![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
This edited collection brings together leading scholars to comparatively investigate national security, surveillance and terror in the early 21st century in two major western jurisdictions, Canada and Australia. Observing that much debate about these topics is dominated by US and UK perspectives, the volume provides penetrating analysis of national security and surveillance practices in two under-studied countries that reveals critical insights into current trends. Written by a wide range of experts in their respective fields, this book addresses a fascinating array of timely questions about the relationship among national security, privacy and terror in the two countries and beyond. Chapters include critical assessments of topics such as: National Security Intelligence Collection since 9/11, The Border as Checkpoint in an Age of Hemispheric Security and Surveillance, Unmanned Aerial Vehicles and Law Enforcement, as well as Federal Government Departments and Security Regimes. An engaging and empirically driven study, this collection will be of great interest to scholars of security and surveillance studies, policing, and comparative criminology.
This book provides a comprehensive understanding of the evolution of India's strategic culture in the era of globalization. It examines dominant themes that have governed India's foreign and security policy and events which have shaped India's role in global politics. The author Examines the traditional and new approaches to diplomacy and the state's response to internal and external conflicts; Delineates policy pillars which are required to protect the state's strategic interests and forge new relationships in the current geopolitical climate; Compares the domestic and international security policies followed during the tenures of Narsimha Rao, Atal Bihari Vajpayee and Manmohan Singh; and Analyzes how the Narendra Modi era has brought on changes in India's security strategy and the use of soft power and diplomacy. With extensive additions, drawing on recent developments, this edition of the book will be a key text for scholars, teachers and students of defence and strategic studies, international relations, history, political science and South Asian studies.
The book examines Bernard Brodie's strategic and philosophical response to the nuclear age, embedding his work within the classical theories of Carl von Clausewitz. Bernard Brodie (1910-1978) was a leading 20th century theorist and philosopher of war. A key architect of American nuclear strategy, Brodie was one of the first civilian defense intellectuals to cross over into the military world. "State of Doom" explores Brodie's evolution as a theorist and his response to the technological innovations that transformed warfare from WWII to the Vietnam War. It situates his theoretical development within the classical theories of Carl von Clausewitz (1780-1831), as Brodie came to be known as "America's Clausewitz." While his first influential works focused on naval strategy, his most lasting impact came within the field of nuclear strategic thinking. Brodie helped conceptualize America's strategy of deterrence, later taking into account America's loss of nuclear monopoly, thermonuclear weapons, and intercontinental missiles. This in-depth exploration of Brodie's strategic and philosophical response to the nuclear age and of his effort to reconcile Clausewitz's theories to the new challenges of the nuclear era will make this book a must read to anyone in strategic studies, international relations, and philosophy of war.
When NATO took charge of the International Security Assistance
Force (ISAF) for Afghanistan in 2003, ISAF conceptualized its
mission largely as a stabilization and reconstruction deployment.
However, as the campaign has evolved and the insurgency has proved
to more resistant and capable, key operational imperatives have
emerged, including military support to the civilian development
effort, closer partnering with Afghan security forces, and greater
military restraint. All participating militaries have adapted, to
varying extents, to these campaign imperatives and pressures.
In the post-9/11 world, the possibility of energy infrastructure-terrorism-the use of weapons to cause devastating damage to the energy industrial sector and cause cascading effects-is very real. Energy Infrastructure Protection and Homeland Security, Second Edition, is a reference for those involved with our energy infrastructure who want quick answers to complicated questions. It is intended to help employers and employees handle security threats they must be prepared to meet on a daily basis. This updated second edition focuses on all components of the energy sector, including sites involved in producing, refining, transporting, generating, transmitting, conserving, building, distributing, maintaining, and controlling energy systems and system components. It presents common-sense methodologies in a straightforward manner and is accessible to those who have no experience with energy infrastructure or homeland security. Through this text, readers gain an understanding of the challenges of domestic preparedness and the immediate need for heightened awareness regarding the present threats faced by the energy sector as a potential terrorist target. This book provides knowledge of security principles and measures that can be implemented, adding a critical component not only to one's professional knowledge but also giving one the tools needed to combat terrorism.
In 1974 Frederick W. WinterbothaM's book "The Ultra Secret" disclosed the Allied success in breaking the German high command ciphers in World War II, and a new form of history began--the study of intelligence and its impact on military operations and international politics. This guide documents and annotates over 800 sources that have appeared in the past 20 years. It examines and evaluates primary and secondary sources dealing with the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also covers sources on the Sigint and cryptanalytic programs of the Axis and neutral powers. The book examines and annotates primary and secondary sources on the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also provides details on sources concerned with Sigint and cryptanalytic programs of the Axis and neutral powers.
" Click here to read a chapter from this book A Choice Outstanding Academic Title for 2002 From South Carolina to South Vietnam, America's two hundred-year involvement in guerrilla warfare has been extensive and varied. America and Guerrilla Warfare analyzes conflicts in which Americans have participated in the role of, on the side of, or in opposition to guerrilla forces, providing a broad comparative and historical perspective on these types of engagements. Anthony James Joes examines nine case studies, ranging from the role of Francis Marion, the Swamp Fox, in driving Cornwallis to Yorktown and eventual surrender to the U.S. support of Afghan rebels that hastened the collapse of the Soviet Empire. He analyzes the origins of each conflict, traces American involvement, and seeks patterns and deviations. Studying numerous campaigns, including ones staged by Confederate units during the Civil War, Joes reveals the combination of elements that can lead a nation to success in guerrilla warfare or doom it to failure. In a controversial interpretation, he suggests that valuable lessons were forgotten or ignored in Southeast Asia. The American experience in Vietnam was a debacle but, according to Joes, profoundly atypical of the country's overall experience with guerrilla warfare. He examines several twentieth-century conflicts that should have better prepared the country for Vietnam: the Philippines after 1898, Nicaragua in the 1920s, Greece in the late 1940s, and the Philippines again during the Huk War of 1946-1954. Later, during the long Salvadoran conflict of the 1980s, American leaders seemed to recall what they had learned from their experiences with this type of warfare. Guerrilla insurgencies did not end with the Cold War. As America faces recurring crises in the Balkans, sub-Saharan Africa, the Middle East, and possibly Asia, a comprehensive analysis of past guerrilla engagements is essential for today's policymakers.
This book assesses the strategic linkages that the Korean Peninsula shares with the Indo-Pacific and provides a succinct picture of issues which will shape the trajectory of the Korean Peninsula in the future. This book analyses how critical actors such as the United States, China, Russia and Japan are caught in a tightly balanced power struggle affecting the Korean Peninsula. It shows how these countries are exerting control over the Korean Peninsula while also holding on to their status as critical actors in the broader Indo-Pacific. The prospects of peace, stability and unity in the Korean Peninsula and the impact of this on Indo-Pacific power politics are explored as well as the contending and competing interests in the region. Chapters present country-specific positions and approaches as case studies and review the impact of power politics on stakeholders' relationships in the Indo-Pacific. The book also argues that the Korean Peninsula and the issue of denuclearization is of primary importance to any direction an Indo-Pacific Partnership may take. Bringing together scholars, journalists and ex-diplomats, this book will be of interest to academics working in the field of international relations, foreign policy, security studies and Asian studies as well as audiences interested
This book calls for the progressive creation of supra-national institutions intended to protect life on Earth against natural threats, be these terrestrial (pandemics, super-volcanoes, major earthquakes.) or celestial (comets, asteroids, meteor storms). The protection proffered would need to be pre-emptive though also responsive, reducing the number of adverse events but also their specific consequences. Rancid though the world scene currently looks, this may actually be a good time to look towards a planetary security programme that can build up over a century or more. It would need special international institutions that are sufficiently integrated to cope with the celestial and terrestrial contingencies anticipated yet not so much a class apart as to be a law unto themselves, a military regime able to ride roughshod over general world opinion. Such an holistic approach to planetary security might prove to be a definitive substitute for war between nations. Professor Brown comes to such questions from a broad career background. His lead qualifications are a Masters degree from Oxford in Modern History and a Doctorate of Science from Birmingham (UK) in Applied Geophysics. He has been a naval meteorologist; staff college instructor; part-time but pro-active as a defence correspondent for several of the West's leading journals; and political consultant. From 1980 to 1986, he was Chairman of the Council for Arms Control. From 1993 to 1997 he worked half-time in the Sensors and Electronic Systems directorate of Britain's Ministry of Defence. This was as the Academic Consultant in a small task force specifically created to advise the government of the day apropos what British policy to Strategic Ballistic Missile Defence should be. A declassified rendering of his 90,000-word report (published by Mansfield College, Oxford, in 1998) argued firmly against our going down this path. It could lead to a catastrophic arms race.
This provocative book seeks to answer a most crucial-and embarrassing-question concerning the U.S. military: why the United States is so often stymied in military confrontations with seemingly weaker opponents, despite its "superpower" status. This fascinating book examines a question that continues to puzzle soldiers, statesmen, and scholars: why do major powers-including the ostensible superpower United States-repeatedly perform poorly against seemingly overmatched adversaries? And what can they, and the United States, do to better achieve their military objectives? How Wars are Won and Lost: Vulnerability and Military Power argues that beyond relying solely on overwhelming military might, the United States needs to focus more on exploiting weaknesses in their adversaries-such as national will, resource mobilization, and strategic miscues-just as opposing forces have done to gain advantage over our military efforts. The author tests the "vulnerability theory" by revisiting six conflicts from the Philippine War of 1899-1902 to the ongoing actions in Iraq and Afghanistan, showing again and again that victory often depends more on outthinking the enemy than outmuscling them. Interviews and data drawn from the author's personal experiences as a U.S. Army officer Six case study chapters on U.S. conflicts where military superiority alone was not the decisive factor in the outcome (the Philippines, World War II, Vietnam, Yugoslavia, Iraq, and Afghanistan)
Knife / Counter-Knife Combatives by W. Hock Hochheim describes offensive and defensive knife fighting tactics in all ranges of combat including standing, sitting and on the ground. This is a complete survival tactical manual for all aspects of knife combat. W. Hock Hochheim is known worldwide as an authority on knife fighting tactics and strategies. He's the author of more than a dozen books and more than 200 dvds on a broad range of self-defense subjects. He teaches military, police and citizens in 9 countries annually.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
This book presents a theory and empirical evidence for how security forces can identify militant suspects during counterinsurgency operations. A major oversight on the part of academics and practitioners has been to ignore the critical antecedent issue common to persuasion and coercion counterinsurgency (COIN) approaches: distinguishing friend from foe. This book proposes that the behaviour of security forces influences the likelihood of militant identification during a COIN campaign, and argues that security forces must respect civilian safety in order to create a credible commitment to facilitate collaboration with a population. This distinction is important as conventional wisdom has wrongly assumed that the presence of security forces confers control over terrain or influence over a population. Collaboration between civilian and government actors is the key observable indicator of support in COIN. Paradoxically, this theory accounts for why and how increased risk to government forces in the short term actually improves civilian security in the long run. Counterinsurgency, Security Forces, and the Identification Problem draws on three case studies: the Huk Rebellion in the Philippines post-World War II; Marines Corps' experiences in Vietnam through the Combined Action Program; and Special Operations activities in Iraq after 2003. For military practitioners, the work illustrates the critical precursor to establishing "security" during counterinsurgency operations. The book also examines the role and limits of modern technology in solving the identification problem. This book will be of interest to students of counterinsurgency, military history, strategic studies, US foreign policy, and security studies in general.
Using journalists' own standards as the measure, an exhaustive analysis of nearly 3000 network news reports from the Reagan, Bush, and Clinton administrations reveals that the networks may do more to misinform than inform on a whole range of complex issues related to national defense. This study paints a disturbing picture of the inadequate coverage ABC World News Tonight, CBS Evening News, and NBC Nightly News provide to millions of viewers each night. Aubin concludes that network coverage of defense issues was too often tainted by preconceived attitudes and lapses in journalistic standards. While as much as twenty-five cents of every dollar went to the defense budget during some of the periods reviewed, the networks hardly covered the key issues surrounding the Reagan defense buildup or the dramatic cuts that followed the end of the Cold War. In addition to their inadequate coverage, the networks also deprived Americans of balanced coverage of the investments made in high-tech weapons that ultimately prevailed in the Gulf War. Though the networks receive good marks for foreign policy coverage, they need to improve the quality of defense reports. This book provides them with the lessons and prescriptions for doing so, and it serves as a primer for all Americans who want to know just what it was that the networks failed to tell them.
Exploring the profound differences between what the military services believe-and how they uniquely serve the nation. When the US military confronts pressing security challenges, the Army, Navy, Air Force, and Marine Corps often react differently as they advise and execute civilian defense policies. Conventional wisdom holds that these dynamics tend to reflect a competition for prestige, influence, and dollars. Such interservice rivalries, however, are only a fraction of the real story. In Four Guardians, Jeffrey W. Donnithorne argues that the services act instead as principled agents, interpreting policies in ways that reflect their unique cultures and patterns of belief. Chapter-length portraits of each service highlight the influence of operational environment ("nature") and political history ("nurture") in shaping each service's cultural worldview. The book also offers two important case studies of civil-military policymaking: one, the little-known story of the creation of the Rapid Deployment Joint Task Force in the early 1980s; the other, the four-year political battle that led to the passage of the Goldwater-Nichols Act in 1986. Donnithorne uses these cases to demonstrate the principled agent framework in action while amply revealing the four services as distinctly different political actors. Combining crisp insight and empirical depth with engaging military history, Four Guardians provides practical utility for civil-military scholars, national security practitioners, and interested citizens alike. This timely work brings a new appreciation for the American military, the complex dynamics of civilian control, and the principled ways in which the four guardian services defend their nation.
This book comprises the journey of the Indian nation state and its tryst with destiny, where successive political leaderships, while governing India, contributed to a better understanding of the idea of India, its political and strategic culture, and the role that its military has had to play to develop that culture. Hence, the journey has been from the backwaters of 'defensive defence' to create a credible deterrence capacity as well as a doctrine to implement the same through political will and enter the domain of global involvement in the strategic, non-strategic as well as non-traditional areas of security. Thus, the title of the book The Purpose of India's Security Strategy: Defence, Deterrence and Global Involvement. It is hoped that this book will serve as a referral document to understand the polemics of the development of a strategic culture in India for an era which will be dominated by the information age and artificial intelligence, without forgetting that the Indian political leadership has come of age to understand the role of the military in the process of nation building.
This book presents a comprehensive history of the Royal Indian Navy (RIN). It traces the origins of the RIN to the East India Company, as early as 1612, and untangles the institution's complex history. Capturing various transitional phases of the RIN, especially during the crucial period of 1920-1950, it concludes with the final transfer of the RIN from under the British Raj to independent India. Drawn from a host of primary sources-personal diaries and logs, official reports and documents-the author presents a previously unexplored history of colonial and imperial defence policy, and the contribution of the RIN during the World Wars. This book explores several aspects in RIN's history such as its involvement in the First World War; its status in policies of the British Raj; the martial race theory in the RIN; and the development of the RIN from a non-combat force to a full-fledged combat defence force during the Second World War. It also studies the hitherto unexplored causes, nature and impact of the 1946 RIN Revolt on the eve of India's independence from a fresh perspective. An important intervention in the study of military and defence history, this will be an essential read for students, researchers, defence personnel, military academy cadets, as well as general readers.
The U.S. military is no longer based on a Cold War self-sufficient
model. Today's armed forces are a third smaller than they were
during the Cold War, and yet are expected to do as much if not more
than they did during those years. As a result, a transformation is
occurring in the way the U.S. government expects the military to
conduct operations--with much of that transformation contingent on
the use of contractors to deliver support to the armed forces
during military campaigns and afterwards.
Britain is often revered for its extensive experience of waging 'small wars'. Its long imperial history is littered with high profile counter-insurgency campaigns, thus marking it out as the world's most seasoned practitioner of this type of warfare. This is the first book to detail the tactical and operational dynamics of Britain's small wars, arguing that the military's use of force was more heavily constrained by wider strategic and political considerations than previously admitted. Outlining the civil-military strategy followed by the British in Palestine, Malaya, Kenya, Cyprus, Aden, Northern Ireland, Iraq and Afghanistan, Defending the realm?, available for the first time in paperback, argues that Britain's small wars since 1945 were fought against the backdrop of an irrevocable decline in British power. Written from a theoretically-informed perspective, grounded in rich archival sources, oral testimonies and a revisionist reading of the literature on counter-insurgency and counter-terrorism, this is the definitive account of the politics of Britain's small wars. -- .
During the Second World War a major part of the strategy of the Grand Alliance was shipping. The Germans fully appreciated the vulnerability of this and their attack on it, largely by means of submarines, became known as the Battle of the Atlantic. The attack was overcome, with some difficulty, by a number of means. One, which remained generally unknown until the 1970s, was the decryption of German coded signals, now usually called Ultra. Subsequent histories often tended to attribute the outcome of the Battle largely to the operation of this factor almost by itself, sometimes because of a lack of rigorous analysis and also because of a failure to set this important subject into the full and complex contexts in which it operated. This study rectifies this deficiency, setting out the full story of the series of campaigns and carefully assessing the complicated pattern of factors, thus allowing a much more balanced understanding of code-breaking.
Through in-depth research and interviews with veterans, William Fowler has produced the most complete history of this elite and elusive unit to date. Out of Africa 1941 - 1943 Into Italy 1943 - 1945 Overlord and Europe 1944 - 1945 Post War Phoenix Malaya 1948 - 1960 The Confrontation 1962 - 1966 Oman 1970 - 1976 The Cold War 1945 - 1990 The Falklands Interlude 1982 The First Gulf War 1990 - 1991 Back to Africa 1981 - 2000 Balkan interlude 1994 - Afghanistan 2001 - The Second Gulf War 2003 C Squadron to 1 SAS Regiment (Rhodesia) 1951 - 1980 Enter the Kiwis 1954 - The Australian Experience 1957 - The Future
This book brings together non-Western viewpoints on military pedagogy and professional military education (PME). In doing so, it seeks to provide a counterbalance to the predominantly European and North American bias found within the research field, as well as generating new insights on Latin American, African and Asian pedagogical commentaries and critiques. The collection contains essays from PME researchers and practitioners across fourteen countries, on subjects including large-scale educational reform, civil-military and academic influences on military pedagogy, internationalisation, cross-cultural collaboration, and interoperability within military education.
This volume examines civil-military relations in general and nonmilitary functions in the service of society and democracy in particular in six different nations, against the backdrop of the Israeli experience with a dual-role military. Since its inception, the Israeli Defense Force (IDF) has functioned as a very effective fighting force while also fulfilling many core nonmilitary roles as a powerful, educational, and remedial agent engaged in strengthening the fabric of Israeli society. The inner workings of the IDF in this area--the subject and dynamics of its broad social agenda, including the dilemmas inherent in education toward broad intellectual autonomy within a regimented system such as the military--are presented, for the first time before a non-Israeli audience, in detail (and with much candor) by both high echelon IDF personnel and junior officers in conscript service directly responsible for carrying out these missions. |
![]() ![]() You may like...
|