![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
In recent times, international society has countered a myriad of 'outlaw' threats at sea, including piracy, terrorism, the proliferation of Weapons of Mass Destruction (WMD) and the threat posed by 'rogue states'. Whilst the US has promoted 'coalitions of the willing' and sought to transform international maritime law in response to these 'outlaws', Japanese governments have developed an innovative maritime security strategy centering on the Japan Coast Guard (JCG). Concerned by Japan's international image as a former imperialist power, Tokyo has relied upon the identity of the JCG as a law enforcement and rescue organization to garner support for its maritime security strategy. Japan's non-military efforts have developed the capacities of states and built institutions in the Southeast Asian region and beyond. The JCG's response to maritime 'outlaws' belies characterizations of Japan as a passive state that does not contribute to international order.
This book, first published in 1988, represents a unique attempt to combine a discussion of an alternative British defence policy in terms of military strategy and new technology, with a consideration of how this policy might be secure in political terms. Written against a background of a possible future Labour government in the late 1980s with a radically different defence policy to the Conservative Government of the day, it considers questions such as: Would conventional deterrence really be effective? Just what is the Labour Party's defence policy? How precisely might Britain be transformed into a non-aligned, non-militarist state?
Now more than ever, in the arenas of national security, diplomacy, and military operations, effective communication strategy is of paramount importance. A 24/7 television, radio, and Internet news cycle paired with an explosion in social media demands it. According to James P. Farwell, an expert in communication strategy and cyber war who has advised the U.S. Special Operations Command and the Department of Defense, and worked nationally and internationally as a media and political consultant, this book examines how colorful figures in history from Julius Caesar to Winston Churchill, Napoleon to Hugo Chavez, Martin Luther to Barack Obama and Ronald Reagan, have forged communication strategies to influence audiences. Mark Twain said that history doesn't repeat itself, but rhymes. In showing how major leaders have moved audiences, Farwell bears out Twain's thesis. Obama and Luther each wanted to reach a mass audience. Obama used social media and the Internet. Luther used the printing press. But the strategic mindset was similar. Hugo Chavez identifies with Simon Bolivar, but his attitude towards the media more closely echoes Napoleon. Caesar used coins to build his image in ways that echo the modern use of campaign buttons. His "triumphs," enormous parades to celebrate military victories, celebrated his achievements and aimed to impress the populace with his power and greatness. Adolph Hitler employed a similar tactic with his torchlight parades. The book shows how the US government's approach to strategic communication has been misguided. It offers a colorful, incisive critical evaluation of the concepts, doctrines, and activities that the US Department of Defense and Department of State employ for psychological operations, military information support operations, propaganda, and public diplomacy. Persuasion and Power is a book about the art of communication strategy, how it is used, where, and why. Farwell's adroit use of vivid examples produce a well-researched, entertaining story that illustrates how its principles have made a critical difference throughout history in the outcomes of crises, conflicts, politics, and diplomacy across different cultures and societies.
Published for the first time, the history of the CIA's clandestine short-wave radio broadcasts to Eastern Europe and the USSR during the early Cold War is covered in-depth. Chapters describe the "gray" broadcasting of Radio Free Europe and Radio Liberty in Munich; clandestine or "black" radio broadcasts from Radio Nacional de Espana in Madrid to Estonia, Latvia, Lithuania and Ukraine; transmissions to Bulgaria, Romania, Albania, Ukraine and the USSR from a secret site near Athens; and broadcasts to Byelorussia and Slovakia. Infiltrated behind the Iron Curtain through dangerous air drops and boat landings, CIA and other intelligence service agents faced counterespionage, kidnapping, assassination, arrest and imprisonment. Excerpts from broadcasts taken from monitoring reports of Eastern Europe intelligence agencies are included.
Despite publicity given to the successes of British and American codebreakers during the Second World War, the study of signals intelligence is still complicated by governmental secrecy over even the most elderly peacetime sigint. This book, first published in 1986, lifts the veil on some of these historical secrets. Christopher Andrew and Keith Neilson cast new light on how Tsarist codebreakers penetrated British code and cypher systems. John Chapman's study of German military codebreaking represents a major advance in our understanding of cryptanalysis during the Weimar Republic. The history of the Government Code and Cypher School - forerunner of today's GCHQ - by its operational head, the late A.G. Denniston, provides both a general assessment of the achievements of British cryptanalysis between the wars and a tantalising glimpse of what historians may one day find in GCHQ's forbidden archives. The distinguished cryptanalyst of Bletchley Park, the late Gordon Welchman, describes in detail how the Ultra programme defeated the German Enigma machine, while another Bletchley Park cryptographer, Christopher Morris, reminds us in his account of the valuable work on hand cyphers that wartime sigint consisted of much more than Ultra. Roger Austin's study of surveillance under the Vichy regime shows the continuing importance of older and simpler methods of message interception such as letter-opening. Taken together, the articles establish sigint as an essential field of study for both the modern historian and the political scientist.
This cogent global history traces the evolution of land warfare since the start of the Crimean War. Jeremy Black argues that although it has always been critical to the outcome of conflicts worldwide, land warfare has become undervalued in comparison to air power in modern military thinking. In practice, land warfare was crucial during the American Civil War, the two world wars, and the conflicts of the Cold War. Indeed, the revival of great power confrontation has led to an urgent need to re-examine the entire contemporary period. Looking to the future, the book shows convincingly that we must consider the nature of the military for non-state actors as well for as the major powers. Ultimately, Black contends, there is no substitute for the control over territory provided by boots on the ground.
Military transformation can be understood as comprising three overlapping and sometimes competing "layers"--the conventional-force dominated revolution in military affairs, a more recent irregular warfare emphasis, and a wider dimension including homeland defense, space and nuclear policy. The Western world is currently focusing its attention on transformation's middle layer, while China and Russia are focusing on the RMA and transformation's wider aspects. This dynamic indicates the United States and its allies should continue to prepare for the full range of conflicts. This book establishes the meaning of "military transformation," assesses the manner in which certain countries are transforming their military forces, discusses the relevancy of transformation efforts to modern conflict and, in drawing out the key areas of emphasis on the part of various countries, provides a window on the future global security environment. It is divided into seven chapters, plus a conclusion. The first chapter focuses on the meaning of military transformation, establishing a framework through which national militaries can be examined. This comprises transformation's revolution in military affairs components, its newer special operations forces, counterinsurgency, and stabilization and reconstruction aspects, and its wider homeland defense, space and deterrence dimensions. The book devotes two chapters to the United States and one each to China, Russia, and NATO. It also has a chapter that looks individually at each of Australia, Britain, Canada, France and Germany. An assessment of the relevancy of force transformation to modern warfare is integrated into the discussion of what transformation means, how the United States is responding, and the concluding chapter. The book contains a biographical sketch of Andrew Marshall, Andrew Krepinevich, William Owens, Arthur Cebrowski, Donald Rumsfeld, and Thomas Barnett, all of whom have been involved in some aspect of military transformation.
This book examines India's foreign intelligence culture and strategic surprises in the 20th century. The work looks at whether there is a distinct way in which India 'thinks about' and 'does' intelligence, and, by extension, whether this affects the prospects of it being surprised. Drawing on a combination of archival data, secondary source information and interviews with members of the Indian security and intelligence community, the book provides a comprehensive analysis of the evolution of Indian intelligence culture from the ancient period to colonial times and, subsequently, the post-colonial era. This evolutionary culture has played a significant role in explaining the India's foreign intelligence failure during the occurrences of strategic surprises, such as the 1962 Sino-Indian War and the 1999 Kargil War, while it successfully prepared for surprise attacks like Operation Chenghiz Khan by Pakistan in 1971. The result is that the book argues that the strategic culture of a nation and its interplay with intelligence organisations and operations is important to understanding the conditions for intelligence failures and strategic surprises. This book will be of much interest to students of intelligence studies, strategic studies, Asian politics and International Relations.
Due to the continuing expansion of the notion of security, various national, regional and international institutions now find themselves addressing contemporary security issues. While institutions may evolve by adjusting themselves to new challenges, they can also fundamentally alter the intricate balance between security and current legal frameworks. This volume explores the tensions that occur when institutions address contemporary security threats, in both public and international law contexts. As part of the Connecting International with Public Law series, it provides important and valuable insights into the legal issues and perspectives which surround the institutional responses to contemporary security challenges. It is essential reading for scholars, practitioners and policy makers seeking to understand the legal significance of security institutions and the implications of their evolution on the rule of law and legitimacy.
Using examples from a wide variety of conflicts, Lawrence Freedman shows that successful military command depends on the ability not only to use armed forces effectively but also to understand the political context in which they are operating. Command in war is about forging effective strategies and implementing them, making sure that orders are appropriate, well-communicated, and then obeyed. But it is also an intensely political process. This is largely because how wars are fought depends to a large extent on how their aims are set. It is also because commanders in one realm must possess the ability to work with other command structures, including those of other branches of the armed forces and allies. In Command, Lawrence Freedman explores the importance of political as well as operational considerations in command with a series of eleven vivid case studies, all taken from the period after 1945. Over this period, the risks of nuclear escalation led to a shift away from great power confrontations and towards civil wars, and advances in communication technologies made it easier for higher-level commanders to direct their subordinates. Freedman covers defeats as well as victories. Pakistani generals tried to avoid surrender as they were losing the eastern part of their country to India in 1971. Iraq's Saddam Hussein turned his defeats into triumphant narratives of victory. Osama bin Laden escaped the Americans in Afghanistan in 2001. The UK struggled as a junior partner to the US in Iraq after 2003. We come across insubordinate generals, such as Israel's Arik Sharon, and those in the French army in Algeria, so frustrated with their political leadership that they twice tried to change it. At the other end of the scale, Che Guevara in Congo in 1966 and Igor Girkin in Ukraine in 2014 both tried to spark local wars to suit their grandiose objectives. Freedman ends the book with a meditation on the future of command in a world that is becoming increasingly reliant on technologies like artificial intelligence. A wide-ranging and insightful history of the changing nature of command in the postwar era, this will stand as a definitive account of a foundational concept in both military affairs and politics.
The world was standing at the crossroads in 2015 as globalization propelled human beings into an increasingly integrated community of common destiny. In the meantime, the world witnessed the strategic competition among major powers. This annual publication offers views, opinions and predictions on global political and security issues, and China's strategic choices by Chinese scholars. It covers almost all the significant issues that took place in the international security arena in 2015. Besides the relations among major powers, it studies the international community's fight against Islamic State (IS), the strategic situation in the Korean Peninsula, political situation in Myanmar, the Joint Comprehensive Plan of Action on the Iranian nuclear issue, free navigation in the South China Sea, China's Belt and Road Initiative and its grand diplomacy.This book argues that the strategic competition among major powers is heightening, and smaller countries as well as extremist forces like the IS are seeking strategic space by taking advantage of the conflicts among major powers. The book concludes that to address this major historic challenge in international politics, it is essential that some major powers drop the hostile stance towards each other and enhance partnership to foster international cooperation.
This book, first published in 1992, examines the changing post-Cold War changing patterns of security in Europe by analysing the major themes, the primary security organisations and the policies of countries at the forefront of the security debate. Leading experts discuss the problems of nationalism, the difficulties of peacekeeping in Europe, and the future of NATO.
The states of West Asia continue to grapple with dramatic changes taking place in the domestic and regional environment. Security has emerged as a significant concern for them. Political upheavals, civil strife, sectarian violence and terrorism in the area have implications on a regional and global order. As the region grapples with myriad socio-economic problems, many extra-regional players and non-state actors, and a few regional ones, are attempting to carve out their own areas of influence. These developments across West Asia demand constant monitoring and careful analyses. This book is a collection of essays exploring various aspects of the changing security paradigm in West Asia and the regional and international responses. Please note: Taylor & Francis does not sell or distribute the Hardback in India, Pakistan, Nepal, Bhutan, Bangladesh and Sri Lanka.
The Impact of the First World War on U.S. Policymakers: American Strategic and Foreign Policy Formulation, 1938-1942 is designed to recount the formulation of foreign and defense policies through an examination of the background of the policymakers, with specific emphasis on the World War I experience. The introduction provides an analysis of the literature of the history of this American World War II policy formulation. The events and factors that led to the reorientation of priorities in 1938-1939 are examined. From that base, Michael Carew reviews the unfolding events of the European and Japanese degeneration into war through the spring of 1940, and their perception for the American policy-makers. He also recounts the tectonic shifts of the subsequent eighteen months and the scramble for an American response. The immediate consequences of Pearl Harbor brought the policymaking to a crisis, and the Casablanca conference of January 1943 signified the completion of the formulation of American foreign policy and naval-military strategy. Carew emphasizes the leadership of President Roosevelt and his cadre of planners in the policy formulation realm, the assertion of leadership of the alliance, and Roosevelt's specific tasks in managing the American war effort. These presidential tasks included the industrial mobilization of the American economy, the domestic political leadership of the war, the persuasion of the alliance to the propriety of American policy, and the defeat of the Axis.
This book examines the United States neoconservative movement, arguing that its support for the 2003 invasion of Iraq was rooted in an intelligence theory shaped by the policy struggles of the Cold War. The origins of neoconservative engagement with intelligence theory are traced to a tradition of labour anti-communism that emerged in the early 20th century and subsequently provided the Central Intelligence Agency with key allies in the state-private networks of the Cold War era. Reflecting on the break-up of Cold War liberalism and the challenge to state-private networks in the 1970s, the book maps the neoconservative response that influenced developments in United States intelligence policy, counterintelligence and covert action. With the labour roots of neoconservatism widely acknowledged but rarely systematically pursued, this new approach deploys the neoconservative literature of intelligence as evidence of a tradition rooted in the labour anti-communist self-image as allies rather than agents of the American state. This book will be of great interest to all students of intelligence studies, Cold War history, United States foreign policy and international relations.
Addressing the complexities of radicalisation, resilience, cyber, and homeland security, State, Society and National Security: Challenges and Opportunities in the 21st Century aims to shed light on what has changed in recent years security discourse, what has worked (as well as what has not), and what the potential further evolutions within each domain might be.The release of this book commemorates the 10th anniversary of the creation of the Centre of Excellence for National Security (CENS) - a policy-oriented security think tank within the S Rajaratnam School for International Studies, Nanyang Technological University, as well as the 10th edition of CENS' annual Asia-Pacific Programme for Senior National Security Officers (APPSNO), which has developed into a premier international security conference in Southeast Asia.Featuring contributions from practitioners, policy experts and academics closely linked to CENS, this volume is a reminder of the meaningful and impact-creating insights that 10 years' worth of thinking and talking about national security imperatives have generated.Contributors to this volume include Professor Sir David Omand, former director of the United Kingdom's Government Communication Headquarters (GCHQ), Steven R Corman, Professor in the Hugh Downs School of Human Communication, Marc Sageman, former operations officer at the United States Central Intelligence Agency, Ilan Mizrahi, former Head of Israel's National Security Council and John, Lord Alderdice, Liberal Democrat member of the House of Lords and Senior Research Fellow and Director of the Centre for the Resolution of Intractable Conflict at Harris Manchester College, Oxford.This book has been written in a manner that makes it accessible to policymakers, security practitioners and academics, as well as interested lay readers.
The Palgrave Handbook of Global Counterterrorism Policy examines a comprehensive range of counterterrorism policies, strategies, and practices across dozens of states and actors around the world. It covers the topics of terrorism and counterterrorism both thematically and by region, allowing for discussions about the underpinning dynamics of these fields, consideration of how terrorism and counterterrorism are evolving in the modern period, and in-depth analyses of individual states and non-state actors, and their approaches to countering terrorism and terrorist threats. It draws upon a multidisciplinary range of established scholars and upcoming new researchers from across multiple fields including political science and international relations, sociology, and history, examining both theory and practice in their respective chapters. This volume is an essential resource for scholars and practitioners alike.
The world was standing at the crossroads in 2015 as globalization propelled human beings into an increasingly integrated community of common destiny. In the meantime, the world witnessed the strategic competition among major powers. This annual publication offers views, opinions and predictions on global political and security issues, and China's strategic choices by Chinese scholars. It covers almost all the significant issues that took place in the international security arena in 2015. Besides the relations among major powers, it studies the international community's fight against Islamic State (IS), the strategic situation in the Korean Peninsula, political situation in Myanmar, the Joint Comprehensive Plan of Action on the Iranian nuclear issue, free navigation in the South China Sea, China's Belt and Road Initiative and its grand diplomacy.This book argues that the strategic competition among major powers is heightening, and smaller countries as well as extremist forces like the IS are seeking strategic space by taking advantage of the conflicts among major powers. The book concludes that to address this major historic challenge in international politics, it is essential that some major powers drop the hostile stance towards each other and enhance partnership to foster international cooperation.
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking-principally the Internet-are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well. Provides relevant, rigorous information to those in the computer security field while also being accessible to a general audience of policy, international security, and military readers who seek to understand the cyber security issue and how it has evolved Documents how contemporary society is dependent upon cyberspace for its function, and that the understanding of how it works and how it can be broken is knowledge held by a precious few Informs both technically savvy readers who build and maintain the infrastructure of cyberspace and the policymakers who develop rules, processes, and laws on how the cyber security problem is managed
A light cavalry regiment at war against Napoleonic France |
![]() ![]() You may like...
Armed Non-State Actors and the Politics…
Anna Geis, Maeva Clement, …
Hardcover
R2,687
Discovery Miles 26 870
Applied Behavior Analysis
John Cooper, Timothy Heron, …
Hardcover
Developing Talent Across the Lifespan
Peter Heymans, Cornelis F.M van Lieshout
Hardcover
R2,901
Discovery Miles 29 010
Humanitarianism and Suffering - The…
Richard Ashby Wilson, Richard D. Brown
Hardcover
|