![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Strategy is not a modern invention. It is an essential and enduring feature of human history that is here to stay. In this original essay, Colin S. Gray, world-renowned scholar of strategic thought, discusses the meaning of strategy and its importance for politicians and the military as a means of achieving desired outcomes in complex, uncertain conditions. Drawing on a wide range of examples from the Great Peloponnesian War to the Second World War, Vietnam, and the ongoing conflicts in Iraq and Afghanistan, Gray ably shows how great military thinkers of the past and present have acted strategically in their various ideological, political, geographical and cultural contexts. Looking to the future, he argues that strategy will continue to provide a vital tool-kit for survival and security, but that the global threat posed by nuclear weapons remains an on-going challenge without obvious practical solutions. As Gray boldy asserts, there is no promised land ahead, only hard and dangerous times that will require us to master the theory and practice of strategy to secure our own future.
Today, the Internet has become a source of information that no country or company can forgo. It is not only used to communicate or entertain, but most importantly to operate utilities and public services such as banking or air traffic. As the reliance on computer networks across societies and economies keeps growing, so do security risks in cyberspace - referred to as "cybersecurity." Cybersecurity means protecting information and control systems from those who seek to compromise them. It also involves actors, both malicious or protective, policies and their societal consequences. This collection of essays provides a better understanding of the risks, perceptions, and myths that surround cybersecurity by looking at it from three different levels of analysis: the sovereign state, the infrastructure and stakeholders of the Internet, and the individual. The essays explore such issues as information ownership, censorship, cyberwars, cyberterrorism, privacy, and rebellion, bringing together expert knowledge from computer science and the social sciences with case studies. It reviews existing policies and practices and discusses the threats and benefits of living in an increasingly networked world. This authoritative analysis of one of the most controversial and compelling security debates of the twenty-first century will appeal to scholars and practitioners interested in security, international relations and policymaking.
This book is concerned with the ideological origins of the cold war and how it was fought by economic means. The book revolves around four major themes. Firstly, it is argued that the origin of the cold war is not to be found in rational, economic motivation, but in ideology through which both the East and West perceived 'reality'. Secondly, these ideological preconceptions generated complex feed-back processes of hostility that lasted forty years. Thirdly, although this hostility was expressed in political, ideological and military terms, the decisive battle was fought in economic terms as each nation devoted resources to unproductive military purposes. Finally, the end of the cold war came with the collapse of the dysfunctional Soviet economy. Although, the Soviets lost the cold war, in the light of the ascendancy of its competitors, the United States did not win it.
This book examines the implications of disruptive technologies of the Fourth Industrial Revolution (4IR) on military innovation and the use of force. It provides an in-depth understanding of how both large and small militaries are seeking to leverage 4IR emerging technologies and the effects such technologies may have on future conflicts. The 4th Industrial Revolution (4IR), the confluence of disruptive changes brought by emerging technologies such as artificial intelligence, robotics, nanotechnologies, and autonomous systems, has a profound impact on the direction and character of military innovation and use of force. The core themes in this edited volume reflect on the position of emerging technologies in the context of previous Revolutions in Military Affairs; compare how large resource-rich states (US, China, Russia) and small resource-limited states (Israel, Sweden, Norway) are adopting and integrating novel technologies and explore the difference between various innovation and adaptation models. The book also examines the operational implications of emerging technologies in potential flashpoints such as the South China Sea and the Baltic Sea. Written by a group of international scholars, this book uncovers the varying 4IR defence innovation trajectories, enablers, and constraints in pursuing military-technological advantages that will shape the character of future conflicts. The chapters in this book were originally published as a special issue of the Journal of Strategic Studies.
The United States and its allies have been fighting the Taliban and al-Qaeda in Afghanistan for a decade in a war that either side could still win. While a gradual drawdown has begun, significant numbers of US combat troops will remain in Afghanistan until at least 2014, perhaps longer, depending on the situation on the ground and the outcome of the US presidential election in 2012. Given the realities of the Taliban's persistence and the desire of US policymakers - and the public - to find a way out, what can and should be the goals of the US and its allies in Afghanistan? "Afghan Endgames" brings together some of the finest minds in the fields of history, strategy, anthropology, ethics, and mass communications to provide a clear, balanced, and comprehensive assessment of the alternatives for restoring peace and stability to Afghanistan. Presenting a range of options - from immediate withdrawal of all coalition forces to the maintenance of an open-ended, but greatly reduced military presence - the contributors weigh the many costs, risks, and benefits of each alternative. This important book boldly pursues several strands of thought suggesting that a strong, legitimate central government is far from likely to emerge in Kabul; that fewer coalition forces, used in creative ways, may have better effects on the ground than a larger, more conventional presence; and that, even though Pakistan should not be pushed too hard, so as to avoid sparking social chaos there, Afghanistan's other neighbors can and should be encouraged to become more actively involved. The volume's editors conclude that while there may never be complete peace in Afghanistan, a self-sustaining security system able to restore order swiftly in the wake of violence is attainable.
Going beyond superficial comparisons of Kissinger and Brzezinski, this study determines their impact on US national security policy by comparing their views on world politics and on strategy and tactics for achieving national goals and by examining the consistency between their actions in office and their beliefs. Despite his attacks on Kissinger, this study found that Brzezinski shared many of Kissinger's beliefs and copied many of his actions in office. Both men's actions were profoundly shaped by their shared beliefs that, within limits, man could shape history, that Moscow's and Peking's commitment to worldwide communist expansion is the main threat to peace, and that divergent national interests threaten even allied relationships, and by their parallel conceptions of power, diplomacy, linkage, and leadership. Indeed, their similar struggles to control policy through the National Security Council and more informal structures and their handling of relations with allies, and with Moscow, and Peking underlined these shared beliefs, as well their differing conceptions of morality and leadership. Moreover, since leaving office, both Kissinger's and Brzezinski's policy proposals clea
Innovation shapes wars, and twelve studies by former faculty members of West Point's United States Military Academy examine specific cases of past and present military innovation. The complex, competitive, and dynamic environment that defines war drives combatants to seek solutions to potentially lethal problems. As some solutions prove effective, gain traction, and win emulation, they follow a path of innovation. The chapters address a broad array of innovations, including in weapon technology, strategy, research and development philosophy, organization of the military instrument, and leveraging maps for strategic goals. Geographically, the examples in this volume span four continents and the Mediterranean Sea, and chronologically they proceed from the twelfth century to the twenty first. Collectively, the studies point to the interconnected value of pursuing constructive solutions to challenges, networking interdisciplinary forms of knowledge, appropriately balancing expectations and capabilities, and understanding an innovation as a journey rather than as an episodic event.
The United Arab Emirates (UAE) has elaborated its own philosophy of security. Driven by emergencies and increasing risks, both in the region and globally, Emirati authorities have developed a sense of anticipation as well as an agility to react promptly to new threats through the ability to assess the risks in any given situation. War and the avatars of conflict are a constant reality in the Middle East. Transnational threats, including the regional context, the war in Yemen, insecurity in the Levant and tensions with Iran affect the overall stability of the Peninsula and consequently that of the UAE. Owing to the inclusion of the UAE in the networks of globalization, non-traditional security issues are not relegated to the background. Issues such as COVID-19, immigration, cybersecurity and human trafficking need to be addressed domestically as well as globally. This volume offers a comprehensive and multifaceted examination of the traditional and non-traditional security measures present in the UAE that allow the country to remain politically stable in an otherwise volatile region, and aims to offer a comprehensive overview of all forms of security in the UAE.
This book, first published in 1985, is an in-depth analysis of the Luftwaffe in the Second World War, using previously untapped German archives and newly-released 'Ultra' intelligence records. It looks at the Luftwaffe within the context of the overall political decision-making process within the Third Reich. It is especially valuable for its careful study of industrial production and pilot losses in the conduct of operations.
Alexandra Kitty's vital new book is a guide to the stratagems and techniques of war propaganda. When nations go to war, governments need reliable and effective methods of rallying public opinion to support their actions, regardless of the political leanings or educational background of citizens. The Mind Under Siege explores real life case studies and research in human motivation to show why propaganda is more powerful, potent, and effective than other types of persuasive messages. Reliance on primal phobias, and the threat to reproduction, well-being, and life itself make propaganda a reliable and powerful tool. For journalists and other news producers, Kitty's book shows how to ask the right questions and avoid spreading misinformation and propaganda and how to see more insidious forms of manipulation and narrative through psychological research and case studies.
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow-and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods. * Learn more at the book's website at http://www.cyberinsecuritybook.org
A richly detailed account of the hard-fought campaign that led to Antietam Creek and changed the course of the Civil War. In early September 1862 thousands of Union soldiers huddled within the defenses of Washington, disorganized and discouraged from their recent defeat at Second Manassas. Confederate General Robert E. Lee then led his tough and confident Army of Northern Virginia into Maryland in a bold gamble to force a showdown that could win Southern independence. The future of the Union hung in the balance. The campaign that followed lasted only two weeks, but it changed the course of the Civil War. D. Scott Hartwig delivers a riveting first installment of a two-volume study of the campaign and climactic battle. It takes the reader from the controversial return of George B. McClellan as commander of the Army of the Potomac through the Confederate invasion, the siege and capture of Harpers Ferry, the daylong Battle of South Mountain, and, ultimately, to the eve of the great and terrible Battle of Antietam.
'Outstanding ... combines a glimpse behind the security screens with a sharp analysis of the real global insecurities - growing inequality and unsustainability' - New Internationalist Written in the late 1990s, Losing Control was years, if not decades, ahead of its time, predicting the 9/11 attacks, a seemingly endless war on terror and the relentless increase in revolts from the margins and bitter opposition to wealthy elites. Now, more than two decades later and in an era of pandemics, climate breakdown and potential further military activity in the Middle East, Asia and Africa, Paul Rogers has revised and expanded the original analysis, pointing to the 2030s and '40s as the decades that will see a showdown between a bitter, environmentally wrecked and deeply insecure world and a possible world order rooted in justice and peace.
Codenames were a vital feature of World War II, serving as mental shorthand for those in the know, and obscuring the issues for those who were not. Codenames were used from the highest level, in the planning of grand strategic moves affecting the conduct of the whole war, to the lowest command divisions, in the conduct of small-scale tactical operations. This encyclopedia, first published in 1986, removes the mystery surrounding many of the important code names from the era. With around 3,000 entries drawn from all sides - the U.K., U.S.A., Germany, the U.S.S.R. and Japan - Christopher Chant's work provides a uniquely comprehensive and full overview of major operations, names and code words. Thorough and exciting, this key reference reissue is an exceptionally valuable resource for military historians, enthusiasts and general readers with an interest in World War II.
In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks
the meaning and significance of asymmetric warfare, in both
civilian and military realms, and examines why it has become such
an important subject for study. He seeks to provide answers to key
questions, such as how weaker opponents apply asymmetric techniques
against the Western world, and shows how the Wests military
superiority can be seriously undermined by asymmetric threats. The
book concludes by looking at the ways in which the US, the state
most vulnerable to asymmetric attack, is attempting to cope with
some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
Why do states persist in using force to enhance their deterrent posture, even though it is not clear that it is effective? This book develops an innovative framework to answer this question, viewing deterrence as an idea. This allows the author to explain how countries institutionalize deterrence strategy, and how this internalization affects policy. He argues that the US and Israel have both internalized deterrence ideas and become attached to these practices. For them, deterrence is not just a means to advance 'physical' security, but it constitutes their very selves as deterring actors. As a result, being unable to deter becomes a threat to their identity, evoking strong emotional responses. In recognizing these dynamics, the book provides a fresh perspective on the US war in Iraq (2003) and the Israeli war in Lebanon (2006), both of which can be seen as attempts to repair each country's shaken sense of self.
This book provides an institutional costs framework for intelligence and security communities to examine the factors that can encourage or obstruct cooperation. The governmental functions of security and intelligence require various organisations to interact in a symbiotic way. These organisations must constantly negotiate with each other to establish who should address which issue and with what resources. By coupling adapted versions of transaction costs theories with socio-political perspectives, this book provides a model to explain why some cooperative endeavours are successful, whilst others fail. This framework is applied to counterterrorism and defence intelligence in the UK and the US to demonstrate that the view of good cooperation in the former and poor cooperation in the latter is overly simplistic. Neither is necessarily more disposed to behave cooperatively than the other; rather, the institutional costs created by their respective organisational architectures incentivise different cooperative behaviour in different circumstances. This book will be of much interest to students of intelligence studies, organisational studies, politics and security studies.
This book undertakes an in-depth examination of the diversity in international approaches to the navy-coastguard nexus. It considers the evolving global maritime security landscape and the emergence and proliferation of maritime law enforcement agencies-collectively referred to here as "coastguards"-performing peacetime constabulary duties alongside navies. Through a cross-regional study of various countries worldwide, including those in Asia and Europe, this book reveals that there is no one optimal, "one size fits all" organizational structure. Instead, there is a wide array of drivers that influence a nation-state's maritime security architecture and its organizational approach to managing security at sea, or broadly speaking, securing its national maritime interests.
The book is a collection of studies on the war in Ukraine. The considerations focus on different contexts of the first phase of the armed conflict. The authors try to answer questions about the motives and results of Russian disinformation and blaming Ukraine, the US and NATO for the invasion, as well as of the position of third countries towards the Russian aggression. One of the issues addressed is sexual violence in wartime and the image of women in armed conflict. The authors also analyze the aid provided by certain nations and Ukrainian national minorities in selected countries. Some chapters also examined public opinions on various war-related issues. Such a broad approach provides multidimensional view of the war while complementing earlier images of the conflict in Ukraine.
This book arises from the NATO Advanced Study Institute "Technological Innovations in Detection and Sensing of CBRN Agents and Ecological Terrorism" held in Chisinau, Republic of Moldova in June 2010. It comprises a variety of invited contributions by highly experienced educators, scientists, and industrialists, and is structured to cover important aspects of the field that include developments in chemical-biological, and radiation sensing, synthesis and processing of sensors, and applications of sensors in detecting/monitoring contaminants introduced/dispersed inadvertently or intentionally in air, water, and food supplies. The book emphasizes nanomaterials and nanotechnology based sensing and also includes a section on sensing and detection technologies that can be applied to information security. Finally, it examines regional, national, and international policies and ethics related to nanomaterials and sensing. It will be of considerable interest and value to those already pursuing or considering careers in the field of nanostructured materials and nanotechnology based sensing, In general, it serves as a valuable source of information for those interested in how nanomaterials and nanotechnologies are advancing the field of sensing, detection, and remediation, policy makers, and commanders in the field.
This book explores Japan's emerging national security policy in relation to China. It considers the rise of nationalism in contemporary Japan, the recent actions of the Abe government to change Japan's security policy course and the importance of domestic views, both elite and popular, about safety and credibility in shaping security policy. It highlights the lack of strong links between China and Japan and the existence in Japan of significant misconceptions about China. It discusses the politics of Japan's alliances, examines the growth of national pride in Japan and of a more confrontational attitude toward China, and concludes by putting forward some scenarios for likely future developments and some policy proposals for a stable Japan-China relationship.
War Transformed: The Future of Twenty-First-Century Great Power Competition and Conflict provides insights for those involved in the design of military strategy, and the forces that must execute that strategy. Emphasizing the impacts of technology, new era strategic competition, demography, and climate change, Mick Ryan uses historical as well as contemporary anecdotes throughout the book to highlight key challenges faced by nations in a new era of great power rivalry. Just as previous industrial revolutions have advanced societies, the nascent fourth industrial revolution will have a similar impact on how humans fight, compete, and build military power in the twenty-first century. After reviewing the principle catalysts of change in the security environment, War Transformed seeks to provide a preview of the shape of war and competition in the twenty-first century. Ryan examines both the shifting character of war and its enduring nature. In doing so, he proposes important trends in warfare that will shape all aspects of human competition and conflict in the coming decades. The remainder of the book analyzes how military institutions must prepare for future competition and conflict. Competing and engaging in combat in this new era involves new and evolved strategies and warfighting concepts, as well as adapting our current military organizations. It will also demand building an intellectual edge in military personnel through evolved concepts of training, education, and development. As the competitive environment and potential battlefields continue to change, conceptions of combat, competition and conflict must also evolve. Mick Ryan makes the case for transforming how Western military institutions view war in this century. |
![]() ![]() You may like...
Regulating the Use of Force in…
Russell Buchan, Nicholas Tsagourias
Hardcover
R3,410
Discovery Miles 34 100
Women's Health in Menopause - Behaviour…
P.G. Crosignani, Rodolfo Paoletti, …
Hardcover
R2,651
Discovery Miles 26 510
|