanes and thus contributes to climate change adaptation. In contrast, I offer a critical analysis of the CCRIF that draws out how it facilitates what I call the 'financialization of disaster management'. The introduction of financial logics and techniques enables the state and capital to visualize a population's self-organizing adaptive capacity as both a threat to state-based forms of order and a value that can be leveraged on capital markets as catastrophe risk. Leveraging enhances a state's ability to repair its critical infrastructure and preemptively negate undesirable adaptations. The CCRIF blends risk pooling with parametric insurance techniques to turn the uncertainty surrounding a population's immanent adaptability into catastrophe risks that can be leveraged to enhance state security and capital accumulation in an emergent environment.
        Export Export
11
ID:   071937


Preemption: a knife that cuts both ways / Dershowitz, Alan M 2006  Book
Dershowitz, Alan M Book
0 Rating(s) & 0 Review(s)
Publication New York, W W Norton, 2006.
Description xii, 348p.
Standard Number 0393060128
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
051293363.32/DER 051293MainOn ShelfGeneral 
12
ID:   062585


Preemption and theevolution of america's strategic defence / Laver, Harry S Summer 2005  Journal Article
Laver, Harry S Journal Article
0 Rating(s) & 0 Review(s)
Publication Summer 2005.
        Export Export
13
ID:   072243


Preemption paradox / Ramberg, Bennett   Journal Article
Ramberg, Bennett Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
        Export Export
14
ID:   140523


South Korean-U.S. nuclear alliance: steadfast and changing / Weitz, Richard   Article
Weitz, Richard Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Nuclear-related issues remain at the core of the Seoul-Washington partnership. These include shared nuclear weapons threats to both partners from North Korea, tussles between South Koreans and Americans regarding how to deter and defeat these North Korean threats without antagonizing the other regional nuclear powers, and managing the transformation of the Republic of Korea (ROK) into a major civilian nuclear energy producer and exporter. Whatever the changes in the Northeast Asian security environment, the enduring goals of the South KoreanU.S. defense alliance remain unchanged—to deter North Korean aggression, maintain South Koreans’ security and welfare, contribute to regional and global stability, and work toward Korean reunification. But the shifting nature of the regional security environment has required difficult adjustments by both partners to sustain a robust and effective partnership.
Key Words Nuclear  Deterrence  BMD  Preemption  THAAD  ROK - US Nuclear Cooperation Agreement 
        Export Export
15
ID:   100956


Suicide terrorism and the backlash effect / Rosendorff, B Peter; Sandler, Todd   Journal Article
Sandler, Todd Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Summary/Abstract This paper presents a game-theoretic model of suicide terrorism containing three agents: the terrorist leader; a targeted government; and potential terrorist supporters. Supporters join the terrorist group if they gain more from their participation than from their economic opportunities. Preemptive measures by the government can result in a backlash that encourages recruitment through new grievances. Suicide attacks can also lead to recruitment. Increases in preemption costs and/or economic opportunities can reduce the overall level of terrorism, while increasing the proportion of suicide to normal attacks. An increase in the effect of preemption on recruitment, or the propaganda effect of suicide bombings has the opposite effect of increasing normal and suicide attacks, but decreasing the proportion of suicide to normal attacks in the terrorist organization's strategy profile.
Key Words Terrorism  Game Theory  Recruitment  Mobilization  Suicide Terrorism  Preemption 
Backlash 
        Export Export
16
ID:   112738


Suspicious encounters: ordinary preemption and the securitization of photography / Simon, Stephanie   Journal Article
Simon, Stephanie Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract Photographers have become common targets of security practice in the public spaces of US and UK cities. The securitization of photography - where photographers are commonly stopped, questioned, told to surrender film or delete photos, and in some cases arrested - rests upon the invocation of a post-9/11 context and the preemptive security logics that characterize the 'war on terror'. Here, the spatio-temporality of the photograph and the photo-taking subject are in tension with preemptive security stances in which everyday, ordinary actions - such as photography - are rendered suspicious and worthy of potential intervention. Using examples of specific encounters between photographers and security personnel, this article interrogates the conduct of these interventions and the preemptive security stance that scopes ordinary actions and everyday urban spaces through flexible and dispersed acts. Finally, the article considers how this uncoordinated and dispersed practice travels across a wide variety of actors without clear, causal linkages. The practice is a mobile, circuitous one, and through its analysis the article argues for more attention to be paid to everyday, embodied, and dispersed practices of preemption.
        Export Export
17
ID:   165352


Transnational policing: preemption and deterrence against elusive perpetrators / Nakao, Keisuke   Journal Article
Nakao, Keisuke Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Why does a state directly police certain kinds of transnational perpetrators by itself while indirectly policing other kinds through their host government? To address this question, we develop a formal model, where Defender chooses either to police Perpetrators or to make Proxy do so. According to our theory, the delegation of policing can enhance its effectiveness in light of Proxy’s three advantages: (a) Proxy can convince Perpetrators of punishments more credibly than Defender (communicative advantage); (b) Proxy is more likely to identify Perpetrators and detect what they hold dear (informational advantage); (c) Proxy can cripple and punish Perpetrators more effectively (offensive advantage). On the other hand, the delegation may cause inefficiency if Defender has limited information about Proxy’s choice or cost of policing. Depending on the relative size between these advantages and disadvantages, one of the following four forms of policing may emerge: (i) Defender polices Perpetrators on her own (e.g. Somali counter-piracy operations); (ii) Defender induces Proxy to police Perpetrators (U.S. War on Drugs in Colombia and Mexico); (iii) Defender and Proxy together police Perpetrators (Operation Inherent Resolve); (iv) two or more Defender-Proxy states police Perpetrators in each’s own domain (Interpol, Budapest Convention).
Key Words Terrorism  Deterrence  Piracy  Policing  Preemption 
        Export Export