![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This edited volume helps bridge the elusive gap between theory and practice in dealing with the issue of "security" broadly conceived. A quarter of a century has passed since the crumbling of the Berlin Wall. Yet our notions of security remain mired in Cold War thinking whose realist ethos is predicated on holding the nation state's power, interests, and survival as the guiding unit of analysis in international relations. Security is ever changing. Confronting new dangers to the individual, the state, and the international order calls for new categories that speak to the new influence of globalization, international institutions, and transnational threats. Composed of original essays by a cosmopolitan mix of leading figures inside and outside the academy, this book proves relevant to any number of classes and courses, and its controversial character makes it all the more necessary and appealing.
In this path-breaking theoretical work, political scientist Steven
Brams and mathematician Mark Kilgour show how game theory can be
applied to the rigorous development and thoughtful analysis of
several critical problems that afflict the security of nations,
from the deterrence of foes who might launch attacks, to the
stabilization of crises that could explode into wars. In addition,
they analyze a variety of related questions, including the
interlocking preferences that fuel arms races, the strategic impact
that Star Wars may have on nuclear deterrence, and optimal
strategies for verifying arms control treaties.
This book discusses strategies, management and potential risks of policing. Chapter One describes and examines the Policing Excellence and Prevention First' programs, and will discuss their successes and challenges since their introduction in 2009 in New Zealand. Chapter Two analyses the action of the Military Police of Minas Gerais (PMMG) during the World Cup protests carried out in 2013 and 2014 in the state capital Belo Horizonte, Brazil. Chapter Three examines the emerging problem of cyber terrorism. It x-rays the concept of cyber terrorism as well as the tenor of existing scholarship on how to police it; and discusses the scope and ramifications of the problem and proposes a model for effectively policing Africas terror-genic cyberspace.
Sylvanus G. Morley (1883-1948) has been highly regarded for over a
century for his archaeological work among the Maya pyramids. As
director of the Carnegie Archaeological Program, he supervised the
reconstruction of ChichA(c)n ItzA, one of today's most visited
sites in Central America.
The World War II codebreaking station at Bletchley is well-known and its activities documented in detail. Its decryption capabilities were vital to the war effort, significantly aiding Allied victory. But where did the messages being deciphered come from in the first place? This is the extraordinary untold story of the Y-Service, a secret even more closely guarded than Bletchley Park. The Y-Service was the code for the chain of wireless intercept stations around Britain and all over the world. A few hundreds of wireless operators, many of them who were civilians, listened to German, Italian and Japanese radio networks and meticulously logged everything they heard. Some messages were then used tactically but most were sent on to Station X - Bletchley Park - where they were deciphered, translated and consolidated to build a comprehensive overview of the enemy's movements and intentions. Peter Hore delves into the fascinating history of the Y-service, with particular reference to the girls of the Women's Royal Naval Service: Wrens who escaped from Singapore to Colombo as the war raged, only to be torpedoed in the Atlantic on their way back to Britain; the woman who had a devastatingly true premonition that disaster would strike on her way to Gibraltar; the Australian who went from being captain of the English Women's Cricket team to a WWII Wren to the head of Abbotleigh girls school in Sydney; how the Y-service helped to hunt the German battleship Bismarck in the North Atlantic, and how it helped to torpedo a Japanese cruiser in the Indian Ocean. Together, these incredible stories build a picture of World War II as it has never been viewed before.
A translation that captures the power of one of the greatest war stories ever told-Julius Caesar's account of his brutal campaign to conquer Gaul Imagine a book about an unnecessary war written by the ruthless general of an occupying army-a vivid and dramatic propaganda piece that forces the reader to identify with the conquerors and that is designed, like the war itself, to fuel the limitless political ambitions of the author. Could such a campaign autobiography ever be a great work of literature-perhaps even one of the greatest? It would be easy to think not, but such a book exists-and it helped make Julius Caesar a legend. This remarkable translation of Caesar's War for Gaul captures, like never before in English, the powerfully concise style of the future emperor's dispatches from the front lines in what are today France, Belgium, Germany, and Switzerland.
Top analyst Leslie Gruis's timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept. All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them.
Located in the center of Asia with one of the largest land frontiers in the world and 14 neighbors whose dispositions could not easily be predicted, China has long been obsessed with security. In this Handbook, an internationally renowned team of contributors provide a comprehensive and systematic analysis of contemporary thinking about Chinese national security. Chapters cover the PRC's historical, ideological and doctrinal heritage related to security, its security arrangements and policies targeting key regions and nations of the world, the security aspects of the PRC's ground, air, sea, space and cyber forces, as well as the changing and expanding definition and scope of China's security theory and practice. The Handbook is divided into three thematic parts: Part I focuses on national security, covering traditional views of security and the impact of China's historical experience on current security dispositions as well as non-traditional security. Part II looks at China's relations with the great powers, regional security and China's involvement with collective security organizations. Part III provides an overview of China's institutionalized security forces; looking at the army, navy, air force and Second Artillery (strategic nuclear forces) and offering analysis of China's recent interest in space as a security concern and cybersecurity. This volume is essential reading for all students of Asian Security, Chinese Politics and International Relations.
The Greatest Escape: A True American Adventure tells the story of the largest prison breakout in US history. It took place during the Civil War, when more than 100 Yankee officers were put in Libby, a special prison considered escape-proof, in the Confederate capitol of Richmond, Virginia. The majority of the men, obsessed with freedom, mapped out an elaborate escape plan and on one moonless night, 109 men dug their way to freedom. Freezing, starving, clad in rags, they still had to travel 40 miles to the Yankee lines and freedom. They were pursued by the whites in the area, but every black person they encountered was their friend. On many occasions, slaves risked their lives to help these Union men, and their journey was aided by a female-led Union spy network. Since all the escapees were officers, they could all read and write. Over 50 of them kept journals and published riveting accounts of their adventures. This is the first book to weave together these contemporary accounts into a true-to-life narrative. Much like a Ken Burns documentary, the book uses the actual words of the prisoners uttered more than 150 years ago, as found in their diaries and journals.
Knowledge is the basic output of the defense technology
establishment in the United States; it is what enables the
development of weapon systems. From this premise, this volume
explores the process of knowledge production in defense technology
from the beginnings of the Cold War to the present time. Produced
through the process of research and development (R&D),
technical knowledge for defense is an economic commodity. It is
"fundable" in the sense of having future value. Like other
commodities in the futures market, it is purchased before it is
produced. But unlike those other commodities, this knowledge is
typically produced through the joint efforts of the customer and
the vendor.
This book is a comprehensive overview of oversight conducted over the past decade to measure how well DHS is achieving its mission, operating its programs, spending taxpayer funds, complying with the law, and respecting the boundaries established to limit the federal government and protect the rights of law abiding U.S. citizens. This book describes and analyzes the discretionary appropriations for the Department of Homeland Security (DHS) for fiscal year 2015 (FY2015). It compares the President's request for FY2015 funding for the Department of Homeland Security (DHS), the enacted FY2014 appropriations for DHS, and the House-reported homeland security appropriations legislation for FY2015. The book tracks legislative action and congressional issues related to DHS appropriations with particular attention paid to discretionary funding amounts.
Notwithstanding the rhetoric of the 'war on terror', the world is now a far safer place. Armed forces designed for the cold war (and only maintained by vested interests within the defence bureaucracy) encourage global interference through pre-emption and other forms of military interventionism. We would be safer with less. The author, who has served as an army officer, is assistant director of the Centre for Security Studies at Hull.
The Department of Homeland Security's (DHS) Federal Protective Service (FPS) and the Department of Justice's (DOJ) United States Marshals Service (USMS) experience a range of challenges in their efforts to provide effective security screening. FPS and USMS conduct building security screening at thousands of GSA buildings across the country. This book examines the challenges federal entities face in their efforts to prevent prohibited items and individuals who may pose a security threat from entering GSA buildings; and actions federal entities have taken to assess the effectiveness of their screening efforts, and the results of those actions. Furthermore, the book examines the extent to which DHS and other stakeholders are prepared to address cyber risk to building and access control systems in federal facilities.
This book examines the subject of strategy and its relationship with politics. Despite the fact that strategy is always the product of political process, the relationship between the two concepts and their ancillary activities has scarcely been touched by scholars. This book corrects that serious deficiency, and explains the high relevance of political factors for matters of general defence. Each chapter aims to show how and why strategy and politics interact and how this interaction has had significant consequences historically. Neither strategy nor politics can make sense if considered alone. Strategy requires direction that can only be provided by political process, while politics cannot be implemented without strategy. In summary, this volume will explain: what strategy is (and is not) why strategy is essential what strategy does and how it does it how strategy is made and executed Written by a leading scholar and former practitioner, this book will be essential reading for all students of military strategy, strategic studies, security studies and war and conflict studies.
To measure the performance of its global distribution pipeline, the Department of Defense (DOD) has established three metrics: (1) logistics response time -- number of days between the time a customer submits an order and receives it, (2) customer wait time -- number of days between the time a maintenance unit, a subset of customers, submits an order and receives it, and (3) time-definite delivery -- a measure of the probability that a customer will receive an order within an established logistics response time. However, these metrics do not provide decision makers with a complete representation of performance across the entire global distribution pipeline. This book assesses the extent to which DOD has established metrics for its distribution performance; is able to accurately measure its performance against distribution standards; and has taken actions to identify causes and develop solutions for any gaps in distribution. Furthermore, the book reviews the extent to which DOD has developed and implemented corrective action plans that address challenges in the three focus areas; an effective program for monitoring and validating the effectiveness and sustainability of supply chain management corrective actions; and an ability to demonstrate supply chain management progress.
With enactment of the FY2014 Consolidated Appropriations Act on January 1, 2014, Congress has approved appropriations for the past 13 years of war that total $1.6 trillion for military operations, base support, weapons maintenance, training of Afghan and Iraq security forces, reconstruction, foreign aid, embassy costs, and veterans health care for the war operations initiated since the 9/11 attacks. This book discusses the cost of Iraq, Afghanistan, and other global war of terror operations since 9/11 in detail, and provides information on the FY2015 funding to counter Ebola and the Islamic State (IS).
Author and illustrator of How to Be Interesting, Jessica Hagy is a cutting-edge thinker whose language - comprising circles, arrows, and lines and the well-chosen word or ?two - makes her an ideal philosopher for our ever-more-visual culture. Her charts and diagrams are deceptively simple, often funny, and always thought-provoking. She knows how to communicate not only ideas but the complex process of thinking itself, complete with its twists and surprises. ?For The Art of War Visualized, she presents her vision in evocative ink-brush art and bold typography. The result is page after page in which each passage of the complete canonical text (in its best-known Lionel Giles translation) is visually interpreted in a singular diagram, chart, or other illustration - transforming, reenergizing, and making the classic dazzlingly accessible for a new generation of readers.
India is poised to resurge as a maritime power, with cooperative engagement as its most prominent pan-regional characteristic. Enabled by a sound national strategy within the Indo-Pacific region and beyond, this would enable successive governments to further the overarching national objective of securing the economic, material, and societal wellbeing of the people of India. In this context, the book appraises the various facets related to India's ascendance as a maritime power, and lays down policy-relevant recommendations to assist the national policy-makers to chart the 'way ahead'. This book additionally seeks to address policymakers in other countries of the Indo-Pacific region, as also extra-regional State entities that are actively seeking to engage with India.
National security has become a major concern with the rise of terrorist groups and technological advances. Surveillance systems are crucial in maintaining security. This book discusses different types and forms of cybercrimes; security in medical institutions; real-time surveillance; biofocal panoramic lenses; the Gaussian mixture model; hybrid warms and defence synergetics; and a futuristic perspective in global health diplomacy.
Invitation to Peace Studies is the first textbook in the field to emphasize 21st-century research and controversies and to encourage the more frequent use of a gender perspective in analyzing peace, war and violence. Recent empirical research forms the core of most chapters, but substantial attention is also given to faith-based ideas, movements, and peace pioneers. The book examines compelling contemporary topics like cyber warfare, drones, robots, digital activism, hactivism, the physiology of peace, rising rates of suicide, and peace through health. It is also unique in its use of a single coherent perspective-that of a global peace network-to make sense of the historically unprecedented and interconnected web of diverse ideas, individuals, groups, organizations, and movements currently promoting peace across the world.
This book's contribution to the discussion on the origin's of the First World War is a pioneering study of both the British General Staff and the evolution of military strategy in the period immediately prior to the war. It describes the development of the General Staff, Britain's agency for strategic planning, and goes on to give an account of its role in devising strategy. Problems are examined as they arose at grass-roots level in the War Office and progressed upward towards the Cabinet. The complex cross-currents involving the Admiralty, Foreign Office, Treasury and individuals from Edward VII downwards are charted. The account covers British military policy up to 1916, interpreting the Gallipoli campaign and explanation for its failure.
With the Lisbon Treaty in place and the European Union increasingly involved in international crisis management and stabilization operations in places near and far, this volume revisits the trajectory of a European strategic culture. Specifically, it studies the usefulness of its application in a variety of circumstances, including the EU's operations in Africa and the Balkans as well as joint operations with NATO and the United Nations. The contributors find that strategic culture is a useful tool to explain and understand the EU's civilian and military operations, not in the sense of a 'cause', but as a European normative framework of preferences and constraints. Accordingly, classical notions of strategic culture in the field of international security must be adapted to highlight the specific character of Europe's strategic culture, especially by taking the interaction with the United Nations and NATO into account. Though at variance over the extent to which security and defence missions have demonstrated or promoted a shared strategic culture in Europe, the authors reveal a growing sense that a cohesive strategic culture is critical in the EU's ambition of being a global actor. Should Europe fail to nurture a shared strategic culture, its actions will be based much more on flexibility than on cohesion. This book was published as a special issue of Contemporary Security Policy.
While American national security policy has grown more interventionist since the Cold War, Washington has also hoped to shape the world on the cheap. Misled by the stunning success against Iraq in 1991, administrations of both parties have pursued ambitious aims with limited force, committing the country's military frequently yet often hesitantly, with inconsistent justification. These ventures have produced strategic confusion, unplanned entanglements, and indecisive results. This collection of essays by Richard K. Betts, a leading international politics scholar, investigates the use of American force since the end of the Cold War, suggesting guidelines for making it more selective and successful. Betts brings his extensive knowledge of twentieth century American diplomatic and military history to bear on the full range of theory and practice in national security, surveying the Cold War roots of recent initiatives and arguing that U.S. policy has always been more unilateral than liberal theorists claim. He exposes mistakes made by humanitarian interventions and peace operations; reviews the issues raised by terrorism and the use of modern nuclear, biological, and cyber weapons; evaluates the case for preventive war, which almost always proves wrong; weighs the lessons learned from campaigns in Iraq, Afghanistan, and Vietnam; assesses the rise of China and the resurgence of Russia; quells concerns about civil-military relations; exposes anomalies within recent defense budgets; and confronts the practical barriers to effective strategy. Betts ultimately argues for greater caution and restraint, while encouraging more decisive action when force is required, and he recommends a more dispassionate assessment of national security interests, even in the face of global instability and unfamiliar threats.
This fourteenth volume of India's National Security Annual Review intensively analyses India's national security with respect to the changing internal and external dynamics. In the global environment, the situation is characterised by rising tensions between United States and Russia, intensified rivalry between United States (US) and China, and increasing cooperation between China and Russia. For India which seeks peaceful growth to emerge as a major power, this poses severe diplomatic challenges. This volume discusses the complexity of these challenges and the deftness with which India gets the best out of its strategic partnerships with the US and Russia while warding off the transgressions of a mighty adversary like China. It also studies the impact of internal convulsions and external intrusions on India's security from South Asian nations such as Afghanistan, Bangladesh, Nepal and Sri Lanka. Examining the field of internal security, the essays carry rare insights into the causes of expansion of Naxalite violence in tribal areas and the dynamics of conflict resolution in the Northeast, as well as India's deep concern as a growing power with its economic slowdown in the recent past, and energy and cyber security. Bringing together contributions from eminent scholars and diplomats, the volume will be indispensable for policymakers, government think tanks, defence and strategic studies experts, as well as students and researchers of international relations, foreign policy and political science.
Churchill has gone down in history as one of the greatest leaders the world has ever known. From the day the Second World War was declared he stood out as the only man wanting to take offensive action. But is this accolade deserved? The first few years of the war were nothing short of disastrous, and author Stephen Napier shows how Churchill's strategies - and his desire not to be the first British prime minister to surrender the nation - brought the war effort to the brink of ruin and back again. Did his series of retaliatory raids in response to a German accidental bombing help cause the Blitz? Were plans already at large for the US to join the war, with Churchill as the primary puppet master? Napier explores all this and more in a controversial examination of Churchill's leadership using first-person accounts from his peers and electorate. |
![]() ![]() You may like...
Cuito Cuanavale - 12 Months Of War That…
Fred Bridgland
Paperback
![]()
|