![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
There are various Ways. There is the Way of salvation by the law of Buddha, the Way of Confucius governing the Way of learning, the Way of healing as a doctor, as a poet teaching the Way of Waka, tea, archery, and many arts and skills. Each man practises as he feels inclined. It is said the warrior's is the twofold Way of pen and sword, and he should have a taste for both Ways. Even if a man has no natural ability he can be a warrior by sticking assiduously to both divisions of the Way. Generally speaking, the Way of the warrior is resolute acceptance of death.
This edited book examines the East German foreign intelligence service (Hauptverwaltung Aufkl?rung, or HVA) as a historical problem, covering politics, scientific-technical and military intelligence and counterintelligence. The contributors broaden the conventional view of East German foreign intelligence as driven by the inter-German conflict to include its targeting of the United States, northern European and Scandinavian countries, highlighting areas that have previously received scant attention, like scientific-technical and military intelligence. The CIA's underestimation of the HVA was a major intelligence failure. As a result, East German intelligence served as a stealth weapon against the US, West German and NATO targets, acquiring the lion's share of critical Warsaw Pact intelligence gathered during the Cold War. This book explores how though all of the CIA's East German sources were double agents controlled by the Ministry of State Security, the CIA was still able to declare victory in the Cold War. Themes and topics that run through the volume include the espionage wars; the HVA's relationship with the Russian KGB; successes and failures of the BND (West German Federal Intelligence Service) in East Germany; the CIA and the HVA; the HVA in countries outside of West Germany; disinformation and the role and importance of intelligence gathering in East Germany. This book will be of much interest to students of East Germany, Intelligence Studies, Cold War History and German politics in general. Kristie Macrakis is Professor at the Georgia Institute of Technology, Atlanta. Thomas Wegener Friis is an Assistant Professor at the University of Southern Denmark's Centre for Cold War Studies. Helmut M?ller-Enbergs is currently a Visiting Professor at the University of Southern Denmark and holds a tenured senior staff position at the German Federal Commission for the STASI Archives in Berlin.
This edited volume focuses on India's experiences waging counterinsurgency campaigns since its independence in 1947. Filling a clear gap in the literature, the book traces and assess the origins, evolution and current state of India's counterinsurgency strategies and capabilities, focusing on key counterinsurgency campaigns waged by India within and outside its territory. It also analyzes the development of Indian doctrine on counterinsurgency, and locates this within the overall ebb and flow of India's defense and security policies. The central argument is that counterinsurgency has been an integral part of India's overall security policy and can thereby impart much to political and military leaders in other states. Since its emergence from British colonialism, India's defence policies have not merely sought to protect and preserve India's inherited colonial borders from threats by rival states, but have also sought to prevent and suppress secessionist movements. In countering insurgencies, the Indian state has fashioned strategies that seek to repress militarily any secessionist movement, while simultaneously forging a range of civilian administrative and institutional arrangements that attempt to address the grievances of disaffected populations. The book highlights key strategic and tactical innovations that the Indian Army and security forces made to deal with a range of insurgent movements. Simultaneously, it also examines how the civilian-military nexus enabled India's policy makers to utilize existing, and formulate novel, institutional means to address extant political grievances. India has been most successful where it has managed to use calibrated force, obtained the trust of much of the aggrieved population and made persuasive commitments to political and institutional reform. Examination of these elements of India's counterinsurgency performance can be compared to counterinsurgency doctrine developed by other countries, including the United States, and thus yield comparative policy prescriptions and recommendations that can be applied to other counterinsurgency contexts. This book will be of great interest to students of counterinsurgency and irregular warfare, Indian politics, Asian Security Studies and Strategic Studies in general.
This edited volume introduces the reader to the role of space in military and defense strategy, and outlines some of the major foreign and domestic actors in the space arena, as well as constraints of law and treaties on activities in space. It also addresses science and technology as they relate to space policy. The book addresses three main questions:
This book fills a niche in the space policy field, providing insights into space and strategy from international experts from the military, academic and scientific communities. A unique feature of the book is the chapter on science and technology, which utilizes the latest information available concerning space utilization and exploration.
This is a wide-ranging study of how the British were more successful in managing the strains of modern industrial war than the French. The book addresses such current historical debates as the nature of the political Right and Left in Europe during the 1930s, the extent of rearmament and economic mobilization, and the causes of France's defeat in 1940.
This book explores the idea of a revolution in military affairs (RMA), which underpins the transformational agenda of the US military, and examines its implications for smaller states. The strategic studies literature on the RMA tends to be American-centric and directed towards the strategic problems of the US military. This volume seeks to fill the gap in the literature and establish an intellectual framework that can assist other, smaller powers in their respective approaches to this issue. The book does so in three main sections; Part I focuses on questions of transformations in strategy and war; Part II explores transformations in operations; while Part III examines possible impediments to an RMA. This book will be of much interest to students of Military Studies, Asian Studies, Strategic Studies and International Relations in general.
The focus of this cutting-edge book is on new, information-age technologies that promise to offer seamless integration of real-time data sharing, creating a single logical network architecture to facilitate the movement of data throughout the battlespace. Because the structure of this network is constrained by the fundamental trade-off between range, mobility and capacity that applies to all communications systems, this network is unlikely to be based on a single network technology. This book presents an architecture for this network, and shows how its subsystems can be integrated to form a single logical network.
In 1942, with a black-market chicken under his arm, Leo Marks left his father's famous bookshop, 84 Charing Cross Road, and went to war. He was twenty-two and a cryptopgraher of genius. In Between Silk and Cyanide, his critically acclaimed account of his time in SOE, Marks tells how he revolutionised the code-making techniques of the Allies, trained some of the most famous agents dropped into France including Violette Szabo and 'the White Rabbit', and why he wrote haunting verse including his 'The Life that I have' poem. He reveals for the first time the disastrous dimensions of the code war between SOE and the Germans in Holland; how the Germans were fooled into thinking a Secret Army was operating in the Fatherland itself, and how and why he broke General de Gaulle's secret code. Both thrilling and poignant, Marks's book is truly one of the last great Second World War memoirs.
The successful application of the Fifth Generation of Warfare (5GW) is "indistinguishable from magic" (Rees 2009, following in the spirit of Clarke's Law, propounded by the author of 2001: A Space Odyssey) "any sufficiently advanced technology is indistinguishable from magic"). The Fifth-Generation warrior hides in the shadows, or in the static. So, then, how can analysts and researchers study and discuss 5GW? Other questions also demand answers. What is the xGW framework, which many theorists use to describe 5GW? What alternatives to the xGW framework exist? What 5GWs have been observed? What are the source documents for the xGW framework? What is the universe of discourse that the xGW framework emerged from? Why bother trying to understand 5GW? This handbook attempts to provide systematic answers to these questions in several major sections, each of which is written by many contributors. While this handbook records many different voices of 5GW research, it speaks with one voice on the need to understand 5GW, the fifth gradient of warfare.
Complete set Since 1961 the Adelphi Papers have provided some of the most informed accounts of international and strategic relations. Produced by the world renowned International Institute of Strategic Studies, each paper provides a short account of a subject of topical interest by a leading military figure, policy maker or academic. The project reprints the first forty years of papers, arranged into thematic sets. The collection as a whole provides a rich and insightful account of international affairs during a period which spans the second half of the Cold War, the fall of the communist bloc and the emergence of a new regime with the United States as the sole superpower. There is a wealth of global coverage: Four volumes on east and southeast Asia as well as individual volumes on China, Japan and Korea Particular attention is given to the Middle East, with volumes addressing internal sources of instability; geo-politics and the role of the superpowers; the Israel-Palestine conflict; and the Iran-Iraq War and the first Gulf War. There is also a volume on oil and insecurity There are also two volumes on Africa, the site of most of the world's wars during the period. The IISS has obviously made a particular contribution to the understanding of military strategy, and this is reflected with material on topics such as urban and guerrilla warfare, nuclear deterrence and the role of information in modern warfare. Volumes on military strategy are complemented by approaches from other disciplines, such as defence economics. Key selling points: Early papers were only distributed by the IISS and will have achieved limited penetration of the academic market A host of major authors on a range of different subjects (eg Gerald Segal on China, Michael Leifer on Southeast Asia, Sir Lawrence Freidman on the revolution in military affairs, Raymond Vernon on multinationals and defence economics) Individual volumes will have a strong appeal to different markets (eg the volume on defence economics for economists, various volumes for Asian Studies etc)
This unique book presents an accurate and reliable assessment of the Special Operations Executive (SOE). It brings together leading authors to examine the organization from a range of key angles. This study shows how historians have built on the first international conference on the SOE at the Imperial War Museum in 1998. The release of many records then allowed historians to develop the first authoritative analyses of the organization's activities and several of its agents and staff officers were able to participate. Since this groundbreaking conference, fresh research has continued and its original papers are here amended to take account of the full range of SOE documents that have been released to the National Archives. The fascinating stories they tell range from overviews of work in a single country to particular operations and the impact of key personalities. SOE was a remarkably innovative organization. It played a significant part in the Allied victory while its theories of clandestine warfare and specialised equipment had a major impact upon the post-war world. SOE proved that war need not be fought by conventional methods and by soldiers in uniform. The organization laid much of the groundwork for the development of irregular warfare that characterized the second half of the twentieth century and that is still here, more potent than ever, at the beginning of the twenty-first. This book will be of great interest to students of World War II history, intelligence studies and special operations, as well as general readers with an interest in SOE and World War II.
The pioneering essays in this volume explore national security challenges posed by new technologies and examine some ongoing efforts to understand and mitigate their potential negative effects. The authors, drawn from among a roster of international scholars, approach these issues from different yet ultimately complementary angles. Turkish scholar Emin Daskin chronicles the efforts of the Turkish government to develop and implement a Cyber Security Strategy aimed at protecting the country from attacks by both governmental and non-governmental cyber actors. French researcher Christine Dugoin-Clement has studied what she views as a successful case of cyberwarfare, in which Ukrainian soldiers fighting in the eastern separatist region of Donbass have been targeted by cyber attackers attempting to deteriorate their cognition, rendering them less effective in the field. Another French author and military academy instructor, Thomas Flichy de La Neuville, provides a counterpoint study of militarized motorbike attacks in the Sahel, demonstrating that cyberspace is not the only technological sphere in which innovation increasingly threatens security. Finally, American academic Christopher Whyte offers a trenchant critique of current academic studies of cyberterrorism, noting that while "cyberterrorism" appears frequently as a subject of research, the actual work being carried out in this critical area lacks thematic nuance and is only tenuously linked to related major thematic topic areas. The collection highlights the unique challenges faced by countries as they attempt to deal with previously unknown adversaries, as both the nature of the enemy and the field of operations continues to shift with unprecedented speed. It will undoubtedly be of interest to anyone concerned with international relations, cybersecurity, cyberterrorism, and national security in the twenty-first century.
How should Israel respond to the changing external threats that confront it? This paper argues that the country's traditional security concept is obsolete and must be reformulated. How this is achieved depends on developments within the Middle East and on the outcome of current shifts in Israel's politics and society.
The US debate surrounding ballistic-missile defence is becoming increasingly polarized: advocates claim that these defences are essential to US security and should be deployed as soon as possible; critics argue that they upset strategic stability, encourage regional arms races, and therefore, will not work. What is lacking in the current debate is a quantitative analysis of how well defences would have to work to meet specific security objectives, and what level of defence might upset strategic stability. This paper argues that there is no immediate need to deploy US national missile defences because accidental or unauthorized Russian or Chinese attacks are unlikely, and because deterrence should mean that the risk of attack from emerging ballistic-missile states is acceptably low. National missile defence might be a useful insurance, but other defence needs are more pressing. However, if the US did deploy such a system, a modified Anti-Ballistic Missile (ABM) Treaty that allowed the US and Russia to deploy 100 interceptors at multiple sites around their territory should not pose a realistic threat to the retaliatory capabilities of four of the five declared nuclear powers.; This bo
This is the first book to describe British wartime success in breaking Japanese codes of dazzling variety and great complexity which contributed to the victory in Burma three months before Hiroshima. Written for the general reader, this first-hand account describes the difficulty of decoding one of the most complex languages in the world in some of the most difficult conditions. The book was published in 1989 to avoid proposed legislation which would prohibit those in the security services from publishing secret information.
EUROPE, 1940. NAZI FORCES SWEEP ACROSS THE CONTINENT, WITH A BRITISH INVASION LIKELY ONLY WEEKS AWAY. NEVER BEFORE HAS A RESISTANCE MOVEMENT BEEN SO CRUCIAL TO THE WAR EFFORT. In this definitive appraisal of Anglo-Norwegian cooperation in the Second World War, Tony Insall reveals how some of the most striking successes of the Norwegian resistance were the reports produced by the heroic SIS agents living in the country's desolate wilderness. Their coast-watching intelligence highlighted the movements of the German fleet and led to counter-strikes which sank many enemy ships - most notably the Tirpitz in November 1944. Using previously unpublished archival material from London, Oslo and Moscow, Insall explores how SIS and SOE worked effectively with their Norwegian counterparts to produce some of the most remarkable achievements of the Second World War.
Cybersecurity is a complex and contested issue in international politics. By focusing on the 'great powers'--the US, the EU, Russia and China--studies in the field often fail to capture the specific politics of cybersecurity in the Middle East, especially in Egypt and the GCC states. For these countries, cybersecurity policies and practices are entangled with those of long-standing allies in the US and Europe, and are built on reciprocal flows of data, capital, technology and expertise. At the same time, these states have authoritarian systems of governance more reminiscent of Russia or China, including approaches to digital technologies centred on sovereignty and surveillance. This book is a pioneering examination of the politics of cybersecurity in the Middle East. Drawing on new interviews and original fieldwork, James Shires shows how the label of cybersecurity is repurposed by states, companies and other organisations to encompass a variety of concepts, including state conflict, targeted spyware, domestic information controls, and foreign interference through leaks and disinformation. These shifting meanings shape key technological systems as well as the social relations underpinning digital development. But however the term is interpreted, it is clear that cybersecurity is an integral aspect of the region's contemporary politics.
Over the past decade the Caspian Sea region has risen from relative obscurity to considerable prominence in global affairs. Located at the crossroads of traditional trade routes between Europe and Asia and possessing vast natural resources, oil and natural gas among them, it attracts widespread international interest. The emergence of new sovereign states in the region has fundamentally transformed its political landscape. The future of the Caspian region is far from certain, however, as it is challenged by a wide variety of political, socio-economic and military threats which include the declining living standards of vast segments of local populations, inter-ethnic and inter-confessional tensions and conflicts, militant separatism, international terrorism, and illegal trade in arms and drugs. The security of the region is also affected by the intensifying strategic competition among major outside powers over establishing their political and economic influence in regional affairs. The book offers a competent analysis of the major political, economic and security developments in the region by a diverse group of highly qualified experts from the Caspian littoral states, the USA and the European Union.
In recent years the importance of Signals Intelligence (Sigint) has
become more prominent, especially the capabilities and
possibilities of reading and deciphering diplomatic, military and
commercial communications of other nations.
In recent years the importance of Signals Intelligence (Sigint) has
become more prominent, especially the capabilities and
possibilities of reading and deciphering diplomatic, military and
commercial communications of other nations. |
![]() ![]() You may like...
Black Kid Magic - Young, Gifted and…
Tirzah McClinton, Andrew McClinton
Hardcover
R445
Discovery Miles 4 450
The Boy with Ants in His Pants
Kimberly Kendall-Drucker, Courtney D Woods, …
Hardcover
R594
Discovery Miles 5 940
|