

New Books in National Security
Marshall Poe
This podcast is a channel on the New Books Network. The New Books Network is an academic audio library dedicated to public education. In each episode you will hear scholars discuss their recently published research with another expert in their field.
Discover our 150+ channels and browse our 28,000+ episodes on our website: newbooksnetwork.com
Subscribe to our free weekly Substack newsletter to get informative, engaging content straight to your inbox: https://newbooksnetwork.substack.com/
Follow us on Instagram and Bluesky to learn about more our latest interviews: @newbooksnetworkSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
Discover our 150+ channels and browse our 28,000+ episodes on our website: newbooksnetwork.com
Subscribe to our free weekly Substack newsletter to get informative, engaging content straight to your inbox: https://newbooksnetwork.substack.com/
Follow us on Instagram and Bluesky to learn about more our latest interviews: @newbooksnetworkSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
Episodes
Mentioned books

Jun 6, 2013 • 32min
Patrick James and Abigail Ruane, “The International Relations of Middle-Earth: Learning from the Lord of the Rings” (University of Michigan Press, 2012)
Patrick James is the Dornsife Dean’s Professor of International Relations at the University of Southern California. A self-described intellectual “fox,” James works on a wide variety of subjects in the study of world politics. But one of his latest books, co-authored with Abigail E. Ruane, breaks even his eclectic mold. The International Relations of Middle-Earth: Learning from the Lord of the Rings (University of Michigan Press, 2012), sheds light on both international-relations theory and Tolkein’s epic fantasy by bringing the two subjects together. Fans, students, and scholars alike will find much of interest — and much to argue about. Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

May 31, 2013 • 1h 7min
Martin A. Miller, “The Foundations of Modern Terrorism” (Cambridge UP, 2013)
Terrorism seems like the kind of thing that has existed since the beginning of states some 5,000 years ago. Understood in one, narrow way–as what we call “insurgency”–it probably has. But modern terrorism is, well, modern as Martin A. Miller explains in The Foundations of Modern Terrorism: State, Society, and the Dynamics of Political Violence (Cambridge University Press, 2013). Miller traces our kind of terrorism to the French Revolution or thereabouts, and specifically to the formation of the idea that “citizens” have a right (and indeed duty) to rebel against their wayward governments “by any means necessary.” Take that notion and another–that there are several different “legitimate” ways to organize governments–and you have modern terrorism: campaigns designed to change or overthrow governments that are deemed by political radicals to be acting illegitimately or to be wholly illegitimate. Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

Apr 26, 2013 • 47min
Jeffrey D. Simon, “Lone Wolf Terrorism: Understanding the Growing Threat” (Prometheus Books, 2013)
It was timely to record this interview just after the Boston Bombing. Lone Wolf terrorists are individuals operating outside organized groups. If the allegations about the bombers in Boston are correct, then the brothers have acted in the same manner as Lone Wolves. In Lone Wolf Terrorism: Understanding the Growing Threat (Prometheus Books, 2013), Jeffrey Simon provides us with an excellent book describing the modern history of lone wolf terrorism, their operation and their possible future. He explains how individuals can not only produce major destruction in the same manner as larger organizations, a case in point being the Oklahoma City Bombing, but they are difficult to find because they leave a small footprint. Much more importantly, Lone Wolves are extremely difficult to identify before they act. Their introspection usually means that they do not advertise their actions. Having said that the age of the internet means that many leave a trail of commentary online, but also have access to inspiration through internet radicalization and also access to skill sets via online ‘how to’ sites on bomb making, etc. The rise of the much more capable intelligence systems can recognize these individuals, but they are unlikely to stand out amongst the hundreds of thousands with similar footprints. Jeffrey Simon’s book is an extremely informative and readable overview that gives an opportune reminder that, not only can terrorism be homegrown, but you don’t need to be Al Qaeda to carry out acts of terror. Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

Apr 17, 2013 • 1h 10min
Kathleen M. Vogel, “Phantom Menace or Looming Danger?: A New Framework for Assessing Bioweapons Threats” (Johns Hopkins UP, 2012)
Kathleen M. Vogel‘s new book is enlightening and inspiring. Phantom Menace or Looming Danger?: A New Framework for Assessing Bioweapons Threats (Johns Hopkins University Press, 2012) uses an approach grounded in deep ethnographic analysis of exemplary case studies to explore the recent and contemporary practices performed by US governmental and non-governmental analysts when considering bioweapons threats. It ultimately uses this foundation to suggest a new way to approach the analysis of bioweapons technology and the threat of weapons of mass destruction.
The book is divided into four parts, each showing how social factors at the laboratory, organizational, and political levels have shaped United States bioweapons assessments since the 1990s and continue to do so. Part I introduces the main problems approached by the book, and motivates the application of STS methodologies that emphasize the centrality of understanding social contexts, technological frames, and analytic practices of knowledge-making to resolving those problems. It also illustrates the dominance of a “biotech revolution” frame in determining bioweapons assessments by US policy and intelligence analysts, a frame that emphasizes technological determinism, material end products, a focus on the future while marginalizing the past, and an emphasis on the geographical spread of and threat posed by technological innovation. Part II of the book contrasts this “biotech revolution” approach with a proposed “biosocial frame” that emphasizes the importance of social context to bioweapons development and assessment. It accomplishes this through careful attention to two case studies with ongoing relevance for the US: synthetic genomics experimentation, and Soviet bioweapons development at the Stepnogorsk Scientific and Experimental Production Base. Part III of the book focuses on the CIA’s Iraqi bioweapons intelligence assessments, showing how social factors are crucial to knowledge practices not just within organizations and spaces that would potentially create technologies, but also within the organizations responsible for assessing the impact of those technologies. It emphasizes the importance of understanding how expertise, narrative and communicative style, and secrecy shape knowledge-making at the institutional level, and offers a fascinating window into the daily life of an intelligence reporter and the life cycle of the President’s Daily Brief. Part IV of the book explores alternative models to the production of bioweapons knowledge, offering a proposal for how to restructure and improve US bioweapons assessments. This is an engrossing book that exemplifies what STS can bring to broader issues of policymaking in the US and potentially beyond, and it is well worth reading. Enjoy! Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

Mar 28, 2013 • 38min
Patrick Dunleavy, “The Fertile Soil of Jihad: Terrorism’s Prison Connection” (Potomac Books, 2011 )
Patrick Dunleavy is the author of The Fertile Soil of Jihad: Terrorism’s Prison Connection (Potomac Books, 2011). He provides us with a fascinating insight into the radicalization process within the prison system. This is a sensitive topic but Dunleavy does not provide a political commentary on radicalization or Islam but rather acknowledges that the process can occur and gives us a detailed recounting of one such group within the New York Correctional system. He discusses a few key characters and how they ended up in prison and the circumstances that led to their participation in radical thought. The most interesting parts of the book for me were the methods of prison life that aided the process; the ability to communicate with the outside world and the massaging of internal security routines to allow interaction and coordination with others inside the system. This is not a morality play, but rather a description of a process. We can certainly learn a lot through books such as these that reduce our naivety about the ingenuity of prison inmates who have a lot of time to think and experiment with their immediate environment. Radicalization is a serious issue but for me this was a book more about the world of incarceration than terrorism. Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

Mar 12, 2013 • 56min
Elizabeth Cobbs Hoffman, “American Umpire” (Harvard UP, 2013)
Is there an “American Empire?” A lot of people on the Left say “yes.” Actually, a lot of people on the Right say “yes” too. But Elizabeth Cobbs Hoffman says “no.” In her stimulating new treatment of the history of American foreign policy American Umpire (Harvard UP, 2013), Hoffman lays out the case that America have never been an “empire” in any real sense. Rather, she says America has been and (for better or worse) still is an “umpire,” making calls according to an evolving set of rules about what makes a legitimate state. She points out that not all of the calls have been good ones–Vietnam and Iraq II being the most obvious examples. Nonetheless, America has long served the world as a kind of fair broker. Whether America should continue in this role is, as she says, an open question. Listen in. Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

Mar 7, 2013 • 52min
Paul Kan, “Cartels at War: Mexico’s Drug-Fueled Violence and the Threat to US National Security” (Potomac Books, 2012)
The violence in Mexico is receiving a lot of media attention internationally. Paul Rexton Kan has produced a book that provides us with a comprehensive and comprehendible introduction to the background to the conflict and its effects. Cartels at War: Mexico’s Drug-Fueled Violence and the Threat to US National Security (Potomac Books, 2012) is a relatively short book packed with detailed information. The book covers the nature of the drug war, the cartels involved, the national and international responses and the effects of this war on the local and international communities. But this is not just a descriptive work. Kan provides us with his recommendations for solutions and predictions about the future of the conflict. In particular, he draws comparisons between treating this as an insurgency and spells out how a counter-terrorist response would not be the correct way to deal with the issue. This is high intensity crime and requires a high intensity policing response. Overall the book is an excellent introduction to the very complex drug war in Mexico, as well as being a source of practical and realistic policy options for addressing a conflict this large. Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

Oct 28, 2012 • 1h 1min
Jason Brownlee, “Democracy Prevention: The Politics of the U.S.-Egyptian Alliance” (Cambridge UP, 2012)
In Democracy Prevention: The Politics of the U.S.-Egyptian Alliance (Cambridge University Press, 2012), Jason Brownlee explains the two countries relationship over the past several decades. From the signing of the Egyptian-Israeli peace treaty up to the present, Brownlee describes four areas in which the U.S. strengthened Egyptian leaders: national defense, coup proofing, macroeconomic stability, and domestic repression. The book outlines the evolving relationship between Washington and Cairo, from Cold War efforts against the Soviet Union, to working with Egypt in the fight against Islamic terrorism. Brownlee explains how repeated U.S. rhetoric of spreading democracy and human rights did not always match its actions, and how strategic interests almost always trumped idealistic goals, both in the past, and potentially in the future. Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

Oct 23, 2012 • 45min
Blake Mobley, “Terrorism and Counter-Intelligence: How Terrorist Groups Elude Detection” (Columbia University Press, 2012)
Today we talked to Blake Mobley about his new book Terrorism and Counter-Intelligence: How Terrorist Groups Elude Detection (Columbia University Press, 2012). There have been many books examining the intelligence operations of counter-terrorist agencies. Also there are books about how terrorist groups operate. This is a book about how terrorist groups conduct intelligence, specifically counter-intelligence designed to protect themselves from the gaze of the government based counter-terrorist agencies. Blake presents us with a varying set of levels of counter-intelligence sophistication that these groups practice as well as the social, geographic and structural elements that affect the success of these practices. He demonstrates that both these tactics and elements are two edged swords; success in one aspect can create a weakness in another. Blake points out that this is good news for counter-terrorist agencies and recommends that they focus on these weaknesses of the terror groups as a means of disrupting their operations. Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security

Oct 16, 2012 • 56min
Maurice Punch, “State Violence, Collusion and the Troubles: Counter Insurgency, Government Deviance and Northern Ireland” (Pluto Press, 2012)
Today we spoke to Maurice Punch about his new book: State Violence, Collusion and the Troubles: Counter Insurgency, Government Deviance and Northern Ireland (Pluto Press, 2012). The Troubles refers to the conflict in Northern Ireland between the IRA and the British government. The government response to the terrorist attacks involved a broad range of policing, intelligence and military agencies, including the SAS. There are many books about the actions of terrorist groups but this book looks at the actions of the government response. A number of independent inquiries have revealed serious breaches of ethics and even criminal acts by these agencies; some of which have had fatal consequences for innocent members of the community. At the very least, some others have been extra-judicial killings. Maurice examines the evidence and lists the offences. In many respects the title summarises the book and its conclusions. He explains how the many decades of conflict saw ‘organizational deviance’ on the part of the collective policing and military agencies. The book is an excellent study of how enthusiasm can lead to justification of illegal actions with deadly results. Learn more about your ad choices. Visit megaphone.fm/adchoicesSupport our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security


