Dancing with Saddam: The Strategic Tango of Jordan-Iraq by David Schenker

By David Schenker

Jordan has lengthy served as a pivot among reasonable pro-Western states and radical anti-American states within the heart East. because the usa pursues a coverage of 'regime swap' in Iraq, the commercial, social, and political results on Jordan should be pervasive. during this well timed and demanding paintings, David Schenker, a professional on center japanese politics, examines the complicated old courting among Jordan and Iraq and offers options for U.S. coverage towards Jordan. This e-book is key interpreting for students of diplomacy and U.S. coverage makers.

Show description

Read or Download Dancing with Saddam: The Strategic Tango of Jordan-Iraq Relations PDF

Best security books

Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious

A One-Stop Reference Containing the main learn subject matters within the Syngress safety Library

This Syngress Anthology is helping You guard your small business from Tomorrow's Threats Today

This is the ideal reference for any IT specialist answerable for retaining their company from the subsequent iteration of IT safeguard threats. This anthology represents the "best of" this year's best Syngress safety books at the Human, Malware, VoIP, equipment driving force, RFID, Phishing, and junk mail threats more likely to be unleashed within the close to destiny. .

* From useful VoIP defense, Thomas Porter, Ph. D. and Director of IT protection for the FIFA 2006 international Cup, writes on threats to VoIP communications platforms and makes tips about VoIP security.
* From Phishing uncovered, Lance James, leader know-how Officer of safe technological know-how company, provides the newest info on phishing and spam.
* From fighting spy ware within the company, Brian Baskin, teacher for the once a year division of safeguard Cyber Crime convention, writes on forensic detection and removing of spyware.
* additionally from struggling with spy ware within the company, approximately. com's safeguard specialist Tony Bradley covers the transformation of spyware.
* From contained in the junk mail Cartel, Spammer-X exhibits how unsolicited mail is created and why it really works so well.
* From Securing IM and P2P functions for the firm, Paul Piccard, former supervisor of web safeguard Systems' worldwide risk Operations heart, covers Skype security.
* additionally from Securing IM and P2P functions for the company, Craig Edwards, author of the IRC defense software program IRC Defender, discusses international IRC security.
* From RFID protection, Brad "Renderman" Haines, essentially the most obvious individuals of the wardriving group, covers tag encoding and tag program attacks.
* additionally from RFID safety, Frank Thornton, proprietor of Blackthorn structures and a professional in instant networks, discusses administration of RFID security.
* From Hack the Stack, safeguard specialist Michael Gregg covers attacking the folk layer.
* Bonus insurance contains particular fabric on machine motive force assaults via Dave Maynor, Senior Researcher at SecureWorks.

* The "best of" this yr: Human, Malware, VoIP, gadget motive force, RFID, Phishing, and unsolicited mail threats
* entire insurance of forensic detection and removing of spy ware, the transformation of spy ware, worldwide IRC defense, and more
* Covers safe enterprise-wide deployment of most well liked applied sciences together with Voice Over IP, Pocket computers, clever telephones, and extra

Security Integration in Europe: How Knowledge-based Networks Are Transforming the European Union

At a time whilst many observers query the EU’s skill to accomplish integration of any value, and certainly Europeans themselves look dissatisfied, Mai’a ok. Davis go argues that the european has made amazing advances in safety integration, in either its exterior and inner dimensions. in addition, inner protection integration—such as facing terrorism, immigration, cross-border crime, and drug and human trafficking—has made even larger growth with dismantling yes limitations that in the past stood on the center of conventional kingdom sovereignty.

Security Aspects in Information Technology: First International Conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011. Proceedings

This e-book constitutes the refereed court cases of the 1st foreign convention on safeguard facets in info know-how, High-Performance Computing and Networking held in Haldia, India, in October 2011. The 14 complete papers awarded including the abstracts of two invited lectures have been rigorously reviewed and chosen from 112 sumbissions.

The Area of Freedom, Security and Justice in the Enlarged Europe

The ecu Union is continually altering, either within the variety of nations it embraces and in coverage components the place it performs a huge function. the recent millennium has witnessed significant adjustments within the EU's scope. On 1 may perhaps 2004, it enlarged to incorporate ten new member states; and the hot ecu structure defines delivering electorate with an 'area of freedom, defense and justice' as one in every of its fundamental goals.

Extra resources for Dancing with Saddam: The Strategic Tango of Jordan-Iraq Relations

Sample text

Iraqi National Congress president Ahmed Chalabi had informed the CIA of the breech in secrecy nearly three months earlier, but the agency decided to nevertheless push forward with the ill-fated plan. 50. See Wurmser, Tyranny’sAlly, 25. 51. “Iraqi Envoy Confirms Jordanian Not to Be Executed,” Jordan Times, December 14,1997, cited in FBIS-NES-97-348, December 16,1997. 52. According to sources close to the Royal Court, there was little interest in this subject. During an earlier meeting on April 2, 1997, King Hussein was said to have brought up the topic with Secretary of State Albright, but time was limited as Albright was scheduled to toss out the first pitch at opening day of the Baltimore Orioles baseball season in Camden Yards.

The UN, for example, took the extraordinary step of making an exception to the sanctions regime for Iraqi oil exports that were the Kingdom’s only ensured source of energy. This permitted Jordan to purchase oil from Iraq at preferential prices, the core of the special economic relationship between the two countries. Given that the United States and Arab countries had effectively cut off Jordan because of its neutralist approach to the Iraq-Kuwait conflict, Jordan was forced to rely on Saddam more than ever.

8 million to 5 million tons, an augmentation Jordan had been seeking for a few years to meet (alleged) increased domestic demand. 90 per barrel, the increase was moderate, relatively speaking. Since the previous year’s negotiations, the global market price had jumped from $24 to $38 per barrel. " Although it seemed slight, however, the $2 increase per barrel translated to a $35 million increase in cost deficit to the Jordanian treasury. 13 For 2002, the trade protocol was fixed at $206 million, a significant decline from the $309 million in implemented contracts in 2001.

Download PDF sample

Rated 4.11 of 5 – based on 28 votes