![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
To capture the defense reform debate surrounding the proper application of high technology in military systems, this study focuses on tactical aircraft, an area epitomizing cutting-edge technology. Air combat history is revisited (including the 1991 Persian Gulf War) to confirm, reject, or qualify positions advocating certain technologies in tactical aviation. Emphasis is placed on enduring combat ideas and aircraft design principles. The interaction between mission requirements, inventory composition, and aircraft design is discussed to illustrate the dynamics of constrained choice that enters acquisition decisions. The relevance of reform arguments in the post-Cold War era is assessed, including the impact of political and economic constraints on future force-mix options, the shift from NATO-centered contingencies to Third World Low Intensity Conflict (LIC), and the threat of conventional arms proliferation.
This edited volume introduces the reader to the role of space in military and defense strategy, and outlines some of the major foreign and domestic actors in the space arena, as well as constraints of law and treaties on activities in space. It also addresses science and technology as they relate to space policy. The book addresses three main questions:
This book fills a niche in the space policy field, providing insights into space and strategy from international experts from the military, academic and scientific communities. A unique feature of the book is the chapter on science and technology, which utilizes the latest information available concerning space utilization and exploration.
This is a wide-ranging study of how the British were more successful in managing the strains of modern industrial war than the French. The book addresses such current historical debates as the nature of the political Right and Left in Europe during the 1930s, the extent of rearmament and economic mobilization, and the causes of France's defeat in 1940.
This book explores the idea of a revolution in military affairs (RMA), which underpins the transformational agenda of the US military, and examines its implications for smaller states. The strategic studies literature on the RMA tends to be American-centric and directed towards the strategic problems of the US military. This volume seeks to fill the gap in the literature and establish an intellectual framework that can assist other, smaller powers in their respective approaches to this issue. The book does so in three main sections; Part I focuses on questions of transformations in strategy and war; Part II explores transformations in operations; while Part III examines possible impediments to an RMA. This book will be of much interest to students of Military Studies, Asian Studies, Strategic Studies and International Relations in general.
This book uses history in two ways: as the source of ideas about strategy and as examples to illustrate the elements by showing their application to specific campaigns and their utility in understanding the role of strategy in military operations. The focus is on American military campaigns from the American Indian Wars to the War in the Gulf. Those case studies are used to illustrate the strategy behind land, sea, and air campaigns. Over a fifth of the book examines the U.S. war against Japan because it furnishes such fine examples of independent and interdependent operations on land, on the sea, and in the air. The cases studied are not only intended to illustrate strategic ideas but also to show the utility of the author's distinctive approach to organizing military strategy. The book will appeal to military professionals, students of military science, and enthusiasts.
During the last two decades, the infrastructure of the U.S. economy has undergone a fundamental set of changes. It has steadily increased its reliance on its service sector and high-technology economy. The U.S. has come to depend on computers, electronic data storage and transfers, and highly integrated communications networks. The result is the rapid development of a new form of critical infrastructure--and one that is exceedingly vulnerable to a new family of threats, loosely grouped together as information warfare. This detailed volume examines these threats and the evolving U.S. policy response. After examining the dangers posed by information warfare and efforts at threat assessment, Cordesman considers the growing policy response on the part of various federal agencies, state and local governments, and the private sector. The changing nature of the threats is leading these actors to reassess the role they must play in critical infrastructure protection. Government at all levels, industry, and even friendly and neutral foreign governments are learning that an effective response requires coordination in deterrence, defense, and counterattack.
The focus of this cutting-edge book is on new, information-age technologies that promise to offer seamless integration of real-time data sharing, creating a single logical network architecture to facilitate the movement of data throughout the battlespace. Because the structure of this network is constrained by the fundamental trade-off between range, mobility and capacity that applies to all communications systems, this network is unlikely to be based on a single network technology. This book presents an architecture for this network, and shows how its subsystems can be integrated to form a single logical network.
Describing the radical transformation in German Infantry tactics that took place during World War I, this book presents the first detailed account of the evolution of stormtroop tactics available in English. It covers areas previously left unexplored: the German Infantry's tactical heritage, the squad's evolution as a tactical unit, the use of new weapons for close combat, the role of the elite assault units in the development of new tactics, and detailed descriptions of offensive battles that provided the inspiration and testing ground for this new way of fighting. Both a historical investigation and a standard of excellence in infantry tactics, Stormtroop Tactics is required reading for professional military officers and historians as well as enthusiasts. Contrary to previous studies, Stormtroop Tactics proposes that the German Infantry adaption to modern warfare was not a straightforward process resulting from the top down intervention of reformers but instead a bottom up phenomenon. It was an accumulation of improvisations and ways of dealing with pressing situations that were later sewn together to form what we now call Blitzkrieg. Focusing on action at the company, platoon, and squad level, Stormtroop Tactics provides a detailed description of the evolution of German defensive tactics during World War I--tactics that were the direct forbears of those used in World War II.
From the author of the Pulitzer Prize-winning history The Dead Hand comes the riveting story of a spy who cracked open the Soviet military research establishment and a penetrating portrait of the CIA's Moscow station, an outpost of daring espionage in the last years of the Cold War While driving out of the American embassy in Moscow on the evening of February 16, 1978, the chief of the CIA's Moscow station heard a knock on his car window. A man on the curb handed him an envelope whose contents stunned U.S. intelligence: details of top-secret Soviet research and developments in military technology that were totally unknown to the United States. In the years that followed, the man, Adolf Tolkachev, an engineer in a Soviet military design bureau, used his high-level access to hand over tens of thousands of pages of technical secrets. His revelations allowed America to reshape its weapons systems to defeat Soviet radar on the ground and in the air, giving the United States near total superiority in the skies over Europe. One of the most valuable spies to work for the United States in the four decades of global confrontation with the Soviet Union, Tolkachev took enormous personal risks--but so did the Americans. The CIA had long struggled to recruit and run agents in Moscow, and Tolkachev was a singular breakthrough. Using spy cameras and secret codes as well as face-to-face meetings in parks and on street corners, Tolkachev and his handlers succeeded for years in eluding the feared KGB in its own backyard, until the day came when a shocking betrayal put them all at risk. Drawing on previously secret documents obtained from the CIA and on interviews with participants, David Hoffman has created an unprecedented and poignant portrait of Tolkachev, a man motivated by the depredations of the Soviet state to master the craft of spying against his own country. Stirring, unpredictable, and at times unbearably tense, The Billion Dollar Spy is a brilliant feat of reporting that unfolds like an espionage thriller.
The Common Security and Defence Policy (CSDP) has come a long way since its inception as the European Security and Defence Identity under NATO. Yet more than a decade after emerging as an autonomous entity, with its own capacity for civilian crisis management and military action, the European Union's CSDP is still very much a work in progress. This fully revised and updated new edition provides the most comprehensive account available of the CSDP and the debates surrounding it. Written by a leading authority in the field, the second edition draws on the author's own extensive research in the area, including hundreds of interviews with key actors, and takes account of developments since the reforms of the Lisbon Treaty. A brand new chapter assesses international relations theory and European integration theory as tools to understand the CSDP, and critically engages with theoretical approaches that view security and defence policy as the exclusive domain of sovereign nation-states. The book concludes with an analysis of future hurdles for the European Union as it responds to new and often unpredictable crises across the globe.
This book is about Europe's apparent inability to cope with the complex international environment. Why does the Union fail to create a workable (sound) Common Foreign and Security Policy? Five distinct explanations for Euro-paralysis are considered, focusing on power politics, the assertion of national interests, misguided institutional designs, a crisis of modern democracy, and the post-Cold War conceptual confusion.
The successful application of the Fifth Generation of Warfare (5GW) is "indistinguishable from magic" (Rees 2009, following in the spirit of Clarke's Law, propounded by the author of 2001: A Space Odyssey) "any sufficiently advanced technology is indistinguishable from magic"). The Fifth-Generation warrior hides in the shadows, or in the static. So, then, how can analysts and researchers study and discuss 5GW? Other questions also demand answers. What is the xGW framework, which many theorists use to describe 5GW? What alternatives to the xGW framework exist? What 5GWs have been observed? What are the source documents for the xGW framework? What is the universe of discourse that the xGW framework emerged from? Why bother trying to understand 5GW? This handbook attempts to provide systematic answers to these questions in several major sections, each of which is written by many contributors. While this handbook records many different voices of 5GW research, it speaks with one voice on the need to understand 5GW, the fifth gradient of warfare.
The attempted Greek takeover of Cyprus, Turkey's military invasion and occupation of that country, and the Turkish arms embargo that followed during the summer of 1974 sparked a struggle over the direction of American foreign policy. Paul Y. Watanabe explores the American foreign policymaking process in general and the impact ethnic group activism can have on foreign policy formulation in particular in his two-part study Ethnic Groups, Congress, and American Foreign Policy. In Part 1, he focuses on the rise of ethnic consciousness and activism, organizational behavior and interest group politics, lobbying, congressional-executive relations, the foreign policymaking process, and national security policy. Part 2 deals with a specific example of ethnic group activity in the foreign policymaking arena--Greek American and congressional attempts to ban further military shipments to Turkey. Watanabe concludes that ethnic groups can and do make significant contributions to the formulation of foreign policy by affecting the perceptions and actions of officials in Congress and the executive branch.
Complete set Since 1961 the Adelphi Papers have provided some of the most informed accounts of international and strategic relations. Produced by the world renowned International Institute of Strategic Studies, each paper provides a short account of a subject of topical interest by a leading military figure, policy maker or academic. The project reprints the first forty years of papers, arranged into thematic sets. The collection as a whole provides a rich and insightful account of international affairs during a period which spans the second half of the Cold War, the fall of the communist bloc and the emergence of a new regime with the United States as the sole superpower. There is a wealth of global coverage: Four volumes on east and southeast Asia as well as individual volumes on China, Japan and Korea Particular attention is given to the Middle East, with volumes addressing internal sources of instability; geo-politics and the role of the superpowers; the Israel-Palestine conflict; and the Iran-Iraq War and the first Gulf War. There is also a volume on oil and insecurity There are also two volumes on Africa, the site of most of the world's wars during the period. The IISS has obviously made a particular contribution to the understanding of military strategy, and this is reflected with material on topics such as urban and guerrilla warfare, nuclear deterrence and the role of information in modern warfare. Volumes on military strategy are complemented by approaches from other disciplines, such as defence economics. Key selling points: Early papers were only distributed by the IISS and will have achieved limited penetration of the academic market A host of major authors on a range of different subjects (eg Gerald Segal on China, Michael Leifer on Southeast Asia, Sir Lawrence Freidman on the revolution in military affairs, Raymond Vernon on multinationals and defence economics) Individual volumes will have a strong appeal to different markets (eg the volume on defence economics for economists, various volumes for Asian Studies etc)
While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.
This unique book presents an accurate and reliable assessment of the Special Operations Executive (SOE). It brings together leading authors to examine the organization from a range of key angles. This study shows how historians have built on the first international conference on the SOE at the Imperial War Museum in 1998. The release of many records then allowed historians to develop the first authoritative analyses of the organization's activities and several of its agents and staff officers were able to participate. Since this groundbreaking conference, fresh research has continued and its original papers are here amended to take account of the full range of SOE documents that have been released to the National Archives. The fascinating stories they tell range from overviews of work in a single country to particular operations and the impact of key personalities. SOE was a remarkably innovative organization. It played a significant part in the Allied victory while its theories of clandestine warfare and specialised equipment had a major impact upon the post-war world. SOE proved that war need not be fought by conventional methods and by soldiers in uniform. The organization laid much of the groundwork for the development of irregular warfare that characterized the second half of the twentieth century and that is still here, more potent than ever, at the beginning of the twenty-first. This book will be of great interest to students of World War II history, intelligence studies and special operations, as well as general readers with an interest in SOE and World War II.
A comparison of Singapore and Taiwan presents an interesting case study for those wishing to understand how small states struggle to overcome their strategic disadvantage. Since their independence, Singapore and Taiwan have faced numerous challenges resulting from their relative strategic disadvantage. They have struggled to overcome vulnerable bases, an unformed conception of state, and weak governmental institutes for defence. While territorial borders are difficult to change, both states have focused on nation building, economic growth, and military build-up in order to overcome their predicaments. During the Cold War, both states employed similarly authoritarian policies to preserve their survival. However, in the post-Cold War era, Taiwan has experienced political and economic weakness in the face of the rising China, while Singapore, with its polity of one-party domination, has continued to strengthen its hard and soft power. This book examines the unique context for each case, drawing comparisons and offering analysis of their distinct approaches.
The second of a series, this study analyzes the historical relationships between the provision of military assistance and success in achieving Soviet aims during the Cold War. Mott looks at Soviet donor-recipient relationships across seventeen case studies to identify the generalities or regularities that relate the classical wartime relationship to achievement of donor Cold War aims. He refines the four critical features of the wartime donor-recipient relationship--convergence of donor and recipient aims, donor control, commitment of donor military forces, and coherence of donor policies and strategies--to reflect the unique political economic constraints of the Cold War. Findings challenge orthodox separation of politics, history, military science, and economics, and refute the common wisdom that economic aid is a more effective policy instrument than military assistance. Mott contends that both successes and failures of Cold War Soviet military assistance were predictable, explicit consequences of donor policies and strategies and of convergence of donor and recipient aims. This book presents a pattern for both policy development and theoretical analysis in which military assistance is a viable, robust policy option and bilateral relationship with a clear set of requirements, features, processes, and predictable results. Its primary methodology is the search for uniformities across historical observations through low-level, ordinary, multivariate regressions. Each chapter focuses on Soviet military assistance in a region and refines the relevant features of the observed relationships into a tentative pattern for comparison with other regions.
This original and detailed collection explores how regional actors deal with uncertainties that are inherent to the current geopolitical situation in East Asia. The contributors collectively demonstrate that strategic uncertainty has become a major factor in the shaping of the security order in East Asia.
We live in an age of subterfuge. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm. Even before the 2016 election, he warned that Russian military intelligence was 'carefully planning and timing a high-stakes political campaign' to disrupt the democratic process. But as crafty as such so-called active measures have become, they are not new. In this astonishing journey through a century of secret psychological war, Rid reveals for the first time some of history's most significant operations - many of them nearly beyond belief. A White Russian ploy backfires and brings down a New York police commissioner; a KGB-engineered, anti-Semitic hate campaign creeps back across the Berlin Wall; the CIA backs a fake publishing empire, run by a former Wehrmacht U-boat commander that produces Germany's best jazz magazine.
This book brings together leading academic specialists and policy
practitioners to explore and develop cooperative approaches for
managing critical contemporary and emerging security challenges for
South East Europe and the wider international community.
How should Israel respond to the changing external threats that confront it? This paper argues that the country's traditional security concept is obsolete and must be reformulated. How this is achieved depends on developments within the Middle East and on the outcome of current shifts in Israel's politics and society. |
![]() ![]() You may like...
White Flag? - An Examination of the UK's…
Michael Ashcroft, Isabel Oakeshott
Hardcover
![]()
|