![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research
At the end of the Second World War, Germany lay at the mercy of its occupiers, all of whom launched programmes of scientific and technological exploitation. Each occupying nation sought to bolster their own armouries and industries with the spoils of war, and Britain was no exception. Shrouded in secrecy yet directed at the top levels of government and driven by ingenuity from across the civil service and armed forces, Britain made exploitation a key priority. By examining factories and laboratories, confiscating prototypes and blueprints, and interrogating and even recruiting German experts, Britain sought to utilise the innovations of the last war to prepare for the next. This ground-breaking book tells the full story of British exploitation for the first time, sheds new light on the legacies of the Second World War, and contributes to histories of intelligence, science, warfare and power in the midst of the twentieth century.
This book provides an empirical understanding of how EU-level defence industrial cooperation functions in practice. Using the Liberal Intergovernmental theoretical model, the book argues that while national economic preferences are an essential factor of government interests they only explain part of the dynamic that leads to the development of defence industrial policy at EU level. Moving beyond a simple adumbration of economic preferences, it shows how the EU's institutional framework and corpus of law are used by governments to reaffirm their position as the ultimate arbiter and promoter of national economic preferences in the defence industrial sector. To this end, the work asks why and how EU member state governments, European defence firms, and EU institutions developed EU-level defence industrial policy between 2003 and 2009. The book also analyses significant policy developments, including the establishment of a European Defence Agency and two EU Directives on equipment transfers and defence procurement. This book will be of much interest to students of EU policy, defence studies, security studies and International Relations in general.
Security in Africa: A Critical Approach to Western Indicators of Threat questions the dominant Western narrative of security threats in Africa. Based on an analysis traditional security studies and Western security policy, it argues that commonly used indicators are based on mainstream security studies and provide only circumscribed analyses of threats to international security. By assessing the origins of this traditional approach to security and problematizing failed states, political instability, Muslim populations, and poverty among others, it makes the case for a critical approach to framing security challenges in Africa.
It is not hyperbole to suggest that the foundations of post-cold war security in Europe have been badly damaged by the conflict in Ukraine since 2014. Russia's annexation of Crimea and intervention in eastern Ukraine appear to have created a 'simmering' conflict, which may take years to resolve and have profound consequences for the European security environment. This volume explores the various political, economic and social aspects of these profound changes and their wider significance for Europe, bringing together contributions by scholars from across the continent and in various disciplinary fields to offer an authoritative, in-depth examination of the complex causes of the Ukraine crisis and the consequences for Ukrainian statehood, Ukraine's relations with Russia, Russia's own domestic governance and Russia's relations with Europe. This book was originally published as a special issue of Europe-Asia Studies.
This book brings together reference material and primary source documents concerning the most important people, places, events, and technologies of Classical Greek warfare in one easy-to-use volume-an invaluable resource for students, educators, and general readers interested in this compelling subject. Greek Warfare: From the Battle of Marathon to the Conquests of Alexander the Great is a unique reference book that examines warfare in ancient Greece during the Classical era between 490 and 323 BCE. This easy-to-use, multi-format handbook provides a range of tools for investigating the military history of Classical Greece, including a timeline, reference entries, selected primary source documents, charts, and a glossary. The accessible reference entries illuminate all of the most important topics and issues within Classical Greek warfare, while the book's logical organization allows students, educators, and general readers alike to quickly find the specific information they seek. The comprehensive bibliography serves as a perfect gateway to additional resources on the subject. Charts present at-a-glance statistical information Maps depict important battles and the political delineation of Greece at different time periods Numerous illustrations of important people, events, and technologies help bring history to life
Sun Bins' Art of Warfare is an essential text of Chinese military philosophy and of strategy in general. This book, lost for over two thousand years and rediscovered only in 1972, has not yet reached the prominence of Sunzi's (Sun-tzu) The Art of Warfare, which is the best-known military treatise in the world. Sun Bin's work is an indispensable companion to the work of Sunzi, who is believed to be his ancestor, but deserves to be better known in its own right, both philosophically and historically. Here, noted sinologists D.C. Lau and Roger T. Ames offer an admirably lucid translation, and provide an introduction examining the life, times, and original philosophical contributions of Sun Bin. Sun Bin, advisor to King Wei of the state of Qi, worked and wrote during the mid-fourth century B.C.E. during China's Warring States period. It was a time of unprecedented violence; without a central national authority, nation-states fought fiercely amongst one another. New technologies made fighting more deadly, so that between the mid-fourth and mid-third centuries B.C.E, the number of battlefield casualties increased tenfold. Sun Bin's work is the key to understanding the physical and intellectual revolution that made such "progress" in the efficiency of warfare possible.
First published in 1979. The report of the Labour Party Defence Study Group, which met from early 1975 to mid-1977, represents a unique attempt to portray defence policy in the context of disarmament and the need to restructure and control the institutions of defence - in particular the defence industry. The report presented the fullest study made by any British political party concerning the implications and consequences of its stated defence policy, and embodied an examination of defence from the perspective of approaches of disarmament. At the same time, the search for a new policy in international relations was harmonised with the further development of a new industrial strategy, concentrating upon the potential for converting part of military industry to civil work. This work which presents a distinctive intervention in the general debate concerning defence policy, industrial and technological planning, economic priorities and public policy, will be of considerable relevance to both specialists in each of these fields as well as the general reader.
This research guide is an introduction to military intelligence, a neglected aspect of warfare that provides commanders and national leaders with essential information for decision making. The introduction provides the general reader with an explanation of the terminology, procedures, and institutional problems of military intelligence, while outlining the history of this field and identifying areas for further research. The core of the guide is an extensively annotated bibliography of unclassified English language materials on military intelligence, the evolution of intelligence operations, the role of intelligence in air, ground, and naval operations, and specialized fields of espionage, counter intelligence, technical intelligence, and aerial photography. This guide is intended to fill a void in the literature for soldiers, historians, and general readers.
This book describes and analyzes the history of the Mediterranean "Double-Cross System" of the Second World War, an intelligence operation run primarily by British officers which turned captured German spies into double agents. Through a complex system of coordination, they were utilized from 1941 to the end of the war in 1945 to secure Allied territory through security and counter-intelligence operations, and also to deceive the German military by passing false information about Allied military planning and operations. The primary questions addressed by the book are: how did the double-cross-system come into existence; what effects did it have on the intelligence war and the broader military conflict; and why did it have those effects? The book contains chapters assessing how the system came into being and how it was organized, and also chapters which analyze its performance in security and counter-intelligence operations, and in deception.
This book deals with the crucially important NATO crisis of 1966-67, and the intensive reorientation of NATO strategy following the departure of France from integrated military command. It includes four detailed case studies and draws on previously unavailable documents.
The fourth and final volume in a pioneering series on the Chinese
military, "Imagined Enemies" offers an unprecedented look at its
history, operational structure, modernization, and strategy.
Beginnning with an examination of culturee adn thought in Part I,
the authors explore the transition away transition away from Mao
Zedong's revolutionary doctrine, the conflict with Moscow, and
Beijing's preoccupation with Taiwanese separatism and preparations
for war to thwart it. Part II focuses on operational and policy
decisions in the National Command Authority and, subsequently, in
the People's Liberation Army. Part III provides a detailed study of
the Second Artillery, China's strategic rocket forces. The book
concludes with the transformation of military strategy and shows
how it is being tested in military exercises, with Taiwan and the
United States as "imagined enemies."
On Operations: Operational Art and Military Disciplines traces the history of the development of military staffs and ideas on the operational level of war and operational art from the Napoleonic Wars to today, viewing them through the lens of Prussia/Germany, the Soviet Union, and the United States. B. A. Friedman concludes that the operational level of war should be rejected as fundamentally flawed, but that operational art is an accurate description of the activities of the military staff, an organization developed to provide the brainpower necessary to manage the complexity of modern military operations. Rather than simply serve as an intercession between levels, the military staff exists as an enabler and supporting organization to tacticians and strategists alike. On Operations examines the organization of military staffs, which has changed little since Napoleon's time. Historical examinations of the functions staffs provided to commanders, and the disciplines of the staff officers themselves, leads to conclusions about how best to organize staffs in the future. Friedman demonstrates these ideas through case studies of historical campaigns based on the military discipline system developed.
This book examines the major armed conflicts in South Asia. The articles study conflict management, look at the direction the armed conflict is likely to take and provide a set of alternative measures that could be pursued by the actors. Designed as an annual series, the articles provide a brief historical sketch of the emergence of armed conflict, outlining its various phases. This volume examines the various armed conflicts in South Asia in 2009 - in Afghanistan, FATA and NWFP, J&K, North-East India, Nepal and Sri Lanka, and sectarian and Naxalite violence in Pakistan and India respectively. The volume also includes an exclusive chapter on the continuing story of suicide terrorism in Pakistan. This important collection discusses India's geo-strategic importance and its common borders with its neighbours; the psychological and economic costs of violence and the problem of refugee migrants; treaties, memorandums and ceasefire agreements signed over the past several years across countries; the role of the United Nations and other peacekeeping forces; and the future of failed and failing states.
This book offers the first systematic, comparative analysis of military education and training in Europe within the context of the post-Cold War security environment. Based on an analysis of military education institutions in the UK, Germany, Finland, Romania and the Baltic States, this book demonstrates that the convergence of European military cultures since the end of the Cold War is linked to changes in military education. The process of convergence originates, at least in part, from the full or partial adoption of a new concept by post-commissioning professional military education institutions: the National Defence University. Officers are now educated alongside civilians and public servants, wherein they enjoy a socialization experience that is markedly different from that of previous generations of European officers, and is increasingly similar across national borders. In addition, this book argues that with the control over the curricula and graduation criteria increasingly set by civilian higher education authorities, the European armed forces, while continuing to exist, and hold significant (although declining) capabilities, stand to lose their status as a profession in the traditional sense. This book will be of much interest to students of military, European security policy, European politics, and IR in general.
This powerful study makes a compelling case about the key U.S. role in state terrorism in Latin America during the Cold War. Long hidden from public view, Operation Condor was a military network created in the 1970s to eliminate political opponents of Latin American regimes. Its key members were the anticommunist dictatorships of Chile, Argentina, Uruguay, Bolivia, Paraguay, and Brazil, later joined by Peru and Ecuador, with covert support from the U.S. government. Drawing on a wealth of testimonies, declassified files, and Latin American primary sources, J. Patrice McSherry examines Operation Condor from numerous vantage points: its secret structures, intelligence networks, covert operations against dissidents, political assassinations worldwide, commanders and operatives, links to the Pentagon and the CIA, and extension to Central America in the 1980s. The author convincingly shows how, using extralegal and terrorist methods, Operation Condor hunted down, seized, and executed political opponents across borders. McSherry argues that Condor functioned within, or parallel to, the structures of the larger inter-American military system led by the United States, and that declassified U.S. documents make clear that U.S. security officers saw Condor as a legitimate and useful 'counterterror' organization. Revealing new details of Condor operations and fresh evidence of links to the U.S. security establishment, this controversial work offers an original analysis of the use of secret, parallel armies in Western counterinsurgency strategies. It will be a clarion call to all readers to consider the long-term consequences of clandestine operations in the name of 'democracy.'
Recent concern about mainland China's intentions towards Taiwan, and more general concern about the risk of instability in the region, has led to growing interest in Taiwan's military strategy. This book brings together a range of experts from the West and from Taiwan itself who examine the key issues connected with Taiwan's air power, which is a key aspect of the China-Taiwan military balance. During the 1990s, Taiwan invested considerable resources in thoroughly re-equipping its air force with modern air defence and strike aircraft equipped with modern missiles, thereby denying China command of the air in any conflict in the short- to medium-term. In the longer-term, air power will remain a crucial influence on the overall balance, as China's efforts to upgrade its own air force's capabilities begin to undermine Taiwan's current advantages.
Based on extensive Japanese-language materials, this book is the first to examine the development of Japan's Ground Self-Defense Force. It addresses: how the GSDF was able to emerge as the post-war successor of the Imperial Japanese Army despite Japan's anti-militarist constitution; how the GSDF, despite the public skepticism and even hostility that greeted its creation, built domestic and international legitimacy; and how the GSDF has responded to changes in international and domestic environments. This path-breaking study of the world's third-largest-economic power's ground army is timely for two reasons. First, the resurgence of tensions in Northeast Asia over territorial disputes, and the emphasis recent Japanese governments have placed on using the GSDF for defending Japan's outlying islands is driving media coverage and specialist interest in the GSDF. Second, the March 11, 2011 Great East Japan Earthquake and Tsunami has focused global attention on the GSDF as Japan's lead disaster relief organization. This highly informative and thoroughly researched book provides insight for policy makers and academics interested in Japanese foreign and defense policies.
On June 22, 1941, just less than two years after signing the Nazi-Soviet Agreements, Adolf Hitler's German army invaded the Soviet Union. The attack hardly came as a surprise to Josef Stalin; in fact, history has long held that Stalin spent the two intervening years building up his defenses against a Nazi attack. With the gradual declassifying of former Soviet documents, though, historians are learning more and more about Stalin's grand plan during the years 1939-1941. Longtime Soviet expert Albert L. Weeks has studied the newly-released information and come to a different conclusion about the Soviet Union's pre-war buildup_it was not precaution against German invasion at all. In fact, Weeks argues, the evidence now suggests Soviet mobilization was aimed at an eventual invasion of Nazi Germany. The Soviets were quietly biding their time between 1939 and 1941, allowing the capitalist powers to destroy one another, all the while preparing for their own Westward march. Stalin, Weeks shows, wasn't waiting for a Nazi attack_Hitler simply beat him to the punch.
Bitzinger examines the phenomenon of attempted self-reliance in arms production within Asia, and assesses the extent of success in balancing this independence with the growing requirements of next-generation weapons systems. He analyzes China, India, Japan, South Korea, and Southeast Asia. The overarching question in the book is whether self-reliance is a strategically viable solution for development and manufacturing of arms. Given the ever-changing dynamics and increasing demand for sophisticated next-generation weaponry, will these countries be able to individually sustain their domestic defense industries and constantly update their technologies? This is the first book to analyze arms production from a regional perspective.
What if you could combine the agility, adaptability, and cohesion of a small team with the power and resources of a giant organization? When General Stanley McChrystal took command of the Joint Special Operations Task Force in Iraq in 2003, he quickly realized that conventional military tactics were failing. The allied forces had a huge advantage in numbers, equipment and training - but none of the enemy's speed and flexibility. McChrystal and his colleagues discarded a century of conventional wisdom to create a 'team of teams' that combined extremely transparent communication with decentralized decision-making authority. Faster, flatter and more flexible, the task force beat back al-Qaeda. In this powerful book, McChrystal and his colleagues show how the challenges they faced in Iraq can be relevant to any leader. Through compelling examples, the authors demonstrate that the 'team of teams' strategy has worked everywhere from hospital emergency rooms to NASA and has the potential to transform organizations large and small. 'A bold argument that leaders can help teams become greater than the sum of their parts' Charles Duhigg, author of The Power of Habit 'An indispensable guide to organizational change' Walter Isaacson, author of Steve Jobs
As European security structures are undergoing transformation in the 1990s it is crucial to examine their origins and rationale: NATO secured peace and facilitated economic and political co-operation, while also becoming the vehicle of national rivalry. This book examines why and how NATO came into existence, and what its strengths and weaknesses were during its formative years. It draws conclusions from these experiences relevant to the reforms of Western security structures in the 1990s.
Security Strategies of Middle Powers in the Asia Pacific examines what drives the different regional security strategies of four middle powers in the Asia Pacific: Australia, Indonesia, South Korea and Malaysia. Drawing on the extant middle power literature, the authors argue that the regional security strategies of middle powers could take two forms, namely, functional or normative. A functional strategy means that the middle power targets its resources to address a specific problem that it has a high level of interest in, while a normative strategy refers to a focus on promoting general behavioural standards and confidence building at the multilateral level. This book argues that whether a middle power ultimately employs a more functional or normative regional security strategy depends on its resource availability and strategic environment.
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilise AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
George F. Kennan's strategic thought was instrumental in the formulation of the American grand strategy of containment of the Soviet Union. As Dr. Russell points out, Kennan's strategic thought was forged in the diplomatic practice and scholarship of the time. Russell looks beyond containment, however, to sift through Kennan's work to illuminate the worldview that informed his analysis of international relations and American foreign policy. Kennan's realist worldview contained principles for governing American diplomacy and the use of force to achieve national interests within the bounds set by the international competition for power between nation-states. Kennan's worldview illuminates the continuities of international politics that are often overlooked because of the massive changes in the post-Cold War world. Ironically, Kennan's worldview continues to provide a theoretical footing for guiding American foreign policy after containment. This is an important study for scholars, policymakers, and concerned citizens interested in international relations, American foreign policy, diplomatic history, and strategic studies. |
![]() ![]() You may like...
The Book of Military Strategy - Sun…
Sun Tzu, Niccolo Machiavelli, …
Hardcover
R1,423
Discovery Miles 14 230
Spacepower - Doctrine for Space Forces
United States Space Force
Hardcover
R681
Discovery Miles 6 810
|