NOTES

Chapter 1: Introduction

1 United Nations Development Programme (UNDP) Human Development Report 1994 (New York: Oxford University Press, 1994).
2 UN (2005). The High Level Panel on Threats, Challenges and Change In Larger Freedom: Towards Development, Security and Human Rights for All. Report to the Secretary-General, http://www.un.org/largerfreedom/contents.htm.
3 Human Security Report: War and Peace in the 21st Century. Human Security Centre, University of British Columbia, Canada, Oxford: Oxford University Press, 2005; The Responsibility to Protect. Report of the International Commission on Intervention and State Sovereignty, 2001.
4 Sen, Amartya, (2003) “Development, rights and human security” in Sen and Ogata, Human Security Now, Commission on Human Security Report (New York), 2003: 8-9.
5 http://www.whitehouse.gov/the-press-office/remarks-president-address-nation-way-forward-afghanistan-and-pakistan.
6 http://www.cfr.org/publication/21000/us_policy_in_afghanistan.html?breadcrumb=%2Fpublication%2Fby_type%2Ftranscript.
7 Quoted in Andrew Exum “The conflict in Central Asia will likely mark the end of the current era of counterinsurgency,” Boston Review, January/February 2010.

Chapter 2

1 These numbers are based on the figures collected by the Research and Documentation Center in Sarajevo. http://www.idc.org.ba/. (At the time of the war, estimates provided by international agencies were much higher.)
2 Susan Woodward, Balkan Tragedy: Chaos and Dissolution after the Cold War (Washington DC: Brookings Institution, 1995).
3 IMF, Democratic Republic of Congo Selected Issues and Statistical Appendix . July, 3 2001.
4 Amnesty International, Democratic Republic of Congo: “Our brothers who help kill us”: Economic Exploitation and Human Rights Abuse in the East. AFR 62/010/2003, March 31, 2003.
5 http://hdrstats.undp.org/countries/country_fact_sheets/cty_fs_COD.html
6 David Rieff, Slaughterhouse: Bosnia and the failure of the West (London: Vintage Books, 1996).
7 Hugh/Grundig, Frank/Zorick, Ethan R., “Marching At the Pace of the Slowest.” Political Studies 49 (2004): 438-461; Oberthuer, Sebastian: The Kyoto Protocol. (Germany: Springer-Verlag, 1999); Andresen, Steinar/Gulbrandsen, Lars H., “NGO Influence in the Implementation of the Kyoto Protocol: Compliance, Flexibility Mechanisms, and Sinks,” Global Environmental Politics 4, No. 4 (2004): 54-75.
8 Glasius, Marlies: The International Criminal Court: A Global Civil Society Achievement (London: Routledge, 2005).

Chapter 3

1 1965 is the year that ground troops were officially sent to Vietnam, although many would argue that the war began much earlier and that the U.S. presence in the form of so-called military advisers was already very significant.
2 John A. Nagl, Learning to eat soup with a knife: Counterinsurgency lessons from Malaya and Vietnam (Chicago: University of Chicago Press, 2005) p.49.
3 Richard Gabriel and Paul Savage, Crisis in Command (New York: Hill and Wang, 1978).
4 Quoted in Nagl, op.cit. p.172.
5 Harry Summers, On Strategy: A Critical Analysis of the Vietnam War (Novato, California: Presidio Press, 1982).
6 Wall Street Journal February 23 1990.
7 Zbigniew Brzezinski “Cold War and Its Aftermath,” Foreign Affairs, Vol. 71, No. 4 (Fall, 1992), pp. 31-49.
8 Project for a New American Century, Rebuilding America’s Defenses: Strategy, Forces and Resources for a New Century, Washington DC, September, 2000.
9 Quoted in Nagl, op.it.
10 November 27, 1995. http://www.cnn.com/US/9511/bosnia_speech/speech.html.
11 “Bosnia: So far, So Good,” Defence Issues 11, 5 (1996).
12 Richard Caplan, “International Diplomacy and the Crisis in Kosovo,” International Affairs, 74, 4 (October 1998), p. 752.
13 Some Western leaders claim that they were taken by surprise by the accelerated ethnic cleansing. But it was quite clear that this was likely to happen. It was reported by The Times of London that Western intelligence knew about a plan called Operation Horseshoe as early as September, although this has never been substantiated. Reportedly, the Yugoslav General, Sreten Lukic, told members of the Kosovo verification mission: “Give us a week and we will clean the terrorists out of Kosovo.” Likewise, Seselj, the leader of the Serbian Radical Party and deputy prime minister of Serbia, warned on television, one week before the bombing began, that “not a single Albanian would remain if NATO bombed.” Whether Operation Horseshoe existed or not, it is evident from the pattern of logistical arrangements made for the deportation of Albanians and from the coordination of actions by the Yugoslav army, the police, and paramilitary groups that this huge expulsion of people was systematic and deliberately planned. See the International Independent Commission on Kosovo: The Kosovo Report Oxford University Press, 2000.
14 NATO Military Briefing, April 1, 1999. http://www.pbs.org/newshour/bb/europe/jan-june99/nato_4-1.html.
15 Doctrine of the International Community at the Economic Club, Chicago. http://www.number-10.gov.uk/output/Page1297.asp.
16 New York Review of Books, June 10, 1999.
17 “Notes for a speech to the Empire Club,” Toronto, Department of Foreign Affairs, Statement 99/43, June 28, 1999.

Chapter 4

1 President George W. Bush Addresses the Council on Foreign Relations, December 7, 2005. http://www.cfr.org/publication/9355/.
2 President George W. Bush, President Bush Announces Major Combat Operations in Iraq Have Ended: Remarks by President Bush from the USS Abraham Lincoln. May 1, 2003.
3 Max Boot, “The New American Way of War,” Foreign Affairs July/August 2003.
4 Donald H. Rumsfeld, Testimony to the Senate Armed Services Committee, July 9, 2003.
5 Ahmed S. Hashim, The Sunni Insurgency in Iraq (Newport, Rhode Island: Center for Naval War Studies, August 15, 2003).
6 Yahia Said, “Civil Society in Iraq,” in Helmut Anheier, Marlies Glasius and Mary Kaldor. Global Civil Society 2004/5 (London: Sage, 2004) p.6.
7 Ashraf Ghani and Clare Lockhart, Fixing failed states: a framework for rebuilding a fractured world (Oxford: Oxford University Press, 2008).
8 Quoted in Lawrence Freedman, “The Transformation of Strategic Affairs,” Adelphi Papers 379, 2006.
9 Condoleeza Rice “In the National Interest” Foreign Affairs 79, No.1 (2000): 53.
10 United States Institute for Peace, Securing Afghanistan: Challenges for the Next Administration. Washington DC, November 2008.
11 Abu Musab al-Zarqawi, a Jordanian militant who had fought with the mujahideen in Afghanistan, had established in 2001 a small group, Ansar Al-Islam, that had a camp in the autonomous northern part of Iraq. Zarqawi joined with the more extremist Islamist groups in Iraq after the invasion; in 2004, he pledged allegiance to Osama bin Laden and renamed his organization Al-Qaeda in Mesopotamia or Al-Qaeda in the Land of Two Rivers.
12 Austin Long, “The Anbar Awakening” Survival. Vol 50, No2 (2008): 67-94.
13 Prof Gilbert Burnham MD, Prof Riyadh Lafta MD, Shannon Doocy PhD, Les Roberts PhD, “Mortality after the 2003 invasion of Iraq: a cross-sectional cluster sample survey.” The Lancet, Volume 368, Issue 9545 (2006): 1421-1428
14 UNAMA, Afghanistan: Annual Report on Protection of Civilians in Armed Conflict, 2008.
15 CRS, Report for Congress, Order Code RL33851, January 26, 2007, Rhoda Margesson, Afghan Refugees: Current Status and Future Prospects.
16 Mundt, Alex and Schmeidl, Susanne, “The Failure to Protect: Battle-Affected IDPs in Southern Afghanistan.” The Brookings Institution, June 22, 2009
17 Ricks, op.cit. p.34.
18 Ibid. p.7.
19 Department of the Army and United States Marine, Corps “Counterinsurgency. Field Manual No 3-24,” Marine Corps Warfighting Publications No 3-33.5, Washington DC, December 2006.
20 Ibid. p. 1-27.
21 Kilcullen, op.cit. p.182.
22 Commander, NATO International Security Assistance Forces, Afghanistan, US Forces, Afghanistan, Commander’s Initial Assessment 30 August 2009.
23 Peter Singer, Wired for War: The Robotics Revolution and Conflict in the 21st Century (Washington DC: Brookings Institution, 2009).
24 Ibid. p. 223.
25 Ibid. p. 34.
26 Interview with Kaldor.

Chapter 5

1 Quoted in Richard Norton Taylor, “Iraq:the Legacy - Ill equipped, poorly trained, and mired in a bloody mess,” The Guardian, April 17 2009.
2 Reidar Vissar, “Historical Myths of a Divided Iraq,” Survival, Vol 50, Issue 2 (2008): 95-106.
3 Quoted on Jomathan Steele. Defeat: Why they lost Iraq (London: I.B.Tauris, 2008): 182.
4 Interview, March 2009.
5 Michel Wievorka, La Violence (Paris: Balland, 2004).
6 Quoted in Victoria K.Holt and Tobias C.Berkman, The Impossible Mandate? Military Preparedness, the Responsibility to Protect and Modern Peace Operations. The Henry L. Stimson Center, 2006, p.147.
7 Ibid. p.174.
8 http://www.sl.undp.org/2_focus/afd_end_yr_rpt07.pdf.
9 http://www.globalhumanitarianassistance.org/.
10 David Keen Complex Emergencies, (Cambridge: Polity Press, 2008) :154.
11 Human Security Now: Final Report of the Commission on Human Security. Co-Chairs Sadako Ogata and Amertya Sen, United Nations, May 1 2003, http://humansecurity-chs.org/finalreport/index.html.

Chapter 6

1 Rebecca Grant, Global Deterrence. Lexington Institute, February 6, 2009. http://www.lexingtoninstitute.org/global-deterrence-the-role-of-the-f-22.
2 http://www.humansecuritygateway.com/.
3 http://www.arab-hdr.org/.
4 http://www.unodc.org/unodc/crime_cicp_survey_countries.html.
5 http://www.internal-displacement.org.
6 http://www.unhcr.org/4a375c426.html.
7 Guha-Sapir, D. and D. Hargitt and Phoyois. Thirty Years of Natural Disasters 1974-2005: The Numbers (Louvain: Presses Univesitaires de Louvain, 2004). The database distinguishes between two categories of disasters: natural disasters and technological disasters. Natural disasters are classified into twelve predefined types: drought, earthquake, epidemic, extreme temperature, famine, flood, insect infestation, slides, volcano, wave/surge, wildfire, and windstorm. Technological disasters are classified into three predefined types: industrial accident, miscellaneous accident, and transport accident.
8 Owen, Taylor (2004), “Challenges and opportunities for defining and measuring human security,” Disarmament Forum [Human Rights, Human Security and Disarmament] 3: 15-24.
9 Documented by Shaun McCarthy, The Function of Intelligence in Crisis Management (Farnham: Ashgate Publishing, 1998).
10 Martin, David and Walcott, John, Best Laid Plans: The Inside Story of America’s War Against Terrorism (New York: Harper and Row, 1988).
11 Gates, Robert, Speech delivered to the Association of American Universities (Washington DC), April 14, 2008. Available at: http://www.defenselink.mil/speeches/speech.aspx?speechid=1228.
12 http://concerned.anthropologists.googlepages.com/.
13 http://www.ushmm.org/maps/projects/darfur/.
14 Zaccaro, Sabina, “Rights: Satellite Data Aid Human Rights Campaigns.” Inter-Press Service, September 3, 2007.
15 http://www.eyesondarfur.org/about.html.
16 http://shr.aaas.org/geotech/.
17 http://www.fews.net/Pages/default.aspx.
18 A report for the European Space Agency found that the biggest gap in human security operation was in telecommunications. See European Space Agency European Space and Human Security Working Group, Paris, 2006.
19 The story is told in Genevieve Schmeder “Equipment and Resources,” in Marlies Glasius and Mary Kaldor, A Human Security Doctrine for Europe (London: Routledge, 2005).
20 http://www.ushahidi.com/.
21 Albon, Christopher, “Ushahidi deploys in the DRC.” War and Health, November 7, 2008. available at: http://warandhealth.com/ushahidi-deploys-in-the-drc/.
22 Dickinson, Elizabeth, “Net Effect: Neighborhood Watch.” Foreign Policy, January/February 2009. Available at: http://www.foreignpolicy.com/story/cms.php?story_id=4601.
23 http://labs.aljazeera.net/warongaza.
24 Stockholm International Peace Research Institute, SIPRI Yearbook 2009: Armament, Disarmament and Security (Oxford: Oxford University Press, 2009).
25 Robert Gates, “A Balanced Strategy,” Foreign Affairs, Vol 88, No 1 (2009).
26 Major General Robert H. Scales, “The Second Learning Revolution,” Military Review, January - February 2006, p40.
27 According to Max Boot, the New York Times report left out the phrase ‘a bit’ thereby exaggerating American difficulties. See Max Boot, op.cit.
28 Anheier, Helmut, Glasius, Marlies, and Kaldor, Mary, Global Civil Society 2001 (Oxford: Oxford University Press, 2001).
29 Peter Singer, Corporate warriors :the rise of the privatized military industry (Ithaca: Cornell University Press, 2001).
30 Economist.com, “Blackwater’s Dark Heart,” August 21, 2009.
31 Jeremy Scahill, Blackwater: the Rise of the World’s Most Powerful Mercenary Army (New York: Nation Books, 2007) :24.
32 Colonel Mark Cancian, “In Defense of Security Contractors.” http://experts.foreignpolicy.com/node/15019.
33 http://www.globalsecurity.org/military/library/policy/dod/qdr-2006-report.htm.
34 Jermy Scahill, op.cit.
35 Jeremy Scahill, Blackwater: the Rise of the World’s Most Powerful Mercenary Army. Nation Books: New York, 2007, pp 57.
36 Associated Press, “House Passes Bill That Would Hike Penalties for U.S. Security Contractors in Iraq,” October 4, 2007.
37 http://www.gibsondunn.com/publications/pages/NewStatusofForcesAgreementSubjectsGovernmentContractorstoIraqiLaw.aspx.
38 James Risen and Mark Mazzetti, “C.I.A. Said to Use Outsiders to Put Bombs on Drones.” August 20, 2009. Accessible at: http://www.nytimes.com/2009/08/21/us/21intel.html.
39 Patrap Chatterjee and A.C. Thompson, “Private Contractors and Torture at Abu Ghraib.” Corpwatch, May 7, 2004. http://www.corpwatch.org/.
40 Thomas A. Schweich, “The Pentagon is muscling in everywhere. Its time to stop mission creep.” Washington Post December 21, 2008 (Schweich was Ambassador for anti-drug policy in Afghanistan under the Bush Administration).
41 The Baroque Arsenal (New York: Hill and Wang, 1982).
42 Statement of Michael Sullivan, Director of Defense Acquisition and Sourcing Management “Defense Acquisitions: DOD Must prioritize Its Weapons Systems Acquisitions and Balane them with Availble Resources,” GAO 2008.
43 Frida Berrigan, Entrenched, Embedded and Here to Stay: The Pentagon’s Expansion will be Bush’s Lasting Legacy, New America Foundation, May 27, 2008. http://www.newamerica.net/publications/articles/2008/entrenched_embedded_and_here_stay_7228.
44 The American Academy of Diplomacy, “A Foreign Affairs Budget for the Future: Fixing the Crisis in Diplomatic Readiness,” October 2008, p4, available at: http://www.academyofdiplomacy.org/publications/FAB_report_2008.pdf.
45 Hillary Clinton’s Confirmation Hearing Transcript for Secretary of State, January 13, 2009, available at: http://www.scribd.com/doc/10323001/Hillary-Clinton-Confirmation-Transcript-for-Secretary-of-State-January-13-2009.
46 J. Anthony Holmes, “Where are the Civilians: How to Rebuild the U.S. Foreign Service,” Foreign Affairs, Vol 88, No 1, (2009).
47 A Unified Security Budget for the United States FY 2009, Institute for Policy Studies, September 2008.
48 A Human Security Doctrine for Europe: The Barcelona Report of the Study Group on Europe’s Security Capabilities, Barcelona, 2004, https://www.lse.ac.uk/Depts/global/Publications/HumanSecurityDoctrine.pdf.

Chapter 7

1 Budget Press Briefing (Arlington, VA), as prepared for delivery by Secretary of Defense Robert Gates, 6 April 2009; access: http://www.defenselink.mil/speeches/speech.aspx?speechid=1341.
2 Robert Gates, Foreign Affairs (2009), op.cit.
3 Robert Kagan, The Return of History and the End of Dreams (London: Atlantic, 2008): 1.
4 Ivan Krastev “Sovereign democracy, Russian-style,” Open Democracy 16 November 2006. http://www.opendemocracy.net/globalization-institutions_government/sovereign_democracy_4104.jsp
5 Quoted in Ibid.
6 Bates Gill, Rising Star: China’s New Security Diplomacy (Washington DC: Brookings Institution, 2007), p.107.
7 Kommersant, December 25, 2008. http://www.kommersant.ru/doc-y.aspx?DocsID=1099153 [Newspaper claimed to have acquired a copy of the draft strategy].
8 Kommersant, December 25, 2008 (http://www.kommersant.ru/doc-y.aspx?DocsID=1099153)
9 Ibid.
10 Rus: http://www.scrf.gov.ru/documents/1.html. The newest edition approved by the Presidential Decree No.24, 10 January 2000.
11 http://eurasianhome.org/doc/declaration_on_fifth_anniversary_of_shanghai_cooperation_organization.doc.
12 Li, Nan, “PLA Conservative Nationalism.” in: Finkelstein, D. Flanagan, S. & Marti, M. (ed) The People’s Liberation Army and China in Transition (Washington DC: National Defense University, 2003): 69-89.
13 SIPRI database http://www.sipri.org/databases/milex.
14 “China’s Foreign and Security Policy: Partner or Rival?” in Bergsten, C. F, Bates Gill, Nicholas Lardy and Derek Mitchell: China: the Balance Sheet, What the world needs to know now about the Emerging Superpower (New York: PublicAffairs, 2006): 136
15 Babak Rahimi, “Cyberdissent: The Internet in Revolutionary Iran,” Middle East Review of International Affairs, Vol.7, No3, September 2003, http://meria.idc.ac.il/journal/2003/issue3/jv7n3a7.html.
16 http://www.allacademic.com/meta/p212142_index.html.
17 http://www.hrw.org/en/news/2008/04/14/north-korea-s-transformation-famine-aid-and-markets.
18 BBC, April 25, 2006.
19 Hillary Mann, “US Diplomacy with Iran: The Limits of Tactical Engagement,” Statement to the Subcommittee on National Security and Foreign Affairs, Committee on Government Oversight and Reform, US House of Representatives, November 7, 2007
20 Zakaria, Fareed, “Tag-Teaming the Mullahs,” Newsweek, 6 December 2004, p37.
21 The Iran Nuclear Policy Group, How to Approach the Iran Nuclear Dilemma: White Paper by the Iran Nuclear Policy Group of the American Foreign Policy Project, the American Foreign Policy Project, 9 April 2009, accessible at: http://americanforeignpolicy.org/.
22 Salehi-Isfahani, Djavad , “Iran Sanctions: Who Really Wins?” Brookings Institution, October 12, 2009, accessed at: http://www.brookings.edu/opinions/2009/0930_iran_sanctions_salehi_isfahani.aspx?p=1.
23 Abbas Milani, “U.S. Foreign Policy and the Future of Democracy in Iran,” The Washington Quarterly 28(3): 2005 pp.41-56.
24 The Iran Nuclear Policy Group, How to Approach the Iran Nuclear Dilemma: White Paper by the Iran Nuclear Policy Group of the American Foreign Policy Project, the American Foreign Policy Project, April 9, 2009, accessible at: http://americanforeignpolicy.org/.
25 http://www.cdi.org/north-korea/north-korea-crisis.pdf.
26 http://www.nytimes.com/2009/05/28/world/asia/28korea.html.
27 Council on Foreign Relations, “After Latest Brinksmanship, Engaging North Korea,” Interview with Sheila A. Smith, April 6, 2009, accessible at: http://www.cfr.org/publication/19044/after_latest_brinksmanship_engaging_north_korea.html.
28 http://news.bbc.co.uk/1/shared/bsp/hi/pdfs/30_09_09_iiffmgc_report.pdf.
29 Barry Posen, “Command of the Commons: The Military Foundations of US hegemony,” International Security, Vol 38, No. 1 (2003): 5-46.

Chapter 8

1 “The 13 parasitic and bacterial infections known as the neglected tropical diseases include three soil-transmitted helminth infections (ascariasis, hookworm infection, and trichuriasis), lymphatic filariasis, onchocerciasis, dracunculiasis, schistosomiasis, Chagas’ disease, human African trypanosomiasis, leishmaniasis, Buruli ulcer, leprosy, and trachoma. An expanded list could include dengue fever, the treponematoses, leptospirosis, strongyloidiasis, food-borne trematodiases, neurocysticercosis, and scabies, as well as other tropical infections.” Peter J. Hotez, David H. Molyneux, Alan Fenwick, Jacob Kumaresan, Sonia Ehrlich Sachs, Jeffrey D. Sachs, and Lorenzo Savioli, The Control of Neglected Tropical Diseases, New England Journal of Medicine, 375(10):1018-1027, September 2007.
2 www.activeworlds.com.

Chapter 9

1 Tom Donelly and Gary Schmitt, “How to make a Real Stimulus Take,” Washington Post, Feb 8, 2009.
2 “Lockheed F-22 Fighter poses Early Test of Obama’s Goals,” Bloomberg .com March 23, 2009.
3 Mark Bowden, “The Last Ace,” Atlantic Online, March 2009.
4 Boston Globe, March 22 2009.
5 SIPRI Yearbook 2009: Armaments, Disarmament, and Security (Oxford: Oxford University Press, 2009).
6 Stathis N. Kalyvas and Laia Balcells, International System and Technologies of Rebellion: How the Cold War Shaped Internal Conflict, Unpublished paper, 2008.
7 Quoted in Peter Taylor, The Brits: The War against the IRA Bloomsbury, London, 2001.
8 Peter Pringle and Philip Jacobson, Those are Real bullets, Aren’t they? Fourth Estate, London, 2000.
9 Fionnuala Ní Aoláin, The Politics of Force: Conflict Management ad State Violence in Northern Ireland, Blackstaff press, Belfast, 2000.