![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This new handbook provides a wide-ranging overview of the current state of academic analysis and debate on insurgency and counterinsurgency, as well as an-up-to date survey of contemporary insurgent movements and counter-insurgencies. In recent years, and more specifically since the insurgency in Iraq from 2003, academic interest in insurgency and counterinsurgency has substantially increased. These topics have become dominant themes on the security agenda, replacing peacekeeping, humanitarian operations and terrorism as key concepts. The aim of this volume is to showcase the rich thinking that is available in the area of insurgency and counterinsurgency studies and act as a further guide for study and research. In order to contain this wide-ranging topic within an accessible and informative framework, the Editors have divided the text into three key parts: Part I: Theoretical and Analytical Issues Part II: Insurgent Movements Part III: Counterinsurgency Cases The Routledge Handbook of Insurgency and Counterinsurgency will be of great interest to all students of insurgency and small wars, terrorism/counter-terrorism, strategic studies, security studies and IR in general, as well as professional military colleges and policymakers.
U.S. Government Counterterrorism: A Guide to Who Does What is the first readily available, unclassified guide to the many U.S. government agencies, bureau offices, and programs involved in all aspects of countering terrorism domestically and overseas. The authors, veterans of the U.S. government's counterterrorism efforts, present a rare insider's view of the counterterrorism effort, addressing such topics as government training initiatives, weapons of mass destruction, interagency coordination, research and development, and the congressional role in policy and budget issues. Includes a Foreword by Brian Michael Jenkins, Senior Advisor RAND Corporation Individual chapters describe the various agencies, their bureaus, and offices that develop and implement the counterterrorism policies and programs, providing a useful unclassified guide to government officials at all levels as well as students and others interested in how the U.S. counters terrorism. The book also discusses the challenges involved in coordinating the counterterrorism efforts at federal, state, and local levels and explains how key terror events influenced the development of programs, agencies, and counterterrorism legislation. The legislative underpinnings and tools of the U.S. counterterrorism efforts are covered as are the oft-debated issues of defining terrorism itself and efforts to counter violent extremism. In addition to outlining the specific agencies and programs, the authors provide unique insights into the broader context of counterterrorism efforts and developments in the last 10-plus years since 9/11 and they raise future considerations given recent landscape-altering global events. The authors were interviewed by National Defense Magazine in a January 23, 2012 article entitled Counterterrorism 101: Navigating the Bureaucratic Maze. They were interviewed on April 30, 2012 by Federal News Radio. Michael Kraft was also interviewed on June 27, 2014 by Federal News Radio.
The Security Governance of Regional Organizations assesses the effectiveness of regional organizations as regional or global security providers, and examines how policy preferences, resources, capabilities, institutional mechanisms and economic and political cohesion link with collective action behaviour in four security policy functions. It investigates how regional organizations meet the new security threats or respond to strategic geopolitical changes and what adaptations they make in the process. Divided into three parts and using a common analytical framework, the book explains the changing security agenda in ten key regional organizations, each organizational chapter:
This collection contributes to the ongoing reconceptualization of security and definition of security governance, and explores whether regional security governance processes are unique or similar and whether some organizational experiences can be seen as models for others to follow. It combines a coherent theoretical framework with strong comparative case studies, making it ideal reading for all students of security studies.
This edited book examines the East German foreign intelligence service (Hauptverwaltung Aufklarung, or HVA) as a historical problem, covering politics, scientific-technical and military intelligence and counterintelligence. The contributors broaden the conventional view of East German foreign intelligence as driven by the inter-German conflict to include its targeting of the United States, northern European and Scandinavian countries, highlighting areas that have previously received scant attention, like scientific-technical and military intelligence. The CIA's underestimation of the HVA was a major intelligence failure. As a result, East German intelligence served as a stealth weapon against the US, West German and NATO targets, acquiring the lion's share of critical Warsaw Pact intelligence gathered during the Cold War. This book explores how though all of the CIA's East German sources were double agents controlled by the Ministry of State Security, the CIA was still able to declare victory in the Cold War. Themes and topics that run through the volume include the espionage wars; the HVA's relationship with the Russian KGB; successes and failures of the BND (West German Federal Intelligence Service) in East Germany; the CIA and the HVA; the HVA in countries outside of West Germany; disinformation and the role and importance of intelligence gathering in East Germany. This book will be of much interest to students of East Germany, Intelligence Studies, Cold War History and German politics in general. Kristie Macrakis is Professor at the Georgia Institute of Technology, Atlanta. Thomas Wegener Friis is an Assistant Professor at the University of Southern Denmark's Centre for Cold War Studies. Helmut Muller-Enbergs is currently a Visiting Professor at the University of Southern Denmark and holds a tenured senior staff position at the German Federal Commission for the STASI Archives in Berlin.
During the past twenty-five years, U.S. strategists have argued that avoiding nuclear war depends on deterring a Soviet first strike by ensuring that U.S. forces could survive a surprise attack in numbers sufficient to inflict unacceptable damage in retaliation. U.S. military and political leaders have thus emphasized acquiring more powerful and accurate weaponry and providing better protection for it, while defense analysts have focused on assessing the relative strength and survivability of U.S. and Soviet forces. In the process neither has given sufficient attention to the vulnerability of the U.S. command, control, and communications system that would coordinate warning of an attack in progress and the response to it. In this study Bruce G. Blair examines accepted assumptions about mutual deterrence, force strength, and survivability, and concludes that the vulnerability of command, control, and communications not only precludes an effective retaliatory strike but also invites a preemptive Soviet first strike. After summarizing the assumptions and evaluative methodology behind mainstream strategic theory, the study describes the current decentralized command and control system that, under conditions of surprise attack, could be unable to communicate with decisionmakers or with units responsible for executing the decisions. Blair traces in detail the development of the system over three decades; the attempts to improve it through the use of procedural guidelines, alternative and redundant communications channels, and survival tactics; and the continuing vulnerabilities from improved Soviet weapons and the environmental forces engendered by massive nuclear detonations. Blair also analyzes the probable effects of proposals by the Reagan administration to strengthen command, control, and communications systems and provides recommendations for further strengthening and for altering related policies, deployments, and strategies to improve the stability of deterrence.
A riveting introduction to the complex and evolving field of geospatial intelligence. Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT. Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.
This book offers an examination of the role of emancipation in the study and practice of security, focusing on the issue of environmental change. The end of the Cold War created a context in which traditional approaches to security could be systematically questioned. This period also saw a concerted attempt in IR to argue that environmental change constituted a threat to security. This book argues that such a notion is problematic as it suggests that a universal definition of security is possible, which prevents a recognition of security as a site of contestation, in which a range of actors articulate alternative visions of who or what is in need of being secured. If security is understood and approached in traditional terms - as the territorial preservation of the nation-state from external threat - then it is indeed difficult to see how environmental issues would benefit from being placed on states' security agenda. If, however, security is defined in terms of the emancipation of the most vulnerable individuals from contingent structural oppressions, then drawing a relationship between environmental change and security may be beneficial for redressing those environmental issues and prioritising the needs of those most at risk from the manifestations of global environmental change. This book takes the limitations of contemporary approaches to the relationship between the environment and security as its starting point, and seeks to do two things. First, it aims to illustrate the ways in which arguments over approaches to environmental issues can be viewed as contestation over the meaning of 'security' in particular political contexts. Central here is the composition and assumptions of the dominant security discourse to emerge regarding those issues: a framework of meaning for the most important forms of action on behalf of a particular group, defining the terms for meaningful contestation and negotiation about security itself within that group. As such, the book attempts to illustrate the dynamics of competition over the meaning of security with reference to environmental issues, particularly focusing on instances of political change in the dominant security discourse through which that issue is approached. In the process the author points to the central role of these dominant security discourses in underpinning the most practically significant actions regarding environmental issues such as deforestation and global climate change. The book employs methodological tools that enable a focus on how particular frameworks of meaning are constituted and become dominant; how they provide a lens through which various issues are approached; and how discourses most consistent with redressing environmental change and the suffering of the most vulnerable might come to provide the framework through which security is viewed in particular contexts. This book will be of much interest to students of Critical Security Studies, geography, sociology, IR and Political Science in general.
This book offers an examination of the role of emancipation in the study and practice of security, focusing on the issue of environmental change. The end of the Cold War created a context in which traditional approaches to security could be systematically questioned. This period also saw a concerted attempt in IR to argue that environmental change constituted a threat to security. This book argues that such a notion is problematic as it suggests that a universal definition of security is possible, which prevents a recognition of security as a site of contestation, in which a range of actors articulate alternative visions of who or what is in need of being secured. If security is understood and approached in traditional terms - as the territorial preservation of the nation-state from external threat - then it is indeed difficult to see how environmental issues would benefit from being placed on states' security agenda. If, however, security is defined in terms of the emancipation of the most vulnerable individuals from contingent structural oppressions, then drawing a relationship between environmental change and security may be beneficial for redressing those environmental issues and prioritising the needs of those most at risk from the manifestations of global environmental change. This book takes the limitations of contemporary approaches to the relationship between the environment and security as its starting point, and seeks to do two things. First, it aims to illustrate the ways in which arguments over approaches to environmental issues can be viewed as contestation over the meaning of 'security' in particular political contexts. Central here is the composition and assumptions of the dominant security discourse to emerge regarding those issues: a framework of meaning for the most important forms of action on behalf of a particular group, defining the terms for meaningful contestation and negotiation about security itself within that group. As such, the book attempts to illustrate the dynamics of competition over the meaning of security with reference to environmental issues, particularly focusing on instances of political change in the dominant security discourse through which that issue is approached. In the process the author points to the central role of these dominant security discourses in underpinning the most practically significant actions regarding environmental issues such as deforestation and global climate change. The book employs methodological tools that enable a focus on how particular frameworks of meaning are constituted and become dominant; how they provide a lens through which various issues are approached; and how discourses most consistent with redressing environmental change and the suffering of the most vulnerable might come to provide the framework through which security is viewed in particular contexts. This book will be of much interest to students of Critical Security Studies, geography, sociology, IR and Political Science in general.
This book examines Russia s external security policy under the
presidencies of Vladimir Putin, Dmitry Medvedev and beyond. This book will be of much interest to students of Russian politics and foreign policy, European politics and Security Studies and IR in general.
William Blair's Virginia's Private War is a close study of the home front in the Confederacy and a significant contribution to our understanding of the Confederate defeat. Blair challenges and effectively overturns the dominant assumption that internal stresses and conflicts, particularly along lines of class and race, undermined the Confederacy. Rather, he shows that for most of the South the centripetal forces of Confederate nationalism and defence of home and hearth against an invading enemy were more powerful. Internal problems, including dissent, wracked the state of Virginia, yet these private wars actually helped prolong the conflict as they forced authorities to turn the war into more of a rich man's fight.
This book explores the mythology woven around the Soviet secret police and the Russian cult of state security that has emerged from it. Tracing the history of this mythology from the Soviet period through to its revival in contemporary post-Soviet Russia, the volume argues that successive Russian regimes have sponsored a cult' of state security, whereby security organs are held up as something to be worshipped. The book approaches the history of this cult as an ongoing struggle to legitimise and sacralise the Russian state security apparatus, and to negotiate its violent and dramatic past. It explores the ways in which, during the Soviet period, this mythology sought to make the existence of the most radically intrusive and powerful secret police in history appear natural'. It also documents the contemporary post-Soviet re-emergence of the cult of state security, examining the ways in which elements of the old Soviet mythology have been revised and reclaimed as the cornerstone of a new state ideology. The Russian cult of state security is of ongoing contemporary relevance, and is crucial for understanding not only the tragedies of Russia's twentieth-century history, but also the ambiguities of Russia's post-Soviet transition, and the current struggle to define Russia's national identity and future development. The book examines the ways in which contemporary Russian life continues to be shaped by the legacy of Soviet attitudes to state-society relations, as expressed in the reconstituted cult of state security. It investigates the shadow which the figure of the secret policeman continues to cast over Russia today. The book will be of great interest to students of modern Russian history and politics, intelligence studies and security studies, as well as readers with an interest in the KGB and its successors.
This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers.
Despite Timor-Leste's high expectations when it became independent from Indonesia in 2002, the country is ranked among the least developed countries in the world. It has found itself at the centre of international attention in the last decade, with one of the biggest interventions in UN history, as well as receiving amongst the highest per capita rates of bilateral assistance in the Asia-Pacific region. This book draws together the perspectives of practitioners, policy-makers and academics on the international efforts to rebuild one of the world's newest nations. The contributors consider issues of peace-building, security and justice sector reform as well as human security in Timor-Leste, locating these in the broader context of building nation, stability and development. The book includes two demographic studies that can be used to critically examine the nation's possible future. Engaging in deliberate consideration of both practical and theoretical complexities of international interventions, this book will be of interest to academics and students in the fields of Development, Security and Southeast Asian Studies.
This book offers a systematic examination, analysis and evaluation of Israeli national security statecraft in terms of challenges and responses. Providing an in-depth analysis of Israeli statecraft challenges and responses, this interdisciplinary book integrates social science and security studies with public policy approaches within a long-term historical perspective on the Arab-Israeli conflict. These scholarly approaches are synthesized with extensive personal knowledge of the author based on involvement in Israeli political-security policy making. This book makes use of conceptualizations of statecraft such as 'fuzzy gambling' and interventions with critical mass in ultra-dynamic historical processes to help clarify Israel's main statecraft successes and failures, alongside the wider theoretical apparatuses these concepts represent. While focused on Israel, these theoretical frameworks have important implications for the academic study of statecraft and statecraft praxis worldwide. This book will be of much interest to both statecraft practitioners and to students of Israeli politics and security, the Middle Eastern conflict, strategic studies and IR/security studies in general.
As the U.S. Navy enters the twenty-first century, many of the ships, aircraft, weapons, and tactics it employed so successfully during the Cold War will no longer be cost-effective or even effective. Future battlefields will shift the locus of naval action from the high seas into littoral waters, demanding sustained operations in relatively narrow, shallow waters. Naval forces in the twenty-first century must not only meet the traditional requirements of command of the sea--ships, planes, troops, and bases--carrying out forward presence, crisis response, strategic deterrence, and sealift. They must now put these together to obtain the four key operational capabilities of littoral warfare: command, control, intelligence and surveillance, and communication; battlespace dominance; power projection; and force sustainment. The core of the new U.S. strategic concept is power projection, and it envisions naval forces directly leading Army and Air Force elements to influence events ashore, most probably in the Third World. And this navy must be cost effective.
The book interrogates the disciplinary biases and firewalls that inform mainstream international relations today, and problematises the several tropes that have come to typify the strategic histories of post-colonial societies such as India. Questioning a range of long-held cultural representations on India, the book challenges such portrayals and underscores the centrality of context and contingency in any cultural explanation of state behaviour. It argues for a historico-cultural understanding of power and critiques IR's tendency to usher in a selective 'return of history'. Taking two contrasting case studies from medieval Indian history, the book assesses the success and failure of the grand strategy pursued by the Mughal empire under Akbar. The study emphasises his grand strategy of accommodation, defined by the interplay of critical variables such as distance and the vast military labour market. The book also looks at his conscious attempt to indigenise power by projecting himself as the personification of the ideal Hindu king. This case study helps to contextualise the many critical transitions that occurred in international relations: from medieval empires to the modern state system, and from an indigenised, experiential understanding of power to its absolute, abstract manifestations in the colonial state.
A noted theorist of globalization offers a complete reconstruction of our national security institutions and strategies to better match today s realities. David A. Westbrook shows how deploying ourselves as statesmen and -women, as citizens can better achieve U.S. national security. Westbrook explains why today s national security establishment is outdated, entrenched in a model of defense befitting the post World War II Cold War era. Today, without military peers, the U.S. must re-create its institutions around wielding influence globally, based on the cooperation of other states and groups. Even when we deploy troops today, our goal is the construction of order, not defense. Westbrook explores radical (including Jihadist) challenges, the long war on terror, and other current topics to show how defense institutions could be reconceived in order to become both more responsible and more effective. His measures include a wholesale revision of the National Security Act of 1947 to radically reform intelligence work by reintegrating it into democratically responsible military and diplomatic bureaucracies."
A noted theorist of globalization offers a complete reconstruction of our national security institutions and strategies to better match today s realities. David A. Westbrook shows how deploying ourselves as statesmen and -women, as citizens can better achieve U.S. national security. Westbrook explains why today s national security establishment is outdated, entrenched in a model of defense befitting the post World War II Cold War era. Today, without military peers, the U.S. must re-create its institutions around wielding influence globally, based on the cooperation of other states and groups. Even when we deploy troops today, our goal is the construction of order, not defense. Westbrook explores radical (including Jihadist) challenges, the long war on terror, and other current topics to show how defense institutions could be reconceived in order to become both more responsible and more effective. His measures include a wholesale revision of the National Security Act of 1947 to radically reform intelligence work by reintegrating it into democratically responsible military and diplomatic bureaucracies."
First published in 1990, this is an authoritative account of defence spending and policy in both developing and developed countries. The book provides case-studies and comparitive materiel for policy-makers, civil servants, and military staffs throughout hte world. It will also be of great use to students of economics, politics, international relations, and policy studies.
This book rethinks security theory from a feminist perspective -- uniquely, it engages feminism, security, and strategic studies to provide a distinct feminist approach to Security Studies. The volume explicitly works toward an opening up of security studies that would allow for feminist (and other) narratives to be recognized and taken seriously as security narratives. To make this possible, it presents a feminist reading of security studies that aims to invigorate the debate and radicalize critical security studies. Since feminism is a political project, and security studies are, at their base, about particular visions of the political and their attendant institutions, this is of necessity a political intervention. The book works through and beyond security studies to explore possible spaces where an opening of security, necessary to make way for feminist insights, can take place. While it develops and illustrates a feminist narrative approach to security, it is also intended as an intervention that challenges the politics of security and the meanings for security legitimized in existing practices. This book provides develops a comprehensive framework for the emerging field of feminist security studies and will be of great interest to students and scholars of feminist IR, critical security studies, gender studies and IR and security studies in general.
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
Since the end of the Cold War, Russia has undergone profound economic and political changes. Initial hopes for a tranquil post-Cold War world, however, look naive in retrospect. Rapid NATO enlargement and European Union expansion, and perhaps NATO's Balkan interventions, now appear to have been premised on an assessment of Russian acquiescence that was far too optimistic, and seemed to extinguish any inkling Russia might have had of even limited integration with Europe. At the same time, the United States' expansive 'unipolar moment' was unexpectedly fleeting, its end hastened by 9/11, which dulled the newly benevolent and hopeful edge of international relations in favour of hard security and martial resolve. This abrupt change in emphasis notably led to the United States' strategic overreach in Iraq and immersion in Afghanistan, and arguably created conditions for an illiberal brand of leadership in line with Russia's historical habit and the inclinations of those who succeeded Boris Yeltsin. Chronologically, these articles span the period starting with the early promise of Russia's conciliation in the 1990s up to the more downbeat and agitated state of affairs at present. They cover a generous range of topics, including the end of the Cold War, Russia-NATO affairs, Russia and the West more broadly, Russia and other strategically important regions, nuclear weapons, Russian strategy, and Putin's Russia in particular.
This edited volume addresses one of the most significant issues in international strategic studies today: how to meet the challenge of a rising China? The contributors take a global view of the topic, offering unique and often controversial perspectives on the nature of the China challenge. The book approaches the subject from a variety of angles, including realist, offensive realist, institutional, power transition, interdependence, and constructivist perspectives. Chapters explore such issues as the US response to the China challenge, Japan's shifting strategy toward a rising China, EU-China relations, China's strategic partnership with Russia and India, and the implications of "unipolarity" for China, the US and the world. In doing so, the volume offers insights into some of the key questions surrounding China's grand strategy and its potential effects on to the existing international order.
This book examines how international intelligence cooperation has come to prominence post-9/11 and introduces the main accountability, legal and human rights challenges that it poses. Since the end of the Cold War, the threats that intelligence services are tasked with confronting have become increasingly transnational in nature -- organised crime, the proliferation of weapons of mass destruction and terrorism. The growth of these threats has impelled intelligence services to cooperate with contemporaries in other states to meet these challenges. While cooperation between certain Western states in some areas of intelligence operations (such as signals intelligence) is longstanding, since 9/11 there has been an exponential increase in both their scope and scale. This edited volume explores not only the challenges to accountability presented by international intelligence cooperation but also possible solutions for strengthening accountability for activities that are likely to remain fundamental to the work of intelligence services. The book will be of much interest to students of intelligence studies, security studies, international law, global governance and IR in general.
The Manchurian "Incident" of 1931 led to a Japanese occupation, the birth of Manchoukuo and the withdrawal of Japan from the League of Nations. At the time it seemed as if the army and navy were exerting a supreme influence. This volume points out that this influence is not new and that there are strong reasons for its existence and continuance. It shows how it is fostered by the peculiar political structure of the country, and how, though often unintelligible to Europeans, it may be understood and accounted for in the light of the historical and political background of Japan. |
![]() ![]() You may like...
Handbook of Floating-Point Arithmetic
Jean-Michel Muller, Nicolas Brunie, …
Hardcover
R4,308
Discovery Miles 43 080
Intelligent Edge Computing for Cyber…
D. Jude Hemanth, Bb Gupta, …
Paperback
R3,137
Discovery Miles 31 370
14th International Symposium on Process…
Yoshiyuki Yamashita, Manabu Kano
Hardcover
R11,801
Discovery Miles 118 010
Interact with Information Technology 2…
Roland Birbal, Michele Taylor
Paperback
R783
Discovery Miles 7 830
|