|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This book critically conceptualises positive security and explores
multiple areas in global politics where positive security can be
studied as an alternative to the existing understandings and
practices of security. Structured through a framework on the
practice and ethics of everyday security, the book defines positive
security as a focal point of contextual and spatiotemporal moments
that emerge through encounters with 'the other' in everyday
politics. In these moments, an actor can show attentiveness and
humility towards 'the other'. In this book, the authors present
their own understandings of positive security, offering an in-depth
discussion and analysis of the Global North and South divides,
delving into many aspects such as human security, migration,
gender, Indigenous issues and perceptions of security in the
Arctic, and challenges and tensions for and within NATO. The book
concludes by reflecting on the significance of positive security,
looking at its application for other current issues, including how
to understand and manage new (in)security challenges including
hybrid threats and warfare. This book will be of interest to
students and scholars of international relations, critical
security, and peace studies.
As the confluence of networks that is the modern Internet grows to
encompass everything from nuclear reactors to home appliances, the
affordances offered to the average citizen grow as well-but so,
too, do the resources made available to those with malicious
intent. Through the rise of Big Data and the Internet of Things,
terrorist organizations today have been freed from geographic and
logistical confines and now have more power than ever before to
strike the average citizen directly at home. This, coupled with the
inherently asymmetrical nature of cyberwarfare-which grants great
advantage to the attacker-has created an unprecedented national
security risk that both governments and their citizens are woefully
ill-prepared to face. The Handbook of Research on Civil Society and
National Security in the Era of Cyber Warfare addresses the problem
of cyber terrorism head-on, first through a review of current
literature, and then through a series of progressive proposals
aimed at researchers, professionals, and policymakers. Touching on
such subjects as cyber-profiling, hacktivism, and digital
counterterrorism, this collection offers the tools to begin
formulating a ground-up resiliency to cybersecurity threats that
starts at the civilian level.
The enormous spread of devices gives access to virtual networks and
to cyberspace areas where continuous flows of data and information
are exchanged, increasing the risk of information warfare,
cyber-espionage, cybercrime, and identity hacking. The number of
individuals and companies that suffer data breaches has increased
vertically with serious reputational and economic damage
internationally. Thus, the protection of personal data and
intellectual property has become a priority for many governments.
Political Decision-Making and Security Intelligence: Recent
Techniques and Technological Developments is an essential scholarly
publication that aims to explore perspectives and approaches to
intelligence analysis and performance and combines theoretical
underpinnings with practical relevance in order to sensitize
insights into training activities to manage uncertainty and risks
in the decision-making process. Featuring a range of topics such as
crisis management, policy making, and risk analysis, this book is
ideal for managers, analysts, politicians, IT specialists, data
scientists, policymakers, government officials, researchers,
academicians, professionals, and security experts.
“From Stettin in the Baltic to Trieste in the Adriatic, an iron
curtain has descended across the Continent. Behind that line lie
all the capitals of the ancient states of Central and Eastern
Europe. Warsaw, Berlin, Prague, Vienna, Budapest, Belgrade,
Bucharest and Sofia” – Winston Churchill, 5 March 1946
Following the Allies’ victory in World War II, the European
continent was soon divided into two broad zones of influence, with
Eastern Europe coming under communist Soviet control, and the west
under the oversight of the liberal democracies led by the United
States. What developed over the next 40 years was a military and
ideological stand-off that defined Europe and much of the world
until 1989. In countries such as Germany, the Cold War divided
families between the two zones of control. The two opponents
competed for global dominance, building up ever greater arsenals of
nuclear weapons, funding and fighting costly proxy wars in
Southeast Asia, Africa and Central America, deploying espionage and
trade embargoes, and even seeking technological advantage in space
exploration, which became known as the “Space Race”. The Cold
War provides a pictorial examination of this crucial era in 20th
century history, offering the reader an instant understanding of
the key events and figures in this 40-year period through 150
dramatic photographs.
Emerging as an effective alternative to organization-based
information systems, cloud computing has been adopted by many
businesses around the world. Despite the increased popularity,
there remain concerns about the security of data in the cloud since
users have become accustomed to having control over their hardware
and software. Security, Trust, and Regulatory Aspects of Cloud
Computing in Business Environments compiles the research and views
of cloud computing from various individuals around the world.
Detailing cloud security, regulatory and industry compliance, and
trust building in the cloud, this book is an essential reference
source for practitioners, professionals, and researchers worldwide,
as well as business managers interested in an assembled collection
of solutions provided by a variety of cloud users.
The claim by the Ministry of Defence in 2001 that 'the experience
of numerous small wars has provided the British Army with a unique
insight into this demanding form of conflict' unravelled
spectacularly in Iraq and Afghanistan. One important reason for
that, David French suggests, was because contemporary British
counter-insurgency doctrine was based upon a serious misreading of
the past.
Until now, many observers believed that during the wars of
decolonisation in the two decades after 1945, the British had
discovered how western liberal notions of right and wrong could be
made compatible with the imperatives of waging war amongst the
people, that force could be used effectively but with care, and
that a more just and prosperous society could emerge from these
struggles. By using only the minimum necessary force, and doing so
with the utmost discrimination, the British were able to win by
securing the 'hearts and minds' of the people. But this was a
serious distortion of actual British practice on the ground. David
French's main contention is that the British hid their use of naked
force behind a carefully constructed veneer of legality. In
reality, they commonly used wholesale coercion, including cordon
and search operations, mass detention without trial, forcible
population resettlement, and the creation of free-fire zones to
intimidate and lock-down the civilian population. The British waged
their counter-insurgency campaigns by being nasty, not nice, to the
people.
The British Way in Counter-Insurgency is a seminal reassessment of
the historical foundation of British counter doctrine and practice.
Israel's military doctrine was aimed at defeating powerful Arab
militaries, mostly those of Egypt, Syria and Jordan. In the years
1948-1982 Israel and Arab states had a series of wars i.e. high
intensity wars. Israel, since 1948, also dealt with guerrilla and
terror attacks. Since 1982 and mostly in the last 15 years Israel
faced hybrid forces, Hamas and Hezbollah. Those groups are a mix
between a conventional military and a guerrilla group. Israel
fought against Hezbollah in Lebanon in 2006 and against Hamas in
the Gaza Strip, mostly in two wars, in 2008-2009 and in 2014. This
book begins with explaining Israel's national security policy. Then
it focuses on how the IDF (Israel defense forces) had to adjust its
doctrine and build up to confront hybrid forces, by examining
Israel's air and the ground corps and major issues such as offense
and defense, infrastructure and manpower. The IDF can inflict heavy
casualties and damages to a hybrid foe. Yet destroying the latter
is a tall order because Hezbollah and Hamas are too elusive, they
hide inside populated areas etc. However, compared with past wars
against Arab states, there is much less danger to Israel let alone
to its survival since even a coalition between Hezbollah, Hamas and
other groups can't defeat the IDF. Furthermore since fighting a
hybrid force is less demanding than running a high intensity war
against an Arab state, then Israel does not rely that much on the
United States in receiving weapon systems, ammunition and spare
parts.
A Sunday Times and FT Book of the Year
When a rising power threatens to displace a ruling one, the most likely outcome is war.
In this razor-sharp analysis, Harvard scholar Graham Allison examines the phenomenon known as Thucydides’s Trap, which is currently playing out between the world’s two biggest superpowers: the US and China.
Through uncanny historical parallels, Destined for War shows how close we are to the unthinkable. Yet, stressing that war is not inevitable, Allison also reveals how clashing powers have kept the peace in the past ― and what painful steps international leaders can and must take to avoid disaster.
The Marine Corps University symposium, "Counterinsurgency
Leadership in Iraq, Afghanistan, and beyond" held on September 23,
2009 at the National Press Club, Washington, DC explored ways to
improve counterinsurgency leadership, with particular attention to
the leaders of American, Afghan, and Iraqi forces.
The Symposium was sponsored by Marine Corps University and the
Marine Corps University Foundation.
This study uses a comparative analysis of the Malayan Emergency,
the American experience in Vietnam, and Operation IRAQI FREEDOM to
examine the role and effectiveness of artillery units in complex
counterinsurgency environments. Through this analysis, four factors
emerge which impact the employment of artillery units: the
counterinsurgency effort's requirement for indirect fires;
constraints and limitations on indirect fires; the
counterinsurgency effort's force organization; and the conversion
cost of nonstandard roles for artillery units. In conclusion, the
study offers five broadly descriptive fundamentals for employing
artillery units in a counterinsurgency environment: invest in
tactical leadership, exploit lessons learned, support the
operational approach and strategic framework, maintain pragmatic
fire support capability, and minimize collateral damage. Finally,
the study examines the role of education for leaders in a
counterinsurgency, and its influence on these imperative
fundamentals.
This handbook reveals the techniques and tactics that make the U.S.
Army Special Forces some of the most elite and highly skilled
soldiers in the world. Trained to succeed in specialized operations
such as reconnaissance, unconventional warfare, and
counter-terrorism, these soldiers undergo a rigorous selection
process and operate under the principles of self-sufficiency,
stealth, speed, and teamwork. Here readers will discover how
guerrilla forces differ from special forces and how unconventional
warfare relates to both; how to conduct a raid; how to improvise
explosive devices; and how special forces carry out air operations.
|
|