![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This book describes and analyzes the history of the Mediterranean "Double-Cross System" of the Second World War, an intelligence operation run primarily by British officers which turned captured German spies into double agents. Through a complex system of coordination, they were utilized from 1941 to the end of the war in 1945 to secure Allied territory through security and counter-intelligence operations, and also to deceive the German military by passing false information about Allied military planning and operations. The primary questions addressed by the book are: how did the double-cross-system come into existence; what effects did it have on the intelligence war and the broader military conflict; and why did it have those effects? The book contains chapters assessing how the system came into being and how it was organized, and also chapters which analyze its performance in security and counter-intelligence operations, and in deception.
This original and detailed collection explores how regional actors deal with uncertainties that are inherent to the current geopolitical situation in East Asia. The contributors collectively demonstrate that strategic uncertainty has become a major factor in the shaping of the security order in East Asia.
Demilitarization of conflict and society is crucial to building sustainable peace in countries emerging from the scourge of civil war. As longstanding conflicts come to an end, processes which facilitate the potentially volatile transition from formal peace to social peace are critically important. At the heart of the exercise is the necessity of transforming the culture and the instruments of war - demilitarization - including disarming, demobilizing and reintegrating (DDR) former combatants into society. This volume represents the first in-depth and comprehensive discussion of reintegration of former combatants in war to peace transitions. In addition to a systematic reflection and review of existing literature on DDR, the authors devised and applied a field research methodology to studying the reintegration of former combatants in Angola with potentially significant implications on the design and implementation of DDR programmes. The volume is written for academics, students and practitioners focusing on war to peace transitions and post-conflict issues.
The concept and utility of strategic defense should be evaluated in an embracing cultural context defined by the values, attitudes, and worldview of society-its ethos. The Strategic Defense Initiative (SDI) responds both to changes in the American ethos and to shifts in the balance of power. Together, these changes have undermined the basis of U.S.
This book explores European Union crisis management and draws implications for its role as an international security actor. The success of EU crisis management has varied greatly and this book aims to identify the key factors that explain the differing degrees of coherence through a comparative analysis of its multidimensional crisis responses in Africa. The empirical focus lies on three prominent EU crisis management cases, namely Libya in 2011, Somalia in 2011-2012, and the Sahel in 2012-2013. It analyses the activities and interaction of EU institutional actors and member states, with a focus on France, the United Kingdom, and Germany. The book argues that the EU represents a rather unpredictable security actor, whose multi-level coherence is contingent on the congruence of domestic economic and electoral interests, as well as national threat perceptions, and the extent to which EU-level coherence norms resonate with national norms on the use of force and modes of multilateral cooperation. In sum, this book offers systematic insight into EU crisis management and clarifies the conceptual and empirical boundaries of the comprehensive approach. Finally, the study of the micro-foundations of coherence allows for policy-relevant suggestions on the EU's future role as a security actor. This book will be of much interest to students of EU policy, European Security, Peace and Conflict Studies, African Politics and IR in general.
China's war on terror is among its most prominent and least understood of campaigns. With links to the global jihad, an indigenous insurgency threatens the government's grip on a massive region of north- western China known as Xinjiang. Riots, bombings, ambushes, and assassinations have rocked the region under separatist and Islamist banners. China acted early and forcefully, and although brutal, their efforts represent one of the few successes in the global struggle against Islamist terrorism. The effectiveness of this campaign has raised questions regarding whether China genuinely confronts a terrorist threat. In this book, based on extensive fieldwork, Martin Wayne investigates China's counter insurgency effort, highlighting the success of an approach centred on reshaping local society and government institutions. At the same time, he raises the question of what the United States may be able to learn from China's approach, and argues that as important a case as Xinjiang needs to be fully examined in order for terrorism to be defeated. This book will be of interest to students of China, Asian politics, terrorism and security studies in general.
At the height of its power, the Roman Empire encompassed the entire Mediterranean basin, extending much beyond it from Britain to Mesopotamia, from the Rhine to the Black Sea. Rome prospered for centuries while successfully resisting attack, fending off everything from overnight robbery raids to full-scale invasion attempts by entire nations on the move. How were troops able to defend the Empire's vast territories from constant attacks? And how did they do so at such moderate cost that their treasury could pay for an immensity of highways, aqueducts, amphitheaters, city baths, and magnificent temples? In The Grand Strategy of the Roman Empire, seasoned defense analyst Edward N. Luttwak reveals how the Romans were able to combine military strength, diplomacy, and fortifications to effectively respond to changing threats. Rome's secret was not ceaseless fighting, but comprehensive strategies that unified force, diplomacy, and an immense infrastructure of roads, forts, walls, and barriers. Initially relying on client states to buffer attacks, Rome moved to a permanent frontier defense around 117 CE. Finally, as barbarians began to penetrate the empire, Rome filed large armies in a strategy of "defense-in-depth," allowing invaders to pierce Rome's borders. This updated edition has been extensively revised to incorporate recent scholarship and archeological findings. A new preface explores Roman imperial statecraft. This illuminating book remains essential to both ancient historians and students of modern strategy.
A comparison of Singapore and Taiwan presents an interesting case study for those wishing to understand how small states struggle to overcome their strategic disadvantage. Since their independence, Singapore and Taiwan have faced numerous challenges resulting from their relative strategic disadvantage. They have struggled to overcome vulnerable bases, an unformed conception of state, and weak governmental institutes for defence. While territorial borders are difficult to change, both states have focused on nation building, economic growth, and military build-up in order to overcome their predicaments. During the Cold War, both states employed similarly authoritarian policies to preserve their survival. However, in the post-Cold War era, Taiwan has experienced political and economic weakness in the face of the rising China, while Singapore, with its polity of one-party domination, has continued to strengthen its hard and soft power. This book examines the unique context for each case, drawing comparisons and offering analysis of their distinct approaches.
The National Institute for Public Policy's new book, Minimum Deterrence: Examining the Evidence, is the first of its kind. Dr. Keith Payne, the late former Secretary of Defense James Schlesinger and an unparalleled bipartisan group of senior civilian and military experts critically examined eight basic assumptions of Minimum Deterrence against available evidence. In general, Minimum Deterrence does not fare well under the careful scrutiny. Proponents of a "Minimum Deterrent" US nuclear force posture believe that anywhere from a handful to a few hundred nuclear weapons are adequate to deter reliably and predictably any enemy from attacking the United States now and in the future. Because nuclear weapons are so destructive, their thinking goes, no foreign leader would dare challenge US capabilities. The benefits, advocates claim, of reducing US nuclear weapons to the "minimum" level needed are: better relations with Russia and China, reinforcement of the arms control and Nonproliferation Treaty, billions of defense dollars in savings, and greater international stability on the way to "nuclear zero." As political pressure builds to pursue this vision of minimum US deterrence, Minimum Deterrence: Examining the Evidence stands as the seminal study to address the many claims of great benefit against available empirical evidence. This book was published as a National Institute Press monograph, Keith B. Payne and James Schlesinger, Minimum Deterrence: Examining the Evidence (Fairfax, VA: National Institute Press, 2013) and as a special issue of Comparative Strategy.
This book is a detailed examination of whether domestic security measures are striking an appropriate balance between homeland security and civil liberties in the post-9/11 era. Professor Paul Wilkinson and the other contributors assess the nature of UK responses to terrorism by key public and private-sector bodies, highlighting how these organizations can prevent, pre-empt, counter and manage terrorist attacks by using a matrix of factors such as types of terrorist networks, tactics and targets. The volume also compares and contrasts the UK's response with cognate states elsewhere in the EU and with the USA. While improved intelligence has helped prevent a major Al Qaeda attack, the authors conclude that there is still a 'major question mark' over whether the country is adequately resourced to deal with an emergency situation, particularly in major cities other than London. The book also confirms that while the UK faces a 'real and serious' threat of terrorist attack by Al Qaeda, it is better prepared for an attack than other EU member states. Homeland Security in the UK will be essential reading for all students of terrorism studies, security studies and politics, as well as by professional practitioners and well-informed general readers.
Based on recently declassified documents, this book provides the first examination of the Truman Administration's decision to employ covert operations in the Cold War. Although covert operations were an integral part of America's arsenal during the late 1940s and early 1950s, the majority of these operations were ill conceived, unrealistic and ultimately doomed to failure. In this volume, the author looks at three central questions: Why were these types of operations adopted? Why were they conducted in such a haphazard manner? And, why, once it became clear that they were not working, did the administration fail to abandon them? The book argues that the Truman Administration was unable to reconcile policy, strategy and operations successfully, and to agree on a consistent course of action for waging the Cold War. This ensured that they wasted time and effort, money and manpower on covert operations designed to challenge Soviet hegemony, which had little or no real chance of success. US Covert Operations and Cold War Strategy will be of great interest to students of US foreign policy, Cold War history, intelligence and international history in general.
Essential background to the German blitzkrieg of World War II Complements the stories of panzer aces like Otto Carius and Michael Wittmann In the wake of World War I, the German army lay in ruins--defeated in the war, sundered by domestic upheaval, and punished by the Treaty of Versailles. A mere twenty years later, Germany possessed one of the finest military machines in the world, capable of launching a stunning blitzkrieg attack against Poland in 1939. Well-known military historian Robert M. Citino shows how Germany accomplished this astonishing reversal and developed the doctrine, tactics, and technologies that its military would use to devastating effect in World War II.
This book brings together leading academic specialists and policy
practitioners to explore and develop cooperative approaches for
managing critical contemporary and emerging security challenges for
South East Europe and the wider international community.
The United States in the Vietnam War, 1954-1975 is an invaluable reference guide to the costly and controversial war the U.S. waged in Vietnam, over the course of five presidential administrations. Focusing not only on the conflict in Southeast Asia, but also on the tumult the war inspired on the domestic front, Louis Peake provides an authoritative guide to the wide range of media available on the U.S. involvement in Vietnam. From collections of art work and poetry about the soldiering experience, to journalistic accounts of battles, and military training films, the entries consistently provide clear and concise descriptions, allowing the reader to easily identify the value of any particular resource. With revised and updated annotations, and over 150 new entries, this second edition of The United States in the Vietnam War, 1954-1975 is an invaluable reference tool for researchers and students of the Vietnam War. Routledge Research Guides to American Military Studies provide concise, annotated bibliographies to the major areas and events in American military history. With the inclusion of brief critical annotations after each entry, the student and researcher can easily assess the utility of each bibliographic source and evaluate the abundance of resources available with ease and efficiency. Comprehensive, concise, and current???Routledge Research Guides to American Military Studies are an essential research tool for any historian.
In Battle Tactics of the Civil War, Paddy Griffith argues that, far from being the first 'modern' war, it was the last 'Napoleonic' war, and that none of the innovations of industrialized warfare had any signiticant effect on the outcome. 'Provocative, challenging and intelligent. Griffith's knowledge of military history in general from the eighteenth to the twentieth centuries is so wide and deep that he is able to put the Civil War into a broader context more effectively and informatively than anyone else.' James M McPherson, author of Battle Cry for Freedom.
Historical Dictionary of Chinese Intelligence, Second Edition covers the history of Chinese Intelligence from 400 B.C. to modern times. The dictionary section has over 400 cross-referenced entries on the agencies and agents, the operations and equipment, the tradecraft and jargon, and many of the countries involved.
The aim of this book is to explore the implications stemming from the recent upgrading of Australia-Japan-US security interactions and the implications for Asia-Pacific regional security that these represent. While a fully functioning trilateral security alliance binding Australia, Japan and the United States is unlikely to materialise or supplant existing bilateral arrangements, the convergence of the strategic interests of these three states makes it imperative that the full-range of such interests and the policy ramifications flowing from them warrants extensive investigation. The need to do so is particularly compelling given that the 'Trilateral Security Dialogue' is one of several contending recent approaches to reshaping Asia-Pacific regional security architectures and mechanisms for confronting new strategic challenges in a post-Cold War and post-9/11 environment. Key issues to be considered in this volume include the theoretical and empirical context of 'trilateralism'; the evolving history of the Australia-Japan-United States trilateral security relationship; its connection to and impact on the U.S. bilateral alliance network in Asia; how domestic politics in each country relates to regional security politics; Sino-Australian and Sino-Japanese bilateral security ties; arms control, maritime security and the 'economic security nexus'. This book will be of much interest to all students of Asia-Pacific Security, US foreign policy, Asian politics and International Relations in general
China's emergence as a great power is a global concern that can potentially alter the structure of world politics. Its rise is multidimensional, affecting the political, security, and economic affairs of all states that comprise the world's fastest developing region of the Asia-Pacific. Most of the recently published studies on China's rise have focused on its relations with its immediate neighbours in Northeast Asia: Japan, the Koreas, Taiwan, and Russia. Less attention has been given to Southeast Asia's relations with China. To address these issues, this volume, with its wide range of perspectives, will make a valuable contribution to the ongoing policy and academic dialogue on a rising China. It examines a range of perspectives on the nature of China's rise and its implications for Southeast Asian states as well as US interests in the region. China, the United States and South-East Asia will be of great interest to students of Chinese politics, South-East Asian politics, regional security and international relations in general.
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.
The range and extent of the Peloponnesian War of the fifth century BC has led to it being described as a 'world war' in miniature. Within a narrative framework, this work concentrates on the fighting itself, and examining the way in which both strategy and tactics developed as the conflict spread.
This is the first book to survey the evolution of the strategic basing systems of the great powers, covering an 800-year span of history, from the Mongol dynasty to the era of the US empire. Robert E. Harkavy details the progression of strategic basing systems and power projection, from its beginnings at a regional level to its current global reach, while emphasizing the interplay between political and international systemic factors (bipolar vs. multipolar systems), and technological factors. Analyzing the relationship between basing structures and national power, the book deals with such key questions as: the co-mingling of military and commercial functions for bases; sea power; geopolitical theory; imperial 'pick-off' during hegemonic wars; base acquisitions; continuity between basing structures; and long-term shifts in basing functions. Strategic Basing and the Great Powers, 1200-2000 will be of much interest to students of strategic studies, military history and international relations.
"Critical Masses and Critical Choices" examines American attitudes
on issues of national and international security. Based on over
13,000 in-depth interviews conducted over a ten-year period, Kerry
Herron and Hank Jenkins-Smith have created a unique and rich set of
data providing insights into public opinion on nuclear deterrence,
terrorism, and other security issues from the end of the Cold War
to the present day. Their goal is to shed light not only on
changes in public opinion about a range of security-related policy
issues, but also to gauge the depth of the public’ s actual
understanding of these matters. Prior to this study, the
predominant view held that the American people were incapable of
articulate and consistent thought on complex political
subjects. This book overturns that notion and demonstrates
the sometimes surprisingly cogent positions held by ordinary
members of the public on intricate national issues.
Hezbollah and Hamas are major players in Middle Eastern politics and have a growing involvement in global events. Despite their strikingly different beginnings, they share a common denominator--an adversary in Israel. "Hezbollah and Hamas" draws from primary interviews and documents coupled with a thorough review of current scholarship. This is a portrait of the organizations' roots, histories, ideologies, relationships, tactics, political outlooks, and futures. Joshua L. Gleis and Benedetta Berti present organization charts, maps, and a case study of the TriBorder Area in South America, which frequently serves as an operational center for terrorist groups. Recognizing that these two groups are increasingly relevant to U.S. national security, Gleis and Berti provide a comparative analysis of their histories and political missions that moves beyond reductionist portrayals of the organizations' military operations.
The Strategic Survey is a journal of records that includes all relevant names and titles, chronologies and dates. But it is also much more: the hard facts are embossed in considered and nuanced analysis over 300 pages of text. The Strategic Survey opens with 'Perspectives', an assessment of the effect of major events and trends on the strategic landscape. Next, particular strategic policy issues, such as terrorism and weapons of mass destruction, missile defence and the future of peacekeeping, are examined in separate chapters. Another eighteen to twenty chapters of similar length, written along thematic rather than merely chronological lines, cover developments in particular regions or countries. The Strategic Survey concludes with 'Prospectives', an essay setting forth strategic priorities for the coming year. Also included are thirty-two pages of maps depicting strategically important activity and political change - such as piracy and Russia's new federal districts - globally, regionally and locally. The interplay of political developments and the actual or potential use of military force remains The Strategic Survey's chief concern. Nevertheless, since the end of the Cold War and of the first distinct post-Cold War period, the Institute has recognised that any survey of matters strategic needs to broaden its scope to embrace economic
Ever since the publication in 2004 of the 9/11 Commission Report, the U.S. intelligence community has been in the throes of a convulsive movement for reform. In Preventing Surprise Attacks (2005), Richard A. Posner carried the story of the reform movement up to the enactment of the Intelligence Reform and Terrorism Prevention Act of 2004, which produced a defective plan for reorganizing the intelligence system, partly as result of the failure of the 9/11 Commission and Congress to bring historical, comparative, and scholarly perspectives to bear issues. At that time, however, the new structure had not yet been built. Posner's new book brings the story up to date. He argues that the decisions about structure that the Administration has made in implementation of the Act are creating too top-heavy, too centralized, an intelligence system. The book * exposes fallacies in criticisms of the performance of the U.S. intelligence services; * analyzes structures and priorities for directing and coordinating U.S. intelligence in the era of global terrorism; * presents new evidence for the need to create a domestic intelligence agency separate from the FBI, and a detailed blueprint for such an agency; * incorporates a wealth of material based on developments since the first book, including the report of the presidential commission on weapons of mass destruction and the botched response to Hurricane Katrina; * exposes the inadequacy of the national security computer networks; * critically examines Congress's performance in the intelligence field, and raises constitutional issues concerning the respective powers of Congress and the President; * emphasizes the importance of reforms that do not require questionable organizational changes. The book is published in cooperation with the Hoover Institution |
You may like...
The Soweto Uprisings - Counter-Memories…
Sifiso Mxolisi Ndlovu
Paperback
(3)
|