
The 27th annual People’s Liberation Army (PLA) Conference—“The People in the PLA” 2.0—revisited a theme first explored at the 2006 conference but understudied since. This volume examines how the structure, education, training, and recruitment of PLA personnel have changed in…

With the United States facing two major revisionist powers, Russia and China, as well as additional security threats from North Korea, Iran, and jihadist terrorism, a critical advantage for the United States is its global network of alliances and strategic…

This Strategic Studies Institute book provides a comprehensive research guide to radical Islamist English-language online magazines, eBooks, and assorted radical Islamist news magazines, reports, and pocketbooks published between April-May 2007 and November 2016, and generates strategic insights and policy response…

The Trump administration has recently called for a free and open Indo-Pacific, essentially replacing the Obama-era “Rebalance.” This U.S. Army War College report provides prescient analysis and policy recommendations on how to proceed down the path to this call while…

Still Soldiers and Scholars? sheds light on a neglected aspect of talent management, namely, officer accessions testing and evaluation. It does so by tracing the history of officer testing since 1900, identifying and analyzing key developments in the assessment process,…

The fiscal year (FY) 2017 National Defense Authorization Act, which includes a title to reform the Department of Defense (DoD) security cooperation, has far-reaching implications for U.S. defense interests in Africa. As the Chairman of the House Armed Services Committee…

The al-Qaeda Organization (AQO) and the Islamic State Organization (ISO) are transnational adversaries that conduct terrorism in the name of Sunni Islam. It is declared U.S. Government (USG) policy to degrade, defeat, and destroy them. The present book has been…

Nuclear deterrence and nonproliferation no longer enjoy the broad support they once did during the Cold War. Academics and security experts now question the ability of either to cope or check nuclear rogue states or terrorists. On the one hand,…

This volume has three parts: the first focuses on cyberspace itself; the second on some of the major forms of malevolence or threats that have become one of its defining characteristics; and the third on possible responses to these threats.…