Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Security concerns have mushroomed. Increasingly numerous areas of life are governed by security policies and technologies. Security Unbound argues that when insecurities pervade how we relate to our neighbours, how we perceive international politics, how governments formulate policies, at stake is not our security but our democracy. Security is not in the first instance a right or value but a practice that challenges democratic institutions and actions. We are familiar with emergency policies in the name of national security challenging parliamentary processes, the space for political dissent, and fundamental rights. Yet, security practice and technology pervade society heavily in very mundane ways without raising national security crises, in particular through surveillance technology and the management of risks and uncertainties in many areas of life. These more diffuse security practices create societies in which suspicion becomes a default way of relating and governing relations, ranging from neighbourhood relations over financial transactions to cross border mobility. Security Unbound demonstrates that governing through suspicion poses serious challenges to democratic practice. Some of these challenges are familiar, such as the erosion of the right to privacy; others are less so, such as the post-human challenge to citizenship. Security unbound provokes us to see that the democratic political stake today is not our security but preventing insecurity from becoming the organising principle of political and social life.
European countries have much in common. They are geographically and culturally close and they all face the problem of relative weakness vis-a-vis larger actors. However, while their many similarities lead them to cooperate, their geopolitical differences and specificities translate into conflicting priorities over how to arrange the terms of cooperation. European security is hence defined by a powerful tension between conflict and cooperation. And Europe's most powerful countries largely delineate the mechanics of such tension. By examining the interplay between geopolitical change, British, French and German grand strategy and the evolution of NATO and the European Union's (EU) Common Security and Defence Policy (CSDP) between 2001 and 2010, this book seeks to shed light on the nature and evolution of European security. Only by examining the grand strategies of Europe's most powerful countries can we get a sense of their interests. However, in order to properly grasp the nature and evolution of such interests we must observe how they play out at the level of specific debates. Very often, it is only when it comes to organising the specific terms of cooperation that conflicting priorities can be properly appreciated. Herein lies the importance of the EU-NATO conundrum. Throughout the 2001-2010 period, NATO and CSDP remained the best thermometers of the powerful tension between conflict and cooperation that defines European security. This book is thus fundamental reading for students, academics and practitioners with an interest in European security, geopolitics, NATO and CSDP.
This book examines how the war crime legacy resulting from the Yugoslav war of the 1990s on political and military transformation in Serbia was an impediment to security reform, democratization and the achievement of Western standards in the Belgrade armed forces.Using original empirical research, it traces the processes of restructuring, civilianisation, legal framework and democratic control and security policy communities, in relation to reforming the Serbian military. Crucially, the book focuses on the war crimes legacy from the 1990s, not as a matter of international conditionality, but as a key factor obstructing successful reform. This book, for the first time, examines the networks linked to security, intelligence and military agencies that protected war crimes suspects, such as General Ratko Mladic, delaying democratic control of the armed forces. Only when that network was broken, could the process of democratization begin to be complete.This unique book linking war crimes and security sector reform will appeal to scholars working on Serbia/former Yugoslavia, law and conflict, security and development, civil-military relations and Central and Eastern European politics.
Offering a new perspective on the widely discussed debate on how the international community would respond to a nuclear-armed Iran, this critical research challenges the prevailing wisdom that a nuclear Iran would provoke a nuclear proliferation cascade in the Middle East.Hobbs and Moran assess the proliferation calculus of four key countries, Saudi Arabia, Egypt, Turkey and Syria, as well exploring the possibility that Iran would transfer nuclear materials to terrorists groups. The authors conclude that a nuclear domino effect would be highly unlikely, even in the face of an Iranian bomb, thus undermining one of the major arguments used in support of pre-emptive military action against Iran's nuclear facilities.A range of policy measures are outlined, that could be enacted by the international community to further reduce the risk of a regional proliferation cascade, making this text a must-read for policy makers, security and international relations scholars and all those with an interest in the Middle East.
In 1993 the first Clinton administration declared environmental security a national security issue, but by the end of the Bush administrations environmental security had vanished from the government's agenda. This book uses changing US environmental security policy to propose a revised securitisation theory, one that both allows insights into the intentions of key actors and enables moral evaluations in the environmental sector of security. Security and the Environment brings together the subject of environmental security and the Copenhagen School s securitisation theory. Drawing on original interviews with former key players in United States environmental security, Rita Floyd makes a significant and original contribution to environmental security studies and security studies more generally. This book will be of interest to international relations scholars and political practitioners concerned with security, as well as students of international environmental politics and US policy-making.
The ebbs and flows of Indian history can also be charted through the country's "maritime blindness" - its onset and the national endeavour to overcome it. The story of developing India's maritime capacity, since independence, is also about the kind of international and regional footprint it needs to have. In this book, the author discusses India's new and old maritime challenges and contextualises them in terms of its inherent institutional strengths to cope with their bewildering complexity. Their complexity is not just due to their sheer scale; the degrading institutional capacities, within countries and internationally, act as threat multipliers. The dynamics of global geopolitics, the seismic perturbations of global economy, and the dizzying pace of technology belie presuppositions for global future; all strategic analysts recognise our current, persisting conundrums. Taking into account the country's critical strategic weight in the maritime domain, the author suggests an approach - about the right 'mix' of the 'traditional' and the 'non-traditional' threats - in the institutional agendas of various governance mechanisms concerning different water bodies, especially the Indian Ocean Region, which also demands of India both hardware and software capacities, including diplomatic. He concludes that the effect of such an approach would be stabilising, consonant with the civilisational vision of the founders of the modern Indian nation.
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.
Americans and Europeans perceive threat differently. Americans remain more religious than Europeans and generally still believe their nation is providentially blessed. American security culture is relatively stable and includes the deeply held belief that existential threat in the world emanates from the work of evil-doers. The US must therefore sometimes intervene militarily against evil. The European Union (EU) security culture model differs from traditional European iterations and from the American variant. The concept of threat as evil lost salience as Western Europe became more secularist. Threats became problems to manage and resolve. The upsurge in anti-immigrant and anti-foreigner sentiment in the midst of economic crisis undermines this model.
Recent years have seen a growing role for private military contractors in national and international security. To understand the reasons for this, Elke Krahmann examines changing models of the state, the citizen and the soldier in the UK, the US and Germany. She focuses on both the national differences with regard to the outsourcing of military services to private companies and their specific consequences for the democratic control over the legitimate use of armed force. Tracing developments and debates from the late eighteenth century to the present, she explains the transition from the centralized warfare state of the Cold War era to the privatized and fragmented security governance, and the different national attitudes to the privatization of force.
Civilian control of the armed forces is crucial for any country hoping to achieve a successful democratic transition. In this remarkable book, Narcis Serra, Spanish Minister of Defence between 1982 and 1991, explains the steps necessary to reduce the powers of armed forces during the process of a democratic transition. Spain's military reform proved a fundamental and necessary element for the consolidation of Spanish democracy and is often viewed as a paradigm case for the transition to democracy. Drawing on this example, Serra outlines a simple model of the process and conditions necessary to any democratic military reform. He argues that progress in military transition must include legal and institutional reforms, changes to the military career structure and doctrine, and control of conflict levels.
Technology is championed as the solution to modern security problems, but also blamed as their cause. This book assesses the way in which these two views collide in the debate over ballistic missile defence: a complex, costly and controversial system intended to defend the United States from nuclear missile attacks. Columba Peoples shows how, in the face of strong scientific and strategic critique, advocates of missile defence seek to justify its development by reference to broader culturally embedded perceptions of the promises and perils of technological development. Unpacking the assumptions behind the justification of missile defence initiatives, both past and present, this book illustrates how common-sense understandings of technology are combined and used to legitimate this controversial and costly defence programme. In doing so it engages fundamental debates over understandings of technological development, human agency and the relationship between technology and security.
Responding to Catastrophic Events brings together the leading scholars and practitioners of consequence management to instruct a new generation in how to respond to both natural disasters and manmade events. Focusing on the relationship of disaster management to national security and the Department of Defense, the contributors cover a range of potential scenarios and address the distinct responsibilities of first responders, the Departments of Homeland Security, Defense, and State, and the military. They also point to the importance of having a plan for the media and knowing the legal obstacles and issues that may arise in a disaster situation. Using recent case studies to provide lessons learned for future responses to disasters, Responding to Catastrophic Events is a comprehensive and vital reader for any scholar of public policy, emergency management, or strategic studies.
This work provides an introduction to the range of potential disaster scenarios, covering the issues and organizational relationships of importance to the student of consequence management. These include the roles, responsibilities, and coordination requirements of first responders, the Department of Homeland Security, the Department of Defense, and the military.
This book brings together leading academic specialists and policy
practitioners to explore and develop cooperative approaches for
managing critical contemporary and emerging security challenges for
South East Europe and the wider international community.
Governments recognise that national security in the turbulent conditions of the early twenty-first century must centre on the creation of public confidence that normal life can continue even in the face of threats such as terrorism and proliferation, and of natural hazards such as pandemics and climate change. Based on his own experience in government, David Omand argues that while public security is vital for good government, the effects of bad government will result from failure to maintain the right relationship between justice, liberty, privacy, civic harmony and security measures. His book examines in detail how secret intelligence helps governments to deliver security, but also risks raising public concern over its methods. A set of ethical principles is proposed to guide intelligence and security work within the framework of human rights. Securing the State provides a new way of thinking about the cycle of activities that generates secret intelligence, examines the issues that arise from the way that modern intelligence uses technology to access new sources of information, and discusses how the meaning of intelligence can best be elucidated. The limits of intelligence in enabling greater security are explored, especially in guiding government in a world in which we must learn not to be surprised by surprise. Illustrated throughout by historical examples, David Omand provides new perspectives for practitioners and those teaching security and intelligence studies and for a wider readership offers an accessible introduction to pressing issues of public policy.
A fascinating and unique history of the launch of Britain's Secret Intelligence Service through the unusual life of its founder, Mansfield Cumming. * Sir Mansfield Cumming, the founder of the British Secret Service and the original 'C', has until now been a shadowy figure. For this authorised biography, the Secret Intelligence Service has released to Alan Judd, Cumming's voluminous diaries, which have never been seen outside the Service and will be put back into storage in perpetuity when Judd has used them. * The result is likely to be the most sensational biography of the season, and the definitive account of how MI5 and MI6 -- the models for all subsequent secret services all over the world -- were set up. * Cumming signed himself 'C', was referred to as such in Whitehall and always used green ink, traditions maintained to this day. His life not only makes riveting reading but casts fascinating light on the development of the Secret Service and its influence on the twentieth century.
This edited collection explores the fruitfulness of applying an interpretive approach to the study of global security. The interpretive approach concentrates on unpacking the meanings and beliefs of various policy actors, and, crucially, explains those beliefs by locating them in historical traditions and as responses to dilemmas. Interpretivists thereby seek to highlight the contingency, diversity, and contestability of the narratives, expertise, and beliefs that inform political action. The interpretive approach is widespread in the study of governance and public policy, but arguably it has not yet had much impact on security studies. The book therefore deploys the interpretive approach to explore contemporary issues in international security, combining theoretical engagement with good empirical coverage through a novel set of case studies. Bringing together a fresh mix of world renowned and up-and-coming scholars from across the fields of security studies, political theory and international relations, the chapters explore the beliefs, traditions, and dilemmas that have informed security practice on the one hand, and the academic study of security on the other, as well as the connections between them. All contributors look to situate their work against a broader historical background and long-standing traditions, allowing them to take a critical yet historically informed approach to the material.
This book provides a comprehensive analysis of the role of the EU in international security through five detailed case studies and in doing so fills a distinct gap in the scholarship on European security and policy-making. Significantly, it offers a broadened conceptualization of the EU as an international security actor, including JHA policy. Furthermore, case studies which explore, amongst other things, EU responses to piracy off the coast of Somalia, climate change and terrorism offers a fresh insight into EU policy on contemporary security challenges. As such, this book constitutes an important and original input in the debate on European security after the ratification of the Lisbon Treaty and is a must-read for students and scholars of EU Politics, Security Studies and International Relations.
The global security situation is challenging and constantly changing. Responding to threats requires the effective coordination of the various levers of national power. These must now go beyond the traditional diplomatic, information, military and economic levers, to involve other, non-security agencies, including those responsible for the environment, health, education and industry. Through a uniquely extensive study of countries from across the world, this book considers how nations have developed bespoke coordination mechanisms to the unique threats they face, and how these mechanisms have had to evolve as the threats change. It covers nations for whom the system is well established (e.g. the US in 1947) and other countries whose arrangements are more recent, such as the UK (2010). Where the National Security Councils have existed for longest, the case studies highlight how they have transformed as the national understanding of security has changed, typically to reflect a broadening. Consequently, while there are no universal solutions, the comparative approach taken in this book identifies enduring principles for shaping the creation or reform of national security coordination fit for the challenges of the twenty-first century.
Using major new documentary sources, the authors tell the story of
why and how China built its nuclear submarine flotilla and the
impact of that development on the nation's politics, technology,
industry, and strategy.
Formulating a military strategy is a complex interaction between politicians, strategic commanders and generals. Formulating such a strategy within a multinational organization is even more complex. In this book, Edstrom and Gyllensporre explore a range of case studies, based on UN documents, and individually analyse their de facto military strategy in terms of ends, ways, means, and the interaction between the political strategic level (UN Security Council) and the military strategic level (UN Secretary General). Some 100,000 UN soldiers deployed all over the world not only deserve but need to be properly directed. Military strategy is hence a necessity, not an option. Moreover the military strategy should be percieved as a complementary effort to a robust integrated mission concept, including other instruments than the military."
Image Warfare in the War on Terror provides an innovative re-examination of the war on terror. It argues that since 11 September 2001 image warfare has replaced techno-war as the dominant warfighting model. Roger suggests that it is a form of warfare in which Al Qaeda currently dominates while the West is still playing catch-up. By dealing frankly with the deployment of disturbing images generated by the 9/11 attacks - from bin Laden videos, suicide terrorism and hostage executions to prisoner abuses, Roger provides us with a new vocabulary through which these acts can be discussed and understood. This book offers the first comprehensive assessment, from an International Relations perspective, of image warfare. Through engagement with IR, Media Studies and Visual Culture literatures, Roger introduces three new conceptual terms 'image munitions', 'counter-image munitions' and 'remediation battles'. These terms are then explored in chapters about political communications concerning Bush, Blair and bin Laden; suicides; executions and abuses.
This textbook provides a comprehensive introduction to modern strategy, covering the context, theory, and practice of military strategy in all its different forms. Covering all the main issues in the field, the book explores the major themes through a combination of classical and modern strategic theory, history, and current practice. It is split into three main sections: The first provides the context for contemporary strategy and includes discussions of the human, technological, intelligence, ethical, and grand strategic dimensions. The second part explores the theory and practice of strategy in different geographical domains, including land, sea, air, space, and cyberspace. The final part engages with three of the most challenging forms of strategy in the contemporary era: nuclear weapons, terrorism, and insurgency. This second edition brings the book up to date by including discussions of the rise and fall of the Islamic State of Iraq and Syria (ISIS); the emergence of robotics and artificial intelligence; major events in space and cyberspace; and the growing profile of nuclear weapons. Each chapter presents the reader with a succinct summary of the topic, provides a challenging analysis of current issues, and finishes with key points, questions for discussion, and further reading. This book will be essential reading for upper-level students of strategic studies, war studies, military history, and international security.
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process. The concept of the intelligence cycle has been central to the study of intelligence. As Intelligence Studies has established itself as a distinctive branch of Political Science, it has generated its own foundational literature, within which the intelligence cycle has constituted a vital thread - one running through all social-science approaches to the study of intelligence and constituting a staple of professional training courses. However, there is a growing acceptance that the concept neither accurately reflects the intelligence process nor accommodates important elements of it, such as covert action, counter-intelligence and oversight. Bringing together key authors in the field, the book considers these questions across a number of contexts: in relation to intelligence as a general concept, military intelligence, corporate/private sector intelligence and policing and criminal intelligence. A number of the contributions also go beyond discussion of the limitations of the cycle concept to propose alternative conceptualisations of the intelligence process. What emerges is a plurality of approaches that seek to advance the debate and, as a consequence, Intelligence Studies itself. This book will be of great interest to students of intelligence studies, strategic studies, criminology and policing, security studies and IR in general, as well as to practitioners in the field.
Interdoc was established in 1963 by Western intelligence services as a multinational effort to coordinate an anti-communist offensive. Drawing on exclusive sources and the memories of its participants, this book charts Interdoc's campaign, the people and ideas that lay behind it and the rise and fall of this remarkable network during the Cold War. |
You may like...
Chilcot Report - Executive Summary
John Chilcot, Lawrence Freedman, …
Paperback
|