![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
The United States and its allies have been fighting the Taliban and al-Qaeda in Afghanistan for a decade in a war that either side could still win. While a gradual drawdown has begun, significant numbers of US combat troops will remain in Afghanistan until at least 2014, perhaps longer, depending on the situation on the ground and the outcome of the US presidential election in 2012. Given the realities of the Taliban's persistence and the desire of US policymakers - and the public - to find a way out, what can and should be the goals of the US and its allies in Afghanistan? "Afghan Endgames" brings together some of the finest minds in the fields of history, strategy, anthropology, ethics, and mass communications to provide a clear, balanced, and comprehensive assessment of the alternatives for restoring peace and stability to Afghanistan. Presenting a range of options - from immediate withdrawal of all coalition forces to the maintenance of an open-ended, but greatly reduced military presence - the contributors weigh the many costs, risks, and benefits of each alternative. This important book boldly pursues several strands of thought suggesting that a strong, legitimate central government is far from likely to emerge in Kabul; that fewer coalition forces, used in creative ways, may have better effects on the ground than a larger, more conventional presence; and that, even though Pakistan should not be pushed too hard, so as to avoid sparking social chaos there, Afghanistan's other neighbors can and should be encouraged to become more actively involved. The volume's editors conclude that while there may never be complete peace in Afghanistan, a self-sustaining security system able to restore order swiftly in the wake of violence is attainable.
A new framework contextualizes crucial international security issues at sea in the Indo-Pacific Competition at sea is once again a central issue of international security. Nowhere is the urgency to address state-on-state competition at sea more strongly felt than in the Indo-Pacific region, where freedom of navigation is challenged by regional states’ continuous investments in naval power, and the renewed political will to use it to undermine its principles. The New Age of Naval Power in the Indo-Pacific provides an original framework in which five “factors of influence” explain how and why naval power matters in this pivotal part of the world. An international group of contributors make the case that these five factors draw upon a longstanding influence of naval power on regional dynamics and impact the extent to which different states in the region use naval power: the capacity to exert control over sea-lanes, the capacity to deploy a nuclear deterrent at sea, the capacity to implement the law of the sea in an advantageous way, the ability to control marine resources, and the capacity for technological innovation. The New Age of Naval Power in the Indo-Pacific offers a fresh approach for academics and policy makers seeking to navigate the complexity of maritime security and regional affairs.
Going beyond superficial comparisons of Kissinger and Brzezinski, this study determines their impact on US national security policy by comparing their views on world politics and on strategy and tactics for achieving national goals and by examining the consistency between their actions in office and their beliefs. Despite his attacks on Kissinger, this study found that Brzezinski shared many of Kissinger's beliefs and copied many of his actions in office. Both men's actions were profoundly shaped by their shared beliefs that, within limits, man could shape history, that Moscow's and Peking's commitment to worldwide communist expansion is the main threat to peace, and that divergent national interests threaten even allied relationships, and by their parallel conceptions of power, diplomacy, linkage, and leadership. Indeed, their similar struggles to control policy through the National Security Council and more informal structures and their handling of relations with allies, and with Moscow, and Peking underlined these shared beliefs, as well their differing conceptions of morality and leadership. Moreover, since leaving office, both Kissinger's and Brzezinski's policy proposals clea
The wars between 1792 and 1815 saw the making of the modern world, with Britain and Russia the key powers to emerge triumphant from a long period of bitter conflict. In this innovative book, Jeremy Black focuses on the strategic contexts and strategies involved, explaining their significance both at the time and subsequently. Reinterpreting French Revolutionary and Napoleonic warfare, strategy, and their consequences, he argues that Napoleon's failure owed much to his limitations as a strategist. Black uses this framework as a foundation to assess the nature of warfare, the character of strategy, and the eventual ascendance of Britain and Russia in this period. Rethinking the character of strategy, this is the first history to look holistically at the strategies of all the leading belligerents from a global perspective. It will be an essential read for military professionals, students, and history buffs alike.
Cybersecurity is a complex and contested issue in international politics. By focusing on the 'great powers'--the US, the EU, Russia and China--studies in the field often fail to capture the specific politics of cybersecurity in the Middle East, especially in Egypt and the GCC states. For these countries, cybersecurity policies and practices are entangled with those of long-standing allies in the US and Europe, and are built on reciprocal flows of data, capital, technology and expertise. At the same time, these states have authoritarian systems of governance more reminiscent of Russia or China, including approaches to digital technologies centred on sovereignty and surveillance. This book is a pioneering examination of the politics of cybersecurity in the Middle East. Drawing on new interviews and original fieldwork, James Shires shows how the label of cybersecurity is repurposed by states, companies and other organisations to encompass a variety of concepts, including state conflict, targeted spyware, domestic information controls, and foreign interference through leaks and disinformation. These shifting meanings shape key technological systems as well as the social relations underpinning digital development. But however the term is interpreted, it is clear that cybersecurity is an integral aspect of the region's contemporary politics.
This book provides an institutional costs framework for intelligence and security communities to examine the factors that can encourage or obstruct cooperation. The governmental functions of security and intelligence require various organisations to interact in a symbiotic way. These organisations must constantly negotiate with each other to establish who should address which issue and with what resources. By coupling adapted versions of transaction costs theories with socio-political perspectives, this book provides a model to explain why some cooperative endeavours are successful, whilst others fail. This framework is applied to counterterrorism and defence intelligence in the UK and the US to demonstrate that the view of good cooperation in the former and poor cooperation in the latter is overly simplistic. Neither is necessarily more disposed to behave cooperatively than the other; rather, the institutional costs created by their respective organisational architectures incentivise different cooperative behaviour in different circumstances. This book will be of much interest to students of intelligence studies, organisational studies, politics and security studies.
In June 1944, the United States launched a crushing assault on the Japanese navy in the Battle of the Philippine Sea. The capture of the Mariana Islands and the accompanying ruin of Japanese carrier airpower marked a pivotal moment in the Pacific War. No tactical masterstroke or blunder could reverse the increasingly lopsided balance of power between the two combatants. The War in the Pacific had entered its endgame. Beginning with the Honolulu Conference, when President Franklin Delano Roosevelt met with his Pacific theater commanders to plan the last phase of the campaign against Japan, Twilight of the Gods brings to life the harrowing last year of World War II in the Pacific, when the U.S. Navy won the largest naval battle in history; Douglas MacArthur made good his pledge to return to the Philippines; waves of kamikazes attacked the Allied fleets; the Japanese fought to the last man on one island after another; B-29 bombers burned down Japanese cities; and Hiroshima and Nagasaki were vaporized in atomic blasts. Ian W. Toll's narratives of combat in the air, at sea, and on the beaches are as gripping as ever, but he also reconstructs the Japanese and American home fronts and takes the reader into the halls of power in Washington and Tokyo, where the great questions of strategy and diplomacy were decided. Drawing from a wealth of rich archival sources and new material, Twilight of the Gods casts a penetrating light on the battles, grand strategic decisions and naval logistics that enabled the Allied victory in the Pacific. An authoritative and riveting account of the final phase of the War in the Pacific, Twilight of the Gods brings Toll's masterful trilogy to a thrilling conclusion. This prize-winning and best-selling trilogy will stand as the first complete history of the Pacific War in more than twenty-five years, and the first multivolume history of the Pacific naval war since Samuel Eliot Morison's series was published in the 1950s.
The Indian Army was one of the most important colonial institutions that the British created. From its humble origins as a mercantile police force to a modern contemporary army in the Second World War, this institution underwent many transitions. This book examines the Indian Army during the later colonial era from the First Afghan War in 1839 to Indian independence in 1947. During this period, the Indian Army developed from an internal policing force, to a frontier army, and then to a conventional western style fighting force capable of deployment to overseas' theaters. These transitions resulted in significant structural and doctrinal changes in the army. The doctrines, and tactics honed during this period would have a dramatic impact upon the post-colonial armies of India and Pakistan. From civil-military relations to fighting and structural doctrines, the Indian and Pakistani armies closely reflect the deep-seated impact of decades of evolution during the late colonial era.
This book, first published in 1985, is an in-depth analysis of the Luftwaffe in the Second World War, using previously untapped German archives and newly-released 'Ultra' intelligence records. It looks at the Luftwaffe within the context of the overall political decision-making process within the Third Reich. It is especially valuable for its careful study of industrial production and pilot losses in the conduct of operations.
Alexandra Kitty's vital new book is a guide to the stratagems and techniques of war propaganda. When nations go to war, governments need reliable and effective methods of rallying public opinion to support their actions, regardless of the political leanings or educational background of citizens. The Mind Under Siege explores real life case studies and research in human motivation to show why propaganda is more powerful, potent, and effective than other types of persuasive messages. Reliance on primal phobias, and the threat to reproduction, well-being, and life itself make propaganda a reliable and powerful tool. For journalists and other news producers, Kitty's book shows how to ask the right questions and avoid spreading misinformation and propaganda and how to see more insidious forms of manipulation and narrative through psychological research and case studies.
This book explores Japan's emerging national security policy in relation to China. It considers the rise of nationalism in contemporary Japan, the recent actions of the Abe government to change Japan's security policy course and the importance of domestic views, both elite and popular, about safety and credibility in shaping security policy. It highlights the lack of strong links between China and Japan and the existence in Japan of significant misconceptions about China. It discusses the politics of Japan's alliances, examines the growth of national pride in Japan and of a more confrontational attitude toward China, and concludes by putting forward some scenarios for likely future developments and some policy proposals for a stable Japan-China relationship.
This book undertakes an in-depth examination of the diversity in international approaches to the navy-coastguard nexus. It considers the evolving global maritime security landscape and the emergence and proliferation of maritime law enforcement agencies-collectively referred to here as "coastguards"-performing peacetime constabulary duties alongside navies. Through a cross-regional study of various countries worldwide, including those in Asia and Europe, this book reveals that there is no one optimal, "one size fits all" organizational structure. Instead, there is a wide array of drivers that influence a nation-state's maritime security architecture and its organizational approach to managing security at sea, or broadly speaking, securing its national maritime interests.
Why do states persist in using force to enhance their deterrent posture, even though it is not clear that it is effective? This book develops an innovative framework to answer this question, viewing deterrence as an idea. This allows the author to explain how countries institutionalize deterrence strategy, and how this internalization affects policy. He argues that the US and Israel have both internalized deterrence ideas and become attached to these practices. For them, deterrence is not just a means to advance 'physical' security, but it constitutes their very selves as deterring actors. As a result, being unable to deter becomes a threat to their identity, evoking strong emotional responses. In recognizing these dynamics, the book provides a fresh perspective on the US war in Iraq (2003) and the Israeli war in Lebanon (2006), both of which can be seen as attempts to repair each country's shaken sense of self.
This book examines how internal and external security are blurring at the EU level, and the implications this has for EU security governance and the EU as a security actor. The EU claims that 'internal and external security are inseparable' and requires a more integrated approach. This book critically assesses this claim in relation to the threats facing the EU, its responses to them, and the practical and normative implications for EU security governance and actorness. It sets out a novel conceptual framework - the EU security continuum - to examine the ways and extent to which internal and external security are blurring along three axes: geographic, bureaucratic, and functional. This is done through an analysis of four key security issues, regional conflict, terrorism, organised crime, and cybersecurity. The book demonstrates that, to varying degrees, these security threats and/or responses do transcend boundaries. However, institutional turf wars and capability silos hamper the EU's integrated approach and, therefore, its management of transboundary security threats. Yet, the EU's pursuit of an integrated approach is reframing its claimed normative distinctiveness toward a more practical one, based on a transnational and multidimensional approach. Such a rearticulation, if implemented, would make the EU a genuinely transboundary security actor, properly structured and equipped to tackle the 21st century's internal-external security continuum. This book will be of much interest to students of European Security, EU politics, and international relations.
In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks
the meaning and significance of asymmetric warfare, in both
civilian and military realms, and examines why it has become such
an important subject for study. He seeks to provide answers to key
questions, such as how weaker opponents apply asymmetric techniques
against the Western world, and shows how the Wests military
superiority can be seriously undermined by asymmetric threats. The
book concludes by looking at the ways in which the US, the state
most vulnerable to asymmetric attack, is attempting to cope with
some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.
This book scrutinizes how contemporary practices of security have come to rely on many different translations of security, risk, and danger. Institutions of national security policies are currently undergoing radical conceptual and organisational changes, and this book presents a novel approach for how to study and politically address the new situation. Complex and uncertain threat environments, such as terrorism, climate change, and the global financial crisis, have paved the way for new forms of security governance that have profoundly transformed the ways in which threats are handled today. Crucially, there is a decentralisation of the management of security, which is increasingly handled by a broad set of societal actors that previously were not considered powerful in the conduct of security affairs. This transformation of security knowledge and management changes the meaning of traditional concepts and practices, and calls for investigation into the many meanings of security implied when contemporary societies manage radical dangers, risks, and threats. It is necessary to study both what these meanings are and how they developed from the security practices of the past. Addressing this knowledge gap, the book asks how different ideas about threats, risk, and dangers meet in the current practices of security, broadly understood, and with what political consequences. This book will be of interest to students of critical security studies, anthropology, risk studies, science and technology studies and International Relations. The Open Access version of this book, available at: https://www.routledge.com/Translations-of-Security-A-Framework-for-the-Study-of-Unwanted-Futures/Berling-Gad-Petersen-Waever/p/book/9781032007090 has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
This book examines intelligence analysis in the digital age and demonstrates how intelligence has entered a new era. While intelligence is an ancient activity, the digital age is a relatively new phenomenon. This volume uses the concept of the "digital age" to highlight the increased change, complexity, and pace of information that is now circulated, as new technology has reduced the time it takes to spread news to almost nothing. These factors mean that decision-makers face an increasingly challenging threat environment, which in turn increases the demand for timely, relevant, and reliable intelligence to support policymaking. In this context, the book demonstrates that intelligence places greater demands on analysis work, as the traditional intelligence cycle is no longer adequate as a process description. In the digital age, it is not enough to accumulate as much information as possible to gain a better understanding of the world. To meet customers' needs, the intelligence process must be centred around the analysis work - which in turn has increased the demand for analysts. Assessments, not least predictions, are now just as important as revealing someone else's secrets. This volume will be of much interest to students of intelligence studies, security studies, and international relations.
This book arises from the NATO Advanced Study Institute "Technological Innovations in Detection and Sensing of CBRN Agents and Ecological Terrorism" held in Chisinau, Republic of Moldova in June 2010. It comprises a variety of invited contributions by highly experienced educators, scientists, and industrialists, and is structured to cover important aspects of the field that include developments in chemical-biological, and radiation sensing, synthesis and processing of sensors, and applications of sensors in detecting/monitoring contaminants introduced/dispersed inadvertently or intentionally in air, water, and food supplies. The book emphasizes nanomaterials and nanotechnology based sensing and also includes a section on sensing and detection technologies that can be applied to information security. Finally, it examines regional, national, and international policies and ethics related to nanomaterials and sensing. It will be of considerable interest and value to those already pursuing or considering careers in the field of nanostructured materials and nanotechnology based sensing, In general, it serves as a valuable source of information for those interested in how nanomaterials and nanotechnologies are advancing the field of sensing, detection, and remediation, policy makers, and commanders in the field.
- offers most comprehensive and up to date0 history of the IAEA's six decades - features essay by leading academics and policymakers - makes an important contribution to security and nonproliferation studies, as well as to the field of international organizations and global governance
Did President Roosevelt and other high-ranking U.S. government officials know about Japanese plans to attack Pearl Harbor in advance, and fail to warn U.S. Navy leadership in Hawaii? Drawing on recently declassified materials and revelations from other writers, this book traces the flow of intelligence and concludes the imminent attack was known about and was allowed to happen to win the support of the American public in a war against Japan. An epilogue describes the fate of Commander-in-Chief of the U.S. Pacific Fleet Admiral Husband E. Kimmel, the intelligence he received from Washington before the attack, and the intelligence he did not.
We live in an age of subterfuge. Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm. Even before the 2016 election, he warned that Russian military intelligence was 'carefully planning and timing a high-stakes political campaign' to disrupt the democratic process. But as crafty as such so-called active measures have become, they are not new. In this astonishing journey through a century of secret psychological war, Rid reveals for the first time some of history's most significant operations - many of them nearly beyond belief. A White Russian ploy backfires and brings down a New York police commissioner; a KGB-engineered, anti-Semitic hate campaign creeps back across the Berlin Wall; the CIA backs a fake publishing empire, run by a former Wehrmacht U-boat commander that produces Germany's best jazz magazine. |
![]() ![]() You may like...
|