![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.
China's war on terror is among its most prominent and least understood of campaigns. With links to the global jihad, an indigenous insurgency threatens the government's grip on a massive region of north- western China known as Xinjiang. Riots, bombings, ambushes, and assassinations have rocked the region under separatist and Islamist banners. China acted early and forcefully, and although brutal, their efforts represent one of the few successes in the global struggle against Islamist terrorism. The effectiveness of this campaign has raised questions regarding whether China genuinely confronts a terrorist threat. In this book, based on extensive fieldwork, Martin Wayne investigates China's counter insurgency effort, highlighting the success of an approach centred on reshaping local society and government institutions. At the same time, he raises the question of what the United States may be able to learn from China's approach, and argues that as important a case as Xinjiang needs to be fully examined in order for terrorism to be defeated. This book will be of interest to students of China, Asian politics, terrorism and security studies in general.
This book is a detailed examination of whether domestic security measures are striking an appropriate balance between homeland security and civil liberties in the post-9/11 era. Professor Paul Wilkinson and the other contributors assess the nature of UK responses to terrorism by key public and private-sector bodies, highlighting how these organizations can prevent, pre-empt, counter and manage terrorist attacks by using a matrix of factors such as types of terrorist networks, tactics and targets. The volume also compares and contrasts the UK's response with cognate states elsewhere in the EU and with the USA. While improved intelligence has helped prevent a major Al Qaeda attack, the authors conclude that there is still a 'major question mark' over whether the country is adequately resourced to deal with an emergency situation, particularly in major cities other than London. The book also confirms that while the UK faces a 'real and serious' threat of terrorist attack by Al Qaeda, it is better prepared for an attack than other EU member states. Homeland Security in the UK will be essential reading for all students of terrorism studies, security studies and politics, as well as by professional practitioners and well-informed general readers.
Based on recently declassified documents, this book provides the first examination of the Truman Administration's decision to employ covert operations in the Cold War. Although covert operations were an integral part of America's arsenal during the late 1940s and early 1950s, the majority of these operations were ill conceived, unrealistic and ultimately doomed to failure. In this volume, the author looks at three central questions: Why were these types of operations adopted? Why were they conducted in such a haphazard manner? And, why, once it became clear that they were not working, did the administration fail to abandon them? The book argues that the Truman Administration was unable to reconcile policy, strategy and operations successfully, and to agree on a consistent course of action for waging the Cold War. This ensured that they wasted time and effort, money and manpower on covert operations designed to challenge Soviet hegemony, which had little or no real chance of success. US Covert Operations and Cold War Strategy will be of great interest to students of US foreign policy, Cold War history, intelligence and international history in general.
China's emergence as a great power is a global concern that can potentially alter the structure of world politics. Its rise is multidimensional, affecting the political, security, and economic affairs of all states that comprise the world's fastest developing region of the Asia-Pacific. Most of the recently published studies on China's rise have focused on its relations with its immediate neighbours in Northeast Asia: Japan, the Koreas, Taiwan, and Russia. Less attention has been given to Southeast Asia's relations with China. To address these issues, this volume, with its wide range of perspectives, will make a valuable contribution to the ongoing policy and academic dialogue on a rising China. It examines a range of perspectives on the nature of China's rise and its implications for Southeast Asian states as well as US interests in the region. China, the United States and South-East Asia will be of great interest to students of Chinese politics, South-East Asian politics, regional security and international relations in general.
Hezbollah and Hamas are major players in Middle Eastern politics and have a growing involvement in global events. Despite their strikingly different beginnings, they share a common denominator--an adversary in Israel. "Hezbollah and Hamas" draws from primary interviews and documents coupled with a thorough review of current scholarship. This is a portrait of the organizations' roots, histories, ideologies, relationships, tactics, political outlooks, and futures. Joshua L. Gleis and Benedetta Berti present organization charts, maps, and a case study of the TriBorder Area in South America, which frequently serves as an operational center for terrorist groups. Recognizing that these two groups are increasingly relevant to U.S. national security, Gleis and Berti provide a comparative analysis of their histories and political missions that moves beyond reductionist portrayals of the organizations' military operations.
This is the first book to survey the evolution of the strategic basing systems of the great powers, covering an 800-year span of history, from the Mongol dynasty to the era of the US empire. Robert E. Harkavy details the progression of strategic basing systems and power projection, from its beginnings at a regional level to its current global reach, while emphasizing the interplay between political and international systemic factors (bipolar vs. multipolar systems), and technological factors. Analyzing the relationship between basing structures and national power, the book deals with such key questions as: the co-mingling of military and commercial functions for bases; sea power; geopolitical theory; imperial 'pick-off' during hegemonic wars; base acquisitions; continuity between basing structures; and long-term shifts in basing functions. Strategic Basing and the Great Powers, 1200-2000 will be of much interest to students of strategic studies, military history and international relations.
The aim of this book is to explore the implications stemming from the recent upgrading of Australia-Japan-US security interactions and the implications for Asia-Pacific regional security that these represent. While a fully functioning trilateral security alliance binding Australia, Japan and the United States is unlikely to materialise or supplant existing bilateral arrangements, the convergence of the strategic interests of these three states makes it imperative that the full-range of such interests and the policy ramifications flowing from them warrants extensive investigation. The need to do so is particularly compelling given that the 'Trilateral Security Dialogue' is one of several contending recent approaches to reshaping Asia-Pacific regional security architectures and mechanisms for confronting new strategic challenges in a post-Cold War and post-9/11 environment. Key issues to be considered in this volume include the theoretical and empirical context of 'trilateralism'; the evolving history of the Australia-Japan-United States trilateral security relationship; its connection to and impact on the U.S. bilateral alliance network in Asia; how domestic politics in each country relates to regional security politics; Sino-Australian and Sino-Japanese bilateral security ties; arms control, maritime security and the 'economic security nexus'. This book will be of much interest to all students of Asia-Pacific Security, US foreign policy, Asian politics and International Relations in general
This book explores alternative systems and strategies for global security by which the conflicts between nations can be carried on, and ultimately resolved, without recourse to war, examining system changes some of which may take many years to enact.
The range and extent of the Peloponnesian War of the fifth century BC has led to it being described as a 'world war' in miniature. Within a narrative framework, this work concentrates on the fighting itself, and examining the way in which both strategy and tactics developed as the conflict spread.
The Cold War phrase "weapons of mass destruction" continues to be used despite significant changes in international political cultures, military concepts of operation, and technology advances. Today, the term "weapons of mass destruction" (WMD) is used to address many things, from grams of ricin and barrels of industrial chemicals to megaton nuclear weapons. As a direct result of the decision to refer to all nuclear, biological, and chemical (NBC) weapons as well as biological, chemical and radiological (CBR) hazards as "WMD," we have lost the ability to accurately develop, assess, and discuss policy concerns relating to the contemporary use of unconventional weapons on the battlefield and within the homeland. This book uses a public policy framework to examine how the U.S. government, and in particular the U.S. military, should address the potential use of unconventional weapons in the 21st century. It defines the problem, identifies the policy actors and reviews policy options. It discusses past policy efforts before offering a critical review of current strategies and how WMD issues are integrated into the current military Joint Operating Concepts (deterrence, cooperative security, major combat operations, irregular warfare, stability, and homeland security), and proposes new national framework for countering WMD. The aim is to answer such questions as what does counterproliferation mean and whether the U.S. government is adequately prepared to protect U.S. citizens and its armed forces from adversaries developing unconventional weapons.
This book, now available in paperback, traces the key evolutions in the development of the concept of human security, the various definitions and critiques, how it relates to other concepts, and what it implies for polities, politics, and policy. Human security is an important subject for the whole world, in particular Asia, as it deals with interactions among fields of social change, such as development, conflict resolution, human rights, and humanitarian assistance. In a globalizing world, in which threats become trans-national and states lose power, security can no longer be studied in a one-dimensional fashion. Written by authors who are experts in this field and with case studies from different regions (Afghanistan, Central Asia and South Asia) presented throughout, this book - now available in paperback - contributes to this new multidimensional conception of security, analyzes its strengths and weaknesses, and focuses on its implications for analysis and action.
Ever since the publication in 2004 of the 9/11 Commission Report, the U.S. intelligence community has been in the throes of a convulsive movement for reform. In Preventing Surprise Attacks (2005), Richard A. Posner carried the story of the reform movement up to the enactment of the Intelligence Reform and Terrorism Prevention Act of 2004, which produced a defective plan for reorganizing the intelligence system, partly as result of the failure of the 9/11 Commission and Congress to bring historical, comparative, and scholarly perspectives to bear issues. At that time, however, the new structure had not yet been built. Posner's new book brings the story up to date. He argues that the decisions about structure that the Administration has made in implementation of the Act are creating too top-heavy, too centralized, an intelligence system. The book * exposes fallacies in criticisms of the performance of the U.S. intelligence services; * analyzes structures and priorities for directing and coordinating U.S. intelligence in the era of global terrorism; * presents new evidence for the need to create a domestic intelligence agency separate from the FBI, and a detailed blueprint for such an agency; * incorporates a wealth of material based on developments since the first book, including the report of the presidential commission on weapons of mass destruction and the botched response to Hurricane Katrina; * exposes the inadequacy of the national security computer networks; * critically examines Congress's performance in the intelligence field, and raises constitutional issues concerning the respective powers of Congress and the President; * emphasizes the importance of reforms that do not require questionable organizational changes. The book is published in cooperation with the Hoover Institution
Despite the substantial output of revisionist scholarship over the last decade reappraising the performance of the British Army on the Western Front during the First World War, there still remains a stubborn perception that its commanders were incompetent, inflexible and unimaginative. Whilst much ink has been spilled vilifying or defending individual commanders, or looking for overarching trends and 'learning curves', this is the first work to examine systematically the vertical nature of command - that is the transmission of plans from the high-command down through the rank structure to the front line. Through such an investigation, a much more rounded measure of the effectiveness of British commanders can be gained; one moves the argument beyond the overly simplistic 'casualties to ground gained' equation that is usually offered. The Battle of Fromelles (19-20 July 1916) was selected as the case study as it was relatively small in scale, in the right period, and retains sufficient primary sources available to sustain the analysis. It also witnessed the first time Australian forces were used in offensive operations on the Western Front, and thus looms large in wider Commonwealth perceptions of 'Bumbling British Generals'. The book follows the progress of the battle plan from its inception in the strategic designs of the supreme commander down through the various intermediate level commands at operational and tactical headquarters until it became the orders that sent the infantry forward into the attack. In so doing it provides a unique insight into the strengths and weaknesses of British command structure, allowing a much more scholarly judgement of its overall effectiveness.
The mysterious life and career of Desmond Morton (1891-1971), Intelligence officer and personal adviser to Winston Churchill during World War II, is exposed for the first time in this study based on full access to official records. After distinguished service as artillery officer and aide-de-camp to General Haig during World War I, Morton worked for the Secret Intelligence Service from 1919-1934, involved in fascinating operations against Bolshevik Russia and a resurgent Germany. The fortunes of SIS in the interwar years are described here in unprecedented detail. As Director of the Industrial Intelligence Centre in the 1930s, Morton's warnings of Germany's military and industrial preparations for war were widely read in Whitehall, though they failed to accelerate British rearmament as much as Morton-and Churchill-considered imperative. Morton had met Churchill on the Western Front in 1916 and supported him throughout the "wilderness years," moving to Downing Street as the Prime Minister's Intelligence adviser in May 1940. There he remained in a liaison role, with the intelligence Agencies and with Allied resistance authorities, until the end of the war, when he became a "troubleshooter" for the Treasury in a series of tricky international assignments. Throughout Morton's career, myth, rumor and deliberate obfuscation have created a misleading picture of his role and influence. The story of this "man of mystery" shines a light into many hitherto shadowy corners of British history in the first half of the 20th century. This book will be of great interest to scholars and informed lay readers with an interest in World War II, intelligence studies and the life of Winston Churchill.
This book assesses the use of 'mercenaries' by states, and their integration into the national armed forces as part of a new hybridisation trend of contemporary armies. Governments, especially in the West, are undertaking an unprecedented wave of demilitarisation and military budget cuts. Simultaneously, these same governments are increasingly opening their armies up to foreign nationals and outsourcing military operations to private companies. This book explores the impact of this hybridisation on the values, cohesion and effectiveness of the armed forces by comparing and contrasting the experiences of the French Foreign Legion, private military companies in Angola, and the merging of private contractors and American troops in Iraq. Examining the employment of foreign citizens and private security companies as military forces and tools of foreign policy, and their subsequent impact on the national armed forces, the book investigates whether the difficulties of coordinating soldiers of various nationalities and allegiances within public-private joint military operations undermines the legitimacy of the state. Furthermore, the author questions whether this trend for outsourcing security can realistically provide a long term and positive contribution to national security. This book will be of much interest to students of private military companies, strategic studies, international security and IR in general.
"Of all the books on Native American service in the U.S. armed forces, this is the best.... Readers will find the story of the Comanche Code Talkers compelling, humorous, thought-provoking, and inspiring." -- Tom Holm, author of Strong Hearts, Wounded Souls: Native American Veterans of the Vietnam War Among the allied troops that came ashore in Normandy on D-Day, June 6, 1944, were thirteen Comanches in the 4th Infantry Division, 4th Signal Company. Under German fire they laid communications lines and began sending messages in a form never before heard in Europe-- coded Comanche. For the rest of World War II, the Comanche Code Talkers played a vital role in transmitting orders and messages in a code that was never broken by the Germans. This book tells the full story of the Comanche Code Talkers for the first time. Drawing on interviews with all surviving members of the unit, their original training officer, and fellow soldiers, as well as military records and news accounts, William C. Meadows follows the group from their recruitment and training to their active duty in World War II and on through their postwar lives up to the present. He also provides the first comparison of Native American code talking programs, comparing the Comanche Code Talkers with their better-known Navajo counterparts in the Pacific and with other Native Americans who used their languages, coded or not, for secret communication. Meadows sets this history in a larger discussion of the development of Native American code talking in World Wars I and II, identifying two distinct forms of Native American code talking, examining the attitudes of the American military toward Native American codetalkers, and assessing the complex cultural factors that led Comanche and other Native Americans to serve their country in this way.
Despite the ongoing drawdown of strategic forces under the terms of START, both the United States and Russia maintain large arsenals of nuclear weapons poised for immediate launch. Under the most optimistic current scenarios, these arsenals will remain very large and launch-ready for more than a decade. This book, by a distinguished group of coauthors, critically evaluates the current policy of retaining and operating large nuclear arsenals. It reviews U.S. nuclear doctrine and strategy, and the role of nuclear weapons in deterring aggression by former Cold War adversaries and other countries with weapons of mass destruction. The risks of inadvertent as well as deliberate nuclear attack are assessed. The authors argue that small arsenals (low hundreds) on low alert satisfy all justifiable requirements for nuclear weapons. They present a blueprint for making deep cuts in U.S. and Russian deployments, and for lowering their alert level. They explain the implications of shifting to small arsenals for further constraining anti-ballistic missile defenses, strengthening verification, and capping or reducing the nuclear arsenals of China, France, and Britain as well as the threshold nuclear states. The political challenges and opportunities, both domestic and international, for achieving deep reductions in the size and readiness of nuclear forces are analyzed by the authors and by distinguished experts from other countries. The coauthors are Bruce Blair, Jonathan Dean, James Goodby, Steve Fetter, Hal Feiveson, George Lewis, Janne Nolan, Theodore Postol, and Frank von Hippel. An appendix with international perspectives by Li Bin (China), Alexei Arbatov (Russia), Therese Delpech (France), PervezHoodbhoy (Pakistan), Shai Feldman (Israel), Harald Mueller (Germany), and Zia Mian and M.V. Ramana (South Asia).
This new volume explores the meaning of security in relation to,
and in the context of, ideas that are fundamental to both
international and domestic political order.
Strategy and History comprises a selection of Professor Gray's key contributions to strategic debate over the past thirty years. These essays have been selected both because they had significant messages for contemporary controversies, and because they have some continuing relevance for today and the future. Each essay in this book is really about strategy in the modern world, and reflects the many dimensions of this complex subject. This book covers a wide range of subjects and historical events, but there are key issues covered throughout: being strategic the consequences of actions a respect for Clausewitz's theory of war historical dependency the importance of geography being critical of enthusiasm for technology over human factors the primacy of politics. This important publication provides an invaluable insight into the development of strategic studies over the past 30 years from one of the world's leading theorists and practitioners of the subject. The book will be of great interest to all students and analysts of strategy and international studies.
SOE in France was first published in 1966, followed by a second
impression with amendments in 1968. Since these editions were
published, other material on SOE has become available. It was,
therefore, agreed in 2000 that Professor Foot should produce a
revised version. In so doing, in addition to the material in the
first edition, the author has had access to previously closed
government records, as well as drawing upon his own invaluable
wartime experiences and the recollections of those involved.
This book comparatively examines the preferences of four key arms-producing states towards European joint armaments programmes. The European defence market is characterised by a mixture of inter-state competition and European cooperation, and this work assesses why countries sometimes decide to cooperate with their partners, while in other instances they refrain from doing so. In order to shed light on this empirical puzzle, the book focuses on state-defence industry relations in the four major European arms producers: France, Germany, Italy and the UK. The main argument is that the public or private governance of industrial suppliers and market size are the two decisive variables that explain the simultaneous presence of cooperation and competition in European defence procurement. Specifically, it argues that in public governance ecosystems, arms industries are able to "capture" the state's decision-making processes to their own advantage. In private governance ecosystems, the state is relatively autonomous from defence industry's influence and able to pursue larger macro-economic and military benefits. Moreover, the strategy pursued by governments and defence firms is decisively shaped by market size because of its importance in determining the relative costs and benefits of collaborative arrangements. This book will be of much interest to students of EU policy, defence studies, European politics and International Relations.
This book explores Japan's emerging national security policy in relation to China. It considers the rise of nationalism in contemporary Japan, the recent actions of the Abe government to change Japan's security policy course and the importance of domestic views, both elite and popular, about safety and credibility in shaping security policy. It highlights the lack of strong links between China and Japan and the existence in Japan of significant misconceptions about China. It discusses the politics of Japan's alliances, examines the growth of national pride in Japan and of a more confrontational attitude toward China, and concludes by putting forward some scenarios for likely future developments and some policy proposals for a stable Japan-China relationship.
"The guerrilla fights the war of the flea, and his military enemy suffers the dog's disadvantages: too much to defend; too small, ubiquitous, and agile an enemy to come to grips with." With these words, Robert Taber began a revolution in conventional military thought that has dramatically impacted the way armed conflicts have been fought since the book's initial publication in 1965. Whether ideological, nationalistic, or religious, all guerrilla insurgencies use similar tactics to advance their cause. "War of the Flea's" timeless analysis of the guerrilla fighter's means and methods provides a fundamental resource for any reader seeking to understand this distinct form of warfare and the challenge it continues to present to today's armed forces in the Philippines, Colombia, and elsewhere.
For the majority of the post-Cold War era, Russian maritime power has hardly featured in the Euro-Atlantic community’s thinking. But in the mid-2010s, the idea that the Russian navy poses a threat to NATO began to gain ground. It took very real form in February 2022, when Moscow launched its invasion of Ukraine. This book presents the first sustained examination of Russian maritime power in the period since the Cold War. It brings together leading specialists from public policy and academia to reflect on historical and contemporary aspects of Russia's naval strategy and capacities. At a time of mounting tensions, which some observers have named the ‘Fourth Battle of the Atlantic’, the book offers an informed and nuanced discussion, taking into account the view from Moscow and how this differs from western perspectives. It sketches a trajectory of Russia’s power at sea and reflects on current capabilities and problems, as well as Moscow’s strategic planning for the future. -- . |
![]() ![]() You may like...
Community Development - Breaking the…
Hennie Swanepoel, Frik De Beer
Paperback
R328
Discovery Miles 3 280
Computer Generated - A 3D Art Anthology
Kyle Goodrich
Hardcover
Operations And Supply Chain Management
David Collier, James Evans
Hardcover
The History and Philosophy of Polish…
K. Mulligan, K. Kijania-Placek, …
Hardcover
R3,562
Discovery Miles 35 620
|