![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
The United States faces a small number of rogue states that either have or are working to acquire weapons of mass destruction. These NASTIs, or NBC-Arming Sponsors of Terrorism and Intervention, include such states as North Korea, Iraq, Iran, Libya, and Syria. U.S. nonproliferation programs and policies have helped to keep this number small, but U.S. and allied counterproliferation programs are essential to reduce the danger. It is up to deterrence, active defenses, passive defenses, decontamination, and counterforce to turn enemy weapons of mass destruction into instruments of limited destructive effect. Warfighters will also have to adopt a different strategy and concept of operations in fighting an adversary that is so heavily armed. This strategy will feature a combination of deception, dispersion, mobility and maneuver, diffused logistics, remote engagement, missile defense bubbles, non-combatant evacuation operations, and large area decontamination. It will also involve upgrades to NBC passive defense measures and equipment, as well as a counterforce capability that can find and destroy a variety of adversary targets, including mobile launchers and deeply buried and hardened underground structures.
The United States and its allies have been fighting the Taliban and al-Qaeda in Afghanistan for a decade in a war that either side could still win. While a gradual drawdown has begun, significant numbers of US combat troops will remain in Afghanistan until at least 2014, perhaps longer, depending on the situation on the ground and the outcome of the US presidential election in 2012. Given the realities of the Taliban's persistence and the desire of US policymakers - and the public - to find a way out, what can and should be the goals of the US and its allies in Afghanistan? "Afghan Endgames" brings together some of the finest minds in the fields of history, strategy, anthropology, ethics, and mass communications to provide a clear, balanced, and comprehensive assessment of the alternatives for restoring peace and stability to Afghanistan. Presenting a range of options - from immediate withdrawal of all coalition forces to the maintenance of an open-ended, but greatly reduced military presence - the contributors weigh the many costs, risks, and benefits of each alternative. This important book boldly pursues several strands of thought suggesting that a strong, legitimate central government is far from likely to emerge in Kabul; that fewer coalition forces, used in creative ways, may have better effects on the ground than a larger, more conventional presence; and that, even though Pakistan should not be pushed too hard, so as to avoid sparking social chaos there, Afghanistan's other neighbors can and should be encouraged to become more actively involved. The volume's editors conclude that while there may never be complete peace in Afghanistan, a self-sustaining security system able to restore order swiftly in the wake of violence is attainable.
This book is a 'hidden' history of Bletchley Park during the Second World War, which explores the agency from a social and gendered perspective. It examines themes such as: the experience of wartime staff members; the town in which the agency was situated; and the cultural influences on the wartime evolution of the agency.
Andrew A. Michta examines the security of Poland, Czechoslovakia, and Hungary in the aftermath of the 1989 collapse of communism and the Soviet empire in Eastern Europe. He reviews the old geopolitical dilemmas in the region as well as the new conditions in Europe as it approaches the remainder of the decade, and offers a country-by-country discussion of security policies and military reforms underway in the region. The analysis is set against a background discussion of the region's history as well as a review of the key events leading to the disintegration of the Warsaw Treaty Organization, including the reformulation of Soviet security policy in the late 1980s. Michta concludes with an assessment of security challenges facing the Triangle states of Poland, Czechoslovakia, and Hungary as they work to join Western Europe by the end of the decade. He argues that the Triangle will remain in a gray security zone in Europe for the foreseeable future, with an implicit security commitment from NATO, but without explicit formal security guarantees.
As the sole remaining superpower, shouldn't the United States be able to call the tune on establishing a secure world to our liking? While most international strategists conjure up history and theory of international relations from the past to examine such a question, Sy Deitchman, in "On Being a Superpower, " focuses on today's changing conditions and attitudes. He starts by addressing hypothetical situations that keep US international security experts awake at night. What would the United States do, he asks, if, in Saudi Arabia, an armed rebellion by Islamic fundamentalists were about to topple the House of Saud while demanding that the US get out of the Middle East? Would the United States go to war to try stop China's invasion of a democratic Taiwan that declares its independence? Could the US really win such a war against a determined country that has over a billion people and nuclear weapons? If a Central American drug cartel gained de facto control of the Panama canal and turned it into a smuggling lynchpin, what would the United States do?Deitchman examines these and other scenarios and then pictures how the US would likely respond, based on our society's current moral concerns, political rhetoric, and overall world view. After reviewing the challenges the world will present to us and examining the current state of our nation and its armed forces, Deitchman describes the strategy for preserving US security that appears to be emerging without explicit planning. He shows how trends in the armed forces parallel the trends in society, and how our argumentative political system is affecting our ability to build and use military power to support our strategy. Deitchman's synthesis of all these themes shows that the existing trends in the nation and the world are not favorable for our future security. Can they be changed? And if so, how? That's the conundrum readers of this book are invited to ponder.
Examining the evolving nature of national and international security in the post-Cold War era, this work focuses on non-military threat potentials and how these may best be countered. Six specific issues are discussed: terrorism, the heroin and cocaine trade, piracy, environmental degradation, the spread of disease and uncontrolled migration. The book concludes that greater national co-ordination, inter-agency co-operation and international collaboration is needed if these problems are going to be dealt with effectively.
Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, presenting the latest results from the U.S. Army's Internet of Battle Things and the U.S. Defense Department's premier IoT research initiative. The text discusses organizational challenges in converting defense industrial operations to IoT and summarizes policy challenges and recommendations for controlling government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT solution deployment that include KepServerEX for edge connectivity to industrial protocols, AWS IoT Core for IoT data processing, Amazon S3 for scalable storage of IoT Data, and more. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base. Witten by leading researchers and practitioners of IoT technology for defense and national security, IoT for Defense and National Security also includes information on: IoT resource allocation via mixed discrete/continuous optimization (monitoring existing resources and reallocating them in response to adversarial actions) Principles of robust learning and inference for Internet of Battlefield Things (IoBTs), covering methodologies to make machine learning models provably robust AI-enabled processing of environmental sounds in commercial and defense environments, such as detecting faults in industrial manufacturing Vulnerabilities in tactical IoT systems that come about due to the intrinsic nature of building networks using several devices and components For application engineers from security and defense-related companies and professors and students in military courses, IoT for Defense and National Security is a one-of-a-kind resource of the topic, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.
The proverbial Soviet enigma has never seemed more elusive to Western analysts than now. General Secretary GorbacheV's demonstrated willingness to reallocate resources, the upheavals in the internal Soviet system wrought by perestroika and glasnost, and a new strategic reliance on defensive sufficiency may all have profound implications for U.S.-Soviet relations in the future. In this volume, distinguished academics, researchers, and government and military strategists look ahead to the 1990s and examine probable trends in the superpower relationship over the course of the next decade. An excellent source of readings for courses in international relations, national security, and foreign policy, the book focuses particularly on the strategic and military aspects of the relationship. The book is divided into four parts and begins by addressing concepts of strategy. The contributors outline U.S. strategic practice and Soviet global objectives in the context of nuclear deterrence and major conventional wars. In Part II, three chapters discuss the U.S. response to the Soviet threat in terms of U.S. strategy for war in Europe, strategic defense policies, and technology and policy choices. Low intensity conflicts, both unconventional conflicts and Third World involvements, are the subject of Part III. Finally, the contributors assess Soviet military power and U.S. defense resources, examining the question of which nation is currently better prepared to outlast the other in a protracted conflict. A concluding chapter ties the readings together by examining whether the Soviet challenge of the 1990s can best be characterized as peacefully offensive or as operational entrapment.
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combat-from the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats. This essential reference-the only of its kind to include an overview of other cyber warfare literature-emphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers. Incorporates expertise from diverse viewpoints from the military, government agencies, industry, and academia Provides an informative timeline of key events in the development of cyber warfare capabilities Highlights the most prominent and effective cyber attacks in history as well as legal attempts to curb them
These essays examine several aspects of the nature of the emerging strategic environment and how this situation affects thinking about U.S. strategy in the 21st century. The United States and its Allies currently confront a number of major trouble spots around the world. In addition, the stability and defense policies of U.S. Allies represent an increasingly important factor in the making of U.S. foreign policy. How well the American military is adjusting to the post-Cold War world with the threats of declining defense budgets and rapid changes in technology, will be a determining factor in the course of the coming decade. Here, the discussion of an impending joint military culture and service cultures out of touch with the harsh realities of the emerging strategic environment combine in a dramatic prediction of 21st century foreign strategies. The Balkans, the Middle East, and Russia all present considerable defense planning difficulties with no obvious solutions. The Balkans represent the clearest immediate danger, as the weight of history and current political ambitions threaten to destabilize Europe's southeastern flank. In the mid-term range are Middle Eastern concerns such as water shortages, border disputes, and new rivalries, all of which unbalance an area whose oil reserves fuel the world economy. Finally, the Russian military collapse suggests that the future Russian threat may result more from national weakness than from strength.
Based upon consideration of United Nation missions to the Congo (1960-64), Somalia (1992-95), and the former Yugoslavia (1992-95) and examination of counterinsurgency campaigns, Mockaitis develops a new model for intervening in intrastate conflicts and commends the British approach to civil strife as the basis for a new approach to peace operations. Both contemporary and historic examples demonstrate that military intervention to end civil conflict differs radically from traditional peacekeeping. Ending a civil war requires the selective and limited use of force to stop the fighting, safeguard humanitarian aid work, and restore law and order. Since intrastate conflict resembles insurgency far more than it does any other type of war, counterinsurgency principles should form the basis of a new intervention model. A comprehensive approach to resolve intrastate conflict requires that peace forces, NGOs, and local authorities cooperate in rebuilding a war-torn country. Only the British have enjoyed much success in counterinsurgency campaigns. Starting from the three broad principles of minimum force, civil-military cooperation, and flexibility, the British approach in responding to insurgency has combined the limited use of force with political and civil development. Carefully considered and correctly applied, these principles could produce a more effective model for peace operations to end intrastate conflict.
One of the most controversial aspects of United States foreign policy centers about its response to unconventional conflict--that is, revolutions, counterrevolutions, and terrorism--in and from a number of Third World countries. Examining the current U.S. political-military posture, this critical study assesses the challenges posed to open systems by these conflicts and proposes guidelines for creating a more effective U.S. response. The author first explores the nature of unconventional conflicts, then turns to the U.S. response to the challenges unconditional conflicts present. Urging the need for a "new realism" based on a more accurate picture of present political conditions and U.S. interests, he concludes with a series of suggested guidelines for designing U.S. policy, strategy, doctrine and organizational strategies as a means of developing a more viable approach to the challenges of contemporary military and political conflict.
This comprehensive analytical biography is the definitive work on the life and writings of history's most significant counterinsurgency doctrinaire, David Galula, elucidating the context for his reflections and examining the present and future applicability of his treatise for scholars and practitioners alike. The product of years of extensive research made possible by exclusive access to Galula's personal papers as well as first-hand accounts from colleagues, family members, and friends, this book traces Galula's life from early childhood until death, describing his upbringing, education, and military career in the tumultuous historical context of his era. The author-a former counterinsurgency practitioner himself-pays particular attention to how the Chinese Revolution and the Algerian War affected Galula's views, and identifies Galula's mentors and the schools of thought within the French military that greatly influenced his writings. A conclusion illuminates the contemporary and likely future validity of his works. In the epilogue, the author speaks to Galula's influence over modern military thought and U.S. counterinsurgency doctrine. This book is essential reading for individuals with an interest in counterinsurgency, Galula's writings, or Galula himself, such as military officers and civilian administrators undertaking counterinsurgency courses and training.
Noted scholars and practitioners describe how America's military strategy is being developed in a post-Cold War eolitical environment to meet future needs confronting the sole surviving world superpower. In defining the domestic constraints and the intense political process that is tied into the formulation of military strategy, they show how difficult it is to build a consensus for American military leadership in a multipolar world. This evaluation of strategic concepts and their application to issues about conventional and nuclear deterrence, technological requirements, and collective security should be required reading for staff officers, civilians in national security bureaucracies, policymakers, and students and scholars concerned with military and security policy.
This work is a critical examination of the dangers which confront the United States in the current era of global instability with historical examples of past crises and prescriptive suggestions for the future. America enters the post-Cold War world as a superpower, but one whose future security, and perhaps even survival, cannot be taken for granted. Only three times in modern history has the world seen such potential instability; in two of those instances, the result was total war. In the coming millennium, major crises and wars are inevitable. Whether or not the United States successfully negotiates such conflicts will depend upon decisions made today. Only careful analysis and planning can help to assure that the United States will preserve its independence and prosperity. This study includes historical examples which illustrate why the current global situation is exceptionally dangerous and how America should prepare to avoid and survive crises, maintain freedom of action, and improve strategic decision-making. The author reviews the most dangerous strategic shortcomings and makes twenty-six recommendations for the future on such topics as military force structure, foreign policy goals, and domestic policy.
Using newly released documents, the author presents an integrated look at American nuclear policy and diplomacy in crises from the Berlin blockade to Vietnam. The book answers the question of why, when the atomic bomb had been used with such devastating effect against the Japanese Empire in 1945, American leaders put this most apocalyptic of weapons back on the shelf, never to be used again in anger. It documents the myopia of Potomac strategists in involving the US in wars of attrition in Korea and Southeast Asia, marginal areas where American vital interests were in no way endangered. Despite the presence of hundreds, then thousands of nuclear bombs and warheads in the nation's stockpile, the greatest military weapon in history became politically impossible to use. And yet overwhelming nuclear superiority did serve its ultimate purpose in the Cold War. When American vital interests were threatened - over Berlin and Cuba - the Soviets backed down from confrontation. Despite errors in strategic judgement brought on by fear of Communist expansion, and in some cases outright incompetence, the ace in the hole proved decisive.
This is the first full-length work to be published about the spectacular failure of the German intelligence services in Persia (Iran) during WWII. Based on archival research it analyzes a compelling history of Nazi planning, operations, personalities, and intrigues, and follows the protagonists from Hitler's rise to power into the postwar era.
Wallach provides a pioneering study of coalition warfare. Using World War I as a case study, Wallach examines such important aspects as Allied pre-war planning; the particularistic interests of coalition partners; human relations; the framework for coordination mechanisms within coalitions; the application of such concepts as a general reserve, unified command, and amalgamation of forces; logistical problems; war finance; and the transition from war to peace. In the process, Wallach shows that coalition warfare is among the most difficult forms to develop and maintain successfully. Unfortunately, as recent post-Cold War experiences illustrate, coalition warfare is an ongoing military issue. As such, this book will be of great interest to military planners as well as students of the history of World War I.
From grassroots terrorism to the nuclear ambitions of hostile nations, the United States faces increasingly complex threats to its national security, and combating these threats continues to demand a reshaping of the nation's security structure, military forces and defense expenditures. In this study, Anthony Cordesman offers a detailed analysis of critical challenges affecting U.S. national security and how failures in adapting to these challenges have exacerbated the strains on available resources. He systematically identifies the most glaring obstacles to successful national security planning and proposes constructive and practical ways to proceed in the future. Cordesman focuses on ten specific challenges, and each is addressed within the context of the Iraq War, Afghan War, War on Terrorism, and the risk of conflict over the Taiwan Straits. Out of the lessons drawn from these experiences, he examines the future of international coalitions, asymmetric warfare, nation building, and stability operations, and concludes that perhaps the most pressing area for change is the need for accountability among civilian and military policymakers.
This is the first description of the formation of America's nulcear surveillance system. Drawing on interviews with participants and the little documentation available under the Freedom of Information Act, Ziegler and Jacobson tell a story not told before. They shed new light on questions raised in earlier interpretations of the early Cold War years and reveal the origins of a surveillance activity that is implied, but not explained, in today's headlines. This book provides the first documented description of the genesis and institutionalization of America's nuclear surveillance system. It traces the development of covert technical methods for assessing the nuclear capability of foreign powers from the introduction of these techniques in World War II to 1949, when they were successfully employed to detect the test of Russia's first atomic bomb. Ziegler and Jacobson examine the planning for the system as well as the technical and organizational obstacles that had to be overcome before it could be implemented. They describe the government decision-making processes and the ways individuals and groups with different beliefs and interests were mobilized in support of the program. They also explore the relationships between the intelligence and scientific communities that were forged in this process.
From the end of the Cold War to the terrorist attacks on the United States in September 2001, the NATO Alliance has changed profoundly. This book explores the multifaceted consequences of NATO's adjustment to new international and domestic political and security realities. Internal Alliance politics and matters of relative power within the membership have strongly influenced recent NATO developments. Several major issues challenging the Alliance are examined, including how the impact of efforts to develop an enhanced common European security and defense policy have affected NATO: whether missile defense is driving the United States and its European allies closer or further apart; how the experience of NATO in the Balkans and elsewhere brought alliance members together or made MATO cohesion more difficult to maintain; and in what way the changing role of NATO has influenced American and Canadian participation in the Alliance. An important guidepost to pivotal changes and likely NATO developments, scholars and policymakers of Atlantic and international politics will find these meditations indispensable. A number of authors also speculate on the likely changes for the alliance that will ensue in the wake of the September 11 terrorist attacks, and the possibility that NATO will soon modify its mission and responsibilities in reaction to the threat of international terrorism. Indeed many of the same strategies and strains that affected NATO cohesion over the past decade are likely to complicate efforts to maintain Alliance unity as part of the anti-terrorist coalition. |
You may like...
Cuito Cuanavale - 12 Months Of War That…
Fred Bridgland
Paperback
(4)
Sustainable Security - Rethinking…
Jeremi Suri, Benjamin Valentino
Hardcover
R3,762
Discovery Miles 37 620
|