![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This edited volume argues that producers of analysis need to shift from producing static, narrative products to much more dynamic, digitally-based platforms in order to remain competitive and relevant.
Despite publicity given to the successes of British and American codebreakers during the Second World War, the study of signals intelligence is still complicated by governmental secrecy over even the most elderly peacetime sigint. This book, first published in 1986, lifts the veil on some of these historical secrets. Christopher Andrew and Keith Neilson cast new light on how Tsarist codebreakers penetrated British code and cypher systems. John Chapman's study of German military codebreaking represents a major advance in our understanding of cryptanalysis during the Weimar Republic. The history of the Government Code and Cypher School - forerunner of today's GCHQ - by its operational head, the late A.G. Denniston, provides both a general assessment of the achievements of British cryptanalysis between the wars and a tantalising glimpse of what historians may one day find in GCHQ's forbidden archives. The distinguished cryptanalyst of Bletchley Park, the late Gordon Welchman, describes in detail how the Ultra programme defeated the German Enigma machine, while another Bletchley Park cryptographer, Christopher Morris, reminds us in his account of the valuable work on hand cyphers that wartime sigint consisted of much more than Ultra. Roger Austin's study of surveillance under the Vichy regime shows the continuing importance of older and simpler methods of message interception such as letter-opening. Taken together, the articles establish sigint as an essential field of study for both the modern historian and the political scientist.
This book, first published in 1988, represents a unique attempt to combine a discussion of an alternative British defence policy in terms of military strategy and new technology, with a consideration of how this policy might be secure in political terms. Written against a background of a possible future Labour government in the late 1980s with a radically different defence policy to the Conservative Government of the day, it considers questions such as: Would conventional deterrence really be effective? Just what is the Labour Party's defence policy? How precisely might Britain be transformed into a non-aligned, non-militarist state?
'Soft' Counterinsurgency reviews the promise and actual achievement of Human Terrain Teams, the small groups of social scientists that were eventually embedded in every combat brigade in Iraq and Afghanistan. The book, based on interviews with both HTT personnel and their military commanders, examines the military's need for sociocultural information, the ethical issues surrounding research carried out in combat zones, and the tensions between military and social science organizational cultures. The account provides a close, detailed account of HTT activities, a critical reflection on the possibilities of creating a 'softer, ' less violent counterinsurgency, and the difficulty of attempting to make war more 'intelligent' and discriminating.
Japan has been expanding its military roles in the post-Cold War period. This book analyses the shift in Japan's security policy by examining the collective ideas of political parties and the effect of an international norm. Starting with the analysis of the collective ideas held by political parties, this book delves into factors overlooked in existing literature, including the effects of domestic and international norms, as well as how an international norm is localised when a conflicting domestic norm already exists. The argument held throughout is that these factors play a primary role in framing Japan's security policy. Overall, three security areas are studied: Japan's arms trade ban policy, Japan's participation in United Nations Peacekeeping Operations, and Japan's enlarged military roles in international security. Close examination demonstrates that the weakening presence of the left since the mid-1990s and the localisation of an international norm encouraged Japan to broaden its military role. Providing a comprehensive picture of Japan's evolving security policy, this book asserts that shifts have occurred in ways that do not violate the pacifist domestic norm. Japan's Evolving Security Policy will appeal to students and scholars of International Relations, Asian Politics, Asian Security Studies and Japanese Studies.
This book examines India's foreign intelligence culture and strategic surprises in the 20th century. The work looks at whether there is a distinct way in which India 'thinks about' and 'does' intelligence, and, by extension, whether this affects the prospects of it being surprised. Drawing on a combination of archival data, secondary source information and interviews with members of the Indian security and intelligence community, the book provides a comprehensive analysis of the evolution of Indian intelligence culture from the ancient period to colonial times and, subsequently, the post-colonial era. This evolutionary culture has played a significant role in explaining the India's foreign intelligence failure during the occurrences of strategic surprises, such as the 1962 Sino-Indian War and the 1999 Kargil War, while it successfully prepared for surprise attacks like Operation Chenghiz Khan by Pakistan in 1971. The result is that the book argues that the strategic culture of a nation and its interplay with intelligence organisations and operations is important to understanding the conditions for intelligence failures and strategic surprises. This book will be of much interest to students of intelligence studies, strategic studies, Asian politics and International Relations.
A riveting introduction to the complex and evolving field of geospatial intelligence. Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT. Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.
In the globalised world of the twenty-first century, security policy in Western societies is driven by a wish to prevent future threats from becoming reality. Applying theories of 'risk society' to the study of strategy, this book analyses the creation of a new approach to strategy. The author demonstrates that this approach creates new choices for policy-makers and challenges well-established truths within the study of security and strategy. He argues that since the seventeenth century the concept of strategy has served to rationalise new technologies, doctrines and agents. By outlining the history of the concept of strategy in terms of rationality, Rasmussen presents a framework for studying strategy in a time of risk and uses this framework to analyse how new technologies of war, pre-emptive doctrines, globalisation and the rise of the 'terrorist approach to warfare' can formulate a new theory of strategy.
This book assesses the strategic linkages that the Korean Peninsula shares with the Indo-Pacific and provides a succinct picture of issues which will shape the trajectory of the Korean Peninsula in the future. This book analyses how critical actors such as the United States, China, Russia and Japan are caught in a tightly balanced power struggle affecting the Korean Peninsula. It shows how these countries are exerting control over the Korean Peninsula while also holding on to their status as critical actors in the broader Indo-Pacific. The prospects of peace, stability and unity in the Korean Peninsula and the impact of this on Indo-Pacific power politics are explored as well as the contending and competing interests in the region. Chapters present country-specific positions and approaches as case studies and review the impact of power politics on stakeholders' relationships in the Indo-Pacific. The book also argues that the Korean Peninsula and the issue of denuclearization is of primary importance to any direction an Indo-Pacific Partnership may take. Bringing together scholars, journalists and ex-diplomats, this book will be of interest to academics working in the field of international relations, foreign policy, security studies and Asian studies as well as audiences interested
Innovation shapes wars, and twelve studies by former faculty members of West Point's United States Military Academy examine specific cases of past and present military innovation. The complex, competitive, and dynamic environment that defines war drives combatants to seek solutions to potentially lethal problems. As some solutions prove effective, gain traction, and win emulation, they follow a path of innovation. The chapters address a broad array of innovations, including in weapon technology, strategy, research and development philosophy, organization of the military instrument, and leveraging maps for strategic goals. Geographically, the examples in this volume span four continents and the Mediterranean Sea, and chronologically they proceed from the twelfth century to the twenty first. Collectively, the studies point to the interconnected value of pursuing constructive solutions to challenges, networking interdisciplinary forms of knowledge, appropriately balancing expectations and capabilities, and understanding an innovation as a journey rather than as an episodic event.
When Robert Haddick wrote Fire on the Water, first published in 2014, most policy experts and the public underestimated the threat China's military modernization posed to the U.S. strategic position in the Indo-Pacific region. Today, the rapid Chinese military buildup has many policy experts wondering whether the United States and its allies can maintain conventional military deterrence in the region, and the topic is central to defense planning in the United States. In this new edition, Haddick argues that the United States and its allies can sustain conventional deterrence in the face of China's military buildup. However, doing so will require U.S. policymakers and planners to overcome institutional and cultural barriers to reforms necessary to implement a new strategy for the region. Fire on the Water, Second Edition also presents the sources of conflict in Asia and explains why America's best option is to maintain its active forward presence in the region. Haddick relates the history of America's military presence in the Indo-Pacific and shows why that presence is now vulnerable. The author details China's military modernization program, how it is shrewdly exploiting the military-technical revolution, and why it now poses a grave threat to U.S. and allied interests. He considers the U.S. responses to China's military modernization over the past decade and discusses why these responses fall short of a convincing competitive strategy. Detailing a new approach for sustaining conventional deterrence in the Indo-Pacific region, the author discusses the principles of strategy as they apply to the problems the United States faces in the region. He explains the critical role of aerospace power in the region and argues that the United States should urgently refashion its aerospace concepts if it is to deter aggression, focusing on Taiwan, the most difficult case. Haddick illustrates how the military-technical revolution has drastically changed the potential of naval forces in the Indo-Pacific region and why U.S. policymakers and planners need to adjust their expectations and planning for naval forces. Finally, he elucidates lessons U.S. policymakers can apply from past great-power competitions, examines long-term trends affecting the current competition, summarizes a new U.S. strategic approach to the region, describes how U.S. policymakers can overcome institutional barriers that stand in the way of a better strategy, and explains why U.S. policymakers and the public should have confidence about sustaining deterrence and peace in the region over the long term.
In recent years, the nature of conflict has changed. Through asymmetric warfare radical groups and weak state actors are using unexpected means to deal stunning blows to more powerful opponents in the West. From terrorism to information warfare, the Wests air power, sea power and land power are open to attack from clever, but much weaker, enemies. In this clear and engaging introduction, Rod Thornton unpacks
the meaning and significance of asymmetric warfare, in both
civilian and military realms, and examines why it has become such
an important subject for study. He seeks to provide answers to key
questions, such as how weaker opponents apply asymmetric techniques
against the Western world, and shows how the Wests military
superiority can be seriously undermined by asymmetric threats. The
book concludes by looking at the ways in which the US, the state
most vulnerable to asymmetric attack, is attempting to cope with
some new battlefield realities. This is an indispensable guide to one of the key topics in security studies today.
Offering a new perspective on the widely discussed debate on how the international community would respond to a nuclear-armed Iran, this critical research challenges the prevailing wisdom that a nuclear Iran would provoke a nuclear proliferation cascade in the Middle East.Hobbs and Moran assess the proliferation calculus of four key countries, Saudi Arabia, Egypt, Turkey and Syria, as well exploring the possibility that Iran would transfer nuclear materials to terrorists groups. The authors conclude that a nuclear domino effect would be highly unlikely, even in the face of an Iranian bomb, thus undermining one of the major arguments used in support of pre-emptive military action against Iran's nuclear facilities.A range of policy measures are outlined, that could be enacted by the international community to further reduce the risk of a regional proliferation cascade, making this text a must-read for policy makers, security and international relations scholars and all those with an interest in the Middle East.
This book arises from the NATO Advanced Study Institute "Technological Innovations in Detection and Sensing of CBRN Agents and Ecological Terrorism" held in Chisinau, Republic of Moldova in June 2010. It comprises a variety of invited contributions by highly experienced educators, scientists, and industrialists, and is structured to cover important aspects of the field that include developments in chemical-biological, and radiation sensing, synthesis and processing of sensors, and applications of sensors in detecting/monitoring contaminants introduced/dispersed inadvertently or intentionally in air, water, and food supplies. The book emphasizes nanomaterials and nanotechnology based sensing and also includes a section on sensing and detection technologies that can be applied to information security. Finally, it examines regional, national, and international policies and ethics related to nanomaterials and sensing. It will be of considerable interest and value to those already pursuing or considering careers in the field of nanostructured materials and nanotechnology based sensing, In general, it serves as a valuable source of information for those interested in how nanomaterials and nanotechnologies are advancing the field of sensing, detection, and remediation, policy makers, and commanders in the field.
1986 did not live up to its name as the International Year of Peace. At the end of 1986 there were 36 wars and armed conflicts being fought, the most destructive of which (the Iraq-Iran war) involves the USA and the USSR both supplying arms to the combatants and now protecting shipping in the Persian Gulf. Arms control came to an impasse, weapons proliferated and arms transfers became more uncontrolled. Continuing their annual review, compiled from open sources by an international staff working on neutral ground, this eighteenth edition of the SIPRI Yearbook bring together information on world armaments and the efforts made to limit or reduce them, an overview of the whole field of developments in armaments technology, in military expenditure, in the arms trade and in the attempts to halt or reverse the process. In addition to regular features and statistics, this latest Yearbook contains special studies on armed conflicts throughout the world, the Chernobyl accident, verification issues, and South Africa. Its comprehensive coverage makes it an invaluable source book for anyone seeking authoritative information on strategic studies, war studies, international relations or peace studies.
This book uncovers how US-India relations have changed and intensified during the administrations of Bill Clinton, George Bush Jr., and Barack Obama. Throughout the Cold War, US-India relations were often distant and volatile as India mostly received attention at times of grave international crises, but from the late 1990s onwards, the US showed a more sustained interest in India. How was this shift possible? While previous scholarship has focused on the civilian nuclear deal as a turning point, this book presents an alternative account for this change by analyzing how India's identity has been constructed in different terms after the Cold War. It examines the underlying discourse and explains how this enables or constrains US foreign policymakers when they establish security policies with India and improve US-India relations.
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow-and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods. * Learn more at the book's website at http://www.cyberinsecuritybook.org
Now in its seventeenth year, the Stockhom International Peace Research Institute (SIPRI) Yearbook brings together information on world armaments and the efforts made to limit or reduce them. Compiled from open sources by an international staff working on neutral ground, the yearbook examines pressing issues such as nuclear and space weapons, chemical and biological warfare and military technology, and military expenditure and the arms trade.
This book examines the United States neoconservative movement, arguing that its support for the 2003 invasion of Iraq was rooted in an intelligence theory shaped by the policy struggles of the Cold War. The origins of neoconservative engagement with intelligence theory are traced to a tradition of labour anti-communism that emerged in the early 20th century and subsequently provided the Central Intelligence Agency with key allies in the state-private networks of the Cold War era. Reflecting on the break-up of Cold War liberalism and the challenge to state-private networks in the 1970s, the book maps the neoconservative response that influenced developments in United States intelligence policy, counterintelligence and covert action. With the labour roots of neoconservatism widely acknowledged but rarely systematically pursued, this new approach deploys the neoconservative literature of intelligence as evidence of a tradition rooted in the labour anti-communist self-image as allies rather than agents of the American state. This book will be of great interest to all students of intelligence studies, Cold War history, United States foreign policy and international relations.
This book, first published in 1992, examines the changing post-Cold War changing patterns of security in Europe by analysing the major themes, the primary security organisations and the policies of countries at the forefront of the security debate. Leading experts discuss the problems of nationalism, the difficulties of peacekeeping in Europe, and the future of NATO.
This book is an absorbing account of secret operations and political intrigue in wartime Thailand. During World War II Free Thai organizations cooperated with Allied intelligence agencies in an effort to rescue their nation from the consequences of its 1941 alliance with Japan. They largely succeeded despite internal differences and the conflicting interests and policies of their would-be-allies, China, Great Britain and the United States. London's determination to punish Thailand placed the British Special Operations Executive (SOE) at a serious disadvantage in its rivalry with the American Office of Strategic Services (OSS). The US State Department, in contrast, strongly supported OSS operations in Thailand, viewing them as a vehicle for promoting American political and economic influence in mainland Southeast Asia. Declassification of the records of the OSS and the SOE now permits full revelation of this complex story of heroic action and political intrigue.
This book critically conceptualises positive security and explores multiple areas in global politics where positive security can be studied as an alternative to the existing understandings and practices of security. Structured through a framework on the practice and ethics of everyday security, the book defines positive security as a focal point of contextual and spatiotemporal moments that emerge through encounters with 'the other' in everyday politics. In these moments, an actor can show attentiveness and humility towards 'the other'. In this book, the authors present their own understandings of positive security, offering an in-depth discussion and analysis of the Global North and South divides, delving into many aspects such as human security, migration, gender, Indigenous issues and perceptions of security in the Arctic, and challenges and tensions for and within NATO. The book concludes by reflecting on the significance of positive security, looking at its application for other current issues, including how to understand and manage new (in)security challenges including hybrid threats and warfare. This book will be of interest to students and scholars of international relations, critical security, and peace studies.
Russian annexation of Crimea and the subsequent air campaign over Syria took the world by surprise. The capabilities and efficiency of Putin's armed forces during both operations signalled to the world that Russia was back in business as a significant military actor on the international stage. In this cutting-edge study, Bettina Renz and Hanna Smith combine their respective expertise in strategic studies and foreign policy to offer an in-depth and comprehensive analysis of Russia's military revival under Putin's leadership. Whilst the West must adjust to the reality of a modernised and increasingly powerful Russian military, they argue that the renaissance of Russian military might and its implications for the balance of global power can only be fully understood within a wider historical context. Assessing developments in Russian Great Power thinking, military capabilities, Russian strategic thought and views on the use of force throughout the post-Soviet era, the book shows that rather than signifying a sudden Russian military resurgence, recent developments are consistent with longstanding trends in Russian military strategy and foreign policy. This timely and thoughtful book is a must-read for students of politics as well as anyone interested in current affairs.
Students and enthusiasts of American history are familiar with the Revolutionary War spies Nathan Hale and Benedict Arnold, but few studies have closely examined the wider intelligence efforts that enabled the colonies to gain their independence. Spies, Patriots, and Traitors provides readers with a fascinating, well-documented, and highly readable account of American intelligence activities during the era of the Revolutionary War, from 1765 to 1783, while describing the intelligence sources and methods used and how our Founding Fathers learned and practiced their intelligence role. The author, a retired CIA officer, provides insights into these events from an intelligence professional's perspective, highlighting the tradecraft of intelligence collection, counterintelligence, and covert actions and relating how many of the principles of the era's intelligence practice are still relevant today. Kenneth A. Daigler reveals the intelligence activities of famous personalities such as Samuel Adams, George Washington, Benjamin Franklin, Nathan Hale, John Jay, and Benedict Arnold, as well as many less well-known figures. He examines the important role of intelligence in key theaters of military operations, such as Massachusetts, New York, New Jersey, Pennsylvania, and in General Nathanael Greene's campaign in South Carolina; the role of African Americans in the era's intelligence activities; undertakings of networks such as the Culper Ring; and intelligence efforts and paramilitary actions conducted abroad. Spies, Patriots, and Traitors adds a new dimension to our understanding of the American Revolution. The book's scrutiny of the tradecraft and management of Revolutionary War intelligence activities will be of interest to students, scholars, intelligence professionals, and anyone who wants to learn more about this fascinating era of American history.
Acknowledgements. Chapter I: National Defense Policy and Resource Decision Making: Unique Challenges. Chapter II: The Federal Government Budget Process. Chapter III: Budgeting for National Defense: Complicated but Workable. Chapter IV: The Planning, Programming, Budgeting, Execution System. |
You may like...
Statistics for Management and Economics
Gerald Keller, Nicoleta Gaciu
Paperback
Rule Based Systems for Big Data - A…
Han Liu, Alexander Gegov, …
Hardcover
R3,172
Discovery Miles 31 720
Design of Underground Structures
Zhen-Dong Cui, Zhong-Liang Zhang, …
Hardcover
R2,389
Discovery Miles 23 890
|