Conscripting Whom for What?

August 1940
New Republic;8/19/40, Vol. 103 Issue 8, p231
The article reflects the author's view regarding the Burke-Wadsworth bill on compulsory and selective military service in the U.S. He stresses that the weakness of the national defense is at the top, and the higher it go the greater the defects appear to be. The government should to have a national plan which would tell, just what the people are to defend, and where and how and with what. Other compelling suggestions and analyses of the bill are presented.


Related Articles

  • WHAT LED TO ORANGE. Kher, Unmesh; Shannon, Elaine; Burger, Timothy J.; MacLeod, Scott // Time;6/2/2003, Vol. 161 Issue 22, p17 

    Discusses reasons why the U.S. security services raised their color-coded threat gauge to a level of high orange. Suicide bombings organized by al-Qaeda in Saudi Arabia and Morocco; Intelligence that indicated that Osama bin Laden's minions had entered an 'operational phase'; Active al-Qaeda...

  • TARGETED.  // Insurance Advocate;7/14/2003, Vol. 114 Issue 26, p46 

    Looks into the issue of national security in the U.S. Scope of the Homeland Security efforts by the federal government; Responsibilities of the Customs and Border Protection personnel; Role of the Immigration and Customs Enforcement unit in providing security.

  • HUMAN SECURITY OR NATIONAL DEFENSE: THE QUESTION OF CONVERSION. Birchard, Bruce // Journal of Sociology & Social Welfare;Jan-Mar1977, Vol. 4 Issue 3/4, p543 

    The article presents information on various aspects of human security and national defense in the U.S. When the war in Southeast Asia ended, most Americans expected quite reasonably that the military budget would decline. In 1967, Charles L. Schultze, then Director of the U.S. Office of the...

  • Terrorist kangaroos and gunpowder tea. Lortie, Bret // Bulletin of the Atomic Scientists;Jul/Aug2003, Vol. 59 Issue 4, p14 

    Focuses on the competition launched by Privacy International to root out the world's most pointless security measures. Award received by the Australian government; Award received by Moscow's Mayor Yuri Luzhkov; Information on other winners.

  • FLIGHTS OF FEAR. Hosenball, Mark; Isikoff, Michael; Hirsh, Michael // Newsweek;1/12/2004, Vol. 143 Issue 2, p30 

    Discusses the increased terrorist threat warning over the holidays in the U.S. Role of the Department of Homeland Security and its secretary, Tom Ridge; Interception of credible information by intelligence sources; Fears that terrorists would hijack airliners; Complaints that President George...

  • Cities Focus on Homeland Defense Spending.  // Security: Solutions for Enterprise Security Leaders;Sep2004, Vol. 41 Issue 9, p10 

    Reports on the focus of cities on homeland defense spending in the U.S. Number of cities who have received their respective federal funds for homeland defense; Program that provides local opportunities for everyone to play a role in hometown security; Total amount allocated by the Department of...

  • APOLÓGIA BEZPEÄŒNOSTNEJ VEDY. Hofreiter, Ladislav // Defense & Strategy / Obrana a strategie;2008, p101 

    Disintegration of the Soviet empire evoked acute necessity to solve doctrinal and strategic issues of national security by new actors, i. e. former states of the Warsaw Pact. Since the beginning, it was clear that peculiar scientific schools supportive to requirements of the security praxis are...

  • Building Resilient Communities: A Preliminary Framework for Assessment. Longstaff, Patricia H.; Armstrong, Nicholas J.; Perrin, Keli; Parker, Whitney May; Hidek, Matthew A. // Homeland Security Affairs;Sep2010, Vol. 6 Issue 3, p1 

    The article outlines the preliminary conceptual framework for assessing resilient communities. It discusses the debating definitions and nature of resilience which varies by disciplinary perspective and the community-based approach in building basic resilience because most disasters are local...

  • Information Security. Livingston, M. Stanley // Bulletin of the Atomic Scientists;May1956, Vol. 12 Issue 5, p172 

    The article focuses on the system of information security in the U.S. The author suggests that for the country to achieve long-range strength in scientific and technical productivity, the flow of information must go two ways, both into and out of government agencies. He notes that classification...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics