![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This book examines the role of Chamberlain and the National Government in responding to the strategic problems created by the emergence of a two-front danger from Germany and Japan. It focuses on the first defence requirements enquiry of 1933-4, when rearmament foundations were laid and foreign policy redefined. It explores the inter-relationship between the different departments of state, and between individuals, in the formulation of policy at a time of crisis, and sheds light on the debate about appeasement.
The collapse of communism in Eastern Europe, the unification of Germany, the withdrawal of Soviet troops, the possible disintegration of the Soviet Union, disengagement of the United States and creation of a federal Europe - all this has changed the security context in Europe and stimulated a Europe-wide debate about the future. Questions about the nature of security itself have been raised. The authors question, however, why none of these themes have been raised in Britain? A comparison with Germany shows that there is now a similar spread of party political opinion in the two countries, reflecting a rapid convergence of security interests. Beyond Deterrence argues that it is time that there was also a similar level of public debate.
For more than 50 years now, Israel's national security conception has changed very little. Its stability derives from its overall success in meeting a variety of challenges throughout this period, and from the fact that the conditions on the basis of which it had originally been formed remained roughly the same.
Initially published on the eve of the German blitzkrieg against France in 1940, this analysis of the German doctrine of defense as it evolved in 1915-1918 is often overlooked because of its misleading title. No understanding of the failure of the Allied offensives on the Western Front in World War I is adequate without reference to this work which explores the problem from the German point of view.
The pioneering essays in this volume explore national security challenges posed by new technologies and examine some ongoing efforts to understand and mitigate their potential negative effects. The authors, drawn from among a roster of international scholars, approach these issues from different yet ultimately complementary angles. Turkish scholar Emin Daskin chronicles the efforts of the Turkish government to develop and implement a Cyber Security Strategy aimed at protecting the country from attacks by both governmental and non-governmental cyber actors. French researcher Christine Dugoin-Clement has studied what she views as a successful case of cyberwarfare, in which Ukrainian soldiers fighting in the eastern separatist region of Donbass have been targeted by cyber attackers attempting to deteriorate their cognition, rendering them less effective in the field. Another French author and military academy instructor, Thomas Flichy de La Neuville, provides a counterpoint study of militarized motorbike attacks in the Sahel, demonstrating that cyberspace is not the only technological sphere in which innovation increasingly threatens security. Finally, American academic Christopher Whyte offers a trenchant critique of current academic studies of cyberterrorism, noting that while "cyberterrorism" appears frequently as a subject of research, the actual work being carried out in this critical area lacks thematic nuance and is only tenuously linked to related major thematic topic areas. The collection highlights the unique challenges faced by countries as they attempt to deal with previously unknown adversaries, as both the nature of the enemy and the field of operations continues to shift with unprecedented speed. It will undoubtedly be of interest to anyone concerned with international relations, cybersecurity, cyberterrorism, and national security in the twenty-first century.
The fundamental issues of maritime strategy and naval power in the
Mediterranean, when considered over the broad spectrum of past,
present and future, clearly touch on the clash of civilizations. In
terms of the millennial political situation, this includes issues
of migration, the environment, geography, technology, economic
power and rivalries in those fields. It also touches on the
structure and interplay of international politics and international
law, as well as the traditional calculation of naval strength and
diplomatic manoeuvre. It is such broad and fundamental themes that
are explored in this volume, the product of the third Naval War
College-Yale conference on maritime and naval history.
The contributors to this overview of the changes in security studies reflect critically on the past decades since the 1980s and consider what the future holds, in a select few areas of security studies. In spite of the individuality of the approaches and spread of topics, the authors conclude that analysts and policy-makers have not been able to respond well to the changes that have occurred and that they must revise their approach is they are to meet the challenges of the future.
In the 25 years since the revelation of the so-called 'Ultra secret', the importance of codebreaking and signals intelligence in the diplomacy and military operations of the Second World War has become increasingly evident. Studies of wartime signals intelligence, however, have largely focused on Great Britain and the United States and their successes against, respectively, the German Enigma and Japanese Purple cipher machines. Drawing upon newly available sources in Australia, Britain, China, France and the United States, the articles in this volume demonstrate that the codebreaking war was a truly global conflict in which many countries were active and successful. They discuss the work of Australian, Chinese, Finnish, French and Japanese codebreakers, shed new light on the work of their American and British counterparts, and describe the struggle to apply technology to the problems of radio intercept and cryptanalysis. The contributions also reveal that, for the Axis as well as the Allies, success in the signals war often depended upon close collaboration among alliance partners.
Providing an invaluable introductory resource for students studying cyber warfare, this book highlights the evolution of cyber conflict in modern times through dozens of key primary source documents related to its development and implementation. This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare. The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare. Covers in detail one of the defining forms of conflict of the 21st century-cyber warfare will significantly impact virtually every American citizen over the next two decades Provides more than 90 primary source documents and matching analysis, allowing readers to investigate the underpinnings of cyber warfare Enables readers to see the development of different concepts of cyber warfare through its chronological organization Reflects the deep knowledge of an editor who is a noted expert in cyber warfare and has taught for the United States Air Force for more than a decade
In the 25 years since the revelation of the so-called 'Ultra secret', the importance of codebreaking and signals intelligence in the diplomacy and military operations of the Second World War has become increasingly evident. Studies of wartime signals intelligence, however, have largely focused on Great Britain and the United States and their successes against, respectively, the German Enigma and Japanese Purple cipher machines. Drawing upon newly available sources in Australia, Britain, China, France and the United States, the articles in this volume demonstrate that the codebreaking war was a truly global conflict in which many countries were active and successful. They discuss the work of Australian, Chinese, Finnish, French and Japanese codebreakers, shed new light on the work of their American and British counterparts, and describe the struggle to apply technology to the problems of radio intercept and cryptanalysis. The contributions also reveal that, for the Axis as well as the Allies, success in the signals war often depended upon close collaboration among alliance partners.
Charting the evolution of Britain's leading role in the formation of NATO, the book provides a balanced assessment of British foreign and defence policies as the Cold War gathered momentum and a new system of European security was forged in the aftermath of World War II. The author argues that, despite the obvious differences between the periods, there are important lessons to be learned from post-war diplomacy by today's statesmen as they struggle to build another system of European security in the post-Cold War era. The book is based on a wide range of British, American and Canadian archives. Other published works by the author include "British Defence Policy in a Changing World", "Soviet Strategy" (with G. Segal), "Alternative Approaches to British Defence Policy", "Anglo-American Defence Relations 1939-84", "Contemporary Strategy Vols I and II" (with G. Segal, J. Garnett and P. Williams), "Nuclear War and Nuclear Peace" (with G. Segal, E. Moreton and L. Freedman), "Britain, NATO and Nuclear Weapons" (with K. Booth), "British Defence Policy: Striking the Right Balance", "Makers of Nuclear Strategy" (with J. Garnett) and "Dilemmas of World Politics" (with N. Rengger).
The threat to use military force is a matter that commands immediate attention from many segments of government. Karsten, Howell, and Allen systematically analyze statistically significant numbers of actual cases to discover the determinants of success or failure of the threat to employ military force. After describing their methodology, they address several questions: what are the general characteristics of the typical threat? what types of threats succeed? what threats lead to war? did threats in the prenuclear past differ in outcome from those in the nuclear present? have the United States' threats differed substantially from those of other nations? can anything be said concerning the long-term consequences of the threats? In a concluding chapter the authors summarize their findings, compare them to the conventional wisdom, and then, as a test, apply them to six historical cases. They end their study with a look at the Solidarity and Falklands crises, and a theoretical scenario that suggests the significance of their findings.
In the desperate summer of 1942, Hitler seemed to be on the verge of victory in Russia and the Middle East. With Rommel nearing Cairo, a little known lieutenant-general, Bernard Montgomery, took charge of what Churchill called a "baffled and bewildered" British 8th Army. Assuming command, Montgomery issued his famous order, "Here we will stand and fight;...If we can't stay here alive, then let us stay here dead," and led the Army to one of the Allies' greatest victories--El Alamein. "Monty" became an instantly recognizable Allied leader, but as a man with strong views, unbending principles, and outspoken frankness, he was both loved and disliked, praised and criticized. This bibliography presents and evaluates the extensive body of literature that has grown up around the controversial Field Marshal. Any serious study of World War II military campaigns must confront Field Marshal Bernard Montgomery, an individualist with both admirers and detractors. This book provides an extensive historiographical overview of the literature in Part I and a bibliography of significant works in Part II. It is a basic reference and research guide for the student, scholar, and general reader.
The Bear Went Over the Mountain is a collection of vignettes
written by Soviet junior officers describing their experiences
fighting the Mujahideen guerrillas. The material was originally
collected and published by the Frunze Combined Arms Staff College
to serve as a text on combat against a guerrilla force in
mountain-desert terrain. It was originally intended for internal
use only and as such provides examples of both good and bad
military practice. The hard lessons learned are not specifically
'Russian' in nature and many of the same mistakes and successes
would apply equally to the American Army in Vietnam. Indeed, the
knowledge gained from these reports should also apply to future
conflicts involving civil war, guerrilla forces and rugged terrain.
The relationship of the United States and Great Britain has been the subject of numerous studies with a particular emphasis on the idea of a "special relationship" based on traditional common ties of language, history, and political affinity. Although certainly special, Anglo-American cooperation arose from mutual necessity. Soybel examines the "special relationship" through a new lens--that of the most intimate of wartime collaborations, the naval intelligence relationship. Rather than looking at the uses of intelligence and espionage, Soybel explores how the cooperation was established and maintained, particularly through the creation of administrative bureaucracies, as well as how World War I and pre-war efforts helped pave the way towards wartime cooperation. The development of the wartime cooperation in naval intelligence between 1939 and 1943 highlights the best and worst of the alliance and shows both its advantages and its limitations. It demonstrates that the Anglo-American partnership during World War II was a necessary one, and its intimacy demanded by the exigencies of the total war then being fought. Its problems were the result of traditional conflicts based on economics, imperial concerns, and national interests. Its successes found their bases in individual partnerships formed during the war, not in the overall one given mythical status by men like Winston Churchill. While still giving credit to the unique alliance that has survived in the last fifty years, this study shows that the close ties were necessary, not special.
This is the first scholarly work to focus purely on British military intelligence operations during the Crimean War. It details the beginnings of the intelligence operations as a result of the British Commander, Lord Raglan's need for information on the enemy. Charles Cattley, the recently expelled British Consul at the Crimean port of Kertch, supplied intelligence on Sevastopol's garrison, on Russian strength, dispositions and reinforcements throughout the Crimea. This system of long-range espionage and prisoner interrogation helped to ensure that the Allies were never caught off guard for the remainder of the war, and also directed their blows with some presicion, thus paving the way to victory. Even after the deaths of Raglan and Cattley before the fall of Sevastopol, the system continued to function and even expand its operations under the direction of other civilians and new commanders. This work demonstrates that intelligence was a fundamental part of the Crimean War and also that this war forms a significant chapter in the history of British intelligence.
Why did NATO expand its membership during the Cold War years, and what was its attraction to new members? This book locates the answers to these questions not solely in the Cold War, but in the historical problems of international order in Europe and the growing idea of the West. A wide range of sources is used, and the analysis looks at a process of neo-enlargement during NATO's inception as well as the formal accessions that followed.
Why has the military not intervened in the post-communist political arena since the advent of democracy in Russia? Do lowered levels of professionalism actually lead to higher levels of intervention? Through a systematic exploration of professionalism within the Russian military, this study addresses these important questions. Moran suggests that by examining the notion of subjective fragmentation, both Gorbachev and Yeltsin utilized a highly effective, yet potentially troublesome, form of civil-military control. Findings that overall levels of praetorian behavior on the part of the Russian military have declined in this period, in spite of declining levels of military professionalism, challenge one of the most basic theoretical assumptions of civil-military relations. Since 1991, post-communist Russia has exhibited all of the classic indicators of a society ripe for a military takeover. Not only have institutional interests of the Russian officer corps been gravely threatened, but surveys conducted within it have found a general lack of sympathy for democratic values. Furthermore, Russia's weak civil society is accompanied by high levels of corruption, rampant crime, secessionist movements, a significant terrorist threat, and a general disrespect for the rule of law. Even further augmenting the chances of a military coup d'^D'etat, public opinion polls of civilians have found that the military is one of the most trusted institutions in the country—so trusted, in fact, that many Russian citizens have expressed support for a military takeover. Moran explains why the military has not capitalized on these factors.
From 1918 to 1939 one issue dominated French foreign and defence policy: the German problem. This work outlines France's strategies for protection and appeasement during this period and places inter-war relations in a larger European context. With contributions from scholars in the field, it examines: relationships with key countries such as Italy and Russia; the significance of inter-war France to 20th-century European integration; the historical context of the policies; and the setbacks and defeats of the period and how they should be evaluated.
Cybersecurity is a complex and contested issue in international politics. By focusing on the 'great powers'--the US, the EU, Russia and China--studies in the field often fail to capture the specific politics of cybersecurity in the Middle East, especially in Egypt and the GCC states. For these countries, cybersecurity policies and practices are entangled with those of long-standing allies in the US and Europe, and are built on reciprocal flows of data, capital, technology and expertise. At the same time, these states have authoritarian systems of governance more reminiscent of Russia or China, including approaches to digital technologies centred on sovereignty and surveillance. This book is a pioneering examination of the politics of cybersecurity in the Middle East. Drawing on new interviews and original fieldwork, James Shires shows how the label of cybersecurity is repurposed by states, companies and other organisations to encompass a variety of concepts, including state conflict, targeted spyware, domestic information controls, and foreign interference through leaks and disinformation. These shifting meanings shape key technological systems as well as the social relations underpinning digital development. But however the term is interpreted, it is clear that cybersecurity is an integral aspect of the region's contemporary politics.
In the immediate post-World War II period, Army aviation began to evolve from an observatory role to a mobility role. Helicopter air mobility began to develop in the Army from 1949 onwards. The outbreak of the Korean war assisted and accelerated the acceptance of greater helicopter air mobility within the Army. The Eisenhower period was a golden age for Army aviation, with rapid and extensive developments in air mobility doctrine and tactics. There was also a strong research and development effort to overcome the initial technological lag. These developments allowed the formation of the first air mobile division in 1965 to meet the growing demands of the Vietnam war. This work gives a new understanding of the process of military innovation. Moreover, this case study has important general implications for future military policy-making.
This work contends that nations embroiled in Continental wars have historically had poor maritime strategies. After an analysis of existing literature on this subject and a discussion of case studies, Rear Admiral Menon develops the argument that those navies that have been involved in such wars have made poor contributions to the overall political objectives. Government neglect, inadequate funding and structures that are more appropriate to purely maritime wars are symptomatic of a universal strategic dilemma that arises from inadequate strategic theory.
An extraordinary tale, much-neglected by historians, of courage, bravery and eventual tragedy which took place during the First World War in the Middle East. It is the story of a small group of people, of whom Sarah and Aaron Aaronsohn were the core, who were devoted to the Yishuv, the Jewish community in Palestine, and who were convinced that it was in imminent danger of extinction from the Turks.They resolved to help the British in Egypt by collecting military intelligence. Unfortunately, as Peter Calvocoressi points out, their understanding of the British position was quite wrong...[their] miscalculations created the tragedy which this book recounts...'
This updated edition of Professor Paul Moorcraft s timely and controversial book examines the international and domestic threats to the West from Jihadism. It joins the dots in the Middle East, Asia and Africa and explains what it means for the home front, mainly Britain but also continental Europe and the USA. More Brits are trying to join the Islamic State than the reserve forces. Why? It puts the whole complex jigsaw together without pulling any punches. After briefly tracing the origins of Jihadism from the time of the Prophet, The Jihadist Threat analyses the fall-out from the Iraq and Afghanistan wars and how far these fuelled the rise of the self-styled Islamic State and other terror groups and the extent these pose to European society. Finally, the Author offers suggestions for defeating this existential threat to the Western way of life. This well-illustrated book is written from the inside. Professor Moorcraft, currently the Director of the Centre for Foreign Policy Analysis, London, has long worked at the heart of the British security establishment and has operated as a war correspondent in over thirty conflict zones since Afghanistan in the 1980s, often alongside frontline Jihadists. Arguably no-one is better qualified to write on this subject and his knowledge coupled with forthright views cannot be ignored. This claim is borne out by his predictions in the original edition which have proved prescient. This is an important work that fully deserves the acclaim it has attracted.
On Operations: Operational Art and Military Disciplines traces the history of the development of military staffs and ideas on the operational level of war and operational art from the Napoleonic Wars to today, viewing them through the lens of Prussia/Germany, the Soviet Union, and the United States. B. A. Friedman concludes that the operational level of war should be rejected as fundamentally flawed, but that operational art is an accurate description of the activities of the military staff, an organization developed to provide the brainpower necessary to manage the complexity of modern military operations. Rather than simply serve as an intercession between levels, the military staff exists as an enabler and supporting organization to tacticians and strategists alike. On Operations examines the organization of military staffs, which has changed little since Napoleon's time. Historical examinations of the functions staffs provided to commanders, and the disciplines of the staff officers themselves, leads to conclusions about how best to organize staffs in the future. Friedman demonstrates these ideas through case studies of historical campaigns based on the military discipline system developed. |
You may like...
Turkish Waters and Cyprus Pilot
Rod and Lucinda Heikell
Hardcover
Gravitation, Inertia and Weightlessness…
V.I. Ferronsky
Hardcover
|