Filter
Militär & försvarslagstiftning
Filter
In recent history, planned violent attacks have persisted in the United States and abroad. Ranging from targeted attacks on private individuals, public figures, schools, …
Since the "surge" in Iraq in 2006, counterinsurgency effectively became America's dominant approach for fighting wars. Yet many of the major controversies and debates surrounding …
In U.S. Military Operations: Law, Policy, and Practice, a distinguished group of military experts comprehensively analyze how the law is applied during military operations on and …
Warfare is changing - and rapidly. New technologies, new geopolitical alignments, new interests and vulnerabilities, and other developments are changing how, why, and by whom …
Surveys show that the all-volunteer military is our most respected and trusted institution, but over the last thirty-five years it has grown estranged from civilian society. …
The conduct of warfare is constantly shaped by new forces that create complexities in the battlespace for military operations. As the nature of how and where wars are fought …
Terrorism: Commentary on Security Documents is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat …
In the 2010s, America's adversaries conducted numerous damaging cyber operations inside the United States: the Office of Personnel Management breach, attacks on banks, persistent …
Verification in an Age of Insecurity takes the reader into some of the most urgent arms control issues facing the world community, including the nuclear activities of rogue states …
In recent years, countries around the world introduced numerous national security programs and military campaigns. Despite the complex legal questions they raise, very few of these …