Security sector reform in Ukraine:
"The Maidan Revolution in Ukraine created an opportunity for change and reforms in a system that had resisted them for 25 years. This report examines Ukraine's security sector...assessing what different institutions need to do and where gaps exist...and offers recommendations for the refor...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
RAND Corporation
[2016]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Literaturverzeichnis |
Zusammenfassung: | "The Maidan Revolution in Ukraine created an opportunity for change and reforms in a system that had resisted them for 25 years. This report examines Ukraine's security sector...assessing what different institutions need to do and where gaps exist...and offers recommendations for the reform of Ukraine's security and defense institutions that meet Ukraine's security needs and align with Euro-Atlantic standards and approaches."...Provided by publisher |
Beschreibung: | Includes bibliographical references |
Beschreibung: | xv, 119 Seiten Diagramme |
ISBN: | 9780833095978 0833095978 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043985056 | ||
003 | DE-604 | ||
005 | 20190111 | ||
007 | t | ||
008 | 170104s2016 xxu|||| |||| 00||| eng d | ||
010 | |a 016038259 | ||
020 | |a 9780833095978 |9 978-0-8330-9597-8 | ||
020 | |a 0833095978 |9 0-8330-9597-8 | ||
020 | |c 9780833095992 (prc) | ||
035 | |a (OCoLC)968712360 | ||
035 | |a (DE-599)BVBBV043985056 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-12 |a DE-Re13 | ||
050 | 0 | |a UA829.U4 | |
082 | 0 | |a 355/.0335477 |2 23 | |
084 | |a OST |q DE-12 |2 fid | ||
100 | 1 | |a Oliker, Olga |d 1970- |0 (DE-588)141911999 |4 aut | |
245 | 1 | 0 | |a Security sector reform in Ukraine |c Olga Oliker, Lynn E. Davis, Keith Crane [und neun weitere] |
264 | 1 | |a Santa Monica, CA |b RAND Corporation |c [2016] | |
300 | |a xv, 119 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a "The Maidan Revolution in Ukraine created an opportunity for change and reforms in a system that had resisted them for 25 years. This report examines Ukraine's security sector...assessing what different institutions need to do and where gaps exist...and offers recommendations for the reform of Ukraine's security and defense institutions that meet Ukraine's security needs and align with Euro-Atlantic standards and approaches."...Provided by publisher | ||
650 | 4 | |a Security sector |z Ukraine | |
650 | 4 | |a National security |z Ukraine | |
650 | 4 | |a Internal security |z Ukraine | |
650 | 0 | 7 | |a Innere Sicherheit |0 (DE-588)4127888-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
651 | 4 | |a Ukraine |x Armed Forces |x Reorganization | |
651 | 7 | |a Ukraine |0 (DE-588)4061496-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a Ukraine |0 (DE-588)4061496-7 |D g |
689 | 0 | 1 | |a Innere Sicherheit |0 (DE-588)4127888-4 |D s |
689 | 0 | 2 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, PDF |z 9780833096005 |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029393381&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029393381&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Literaturverzeichnis |
940 | 1 | |n oe | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029393381 | ||
942 | 1 | 1 | |c 355.009 |e 22/bsb |f 090512 |g 477 |
942 | 1 | 1 | |c 909 |e 22/bsb |f 090512 |g 477 |
Datensatz im Suchindex
_version_ | 1804176954308427776 |
---|---|
adam_text | Contents
Preface....................................................... iii
Figures and Tables.............................................vii
Summary........................................................ ix
CHAPTER ONE
Introduction.................................................... 1
Approach.........................................................2
CHAPTER TWO
Reforming the Security Sector—Overall Architecture...............5
Clarify Roles and Responsibilities...............................7
Strengthen Coordination Among Ministries and Agencies ...........9
Improve Intelligence Coordination...............................11
Align Roles and Functions of Internal Security Organizations....13
CHAPTER THREE
Organizing for Defense..........................................21
Structure of Defense Institutions...............................21
Implementation of Defense Structural Recommendations........... 38
CHAPTER FOUR
Defense Reforms to Improve Warfighting and Efficient Use of
Resources.....................................................41
Command, Control, Communications, and Intelligence............... 42
Personnel, Recruiting, and Training...............................47
Procurement.......................................................57
Logistics........................................................ 64
vi Security Sector Reform in Ukraine
CHAPTER FIVE
Cybersecurity...................................................71
National Cybersecurity Strategy and Concept.....................71
Cybersecurity and Defense Organizational Structure..............73
Critical National Infrastructure Protection.....................75
Incident Response...............................................78
Military Cyber Defense and Cybersecurity....................... 80
CHAPTER SIX
Defense-Technical Cooperation with Global Partners..............85
Addressing Source Country Concerns............................. 86
Impediments to Defense-Technical Cooperation in Ukraine........ 88
Recommendations to Address the Challenges to Defense-Technical
Cooperation ................................................95
CHAPTER SEVEN
Conclusions.................................................... 103
Acknowledgments................................................ 107
Abbreviations.................................................. 109
Bibliography................................................... Ill
Bibliography
Arms Control Association, “The Missile Technology Control Regime at a Glance,”
December 2012. As of September 11, 2015:
https://www.armscontrol.org/factsheets/mtcr
Australian Department of Defence, “Exercise: Talisman Sabre: Home,” 2005. As
of February 28, 2016:
http://web.archive.Org/web/20050713122123/http://www.defence.gov.au/
tal isman_sabre/
Aziz, Sahar, US. Foreign Aid andMorsVs Ouster, Middle East Institute, July 31,
2013. As of July 22, 2015:
http://www.mei. edu/content/us-foreign-aid-and-morsis-ouster
Azulai, Yuval, “Interview with the Man Responsible for Israeli Arms Exports,” [in
Hebrew] Globes, June 7, 2015. As of September 11, 2015:
http://www.globesxo.il/news/article.aspxPdidH001042515
Ball, Sam, “Arms Sales Becoming France’s New El Dorado, But at What Cost?”
France 24, May 4, 2015. As of August 5, 2015:
http://www.france24.com/en/20150503-arms-sales-becoming-france-new-el-
dorado-but-what-cost-francois-hollande-saudi-arabia-rafale
Banham, Mark, “UK Government to Invest a Further £2bn to Police Cyberspace,”
International Business Timesy 2015. As of August 5, 2015:
http://www.ibtimes.co.uk/
government-invest-further-2bn-police-cyberspace-1515691
Benn, Aluf, “Israel Selling Military Wares to Mideast Countries, Britain Says,”
Haaretz, June 11, 2013. As of September 11, 2015:
http://www.haaretz.eom/news/diplomacy-defense/.premium-l.528993
Cabinet Office, The UK Cyber Security Strategy: Report on Progress and Forward
Plans, December 2014. As of February 28, 2016:
https://www.gov.uk/government/uploads/system/uploads/attachment_data/
file/386093/The_JJK_Cyber_Security__Strategy_Report_on_Progress_and_
Forward_Plans_-__De______.pdf
111
112 Security Sector Reform in Ukraine
Cavaiola, Lawrence J., David C. Gompert, and Martin Libicki, “Cyber House
Rules: On War, Retaliation and Escalation,” Survival, Vol. 57, No. 1, 2015.
Cohen, Gili, “Israeli Arms Exports Down $1 Billion in 2014,” Haaretz, May 21,
2015. As of September 11, 2015:
http://www.haaretz.eom/news/dipIomacy-defense/.premium-l.6576l3
Constitution of Ukraine, Kyiv: Supreme Council of Ukraine, 1996.
Council of the European Union, “European Union Code of Conduct on Arms
Exports,” 8675/2/98 Rev. 2, June 5, 1998.
-------, “Council Common Position 2003/468/CFSP,” Official Journal of the
European Union, June 23, 2003. As of October 1, 2015:
http://eur-lex.europa.eu/legal-content/EN/TXT/HTML/
?uri=CELEX:32003E0468 from=EN
-------, “Council Common Position 2008/944/CFSP,” Official Journal of the
European Union, L335, December 8, 2008.
-------, “Regulations,” Official Journal of the European Union, No. 428/2009,
May 5, 2009a. As of October 1, 2015:
http://eur-lex.europa.eu/LexUriServ/
LexUriServ.do?uri=OJ:L:2009:134:0001:0269:en:PDF
-------, “Directive 2009/43/EC of the European Parliament and of the Council,”
Official Journal of the European Union, May 6, 2009b. As of August 26, 2015:
http://eur-lex.europa.eu/LexUriServ/
LexUriServ.do?uri=OJ:L:2009:l46:0001:0036:en:PDF
-------, “Notices from European Union Institutions, Bodies, Offices and
Agencies,” OJfcial Journal of the European Union, Vol. 57, April 9, 2014. As of
October 1, 2015:
http://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?
uri=OJ:JOC_20l4_107_R_0001 from=EN
Defence Committee, Parliament of the UK, “Defence and Cyber-Security—
Defence Committee Contents,” January 9, 2013. As of February 28, 2016:
http://www.publications.parliament.uk/pa/cm201213/cmselect/
cmdfence/106/10605.htm
Defense Export Controls Agency, “About DECA,” Government of Israel,
undated-a. As of July 22, 2015:
http://www.exportctrl.mod.gov.xl/ExportCtrl/ENGLISH/About+DECA/
-------, “Defense Export Control Policy,” Government of Israel, undated-b. As of
July 22, 2015:
http://www.exportctrl.mod.gov.il/ExportCtrl/ENGLISH/
Defense+Export+ControJ+Policy/
Defense Institute of Security Assistance Management, The Management of Security
Cooperation (Green Book), 2015.
Bibliography 113
Defense Security Cooperation Agency, “Excess Defense Articles (EDA),” undated.
As of July 22, 2015:
http://www.dsca.mil/programs/excess-defense-articles--eda
-------Security Assistance Management Manual, 2015. As of July 22, 2015:
http://www.samm.dsca.mil/
Demper, Alexandra, “UK Implements Changes to EU Common Military List; UK
Military List Replaced,” Sanctions Update, March 27, 2015.
Directorate of Defense Trade Controls, “Compliance Program Guidelines,” U.S.
Department of State, 2015a. As of July 22, 2015:
https://www.pmddtc.state.gov/compliance/documents/compllance_programs.pdf
-------, “The International Traffic in Arms Regulations: ITAR, 22 CFR 120-130,”
U.S. Department of State, updated July 7, 2015b. As of July 22, 2015:
https://www.pmddtc.state.gov/regulations_laws/itar.html
Dyson, E., G. Gilder, G. Keyworth, and A. Toffier, “Cyberspace and the American
Dream: A Magna Carta for the Knowledge Age,” Information Society, Vol. 12,
No. 3, 1996. As of February 25, 2016:
http://www.tandfonline.com/doi/pdf/10.1080/019722496l29486.
“Electronic Warfare,” TheyWorkForYou.com, 2014. As of November 26, 2015:
http://www.theyworkforyou.com/wrans/?id=20l4-09-04a.207634.h
“EU Defense Procurement and Export Control Policies,” web page, July 14, 2014.
As of October 1, 2015:
http://www.export.gov/europeanunion/defenseprocurement/index.asp
European Network Against Arms Trade, European Export Credit Agencies and the
Fina ncing of A rms Trade, 2007.
European Parliament, Council of the EU, European Economic and Social
Committee, and Committee of the Regions, Cybersecurity Strategy of the
European Union: An Open, Safe and Secure Cyberspace, Joint Communication
to the European Parliament, the Council, the European Economic and Social
Committee and the Committee of the Regions, 2013- As of September 20, 2015:
http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52013JC0001
European Union Agency for Network and Information Security, A Step-By-Step
Approach on Mow to Set Up a CSIRT Including Examples and a Checklist in Form of
a Project Plan, Heraklyon, 2006.
-------, An Evaluation Framework for National Cyber Security Strategies,
Ueraklyon, 2014.
Farmer, Ben, “Fitness Tests Waived for MoD’s New Reservist Cyber Warriors,”
The Telegraph, 2015. As of November 26, 2015:
http://www.telegraph.co.Uk/news/uknews/defence/l 1360976/
Fitness-tests-waived-for-MoDs-new-reservist-cyber-warriors.html
114 Security Sector Reform in Ukraine
Federal Bureau of Investigation, “FBI—Cyber Task Forces,” 2015.
Fergusson, Ian F., and Paul K. Kerr, The US. Export Control System and the
President’s Reform Initiative, Congressional Research Service, January 13, 2014. As
of July 29, 2015:
https: / /www.fas .org/sgp/crs/natsec/R41916 .pdf
Fluri, Philipp, Marcin Koziel, and Andrii Yermolaiev, eds., The Security Sector
Legislation of Ukraine, Kyiv, Ukraine: Center for Army, Conversion and
Disarmament Studies, 2014.
Fluri, Philipp, and V. G. Radetskiy, Security Sector Reform in Ukraine: Quo
Vadis? Kyiv: National Defense Academy of Ukraine and Geneva: Centre for the
Democratic Control of Armed Forces, 2010. As of January 29, 2016:
http://www.dcaf.ch/PubIications/Security-Sector-Reforni-in-Ukraine-Quo-Vadis
Global Cyber Security Capacity Centre, “Cyber Security Capability Maturity
Model (CMM)—VI. 2,” University of Oxford, 2014. As of February 25, 2016:
https://www.sbs.ox.ac.uk/cybersecurity-capacity/system/files/
CMM%20Version%20 l_2_0.pdf
Gould, Joe, “Constructing a Cyber Superpower,” DefenseMetvs, 2015. As of
December 28, 2015:
http://www.defensenews.com/story/defense/policy-budget/cyber/2015/06/27/
us-cyber-command-budget-expand-fort-meade-ofFensive/28829321/
Government of Israel, “Import and Export Order (Control of Dual-Purpose
Goods, Services and Technology Exports),” 5766—2006, August 23, 2006.
Green, James A., Cyber Warfare: A Multidisciplinary Analysis, New York: Taylor C
Francis, 2015.
Gross, Judah Ari, “As South Sudan Bloodies Itself, Israeli Arms Sales Questioned,”
Times of Israel, August 20, 2015. As of September 11, 2015:
http://www.timesofisrael.com/
as-south-sudan-bloodies-itself-israeli-arms-sales-questioned/
Hansen, Susanne Therese, and Nicholas Marsh, “Normative Power and Organized
Hypocrisy: European Union Member States’ Arms Export to Libya,” European
Security, Vol. 24, No. 2, 2015.
Headington, Yvonne, “MoD s Cyber Security Capabilities,” 2013. As of
November 30, 2015:
http://www.battle-technology.com/exhibitions.asppkey-604
Her Majesty s Treasury, Government Communications Headquarters, and
George Osborne, “Chancellors Speech to GCHQon Cyber Security,” 2015. As of
November 26, 2015:
https://www.gov.uk/government/speeches/
chancellors-speech-to-gchq-on-cyber-security
Bibliography 115
Holm, Kyrre, Europeanising Export Controls: The Impact of the European
Union Code of Conduct on Arms Exports in Belgium, Germany, and Italy,”
European Security, Vol. 15, No. 2, 2006, pp. 213—234.
Israeli Defense Industry Exports Under Scrutiny,” United Press International,
July 19, 2013. As of July 22, 2015:
http://www.upi.com/Business_News/Security-Industry/2013/07/19/
Israeli-defense-industry-exports-under-scrutiny/UPI-11581374259134/
Joint Cyber Reserve,” TheyWorkForYou, 2015. As of November 26, 2015:
http://www.theyworkforyou.com/wrans/?id^2015-02-25.225462.h
Joint Forces Command, Working for JFC,” 2015. As of November 26, 2015:
https://www.gov.uk/government/organisatxons/joint-forces-command/about/
recruitment
Klimburg, Alexander, ed., National Cyber Security Framework Manual, Tallin:
NATO Cooperative Cyber Defence Centre, December 2012.
Knight, Ben, “Germany’s Arms Exports Turn into Gamesmanship,” Deutsche
Welle, April 16, 2014. As of August 5, 2015:
http://www.dw.com/en/
germanys-arms-exports-turn-into-gamesmanship/a-17566710
Kramer, Andrew, and David Herszenhorn, Ukrainian Soldiers’ Retreat from
Eastern Town Raises Doubt for Truce,” New York Times, February 18, 2015. As of
August 8, 2016:
http://www.nytimes.com/2015/02/19/world/europe/
ukraine-conflict-debaltseve.html
Law of Ukraine, “On the Security Service of Ukraine,” Article 1, 1992.
-------, “On Democratic Civilian Control of State Military Organisation and Law
Enforcement Bodies,” Article 13.2, 2003.
-------, On Democratic Civilian Control of State Military Organisation and Law
Enforcement Bodies,” Article 15, 2003.
-------, “On Counterintelligence Activity,” Article 1, 2005.
Law of the United Kingdom, “Security Service Act of 1989,” Chapter 5, Section 1,
1989. As of February 25, 2016:
http://www.legislation.gov.Uk/ukpga/1989/5/section/l
Leigh, David, and Rob Evans, “BAE Admits Guilt Over Corrupt Arms Deals,”
The Guardian, February 5, 2010. As of August 7, 2015:
http://www.theguardian.com/world/2010/feb/05/
bae-systems-arms-deal-corruption
Levitsky, Steven, and Lucan Way, Competitive Authoritarianism: Hybrid Regimes
After the Cold War, New York: Cambridge University Press, 2010.
116 Security Sector Reform in Ukraine
Libicki, Martin C., David Senty, and Julia Poliak, Hackers Wanted: An
Examination of the Cybersecurity Labor Market, Santa Monica, Calif.: RAND
Corporation, RR-430, 2014. As of December 28, 2015:
http://www.rand.org/pubs/research_reports/RR430.html
Lutterbeck, Derek, The Paradox of Gendarmeries: Between Expansion,
Demilitarization and Dissolution, The Geneva Centre for the Democratic Control
of Armed Forces, 2013. As of August 8, 2016:
http://www.dcaf.ch/content/download/150865/2344885/file/SSR_8_EN.pdf
Manor, Hadas, “Israel and US to Review Arms Export Controls,” Globes,
March 8, 2006. As of September 11, 2015:
http://www.globes.co.il/en/article-1000069319
Marks, Paul, “UK Will Launch Its Own Cyberattacks, Not Just Defend,” New
Scientist, October 1, 2013. As of September 11, 2015:
https://www.newscientist.com/article/
dn24304-uk-will-launch-its-own-cyberattacks-not-just-defend/
Minakov, Mikhail, “A Decisive Turn? Risks for Ukrainian Democracy After the
Euromaidan,” Carnegie Endowment for International Peace, Washington, D.C.,
February 3, 2016. As of July 28, 2016:
http://carnegieendowment.org/20l6/02/03/
decisive-turn-risks-for-ukrainian-democracy-after-euromaidan/itf4
Ministry of Defence and Joint Forces Command, “Joint Forces Command
Reaches Full Operating Capability,” April 2, 2013. As of February 28, 2016:
https://www.gov.uk/government/news/
joint-forces-command-reaches-ful 1-operating-capability
Ministry of Defence, Joint Forces Command, and The Rt Hon Philip Hammond
MP, “New Cyber Reserve Unit Created,” September 29, 2013. As of February 28,
2016:
https://www.gov.uk/government/news/reserves-head-up-new-cyber-unit
National Information Assurance Partnership, home page, undated. As of
December 23, 2015-*
https://www.niap-ccevs.org/
National Security Agency, “The NSA/CSS Mission—NSA/CSS,” April 15, 2011.
As of November 26, 2015:
https://www.nsa.gov/about/mission-strategy/
NATO—See North Atlantic Treaty Organization.
Norton-Taylor, Richard, “Britain Plans Cyber Strike Force—With Help From
GCHQ,” The Guardian, 2013. As of November 30, 2015:
http://www.theguardian.com/uk-news/defence-and-security-blog/2013/sep/30/
cy b er-gchq - de fence
Bibliography 117
North Atlantic Treaty Organization, “NATO’s Practical Support to Ukraine,” Fact
Sheet, June 2015. As of July 30, 2016:
http://www.nato.int/nato_static_fl20l4/assets/pdf/
pdf_2015_06/20150624_1506-Factsheet_PracticalSupportUkraine_en.pdf
Orttung, Robert W., “What Hinders Reform in Ukraine?” George Washington
University Elliott School of International Affairs, Washington, D.C., PONARS
Eurasia Policy Memo No. 166, September 2011. As of July 28, 2016:
http://www.ponarseurasia.org/sites/default/files/policy-memos-pdf/pepm_l66.pdf
Parkin, Brian, “German Split Opens Over Blocked Sale of Tanks to Saudi Arabia,”
Bloomberg Business^ March 8, 2015. As of August 5, 2015:
http://www.bloomberg.com/news/articles/2015-03-08/
german-split-opens-over-blocked-sale-of-tanks-to-saudi-arabia ^
“Parliament Simplified Import of Medicines and Bulletproof Jackets to Ukraine”
[in Ukrainian], Ukr.Media, July 1, 2014. As of August 5, 2015:
https://ukr.media/ukrain/206484/
Petrov, Oleksii, “Political and Budgetary Oversight of the Ukrainian Intelligence
Community,” thesis, Monterey, Calif.: Naval Postgraduate School,
September 2007.
Phalnikar, Sonia, “Europe Tries to Reconcile Libya Criticism with Booming Arms
Exports,” Deutsche Welle, February 24, 2011. As of August 5, 2015:
http://www.dw.com/en/
europe-tries-to-reconcile-libya-criticism-with-booming-arms-exports/a~-l4872650
Pomper, Miles A., “U.S., Israel Reach China Arms Deal,” Arms Control Today,
September 1, 2005. As of September 11, 2015:
https://www.armscontrol.org/act/2005_09/USIsraelChinaDeal
Rapaport, Amir, “New US-Israel Crisis Involving Defense Exports to China,”
Israel Defense, December 21, 2013. As of September 11, 2015:
http://www.israeldefense.co.il/en/content/
new-us-israel-crisis-involving-defense-exports-china
Reznikova, O., and V. Tsiukalo, Development of Ukrainian National Security
Strategic Planning and Forecasting System, Kyiv, Ukraine: National Institute for
Strategic Studies, June 2015- As of December 30, 2015:
http://en.niss.gov.ua/articles/529/
Robinson, Neil, Luke Gribbon, Veronika Horvath, and Kate Robertson, Cyber-
Security Threat Characterisation: A Rapid Comparative Analysis, Santa Monica,
Calif-: RAND Corporation, RR-235-CATS, 2013. As of December 28, 2015:
http://www.rand.org/pubs/research_reports/RR235-html
118 Security Sector Reform in Ukraine
Saferworld and China Arms Controls and Disarmament Association (CACDA),
The Evolution ofEUand Chinese Arms Export Controls, March 2012. As of
September 18, 2015:
http://www.saferworld.org.uk/resources/
view-resource/687-the-evolution-of-eu-and-chinese-arms-export-controls
Sawer, Patrick, “General Sir Richard Dannatt Condemns Armoured Vehicle
Transfer to Ukraine,” The Telegraphy February 14, 2015. As of September 18, 2015:
http://www.telegraph.co.uk/news/worldnews/europe/ukraine/ll4l2838/
Sir-Richard-Dannatt-condemns-armoured-vehicle-transfer-to-Ukraine.html
Schmidt, Lara, Perspective on 2015 DoD Cyber Strategy, Testimony presented
before the House Armed Services Committee, Santa Monica, Calif.: RAND
Corporation, CT-439, 2015- As of December 28, 2015:
http://www.rand.org/pubs/testimonies/CT439.html
Solivan, Douglas A., Sr., “Communications-Electronics Command Cyber
Training Range Launches,” United States Army: Logistics and Readiness Center,
CECOM, June 23, 2015- As of December 23, 2015:
http://www.army.mil/article/150996/
Communications_Electronics_Command_cyber_training_range_launches/
Stavridis, James G., and Dave Weinstein, “Divide and Conquer: Why Dual
Authority at the NSA and Cyber Command Hurts U.S. Cybersecurity,” Foreign
Affairs, 2013- As of November 26, 2015:
https://www.foreignaffairs.com/articles/united-states/2013-10-22/
divide-and-conquer
Sternstein, Aliya, “The Military’s Cybersecurity Budget in 4 Charts,” DefenseOney
2015a. As of November 26, 2015:
http://www.defenseone.com/management/2015/03/
mi!itarys-cybersecurity-budget-4-charts/107679/
-------, “US Cyber Command Has Just Half the Staff It Needs,” DefenseOne,
2015b. As of February 28, 2016:
http://www.defenseone.com/threats/2015/02/
us-cyber-command-has-just-half-staff-it-needs/104847/
Tran, Pierre, “Egypt Seeks Bank Loans for French Arms Buy,” DefenseNewSy
February 9, 2015. As of August 7, 2015:
http://www.defensenews.com/story/defense/policy-budget/industry/2015/02/06/
france/22934245/
United Nations Office for Disarmament Affairs, “The Arms Trade Treaty,” 2014.
U.S. Department of Defense, “Active Duty Military Personnel by Service by
Rank/Grade: April 2015,” DoD Personnel, Workforce Reports ¿c Publications,
Defense Manpower Data Center, 2015. As of April 15, 2015:
https://www.dmdc.osd.mil/appj/dwp/dwp_reports.jsp
Bayerische
Staatsbibliothek
München
Bibliography 119
-------, “Military Pay Charts, Jan 1, 2015 Defense Finance and Accounting
Service, 2015. As of April 15, 2015:
http://www.dfas.mil/militarymembers/payentitlements/military-pay-charts.html
U.S. Strategic Command, “U.S. Cyber Command—U.S. Strategic Command,”
March 2015. As of November 26, 2015:
https://www.stratcom.mi1/factsheets/2/Cyber_Command/
Van der Meulen, Nicole, Eun Jo, and Stefan Soesanto, Cybersecurity in the
European Union and Beyond: Exploring the Threats and Policy Responsesy Santa
Monica, Calif.: RAND Corporation, RR-1354-EP, 2015. As of November 26,
2015:
http://www.rand.org/pubs/research_reports/RR1354.html
|
any_adam_object | 1 |
author | Oliker, Olga 1970- |
author_GND | (DE-588)141911999 |
author_facet | Oliker, Olga 1970- |
author_role | aut |
author_sort | Oliker, Olga 1970- |
author_variant | o o oo |
building | Verbundindex |
bvnumber | BV043985056 |
callnumber-first | U - Military Science |
callnumber-label | UA829 |
callnumber-raw | UA829.U4 |
callnumber-search | UA829.U4 |
callnumber-sort | UA 3829 U4 |
callnumber-subject | UA - Armies |
ctrlnum | (OCoLC)968712360 (DE-599)BVBBV043985056 |
dewey-full | 355/.0335477 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355/.0335477 |
dewey-search | 355/.0335477 |
dewey-sort | 3355 6335477 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02827nam a2200565 c 4500</leader><controlfield tag="001">BV043985056</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190111 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170104s2016 xxu|||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">016038259</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833095978</subfield><subfield code="9">978-0-8330-9597-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833095978</subfield><subfield code="9">0-8330-9597-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="c">9780833095992 (prc)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)968712360</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043985056</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield><subfield code="a">DE-Re13</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">UA829.U4</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355/.0335477</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">OST</subfield><subfield code="q">DE-12</subfield><subfield code="2">fid</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oliker, Olga</subfield><subfield code="d">1970-</subfield><subfield code="0">(DE-588)141911999</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security sector reform in Ukraine</subfield><subfield code="c">Olga Oliker, Lynn E. Davis, Keith Crane [und neun weitere]</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">RAND Corporation</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xv, 119 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"The Maidan Revolution in Ukraine created an opportunity for change and reforms in a system that had resisted them for 25 years. This report examines Ukraine's security sector...assessing what different institutions need to do and where gaps exist...and offers recommendations for the reform of Ukraine's security and defense institutions that meet Ukraine's security needs and align with Euro-Atlantic standards and approaches."...Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security sector</subfield><subfield code="z">Ukraine</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">National security</subfield><subfield code="z">Ukraine</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internal security</subfield><subfield code="z">Ukraine</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">Ukraine</subfield><subfield code="x">Armed Forces</subfield><subfield code="x">Reorganization</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">Ukraine</subfield><subfield code="0">(DE-588)4061496-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Ukraine</subfield><subfield code="0">(DE-588)4061496-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Innere Sicherheit</subfield><subfield code="0">(DE-588)4127888-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, PDF</subfield><subfield code="z">9780833096005</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029393381&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029393381&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Literaturverzeichnis</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029393381</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">355.009</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">477</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">477</subfield></datafield></record></collection> |
geographic | Ukraine Armed Forces Reorganization Ukraine (DE-588)4061496-7 gnd |
geographic_facet | Ukraine Armed Forces Reorganization Ukraine |
id | DE-604.BV043985056 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:40:23Z |
institution | BVB |
isbn | 9780833095978 0833095978 |
language | English |
lccn | 016038259 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029393381 |
oclc_num | 968712360 |
open_access_boolean | |
owner | DE-12 DE-Re13 DE-BY-UBR |
owner_facet | DE-12 DE-Re13 DE-BY-UBR |
physical | xv, 119 Seiten Diagramme |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | RAND Corporation |
record_format | marc |
spelling | Oliker, Olga 1970- (DE-588)141911999 aut Security sector reform in Ukraine Olga Oliker, Lynn E. Davis, Keith Crane [und neun weitere] Santa Monica, CA RAND Corporation [2016] xv, 119 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references "The Maidan Revolution in Ukraine created an opportunity for change and reforms in a system that had resisted them for 25 years. This report examines Ukraine's security sector...assessing what different institutions need to do and where gaps exist...and offers recommendations for the reform of Ukraine's security and defense institutions that meet Ukraine's security needs and align with Euro-Atlantic standards and approaches."...Provided by publisher Security sector Ukraine National security Ukraine Internal security Ukraine Innere Sicherheit (DE-588)4127888-4 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Ukraine Armed Forces Reorganization Ukraine (DE-588)4061496-7 gnd rswk-swf Ukraine (DE-588)4061496-7 g Innere Sicherheit (DE-588)4127888-4 s Sicherheitspolitik (DE-588)4116489-1 s DE-604 Erscheint auch als Online-Ausgabe, PDF 9780833096005 Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029393381&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung BSB Muenchen - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029393381&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Literaturverzeichnis |
spellingShingle | Oliker, Olga 1970- Security sector reform in Ukraine Security sector Ukraine National security Ukraine Internal security Ukraine Innere Sicherheit (DE-588)4127888-4 gnd Sicherheitspolitik (DE-588)4116489-1 gnd |
subject_GND | (DE-588)4127888-4 (DE-588)4116489-1 (DE-588)4061496-7 |
title | Security sector reform in Ukraine |
title_auth | Security sector reform in Ukraine |
title_exact_search | Security sector reform in Ukraine |
title_full | Security sector reform in Ukraine Olga Oliker, Lynn E. Davis, Keith Crane [und neun weitere] |
title_fullStr | Security sector reform in Ukraine Olga Oliker, Lynn E. Davis, Keith Crane [und neun weitere] |
title_full_unstemmed | Security sector reform in Ukraine Olga Oliker, Lynn E. Davis, Keith Crane [und neun weitere] |
title_short | Security sector reform in Ukraine |
title_sort | security sector reform in ukraine |
topic | Security sector Ukraine National security Ukraine Internal security Ukraine Innere Sicherheit (DE-588)4127888-4 gnd Sicherheitspolitik (DE-588)4116489-1 gnd |
topic_facet | Security sector Ukraine National security Ukraine Internal security Ukraine Innere Sicherheit Sicherheitspolitik Ukraine Armed Forces Reorganization Ukraine |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029393381&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029393381&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT olikerolga securitysectorreforminukraine |