|
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Today more than one hundred small, asymmetric, and revolutionary
wars are being waged around the world. This book provides
invaluable tools for fighting such wars by taking enemy
perspectives into consideration. The third volume of a trilogy by
Max G. Manwaring, it continues the arguments the author presented
in "Insurgency, Terrorism, and Crime" and "Gangs,
Pseudo-Militaries, and Other Modern Mercenaries." Using case
studies, Manwaring outlines vital survival lessons for leaders and
organizations concerned with national security in our contemporary
world.
The insurgencies Manwaring describes span the globe. Beginning with
conflicts in Algeria in the 1950s and 1960s and El Salvador in the
1980s, he goes on to cover the Shining Path and its resurgence in
Peru, Al Qaeda in Spain, popular militias in Cuba, Haiti, and
Brazil, the Russian youth group Nashi, and drugs and politics in
Guatemala, as well as cyber warfare.
Large, wealthy, well-armed nations such as the United States have
learned from experience that these small wars and insurgencies do
not resemble traditional wars fought between geographically
distinct nation-state adversaries by easily identified military
forces. Twenty-first-century irregular conflicts blur traditional
distinctions among crime, terrorism, subversion, insurgency,
militia, mercenary and gang activity, and warfare.
Manwaring's multidimensional paradigm offers military and civilian
leaders a much needed blueprint for achieving strategic victories
and ensuring global security now and in the future. It combines
military and police efforts with politics, diplomacy, economics,
psychology, and ethics. The challenge he presents to civilian and
military leaders is to take probable enemy perspectives into
consideration, and turn resultant conceptions into strategic
victories.
'The Art of War' is as relevant to today's warriors in business,
politics, and everyday life as it once was to the warlords of
ancient China. It is one of the most useful books ever written on
leading with wisdom, an essential tool for modern corporate
warriors battling to gain the advantage in the boardroom, and for
anyone struggling to gain the upper hand in confrontations and
competitions.
Out-of-print and out of the hands of military professionals for
years, Artech House answers the demand, making the sought-after,
classic work, "Stratagem: Deception and Surprise in War", available
once again. This timeless and widely cited volume offers
professionals a model and template for studying and analyzing
deception operations. Readers get an historical analysis of
deception and surprise, over 100 real-world case studies, and a set
of methods that underlie and pervade the entire book. This unique
resource takes a broad and deep look at surprise operations,
presenting intriguing questions and hypotheses about the possible
causes of surprise, including deception. Thoroughly referenced and
supported with clear data tables, the case studies concentrate on
goals, planning, expectations, security, leaks, warnings,
intelligence assessments, and final results. The book concludes
with analytical lists of battles from 1914 to 1968, systematically
laid out in columns for cross-tabulation.
This textbook anthology of selected readings on pressing Middle
East security concerns serves as an invaluable single-volume
assessment of critical security issues in nations such as
Afghanistan, Egypt, Iran, Iraq, Israel, Lebanon, Syria, and Yemen.
The issues and current events of the Greater Middle East continue
to hold deep implications for American geopolitical interests in
the region—as they have for many decades. An ideal resource for
students in undergraduate courses on the Middle East and related
regions as well as students in graduate programs of international
studies or security studies, this textbook anthologizes recent,
insightful analyses by top scholars on trends and events in the
Middle East that bear crucially on regional and global security
considerations, covering topics like Iran's nuclear ambitions; the
rise, ebb, and resurgence of Al Qaeda; and the war in Syria. The
essays address concerns that include the re-imposition of military
rule in Egypt; the current status of Palestinian-Israeli relations;
the civil war and proposed chemical inspections in Syria;
Sunni-Shiite conflict and the revitalized al Qaeda presence in Iraq
and the Sunni resurgence in Iraq and Syria; and the
on-again-off-again international monitoring of nuclear facilities
in Iran, along with discussions of that country's connections to
the Syrian regime and Hezbollah in Lebanon. The use of drone
strikes as antiterrorist weapons and their use within U.S. and
international law also receive specific attention. Each reading is
summarized and contextualized by a concise introduction that serves
to enhance the integration of the individual readings across the
book. Original source notes are included with each chapter as
guides to further reading, and numerous maps provide an essential
sense of place. The book also includes a glossary of terms and a
register of brief biographies of significant persons.
This book presents a holistic view of the geopolitics of cyberspace
that have arisen over the past decade, utilizing recent events to
explain the international security dimension of cyber threat and
vulnerability, and to document the challenges of controlling
information resources and protecting computer systems. How are the
evolving cases of cyber attack and breach as well as the actions of
government and corporations shaping how cyberspace is governed?
What object lessons are there in security cases such as those
involving Wikileaks and the Snowden affair? An essential read for
practitioners, scholars, and students of international affairs and
security, this book examines the widely pervasive and enormously
effective nature of cyber threats today, explaining why cyber
attacks happen, how they matter, and how they may be managed. The
book addresses a chronology of events starting in 2005 to
comprehensively explain the international security dimension of
cyber threat and vulnerability. It begins with an explanation of
contemporary information technology, including the economics of
contemporary cloud, mobile, and control systems software as well as
how computing and networking-principally the Internet-are
interwoven in the concept of cyberspace. Author Chris Bronk, PhD,
then documents the national struggles with controlling information
resources and protecting computer systems. The book considers major
security cases such as Wikileaks, Stuxnet, the cyber attack on
Estonia, Shamoon, and the recent exploits of the Syrian Electronic
Army. Readers will understand how cyber security in the 21st
century is far more than a military or defense issue, but is a
critical matter of international law, diplomacy, commerce, and
civil society as well. Provides relevant, rigorous information to
those in the computer security field while also being accessible to
a general audience of policy, international security, and military
readers who seek to understand the cyber security issue and how it
has evolved Documents how contemporary society is dependent upon
cyberspace for its function, and that the understanding of how it
works and how it can be broken is knowledge held by a precious few
Informs both technically savvy readers who build and maintain the
infrastructure of cyberspace and the policymakers who develop
rules, processes, and laws on how the cyber security problem is
managed
A no-nonsense treatment of information operations, this handbook
makes clear what does and does not fall under information
operations, how the military plans and executes such efforts, and
what the role of IO ought to be in the "war of ideas." Paul
provides detailed accounts of the doctrine and practice of the five
core information operations capabilities (psychological operations,
military deception, operations security, electronic warfare, and
computer network operations) and the three "related" capabilities
(public affairs, civil-military operations, and military support to
public diplomacy). The discussion of each capability includes
historical examples, explanations of tools and forces available,
and current challenges faced by that community. An appendix of
selected excerpts from military doctrine ties the work firmly to
the military theory behind information operations. Paul argues that
contemporary IO's mixing of capabilities focused on information
content with those focused on information systems conflates
"apples" with the "apple carts." This important study concludes
that information operations would be better poised to contribute to
the war of ideas if IO were reorganized, separating content
capabilities from systems capabilities and separating the
employment of "black" (deceptive or falsely attributed) information
from "white" (wholly truthful and correctly attributed)
information.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
Examines the causes and consequences of Saudi Arabia's current
security policy and the domestic, regional, and international
challenges the country's defense program presents to the general
welfare of the Middle East. As possessor of a quarter of the
world's oil reserves and host to two of the holiest cities in
Islam, Saudi Arabia is an integral part of the cultural, economic,
and political well-being of the Middle East. From Persian Gulf
security, to Middle Eastern politics, to the international energy
industry, events in this desert kingdom strongly impact the
stability of the region. This comprehensive resource analyzes
contemporary Saudi Arabia-its modern history, the role of Islam,
and the nature of Saudi foreign relations-and reveals how these and
other factors dictate and shape the country's current security
policies and priorities. Middle East expert and author Mathew Gray
has organized the work into six sections: the first provides an
historical overview of the region from the mid-1700s to the 1980s;
the second explores the Saudi political and security system; the
third discusses Saudi-U.S. relations; the fourth looks at Saudi
relations with the Gulf region and the wider Middle East; and the
fifth considers Saudi Arabia's role in Sunni extremism and
terrorism. The final chapter looks at emerging security threats for
Saudi Arabia. The book includes an overview of future challenges
and risks including climate change, water shortages, and problems
of Saudi identity and social dispersion. Explains the role of oil
in sustaining the state-society political bargain, and the impact
of population on its effectiveness Links Islam and Islamic
extremism to a range of influencing factors, including political
pressure, demographic changes, and the role of globalization in
fostering more extreme views Weaves together an analysis of
politics, economics, foreign relations, and social change, showing
how these all relate to and impact each other and, above all, shape
Saudi Arabia's and the Middle East's security environment
Counterterrorism: Mission Critical Skills helps current and future
counterterrorism specialists develop skills that are vital for
their professional success. The book provides readers with a
well-researched argument as to why a particular set of soft skills
are indispensable to counterterrorism specialists. It underscores
the need for best practices and proficiencies among the extensive
network of agencies and entities that fight terrorism. The opening
chapter explores the various counterterrorism entities in the
United States, highlighting their interconnectedness and
illuminating the need for entities to work collaboratively toward a
shared goal. Each of the remaining chapters profile a
mission-critical soft skill and offer learning demands for
guidance, first-person quotes from professional counterterrorism
experts, and operational vignettes to demonstrate the importance of
each skill. The skills presented include teamwork, imagination,
strategic consciousness, cultural mindfulness, discernment,
empathy, mutuality, and operational adaptability. Counterterrorism
equips readers with the soft skills that, when paired with the hard
skills counterterrorism specialists are required to learn, will
help them develop into highly capable, well-rounded, and efficient
counterterrorism professionals.
|
|