![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
Codenames were a vital feature of World War II, serving as mental shorthand for those in the know, and obscuring the issues for those who were not. Codenames were used from the highest level, in the planning of grand strategic moves affecting the conduct of the whole war, to the lowest command divisions, in the conduct of small-scale tactical operations. This encyclopedia, first published in 1986, removes the mystery surrounding many of the important code names from the era. With around 3,000 entries drawn from all sides - the U.K., U.S.A., Germany, the U.S.S.R. and Japan - Christopher Chant's work provides a uniquely comprehensive and full overview of major operations, names and code words. Thorough and exciting, this key reference reissue is an exceptionally valuable resource for military historians, enthusiasts and general readers with an interest in World War II.
Using examples from a wide variety of conflicts, Lawrence Freedman shows that successful military command depends on the ability not only to use armed forces effectively but also to understand the political context in which they are operating. Command in war is about forging effective strategies and implementing them, making sure that orders are appropriate, well-communicated, and then obeyed. But it is also an intensely political process. This is largely because how wars are fought depends to a large extent on how their aims are set. It is also because commanders in one realm must possess the ability to work with other command structures, including those of other branches of the armed forces and allies. In Command, Lawrence Freedman explores the importance of political as well as operational considerations in command with a series of eleven vivid case studies, all taken from the period after 1945. Over this period, the risks of nuclear escalation led to a shift away from great power confrontations and towards civil wars, and advances in communication technologies made it easier for higher-level commanders to direct their subordinates. Freedman covers defeats as well as victories. Pakistani generals tried to avoid surrender as they were losing the eastern part of their country to India in 1971. Iraq's Saddam Hussein turned his defeats into triumphant narratives of victory. Osama bin Laden escaped the Americans in Afghanistan in 2001. The UK struggled as a junior partner to the US in Iraq after 2003. We come across insubordinate generals, such as Israel's Arik Sharon, and those in the French army in Algeria, so frustrated with their political leadership that they twice tried to change it. At the other end of the scale, Che Guevara in Congo in 1966 and Igor Girkin in Ukraine in 2014 both tried to spark local wars to suit their grandiose objectives. Freedman ends the book with a meditation on the future of command in a world that is becoming increasingly reliant on technologies like artificial intelligence. A wide-ranging and insightful history of the changing nature of command in the postwar era, this will stand as a definitive account of a foundational concept in both military affairs and politics.
This book, first published in 1985, is an in-depth analysis of the Luftwaffe in the Second World War, using previously untapped German archives and newly-released 'Ultra' intelligence records. It looks at the Luftwaffe within the context of the overall political decision-making process within the Third Reich. It is especially valuable for its careful study of industrial production and pilot losses in the conduct of operations.
'Outstanding ... combines a glimpse behind the security screens with a sharp analysis of the real global insecurities - growing inequality and unsustainability' - New Internationalist Written in the late 1990s, Losing Control was years, if not decades, ahead of its time, predicting the 9/11 attacks, a seemingly endless war on terror and the relentless increase in revolts from the margins and bitter opposition to wealthy elites. Now, more than two decades later and in an era of pandemics, climate breakdown and potential further military activity in the Middle East, Asia and Africa, Paul Rogers has revised and expanded the original analysis, pointing to the 2030s and '40s as the decades that will see a showdown between a bitter, environmentally wrecked and deeply insecure world and a possible world order rooted in justice and peace.
1986 did not live up to its name as the International Year of Peace. At the end of 1986 there were 36 wars and armed conflicts being fought, the most destructive of which (the Iraq-Iran war) involves the USA and the USSR both supplying arms to the combatants and now protecting shipping in the Persian Gulf. Arms control came to an impasse, weapons proliferated and arms transfers became more uncontrolled. Continuing their annual review, compiled from open sources by an international staff working on neutral ground, this eighteenth edition of the SIPRI Yearbook bring together information on world armaments and the efforts made to limit or reduce them, an overview of the whole field of developments in armaments technology, in military expenditure, in the arms trade and in the attempts to halt or reverse the process. In addition to regular features and statistics, this latest Yearbook contains special studies on armed conflicts throughout the world, the Chernobyl accident, verification issues, and South Africa. Its comprehensive coverage makes it an invaluable source book for anyone seeking authoritative information on strategic studies, war studies, international relations or peace studies.
This book provides an institutional costs framework for intelligence and security communities to examine the factors that can encourage or obstruct cooperation. The governmental functions of security and intelligence require various organisations to interact in a symbiotic way. These organisations must constantly negotiate with each other to establish who should address which issue and with what resources. By coupling adapted versions of transaction costs theories with socio-political perspectives, this book provides a model to explain why some cooperative endeavours are successful, whilst others fail. This framework is applied to counterterrorism and defence intelligence in the UK and the US to demonstrate that the view of good cooperation in the former and poor cooperation in the latter is overly simplistic. Neither is necessarily more disposed to behave cooperatively than the other; rather, the institutional costs created by their respective organisational architectures incentivise different cooperative behaviour in different circumstances. This book will be of much interest to students of intelligence studies, organisational studies, politics and security studies.
This book arises from the NATO Advanced Study Institute "Technological Innovations in Detection and Sensing of CBRN Agents and Ecological Terrorism" held in Chisinau, Republic of Moldova in June 2010. It comprises a variety of invited contributions by highly experienced educators, scientists, and industrialists, and is structured to cover important aspects of the field that include developments in chemical-biological, and radiation sensing, synthesis and processing of sensors, and applications of sensors in detecting/monitoring contaminants introduced/dispersed inadvertently or intentionally in air, water, and food supplies. The book emphasizes nanomaterials and nanotechnology based sensing and also includes a section on sensing and detection technologies that can be applied to information security. Finally, it examines regional, national, and international policies and ethics related to nanomaterials and sensing. It will be of considerable interest and value to those already pursuing or considering careers in the field of nanostructured materials and nanotechnology based sensing, In general, it serves as a valuable source of information for those interested in how nanomaterials and nanotechnologies are advancing the field of sensing, detection, and remediation, policy makers, and commanders in the field.
This book explores Japan's emerging national security policy in relation to China. It considers the rise of nationalism in contemporary Japan, the recent actions of the Abe government to change Japan's security policy course and the importance of domestic views, both elite and popular, about safety and credibility in shaping security policy. It highlights the lack of strong links between China and Japan and the existence in Japan of significant misconceptions about China. It discusses the politics of Japan's alliances, examines the growth of national pride in Japan and of a more confrontational attitude toward China, and concludes by putting forward some scenarios for likely future developments and some policy proposals for a stable Japan-China relationship.
Now in its seventeenth year, the Stockhom International Peace Research Institute (SIPRI) Yearbook brings together information on world armaments and the efforts made to limit or reduce them. Compiled from open sources by an international staff working on neutral ground, the yearbook examines pressing issues such as nuclear and space weapons, chemical and biological warfare and military technology, and military expenditure and the arms trade.
Animals and War: Confronting the Military-Animal Industrial Complex is the first book to examine how nonhuman animals are used for war by military forces. Each chapter delves deeply into modes of nonhuman animal exploitation: as weapons, test subjects, and transportation, and as casualties of war leading to homelessness, starvation, and death. With leading scholar-activists writing each chapter, this is an important text in the fields of peace studies and critical animal studies. This is a must read for anyone interested in ending war and fostering peace and justice.
Acknowledgements. Chapter I: National Defense Policy and Resource Decision Making: Unique Challenges. Chapter II: The Federal Government Budget Process. Chapter III: Budgeting for National Defense: Complicated but Workable. Chapter IV: The Planning, Programming, Budgeting, Execution System.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
A new framework contextualizes crucial international security issues at sea in the Indo-Pacific Competition at sea is once again a central issue of international security. Nowhere is the urgency to address state-on-state competition at sea more strongly felt than in the Indo-Pacific region, where freedom of navigation is challenged by regional states’ continuous investments in naval power, and the renewed political will to use it to undermine its principles. The New Age of Naval Power in the Indo-Pacific provides an original framework in which five “factors of influence” explain how and why naval power matters in this pivotal part of the world. An international group of contributors make the case that these five factors draw upon a longstanding influence of naval power on regional dynamics and impact the extent to which different states in the region use naval power: the capacity to exert control over sea-lanes, the capacity to deploy a nuclear deterrent at sea, the capacity to implement the law of the sea in an advantageous way, the ability to control marine resources, and the capacity for technological innovation. The New Age of Naval Power in the Indo-Pacific offers a fresh approach for academics and policy makers seeking to navigate the complexity of maritime security and regional affairs.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
This book examines how internal and external security are blurring at the EU level, and the implications this has for EU security governance and the EU as a security actor. The EU claims that 'internal and external security are inseparable' and requires a more integrated approach. This book critically assesses this claim in relation to the threats facing the EU, its responses to them, and the practical and normative implications for EU security governance and actorness. It sets out a novel conceptual framework - the EU security continuum - to examine the ways and extent to which internal and external security are blurring along three axes: geographic, bureaucratic, and functional. This is done through an analysis of four key security issues, regional conflict, terrorism, organised crime, and cybersecurity. The book demonstrates that, to varying degrees, these security threats and/or responses do transcend boundaries. However, institutional turf wars and capability silos hamper the EU's integrated approach and, therefore, its management of transboundary security threats. Yet, the EU's pursuit of an integrated approach is reframing its claimed normative distinctiveness toward a more practical one, based on a transnational and multidimensional approach. Such a rearticulation, if implemented, would make the EU a genuinely transboundary security actor, properly structured and equipped to tackle the 21st century's internal-external security continuum. This book will be of much interest to students of European Security, EU politics, and international relations.
War Transformed: The Future of Twenty-First-Century Great Power Competition and Conflict provides insights for those involved in the design of military strategy, and the forces that must execute that strategy. Emphasizing the impacts of technology, new era strategic competition, demography, and climate change, Mick Ryan uses historical as well as contemporary anecdotes throughout the book to highlight key challenges faced by nations in a new era of great power rivalry. Just as previous industrial revolutions have advanced societies, the nascent fourth industrial revolution will have a similar impact on how humans fight, compete, and build military power in the twenty-first century. After reviewing the principle catalysts of change in the security environment, War Transformed seeks to provide a preview of the shape of war and competition in the twenty-first century. Ryan examines both the shifting character of war and its enduring nature. In doing so, he proposes important trends in warfare that will shape all aspects of human competition and conflict in the coming decades. The remainder of the book analyzes how military institutions must prepare for future competition and conflict. Competing and engaging in combat in this new era involves new and evolved strategies and warfighting concepts, as well as adapting our current military organizations. It will also demand building an intellectual edge in military personnel through evolved concepts of training, education, and development. As the competitive environment and potential battlefields continue to change, conceptions of combat, competition and conflict must also evolve. Mick Ryan makes the case for transforming how Western military institutions view war in this century.
The book is a collection of studies on the war in Ukraine. The considerations focus on different contexts of the first phase of the armed conflict. The authors try to answer questions about the motives and results of Russian disinformation and blaming Ukraine, the US and NATO for the invasion, as well as of the position of third countries towards the Russian aggression. One of the issues addressed is sexual violence in wartime and the image of women in armed conflict. The authors also analyze the aid provided by certain nations and Ukrainian national minorities in selected countries. Some chapters also examined public opinions on various war-related issues. Such a broad approach provides multidimensional view of the war while complementing earlier images of the conflict in Ukraine.
This book scrutinizes how contemporary practices of security have come to rely on many different translations of security, risk, and danger. Institutions of national security policies are currently undergoing radical conceptual and organisational changes, and this book presents a novel approach for how to study and politically address the new situation. Complex and uncertain threat environments, such as terrorism, climate change, and the global financial crisis, have paved the way for new forms of security governance that have profoundly transformed the ways in which threats are handled today. Crucially, there is a decentralisation of the management of security, which is increasingly handled by a broad set of societal actors that previously were not considered powerful in the conduct of security affairs. This transformation of security knowledge and management changes the meaning of traditional concepts and practices, and calls for investigation into the many meanings of security implied when contemporary societies manage radical dangers, risks, and threats. It is necessary to study both what these meanings are and how they developed from the security practices of the past. Addressing this knowledge gap, the book asks how different ideas about threats, risk, and dangers meet in the current practices of security, broadly understood, and with what political consequences. This book will be of interest to students of critical security studies, anthropology, risk studies, science and technology studies and International Relations. The Open Access version of this book, available at: https://www.routledge.com/Translations-of-Security-A-Framework-for-the-Study-of-Unwanted-Futures/Berling-Gad-Petersen-Waever/p/book/9781032007090 has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license
Historians of American environmentalism have long given religion either a negligible role or a negative one in the development of the field. According to the standard view, Christianity fostered attitudes hostile or indifferent to nature, with Protestantism the worst offender. While virtually all leading environmental figures did eventually leave organized religion, a large majority however had religious childhoods, usually in Reformed Protestant churches, and often counted clergy as close relatives. And although popular support for conservation and environmentalism was relatively non-denominational, Congregationalists provided the foundational ideas of conservation, while the rise and decline of environmentalism as a powerful national movement coincided with the prevalence of Presbyterian leadership. By tracing the history of American environmentalism from a perspective that puts religion at the center rather than the margins, Mark Stoll opens up a fundamentally new and much needed narrative in environmental studies. Inherit the Holy Mountain argues against the divide between religion and American environmentalism, demonstrating how religion necessarily provided environmentalists with deeply-embedded moral and cultural ways of viewing the world giving content, direction, and tone to the environmental causes they espoused. The book demonstrates how individuals' denominational origins corresponded with characteristic sets of ideas about nature and the environment, with each denomination fostering a distinctive culture with its own moral framework and its own placement of humans within the natural world. Stoll also demonstrates how each denomination also fostered a distinctive aesthetic reaction to nature, beginning each chapter of the book with an analysis of a representative work of art. Inherit the Holy Mountain also provides insight into the possible future of environmentalism in the United States, concluding with an examination of the current religious scene and consideration of what it may tell us. Whatever form the response to these problems will take in the twenty-first century, Stoll says, it will look very different, with different values, goals, and styles of leadership, than it did when the children of the Reformed churches created and led it.
This book examines intelligence analysis in the digital age and demonstrates how intelligence has entered a new era. While intelligence is an ancient activity, the digital age is a relatively new phenomenon. This volume uses the concept of the "digital age" to highlight the increased change, complexity, and pace of information that is now circulated, as new technology has reduced the time it takes to spread news to almost nothing. These factors mean that decision-makers face an increasingly challenging threat environment, which in turn increases the demand for timely, relevant, and reliable intelligence to support policymaking. In this context, the book demonstrates that intelligence places greater demands on analysis work, as the traditional intelligence cycle is no longer adequate as a process description. In the digital age, it is not enough to accumulate as much information as possible to gain a better understanding of the world. To meet customers' needs, the intelligence process must be centred around the analysis work - which in turn has increased the demand for analysts. Assessments, not least predictions, are now just as important as revealing someone else's secrets. This volume will be of much interest to students of intelligence studies, security studies, and international relations.
A comparative analysis of an old and new EU Member State's perceptions of and contributions to EU security and defence. This book focuses on change and continuity in both countries' defence policies and where convergence and divergence has occurred. This has important implications for the EU's effectiveness as an international security actor.
Elephants have fought in human armies for more than three thousand years. Asian powers boasted of their pachyderm power, while the Romans fielded elephants alongside their legendary legions but were, perhaps, too proud to admit that mere animals contributed to victory. Elephants have gored, stomped, and sliced their way through infantry and cavalry with great success. They have also been cut, speared, bombed, and napalmed for their efforts. This is the story of their largely forgotten role in the history of warfare. Generals throughout recorded history have used elephants as tanks, bulldozers, and cargo trucks long before such vehicles existed. Until gunpowder began to reduce the utility of elephants in battle during the 17th Century, these beasts built roads, swung swords, or simply terrified opposing forces. Although some believe that elephants were mere gimmicks of warfare, Kistler discredits that notion. His book hopes to give elephants the credit they deserve for the sacrifices they have endured. Elephants have long fought for and served human masters, but it is now the elephants themselves that must be protected.
- offers most comprehensive and up to date0 history of the IAEA's six decades - features essay by leading academics and policymakers - makes an important contribution to security and nonproliferation studies, as well as to the field of international organizations and global governance
Intelligence is currently facing increasingly challenging cross-pressures from both a need for accurate and timely assessments of potential or imminent security threats and the unpredictability of many of these emerging threats. We are living in a social environment of growing security and intelligence challenges, yet the traditional, narrow intelligence process is becoming increasingly insufficient for coping with diffuse, complex, and rapidly-transforming threats. The essence of intelligence is no longer the collection, analysis, and dissemination of secret information, but has become instead the management of uncertainty in areas critical for overriding security goals--not only for nations, but also for the international community as a whole. For its part, scientific research on major societal risks like climate change is facing a similar cross-pressure from demand on the one hand and incomplete data and developing theoretical concepts on the other. For both of these knowledge-producing domains, the common denominator is the paramount challenges of framing and communicating uncertainty and of managing the pitfalls of politicization National Intelligence and Science is one of the first attempts to analyze these converging domains and the implications of their convergence, in terms of both more scientific approaches to intelligence problems and intelligence approaches to scientific problems. Science and intelligence constitute, as the book spells out, two remarkably similar and interlinked domains of knowledge production, yet ones that remain traditionally separated by a deep political, cultural, and epistemological divide. Looking ahead, the two twentieth-century monoliths--the scientific and the intelligence estates--are becoming simply outdated in their traditional form. The risk society is closing the divide, though in a direction not foreseen by the proponents of turning intelligence analysis into a science, or the new production of scientific knowledge. |
![]() ![]() You may like...
|