![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This edited book examines the East German foreign intelligence service (Hauptverwaltung Aufkl?rung, or HVA) as a historical problem, covering politics, scientific-technical and military intelligence and counterintelligence. The contributors broaden the conventional view of East German foreign intelligence as driven by the inter-German conflict to include its targeting of the United States, northern European and Scandinavian countries, highlighting areas that have previously received scant attention, like scientific-technical and military intelligence. The CIA's underestimation of the HVA was a major intelligence failure. As a result, East German intelligence served as a stealth weapon against the US, West German and NATO targets, acquiring the lion's share of critical Warsaw Pact intelligence gathered during the Cold War. This book explores how though all of the CIA's East German sources were double agents controlled by the Ministry of State Security, the CIA was still able to declare victory in the Cold War. Themes and topics that run through the volume include the espionage wars; the HVA's relationship with the Russian KGB; successes and failures of the BND (West German Federal Intelligence Service) in East Germany; the CIA and the HVA; the HVA in countries outside of West Germany; disinformation and the role and importance of intelligence gathering in East Germany. This book will be of much interest to students of East Germany, Intelligence Studies, Cold War History and German politics in general. Kristie Macrakis is Professor at the Georgia Institute of Technology, Atlanta. Thomas Wegener Friis is an Assistant Professor at the University of Southern Denmark's Centre for Cold War Studies. Helmut M?ller-Enbergs is currently a Visiting Professor at the University of Southern Denmark and holds a tenured senior staff position at the German Federal Commission for the STASI Archives in Berlin.
This edited volume focuses on India's experiences waging counterinsurgency campaigns since its independence in 1947. Filling a clear gap in the literature, the book traces and assess the origins, evolution and current state of India's counterinsurgency strategies and capabilities, focusing on key counterinsurgency campaigns waged by India within and outside its territory. It also analyzes the development of Indian doctrine on counterinsurgency, and locates this within the overall ebb and flow of India's defense and security policies. The central argument is that counterinsurgency has been an integral part of India's overall security policy and can thereby impart much to political and military leaders in other states. Since its emergence from British colonialism, India's defence policies have not merely sought to protect and preserve India's inherited colonial borders from threats by rival states, but have also sought to prevent and suppress secessionist movements. In countering insurgencies, the Indian state has fashioned strategies that seek to repress militarily any secessionist movement, while simultaneously forging a range of civilian administrative and institutional arrangements that attempt to address the grievances of disaffected populations. The book highlights key strategic and tactical innovations that the Indian Army and security forces made to deal with a range of insurgent movements. Simultaneously, it also examines how the civilian-military nexus enabled India's policy makers to utilize existing, and formulate novel, institutional means to address extant political grievances. India has been most successful where it has managed to use calibrated force, obtained the trust of much of the aggrieved population and made persuasive commitments to political and institutional reform. Examination of these elements of India's counterinsurgency performance can be compared to counterinsurgency doctrine developed by other countries, including the United States, and thus yield comparative policy prescriptions and recommendations that can be applied to other counterinsurgency contexts. This book will be of great interest to students of counterinsurgency and irregular warfare, Indian politics, Asian Security Studies and Strategic Studies in general.
To capture the defense reform debate surrounding the proper application of high technology in military systems, this study focuses on tactical aircraft, an area epitomizing cutting-edge technology. Air combat history is revisited (including the 1991 Persian Gulf War) to confirm, reject, or qualify positions advocating certain technologies in tactical aviation. Emphasis is placed on enduring combat ideas and aircraft design principles. The interaction between mission requirements, inventory composition, and aircraft design is discussed to illustrate the dynamics of constrained choice that enters acquisition decisions. The relevance of reform arguments in the post-Cold War era is assessed, including the impact of political and economic constraints on future force-mix options, the shift from NATO-centered contingencies to Third World Low Intensity Conflict (LIC), and the threat of conventional arms proliferation.
This edited volume introduces the reader to the role of space in military and defense strategy, and outlines some of the major foreign and domestic actors in the space arena, as well as constraints of law and treaties on activities in space. It also addresses science and technology as they relate to space policy. The book addresses three main questions:
This book fills a niche in the space policy field, providing insights into space and strategy from international experts from the military, academic and scientific communities. A unique feature of the book is the chapter on science and technology, which utilizes the latest information available concerning space utilization and exploration.
This book explores the idea of a revolution in military affairs (RMA), which underpins the transformational agenda of the US military, and examines its implications for smaller states. The strategic studies literature on the RMA tends to be American-centric and directed towards the strategic problems of the US military. This volume seeks to fill the gap in the literature and establish an intellectual framework that can assist other, smaller powers in their respective approaches to this issue. The book does so in three main sections; Part I focuses on questions of transformations in strategy and war; Part II explores transformations in operations; while Part III examines possible impediments to an RMA. This book will be of much interest to students of Military Studies, Asian Studies, Strategic Studies and International Relations in general.
French security policy has posed a puzzle to many people outside France, including politicians and even defense specialists such as the author, who took time off from his administrative position in Whitehall in order to study French thinking about security in detail. As with many other studies, he takes as his point of departure the traumatic defeat of 1940 but argues that the origins of current French policy are grounded in events and ideas that go back hundreds of years. They are ideas that are scarcely known or often misinterpreted in the Anglo-Saxon world.
This is a wide-ranging study of how the British were more successful in managing the strains of modern industrial war than the French. The book addresses such current historical debates as the nature of the political Right and Left in Europe during the 1930s, the extent of rearmament and economic mobilization, and the causes of France's defeat in 1940.
This book uses history in two ways: as the source of ideas about strategy and as examples to illustrate the elements by showing their application to specific campaigns and their utility in understanding the role of strategy in military operations. The focus is on American military campaigns from the American Indian Wars to the War in the Gulf. Those case studies are used to illustrate the strategy behind land, sea, and air campaigns. Over a fifth of the book examines the U.S. war against Japan because it furnishes such fine examples of independent and interdependent operations on land, on the sea, and in the air. The cases studied are not only intended to illustrate strategic ideas but also to show the utility of the author's distinctive approach to organizing military strategy. The book will appeal to military professionals, students of military science, and enthusiasts.
During the last two decades, the infrastructure of the U.S. economy has undergone a fundamental set of changes. It has steadily increased its reliance on its service sector and high-technology economy. The U.S. has come to depend on computers, electronic data storage and transfers, and highly integrated communications networks. The result is the rapid development of a new form of critical infrastructure--and one that is exceedingly vulnerable to a new family of threats, loosely grouped together as information warfare. This detailed volume examines these threats and the evolving U.S. policy response. After examining the dangers posed by information warfare and efforts at threat assessment, Cordesman considers the growing policy response on the part of various federal agencies, state and local governments, and the private sector. The changing nature of the threats is leading these actors to reassess the role they must play in critical infrastructure protection. Government at all levels, industry, and even friendly and neutral foreign governments are learning that an effective response requires coordination in deterrence, defense, and counterattack.
The focus of this cutting-edge book is on new, information-age technologies that promise to offer seamless integration of real-time data sharing, creating a single logical network architecture to facilitate the movement of data throughout the battlespace. Because the structure of this network is constrained by the fundamental trade-off between range, mobility and capacity that applies to all communications systems, this network is unlikely to be based on a single network technology. This book presents an architecture for this network, and shows how its subsystems can be integrated to form a single logical network.
The Common Security and Defence Policy (CSDP) has come a long way since its inception as the European Security and Defence Identity under NATO. Yet more than a decade after emerging as an autonomous entity, with its own capacity for civilian crisis management and military action, the European Union's CSDP is still very much a work in progress. This fully revised and updated new edition provides the most comprehensive account available of the CSDP and the debates surrounding it. Written by a leading authority in the field, the second edition draws on the author's own extensive research in the area, including hundreds of interviews with key actors, and takes account of developments since the reforms of the Lisbon Treaty. A brand new chapter assesses international relations theory and European integration theory as tools to understand the CSDP, and critically engages with theoretical approaches that view security and defence policy as the exclusive domain of sovereign nation-states. The book concludes with an analysis of future hurdles for the European Union as it responds to new and often unpredictable crises across the globe.
Describing the radical transformation in German Infantry tactics that took place during World War I, this book presents the first detailed account of the evolution of stormtroop tactics available in English. It covers areas previously left unexplored: the German Infantry's tactical heritage, the squad's evolution as a tactical unit, the use of new weapons for close combat, the role of the elite assault units in the development of new tactics, and detailed descriptions of offensive battles that provided the inspiration and testing ground for this new way of fighting. Both a historical investigation and a standard of excellence in infantry tactics, Stormtroop Tactics is required reading for professional military officers and historians as well as enthusiasts. Contrary to previous studies, Stormtroop Tactics proposes that the German Infantry adaption to modern warfare was not a straightforward process resulting from the top down intervention of reformers but instead a bottom up phenomenon. It was an accumulation of improvisations and ways of dealing with pressing situations that were later sewn together to form what we now call Blitzkrieg. Focusing on action at the company, platoon, and squad level, Stormtroop Tactics provides a detailed description of the evolution of German defensive tactics during World War I--tactics that were the direct forbears of those used in World War II.
This book is about Europe's apparent inability to cope with the complex international environment. Why does the Union fail to create a workable (sound) Common Foreign and Security Policy? Five distinct explanations for Euro-paralysis are considered, focusing on power politics, the assertion of national interests, misguided institutional designs, a crisis of modern democracy, and the post-Cold War conceptual confusion.
The successful application of the Fifth Generation of Warfare (5GW) is "indistinguishable from magic" (Rees 2009, following in the spirit of Clarke's Law, propounded by the author of 2001: A Space Odyssey) "any sufficiently advanced technology is indistinguishable from magic"). The Fifth-Generation warrior hides in the shadows, or in the static. So, then, how can analysts and researchers study and discuss 5GW? Other questions also demand answers. What is the xGW framework, which many theorists use to describe 5GW? What alternatives to the xGW framework exist? What 5GWs have been observed? What are the source documents for the xGW framework? What is the universe of discourse that the xGW framework emerged from? Why bother trying to understand 5GW? This handbook attempts to provide systematic answers to these questions in several major sections, each of which is written by many contributors. While this handbook records many different voices of 5GW research, it speaks with one voice on the need to understand 5GW, the fifth gradient of warfare.
The attempted Greek takeover of Cyprus, Turkey's military invasion and occupation of that country, and the Turkish arms embargo that followed during the summer of 1974 sparked a struggle over the direction of American foreign policy. Paul Y. Watanabe explores the American foreign policymaking process in general and the impact ethnic group activism can have on foreign policy formulation in particular in his two-part study Ethnic Groups, Congress, and American Foreign Policy. In Part 1, he focuses on the rise of ethnic consciousness and activism, organizational behavior and interest group politics, lobbying, congressional-executive relations, the foreign policymaking process, and national security policy. Part 2 deals with a specific example of ethnic group activity in the foreign policymaking arena--Greek American and congressional attempts to ban further military shipments to Turkey. Watanabe concludes that ethnic groups can and do make significant contributions to the formulation of foreign policy by affecting the perceptions and actions of officials in Congress and the executive branch.
The global distribution of power is changing. But how should we make sense of this moment of transition? With the rise of new powers and the decline of seemingly unchallenged US dominance in world politics, a conventional wisdom is gaining ground that a new multipolar order is taking shape. Yet multipolarity - an order with multiple centres of power - is variously used as a description of the current distribution of power, of the likely shape of a future global order, or even as a prescription for how power 'should' be distributed in the international system. To understand the power of the different - and sometimes competing - narratives on offer today about the changing global order, a global perspective is necessary. This book explores how the concept of a multipolar order is being used for different purposes in different national contexts. From rising powers to established powers, contemporary debates are analysed by a set of leading scholars to provide in-depth insight into the use and abuse of a widely employed but rarely explored concept. -- .
While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.
A comparison of Singapore and Taiwan presents an interesting case study for those wishing to understand how small states struggle to overcome their strategic disadvantage. Since their independence, Singapore and Taiwan have faced numerous challenges resulting from their relative strategic disadvantage. They have struggled to overcome vulnerable bases, an unformed conception of state, and weak governmental institutes for defence. While territorial borders are difficult to change, both states have focused on nation building, economic growth, and military build-up in order to overcome their predicaments. During the Cold War, both states employed similarly authoritarian policies to preserve their survival. However, in the post-Cold War era, Taiwan has experienced political and economic weakness in the face of the rising China, while Singapore, with its polity of one-party domination, has continued to strengthen its hard and soft power. This book examines the unique context for each case, drawing comparisons and offering analysis of their distinct approaches.
This original and detailed collection explores how regional actors deal with uncertainties that are inherent to the current geopolitical situation in East Asia. The contributors collectively demonstrate that strategic uncertainty has become a major factor in the shaping of the security order in East Asia.
The second of a series, this study analyzes the historical relationships between the provision of military assistance and success in achieving Soviet aims during the Cold War. Mott looks at Soviet donor-recipient relationships across seventeen case studies to identify the generalities or regularities that relate the classical wartime relationship to achievement of donor Cold War aims. He refines the four critical features of the wartime donor-recipient relationship--convergence of donor and recipient aims, donor control, commitment of donor military forces, and coherence of donor policies and strategies--to reflect the unique political economic constraints of the Cold War. Findings challenge orthodox separation of politics, history, military science, and economics, and refute the common wisdom that economic aid is a more effective policy instrument than military assistance. Mott contends that both successes and failures of Cold War Soviet military assistance were predictable, explicit consequences of donor policies and strategies and of convergence of donor and recipient aims. This book presents a pattern for both policy development and theoretical analysis in which military assistance is a viable, robust policy option and bilateral relationship with a clear set of requirements, features, processes, and predictable results. Its primary methodology is the search for uniformities across historical observations through low-level, ordinary, multivariate regressions. Each chapter focuses on Soviet military assistance in a region and refines the relevant features of the observed relationships into a tentative pattern for comparison with other regions.
In Bracing for Armageddon, Dee Garrison pulls back the curtain on the U.S. government's civil defense plans from World War II through the end of the Cold War. Based on government documents, peace organizations, personal papers, scientific reports, oral histories, newspapers, and popular media, her book chronicles the operations of the various federal and state civil defense programs from 1945 to contemporary issues of homeland security, as well as the origins and development of the massive public protest against civil defense from 1955 through the 1980s. At a time of increasing preoccupation over national security issues, Bracing for Armageddon sheds light on the growing distrust between the U.S. government and its subjects in postwar America.
This book brings together leading academic specialists and policy
practitioners to explore and develop cooperative approaches for
managing critical contemporary and emerging security challenges for
South East Europe and the wider international community.
The wars between 1792 and 1815 saw the making of the modern world, with Britain and Russia the key powers to emerge triumphant from a long period of bitter conflict. In this innovative book, Jeremy Black focuses on the strategic contexts and strategies involved, explaining their significance both at the time and subsequently. Reinterpreting French Revolutionary and Napoleonic warfare, strategy, and their consequences, he argues that Napoleon's failure owed much to his limitations as a strategist. Black uses this framework as a foundation to assess the nature of warfare, the character of strategy, and the eventual ascendance of Britain and Russia in this period. Rethinking the character of strategy, this is the first history to look holistically at the strategies of all the leading belligerents from a global perspective. It will be an essential read for military professionals, students, and history buffs alike. |
![]() ![]() You may like...
|