front cover of Armed Servants
Armed Servants
Agency, Oversight, and Civil-Military Relations
Peter D. Feaver
Harvard University Press, 2005

How do civilians control the military? In the wake of September 11, the renewed presence of national security in everyday life has made this question all the more pressing. In this book, Peter Feaver proposes an ambitious new theory that treats civil-military relations as a principal-agent relationship, with the civilian executive monitoring the actions of military agents, the "armed servants" of the nation-state. Military obedience is not automatic but depends on strategic calculations of whether civilians will catch and punish misbehavior.

This model challenges Samuel Huntington's professionalism-based model of civil-military relations, and provides an innovative way of making sense of the U.S. Cold War and post-Cold War experience--especially the distinctively stormy civil-military relations of the Clinton era. In the decade after the Cold War ended, civilians and the military had a variety of run-ins over whether and how to use military force. These episodes, as interpreted by agency theory, contradict the conventional wisdom that civil-military relations matter only if there is risk of a coup. On the contrary, military professionalism does not by itself ensure unchallenged civilian authority. As Feaver argues, agency theory offers the best foundation for thinking about relations between military and civilian leaders, now and in the future.

[more]

logo for Georgetown University Press
Understanding Cyber Conflict
Fourteen Analogies
George Perkovich and Ariel E. Levite, Editors
Georgetown University Press

Cyber weapons and the possibility of cyber conflict—including interference in foreign political campaigns, industrial sabotage, attacks on infrastructure, and combined military campaigns—require policymakers, scholars, and citizens to rethink twenty-first-century warfare. Yet because cyber capabilities are so new and continually developing, there is little agreement about how they will be deployed, how effective they can be, and how they can be managed.

Written by leading scholars, the fourteen case studies in this volume will help policymakers, scholars, and students make sense of contemporary cyber conflict through historical analogies to past military-technological problems. The chapters are divided into three groups. The first—What Are Cyber Weapons Like?—examines the characteristics of cyber capabilities and how their use for intelligence gathering, signaling, and precision striking compares with earlier technologies for such missions. The second section—What Might Cyber Wars Be Like?—explores how lessons from several wars since the early nineteenth century, including the World Wars, could apply—or not—to cyber conflict in the twenty-first century. The final section—What Is Preventing and/or Managing Cyber Conflict Like?—offers lessons from past cases of managing threatening actors and technologies.

[more]


Send via email Share on Facebook Share on Twitter