Why has U.S. security policy scarcely changed from the Bush to the Obama administration? National Security and Double Government offers a disquieting answer. Michael J. Glennon challenges the myth that U.S. security policy is still forged by America's visible, "Madisonian institutions"¿the President, Congress, and the courts. This paperback version features an Afterword that addresses the emerging danger posed by populist authoritarianism rejecting thenotion that the security bureaucracy can or should be relied upon to block it.
Why has U.S. security policy scarcely changed from the Bush to the Obama administration? National Security and Double Government offers a disquieting answer. Michael J. Glennon challenges the myth that U.S. security policy is still forged by America's visible, "Madisonian institutions"¿the President, Congress, and the courts. This paperback version features an Afterword that addresses the emerging danger posed by populist authoritarianism rejecting thenotion that the security bureaucracy can or should be relied upon to block it.
Michael J. Glennon is Professor of International Law at the Fletcher School of Law and Diplomacy, Tufts University. Before going into teaching, he was the Legal Counsel to the Senate Foreign Relations Committee. He co-authored Foreign Affairs Federalism: The Myth of National Exclusivity (with Robert D. Sloane, Oxford, 2016). He also co-authored Foreign Relations and National Security Law, and he is the author of Constitutional Diplomacy, among other books. His op-ed pieces have appeared in the New York Times, Washington Post, Los Angeles Times, International Herald-Tribune, Financial Times, and Frankfurt Allgemeine Zeitung. He lives in Concord, Massachusetts, with his wife and son.
Inhaltsangabe
ACKNOWLEDGMENTS I. INTRODUCTION II. THE TRUMANITE NETWORK Origins Operation Threat Exaggeration Secrecy Conformism III. THE SOURCES OF MADISONIAN ILLUSION IV. THE REALITY OF MADISONIAN WEAKNESS The Judiciary The Congress The Presidency A Case Study: NSA Surveillance V. PLAUSIBLE ALTERNATIVE EXPLANATIONS FOR POLICY CONTINUITY The Rational Actor Model The Government Politics Model The Organizational Behavior Model The Network Model Conclusion: The Myth of Alternative Competing Hypotheses VI. IS REFORM POSSIBLE? CHECKS, SMOKE, AND MIRRORS Strengthening systemic checks Government cultivation of civic virtue VII. CONCLUSION NOTES AFTERWORD INDEX
ACKNOWLEDGMENTS I. INTRODUCTION II. THE TRUMANITE NETWORK Origins Operation Threat Exaggeration Secrecy Conformism III. THE SOURCES OF MADISONIAN ILLUSION IV. THE REALITY OF MADISONIAN WEAKNESS The Judiciary The Congress The Presidency A Case Study: NSA Surveillance V. PLAUSIBLE ALTERNATIVE EXPLANATIONS FOR POLICY CONTINUITY The Rational Actor Model The Government Politics Model The Organizational Behavior Model The Network Model Conclusion: The Myth of Alternative Competing Hypotheses VI. IS REFORM POSSIBLE? CHECKS, SMOKE, AND MIRRORS Strengthening systemic checks Government cultivation of civic virtue VII. CONCLUSION NOTES AFTERWORD INDEX
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309