Attempts to compare Malaya with other counterinsurgency campaigns such as the Vietnam War or Afghanistan War are limited in value and risk dangerous over-simplifications
The Central Security and Defence Policy attempted to centralise the decision-making process on foreign policy for E.U. members, but a more unified Union is essential.
Throughout its endeavour, NATO has faced many key challenges in its crisis management operation in Afghanistan.
Environmental changes make the rethinking of security unavoidable. An international effort is necessary to develop a framework of adaptation and mitigation practices.
In a ‘state of exception’, where it is vital to maintain national security, liberal governments do not suspend the rule of law but rather legally circumvent it.
Any advantages that a virtual currency like Bitcoin has over fiat money may be short-lived, as states will subject it to regulations that will erode its competitive edge.
Shaw’s risk-transfer theory and Der Derian’s conceptualization of virtuous war allow an in-depth understanding of the deployment of drones in the War on Terror.
The symbolic power of the aircraft carrier was key to China’s public demand to develop aircraft capabilities and reflective of desires to achieve world power prestige.
The presence of a deontological ethic provides private security companies (PSCs) the necessary legitimacy for the use of violence for the betterment of citizens.
The prevalence of torture represents a failure of the state-led, sovereignty-based international order. A move beyond torture requires a move beyond sovereignty.
In recent years, American audiences have grown sceptical on the securitisation of the US-Mexico border, and indeed, the broader discourse on immigration and security.