Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
For more than fifty years, the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) and the wider nuclear nonproliferation regime have worked to prevent the spread of nuclear weapons. Analysts and pundits have often viewed the regime with skepticism, repeatedly warning that it is on the brink of collapse, and the NPT lacks many of the characteristics usually seen in effective international institutions. Nevertheless, the treaty continues to enjoy near-universal membership and high levels of compliance. This is the first book to explain why the nonproliferation regime has been so successful, bringing to bear declassified documents, new data on regime membership and weapons pursuit, and a variety of analytic approaches. It offers important new insights for scholars of nuclear proliferation and international security institutions, and for policymakers seeking to strengthen the nonproliferation regime and tighten international constraints on the spread of nuclear weapons.
The Asia-Pacific region presents one of the greatest challenges to international security in the post-Cold War era. The demise of the Cold War security framework has ushered in a new period of uncertainty as longstanding tensions re-emerge. There are growing doubts as the the future of military commitment of the US and concern with Japan's security roles and aspirations. The widespread build-up of military capabilities in the region and the nuclear ambitions of North Korea have further heightened tension. Using a thematic approach, this volume addresses the concerns of the region.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
Nicholas Eftimiades examines the infiltration of Chinese espionage agents into foreign governments and private businesses. These efforts have been going on mostly uninterrupted for decades, while Western intelligence services focused on the Soviet Union. He draws on his expertise as a counterintelligence analyst to examine the structure, objectives and methodology of Chinese clandestine activities. The book specifically addresses the human source in intelligence operations, such as agent and double-agent recruitment, and how these tactics fit into the conduct of internal and foreigh affairs in China.
This book traces the history of Australia's highly secret Intelligence Security Organisation. Established in the early days of the Cold War, like most intelligence organisations working under covert conditions, it exceeded the vague powers entrusted to it. It has been the subject of two Royal Commissions in Australia and in recent times several acts of Parliament have been passed in order to make it more accountable to Australia's government and its citizens.
The Asia-Pacific region presents one of the greatest challenges to international security in the post-Cold War era. The demise of the Cold War security framework has ushered in a new period of uncertainty as longstanding tensions re-emerge. There are growing doubts as the the future of military commitment of the US and concern with Japan's security roles and aspirations. The widespread build-up of military capabilities in the region and the nuclear ambitions of North Korea have further heightened tension. Using a thematic approach, this volume addresses the concerns of the region.
What was Britain's reaction to the death of Stalin? How has Britain reconciled a modern nuclear strategy with its traditional imperial defence commitments around the world? How has secret intelligence affected the Special Relationship' since 1945? Certain clear questions and perennial themes run through British overseas policy since 1945. This book examines them, drawing on new research by leading historians and scholars in the field.
What was Britain's reaction to the death of Stalin? How has Britain reconciled a modern nuclear strategy with its traditional imperial defence commitments around the world? How has secret intelligence affected the Special Relationship' since 1945? Certain clear questions and perennial themes run through British overseas policy since 1945. This book examines them, drawing on new research by leading historians and scholars in the field.
What should military warriors do in peacetime? Such was the theme of an international conference at the Inter-American Defense College in 1992 which brought together diplomats, military officials and distinguished academics to discuss the purpose of military institutions in Latin America in the new world order. The most important message of this book is that the order has by no means eliminated the need for armed forces.
What should military warriors do in peacetime? Such was the theme of an international conference at the Inter-American Defense College in 1992 which brought together diplomats, military officials and distinguished academics to discuss the purpose of military institutions in Latin America in the new world order. The most important message of this book is that the order has by no means eliminated the need for armed forces.
Numerous allegations of abuse of power have been made against the domestic security intelligence agencies in the UK - police special branches and MI5. These include the improper surveillance of trades unionists and peace activists, campaigns of disinformation against elected politicians and the summary shooting of people believed to be engaged in political violence. Although far-reaching enquiries have been conducted into similar agencies in other liberal democracies, and the end of the Cold War has brought dramatic change to security agencies in Eastern Europe, the UK agencies have remained aloof from anything more than marginal organizational change.
Numerous allegations of abuse of power have been made against the domestic security intelligence agencies in the United Kingdom - police special branches and MI5. These include the improper surveillance of trade unionists and peace activists, campaigns of disinformation against elected politicians and, most serious of all, the summary shooting of people believed to be engaged in political violence. Although in recent years far-reaching inquiries have been conducted into similar agencies in other liberal democracies, and the end of the Cold War has brought dramatic change to security agencies in Eastern Europe, the UK agencies have remained aloof from anything more than marginal organisational change. Drawing on extensive foreign material and making use of the social science concepts of information, power and law, this book develops a framework for the comparative analysis of these agencies. This provides, first, a systematic discussion of what is known about the operations of security intelligence agencies in liberal democracies and, second, an agenda for research into the UK agencies, including: the ambiguous nature of their mandate regarding 'national security', 'subversion' and 'terrorism'; the ways in which the agencies penetrate society and what they do with the information they gather; internal organisational questions such as recruitment and culture; the extent to which the agencies are controlled by ministers; and how the agencies' activities might be overseen by outside political bodies such as parliamentary committees, and by citizens in general. Concluding that not enough is known about how these agencies operate in the UK, the book argues the need for a thorough inquiry toinvestigate the disturbing allegations that have been made, and to make proposals for a more democratic system of security intelligence.
Sun Tzu, author of 'The Art of War', believed that the acme of leadership consists in figuring out how to subdue the enemy with the least amount of fighting-a fact that America's Founders also understood, and practiced with astonishing success. For it to work, however, a people must possess both the ability and the willingness to use all available instruments of power in peace as much as in war. US foreign policy has increasingly neglected the instruments of civilian power and become overly dependent on lethal solutions to conflict. The steep rise in unconventional conflict has increased the need for diplomatic and other non-hard power tools of statecraft. The United States can no longer afford to sit on the proverbial three-legged national security stool ("military, diplomacy, development"), where one leg is a lot longer than either of the other two, almost forgetting altogether the fourth leg-information, especially strategic communication and public diplomacy. The United States isn't so much becoming militarized as DE civilianized. According to Sun Tzu, self-knowledge is as important as knowledge of one's enemy: "if you know neither yourself nor the enemy, you will succumb in every battle." Alarmingly, the United States is deficient on both counts. And though we can stand to lose a few battles, the stakes of losing the war itself in this age of nuclear proliferation are too high to contemplate.
This book reappraises the ill-fated raid named operation Jubilee, focusing on aspects such as naval and air operations in the Channel, signals, radar intelligence, agents and deception. It draws from official archives, both German and Allied. From these voluminous but fragmented records, many of which have been destroyed, classified or lost, the book aims to thread the evidence together.
This collection of writings covers the war on the Western Front.
Whereas, traditionally, attention has been given to strategic or
political matters, these essays highlight tactical issues. They
show that the British high command could boast more achievements in
tactics than is usually assumed.
This comprehensive work on security in the English-speaking Caribbean, offers a wealth of information about the history, politics, economics and geography of the entire region. The author examines security problems in the region as a geopolitical unit, not on a selective case-study basis, as is usually done. He assesses Caribbean security within a theoretical framework where four factors are critical: perceptions of the political elites; capabilities of the states; the geopolitics of the area; and the ideological orientations of the parties in power. Political and economic issues are judged to be as relevant to security as military factors. The author identifies safeguards which countries in the region may take in the coming decade.
This book examines the evolution, impact, and future prospects of the Security Sector Reform (SSR) model in conflict-affected countries in the context of the wider debate over the liberal peace project. Since its emergence as a concept in the late 1990s, SSR has represented a paradigm shift in security assistance, from the realist, regime-centric, train-and-equip approach of the Cold War to a new liberal, holistic and people-centred model. The rapid rise of this model, however, belied its rather meagre impact on the ground. This book critically examines the concept and its record of achievement over the past two decades, putting it into the broader context of peace-building and state-building theory and practice. It focuses attention on the most common, celebrated and complex setting for SSR, conflict-affected environments, and comparatively examines the application and impacts of donor-supported SSR programing in a series of conflict-affected countries over the past two decades, including Afghanistan, Sierra Leone, the Democratic Republic of Congo, East Timor and Bosnia-Herzegovina. The broader aim of the book is to better understand how the contemporary SSR model has coalesced over the past two decades and become mainstreamed in international development and security policy and practice. This provides a solid foundation to investigate the reasons for the poor performance of the model and to assess its prospects for the future. This book will be of much interest to students of international security, peacebuilding, statebuilding, development studies and IR in general.
This book explains what 'small' states are and explores their current security challenges, in general terms and through specific examples. It reflects the shift from traditional security definitions emphasizing defence and armaments, to new security concerns such as economic, societal and environmental security where institutional cooperation looms larger. These complex issues, linked with traditional power relations and new types of actors, need to be tackled with due regard to democracy and good governance. Key policy challenges for small states are examined and applied in the regional case studies. The book deals mainly with the current experience and recent past of such states but also offers insights for their future policies. Although many of the states covered are European, the study also includes African, Caribbean and Asian small states. Their particular interest and relevance is outlined, as is the connection between their security challenges and their smallness. Policy lessons for other states are then sought. The book is the first in-depth, multi-continent study of security as an aspect of small state governance today. It is novel in placing the security dilemmas of small states in the context of wider ideas on international and institutional change, and in dealing with non-European states and regions.
Forty years of confrontation in Europe produced a complex set of
conditioned reflexes in western military thinking. With the end of
the Warsaw pact, planning and analysis specialists have been
compelled to look again at basic principles. The analysis of threat
and response has been transformed, and patterns of likely action
such as the Gulf intervention have been accommodated. In practical
terms, these developments affect what is taught to both new
officers and senior officers about to assume command
responsibilities.
This textbook provides a comprehensive introduction to post-Cold War military theory for students of strategic studies. This second edition has been fully revised and updated, including a new chapter on peacekeeping, and examines contemporary strategic thought on the conduct of war in the sea, land, air, nuclear, space and cyber domains, as well as irregular warfare. Each chapter identifies contemporary strategic thinkers in a particular area, examines strategic thought through the lens of identifiable themes, and discusses the ideas of classical strategists to provide historical context. Examples of the link between the use of military force and the pursuit of political objectives are presented, such as airpower against ISIS and in Libya, counterinsurgency in Afghanistan and Iraq, counter-piracy operations off the coast of Africa, and the Stuxnet virus in Iran. The chapters identify trends, statements and principles that indicate how military power can best be employed to effect political ends, while the conclusion paints an overall picture of the relationship between classic and contemporary strategic thinking within each warfare domain. This book will be essential reading for students of strategic studies, war studies and military history, and is highly recommended for students of security studies and international relations in general.
This volume offers an account of some key activities of the Allied secret services and their German counterparts in Sweden during World War II. It also describes in some detail Swedish wartime legislation and Swedish organizations concerned with internal security and intelligence.
This comprehensive work on security in the English-speaking Caribbean, offers a wealth of information about the history, politics, economics and geography of the entire region. The author examines security problems in the region as a geopolitical unit, not on a selective case-study basis, as is usually done. He assesses Caribbean security within a theoretical framework where four factors are critical: perceptions of the political elites; capabilities of the states; the geopolitics of the area; and the ideological orientations of the parties in power. Political and economic issues are judged to be as relevant to security as military factors. The author identifies safeguards which countries in the region may take in the coming decade.
In Technology Security and National Power, Stephen D. Bryen shows how the United States has squandered its technological leadership through unwise policies. Starting from biblical times, he shows how technology has either increased national power or led to military and political catastrophe. He goes on to show how the US has eroded its technological advantages, endangering its own security. The scope ofTechnology Security and National Power extends across 3,000 years of history, from an induced plague in Athens to chemical weapons at Ypres to an atomic bomb on Hiroshima to the nuclear balance of terror. It describes new weapons systems and stealth jets, cyber attacks on national infrastructure, the looting of America's Defense secrets, and much more. The core thesis is supported by unique insight and new documentation that reaches into today's conflicted world. More than a litany of recent failures and historical errors, this book is a wake-up call for political actors and government officials who seem unable to understand the threat. Technology Security and National Power proposes that the United States can again become a winner in today's globalized environment. |
You may like...
Chilcot Report - Executive Summary
John Chilcot, Lawrence Freedman, …
Paperback
|