![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This book examines the implications of disruptive technologies of the Fourth Industrial Revolution (4IR) on military innovation and the use of force. It provides an in-depth understanding of how both large and small militaries are seeking to leverage 4IR emerging technologies and the effects such technologies may have on future conflicts. The 4th Industrial Revolution (4IR), the confluence of disruptive changes brought by emerging technologies such as artificial intelligence, robotics, nanotechnologies, and autonomous systems, has a profound impact on the direction and character of military innovation and use of force. The core themes in this edited volume reflect on the position of emerging technologies in the context of previous Revolutions in Military Affairs; compare how large resource-rich states (US, China, Russia) and small resource-limited states (Israel, Sweden, Norway) are adopting and integrating novel technologies and explore the difference between various innovation and adaptation models. The book also examines the operational implications of emerging technologies in potential flashpoints such as the South China Sea and the Baltic Sea. Written by a group of international scholars, this book uncovers the varying 4IR defence innovation trajectories, enablers, and constraints in pursuing military-technological advantages that will shape the character of future conflicts. The chapters in this book were originally published as a special issue of the Journal of Strategic Studies.
A light cavalry regiment at war against Napoleonic France
Strategy is not a modern invention. It is an essential and enduring feature of human history that is here to stay. In this original essay, Colin S. Gray, world-renowned scholar of strategic thought, discusses the meaning of strategy and its importance for politicians and the military as a means of achieving desired outcomes in complex, uncertain conditions. Drawing on a wide range of examples from the Great Peloponnesian War to the Second World War, Vietnam, and the ongoing conflicts in Iraq and Afghanistan, Gray ably shows how great military thinkers of the past and present have acted strategically in their various ideological, political, geographical and cultural contexts. Looking to the future, he argues that strategy will continue to provide a vital tool-kit for survival and security, but that the global threat posed by nuclear weapons remains an on-going challenge without obvious practical solutions. As Gray boldy asserts, there is no promised land ahead, only hard and dangerous times that will require us to master the theory and practice of strategy to secure our own future.
The United Arab Emirates (UAE) has elaborated its own philosophy of security. Driven by emergencies and increasing risks, both in the region and globally, Emirati authorities have developed a sense of anticipation as well as an agility to react promptly to new threats through the ability to assess the risks in any given situation. War and the avatars of conflict are a constant reality in the Middle East. Transnational threats, including the regional context, the war in Yemen, insecurity in the Levant and tensions with Iran affect the overall stability of the Peninsula and consequently that of the UAE. Owing to the inclusion of the UAE in the networks of globalization, non-traditional security issues are not relegated to the background. Issues such as COVID-19, immigration, cybersecurity and human trafficking need to be addressed domestically as well as globally. This volume offers a comprehensive and multifaceted examination of the traditional and non-traditional security measures present in the UAE that allow the country to remain politically stable in an otherwise volatile region, and aims to offer a comprehensive overview of all forms of security in the UAE.
Innovation shapes wars, and twelve studies by former faculty members of West Point's United States Military Academy examine specific cases of past and present military innovation. The complex, competitive, and dynamic environment that defines war drives combatants to seek solutions to potentially lethal problems. As some solutions prove effective, gain traction, and win emulation, they follow a path of innovation. The chapters address a broad array of innovations, including in weapon technology, strategy, research and development philosophy, organization of the military instrument, and leveraging maps for strategic goals. Geographically, the examples in this volume span four continents and the Mediterranean Sea, and chronologically they proceed from the twelfth century to the twenty first. Collectively, the studies point to the interconnected value of pursuing constructive solutions to challenges, networking interdisciplinary forms of knowledge, appropriately balancing expectations and capabilities, and understanding an innovation as a journey rather than as an episodic event.
This book provides an institutional costs framework for intelligence and security communities to examine the factors that can encourage or obstruct cooperation. The governmental functions of security and intelligence require various organisations to interact in a symbiotic way. These organisations must constantly negotiate with each other to establish who should address which issue and with what resources. By coupling adapted versions of transaction costs theories with socio-political perspectives, this book provides a model to explain why some cooperative endeavours are successful, whilst others fail. This framework is applied to counterterrorism and defence intelligence in the UK and the US to demonstrate that the view of good cooperation in the former and poor cooperation in the latter is overly simplistic. Neither is necessarily more disposed to behave cooperatively than the other; rather, the institutional costs created by their respective organisational architectures incentivise different cooperative behaviour in different circumstances. This book will be of much interest to students of intelligence studies, organisational studies, politics and security studies.
Form New York Times bestselling author Don Mann and Ralph Pezzulo, Navy SEAL expert advice on surviving in the jungle, in the mountains, in the desert, or at sea. As the elite of the military elite, U.S. Navy SEALs know that they can be deployed anywhere in the world at a moment's notice. Whether in a temperate, tropical, arctic, or subarctic region, they might find themselves alone in a remote area with little or no personal gear. In The U.S. Navy SEAL Survival Handbook, decorated Navy SEAL Team Six member and New York Times bestselling author Don Mann provides a definitive survival resource. From basic camp craft and navigation to fear management and strategies for coping with any type of disaster, it is an essential resource. It covers: Water Shelter and fire Food and hunting Weather Navigation Survival medicine Survival kits And much more Complete with 150 color photographs, this comprehensive guide includes life-saving information for SEALs, for other special operations forces, or for anyone who might fight themselves in a life-threatening situation.
This book, first published in 1985, is an in-depth analysis of the Luftwaffe in the Second World War, using previously untapped German archives and newly-released 'Ultra' intelligence records. It looks at the Luftwaffe within the context of the overall political decision-making process within the Third Reich. It is especially valuable for its careful study of industrial production and pilot losses in the conduct of operations.
Alexandra Kitty's vital new book is a guide to the stratagems and techniques of war propaganda. When nations go to war, governments need reliable and effective methods of rallying public opinion to support their actions, regardless of the political leanings or educational background of citizens. The Mind Under Siege explores real life case studies and research in human motivation to show why propaganda is more powerful, potent, and effective than other types of persuasive messages. Reliance on primal phobias, and the threat to reproduction, well-being, and life itself make propaganda a reliable and powerful tool. For journalists and other news producers, Kitty's book shows how to ask the right questions and avoid spreading misinformation and propaganda and how to see more insidious forms of manipulation and narrative through psychological research and case studies.
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow-and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods. * Learn more at the book's website at http://www.cyberinsecuritybook.org
This book examines how internal and external security are blurring at the EU level, and the implications this has for EU security governance and the EU as a security actor. The EU claims that 'internal and external security are inseparable' and requires a more integrated approach. This book critically assesses this claim in relation to the threats facing the EU, its responses to them, and the practical and normative implications for EU security governance and actorness. It sets out a novel conceptual framework - the EU security continuum - to examine the ways and extent to which internal and external security are blurring along three axes: geographic, bureaucratic, and functional. This is done through an analysis of four key security issues, regional conflict, terrorism, organised crime, and cybersecurity. The book demonstrates that, to varying degrees, these security threats and/or responses do transcend boundaries. However, institutional turf wars and capability silos hamper the EU's integrated approach and, therefore, its management of transboundary security threats. Yet, the EU's pursuit of an integrated approach is reframing its claimed normative distinctiveness toward a more practical one, based on a transnational and multidimensional approach. Such a rearticulation, if implemented, would make the EU a genuinely transboundary security actor, properly structured and equipped to tackle the 21st century's internal-external security continuum. This book will be of much interest to students of European Security, EU politics, and international relations.
'Outstanding ... combines a glimpse behind the security screens with a sharp analysis of the real global insecurities - growing inequality and unsustainability' - New Internationalist Written in the late 1990s, Losing Control was years, if not decades, ahead of its time, predicting the 9/11 attacks, a seemingly endless war on terror and the relentless increase in revolts from the margins and bitter opposition to wealthy elites. Now, more than two decades later and in an era of pandemics, climate breakdown and potential further military activity in the Middle East, Asia and Africa, Paul Rogers has revised and expanded the original analysis, pointing to the 2030s and '40s as the decades that will see a showdown between a bitter, environmentally wrecked and deeply insecure world and a possible world order rooted in justice and peace.
Codenames were a vital feature of World War II, serving as mental shorthand for those in the know, and obscuring the issues for those who were not. Codenames were used from the highest level, in the planning of grand strategic moves affecting the conduct of the whole war, to the lowest command divisions, in the conduct of small-scale tactical operations. This encyclopedia, first published in 1986, removes the mystery surrounding many of the important code names from the era. With around 3,000 entries drawn from all sides - the U.K., U.S.A., Germany, the U.S.S.R. and Japan - Christopher Chant's work provides a uniquely comprehensive and full overview of major operations, names and code words. Thorough and exciting, this key reference reissue is an exceptionally valuable resource for military historians, enthusiasts and general readers with an interest in World War II.
In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks
the meaning and significance of asymmetric warfare, in both
civilian and military realms, and examines why it has become such
an important subject for study. He seeks to provide answers to key
questions, such as how weaker opponents apply asymmetric techniques
against the Western world, and shows how the Wests military
superiority can be seriously undermined by asymmetric threats. The
book concludes by looking at the ways in which the US, the state
most vulnerable to asymmetric attack, is attempting to cope with
some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.
This book scrutinizes how contemporary practices of security have come to rely on many different translations of security, risk, and danger. Institutions of national security policies are currently undergoing radical conceptual and organisational changes, and this book presents a novel approach for how to study and politically address the new situation. Complex and uncertain threat environments, such as terrorism, climate change, and the global financial crisis, have paved the way for new forms of security governance that have profoundly transformed the ways in which threats are handled today. Crucially, there is a decentralisation of the management of security, which is increasingly handled by a broad set of societal actors that previously were not considered powerful in the conduct of security affairs. This transformation of security knowledge and management changes the meaning of traditional concepts and practices, and calls for investigation into the many meanings of security implied when contemporary societies manage radical dangers, risks, and threats. It is necessary to study both what these meanings are and how they developed from the security practices of the past. Addressing this knowledge gap, the book asks how different ideas about threats, risk, and dangers meet in the current practices of security, broadly understood, and with what political consequences. This book will be of interest to students of critical security studies, anthropology, risk studies, science and technology studies and International Relations. The Open Access version of this book, available at: https://www.routledge.com/Translations-of-Security-A-Framework-for-the-Study-of-Unwanted-Futures/Berling-Gad-Petersen-Waever/p/book/9781032007090 has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
This book explores Japan's emerging national security policy in relation to China. It considers the rise of nationalism in contemporary Japan, the recent actions of the Abe government to change Japan's security policy course and the importance of domestic views, both elite and popular, about safety and credibility in shaping security policy. It highlights the lack of strong links between China and Japan and the existence in Japan of significant misconceptions about China. It discusses the politics of Japan's alliances, examines the growth of national pride in Japan and of a more confrontational attitude toward China, and concludes by putting forward some scenarios for likely future developments and some policy proposals for a stable Japan-China relationship.
This book examines intelligence analysis in the digital age and demonstrates how intelligence has entered a new era. While intelligence is an ancient activity, the digital age is a relatively new phenomenon. This volume uses the concept of the "digital age" to highlight the increased change, complexity, and pace of information that is now circulated, as new technology has reduced the time it takes to spread news to almost nothing. These factors mean that decision-makers face an increasingly challenging threat environment, which in turn increases the demand for timely, relevant, and reliable intelligence to support policymaking. In this context, the book demonstrates that intelligence places greater demands on analysis work, as the traditional intelligence cycle is no longer adequate as a process description. In the digital age, it is not enough to accumulate as much information as possible to gain a better understanding of the world. To meet customers' needs, the intelligence process must be centred around the analysis work - which in turn has increased the demand for analysts. Assessments, not least predictions, are now just as important as revealing someone else's secrets. This volume will be of much interest to students of intelligence studies, security studies, and international relations.
The book is a collection of studies on the war in Ukraine. The considerations focus on different contexts of the first phase of the armed conflict. The authors try to answer questions about the motives and results of Russian disinformation and blaming Ukraine, the US and NATO for the invasion, as well as of the position of third countries towards the Russian aggression. One of the issues addressed is sexual violence in wartime and the image of women in armed conflict. The authors also analyze the aid provided by certain nations and Ukrainian national minorities in selected countries. Some chapters also examined public opinions on various war-related issues. Such a broad approach provides multidimensional view of the war while complementing earlier images of the conflict in Ukraine.
- offers most comprehensive and up to date0 history of the IAEA's six decades - features essay by leading academics and policymakers - makes an important contribution to security and nonproliferation studies, as well as to the field of international organizations and global governance
Animals and War: Confronting the Military-Animal Industrial Complex is the first book to examine how nonhuman animals are used for war by military forces. Each chapter delves deeply into modes of nonhuman animal exploitation: as weapons, test subjects, and transportation, and as casualties of war leading to homelessness, starvation, and death. With leading scholar-activists writing each chapter, this is an important text in the fields of peace studies and critical animal studies. This is a must read for anyone interested in ending war and fostering peace and justice.
The Nobel Symposium on A Future Arms Control Agenda was organized by SIPRI to consider how arms control can contribute to creating a cooperative security system based on the peaceful resolution of disputes and the gradual demilitarization of international relations. The proceedings of the symposium include comprehensive discussions of the new normative and structural elements of the post-cold war global security system and the objectives and limits of arms control within that evolving system.
Acknowledgements. Chapter I: National Defense Policy and Resource Decision Making: Unique Challenges. Chapter II: The Federal Government Budget Process. Chapter III: Budgeting for National Defense: Complicated but Workable. Chapter IV: The Planning, Programming, Budgeting, Execution System. |
![]() ![]() You may like...
Biodegradation Technology of Organic and…
Kassio Ferreira Mendes, Rodrigo Nogueira de Sousa, …
Hardcover
R4,041
Discovery Miles 40 410
|