![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
"A must-read...It reveals important truths." -Vint Cerf, Internet pioneer "One of the finest books on information security published so far in this century-easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive." -Thomas Rid, author of Active Measures Cyber attacks are less destructive than we thought they would be-but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists. Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph. "A helpful reminder...of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission." -Jonathan Freedland, New York Review of Books "The best examination I have read of how increasingly dramatic developments in cyberspace are defining the 'new normal' of geopolitics in the digital age." -General David Petraeus, former Director of the CIA "Fundamentally changes the way we think about cyber operations from 'war' to something of significant import that is not war-what Buchanan refers to as 'real geopolitical competition.'" -Richard Harknett, former Scholar-in-Residence at United States Cyber Command
Based on extensive Japanese-language materials, this book is the first to examine the development of Japan's Ground Self-Defense Force. It addresses: how the GSDF was able to emerge as the post-war successor of the Imperial Japanese Army despite Japan's anti-militarist constitution; how the GSDF, despite the public skepticism and even hostility that greeted its creation, built domestic and international legitimacy; and how the GSDF has responded to changes in international and domestic environments. This path-breaking study of the world's third-largest-economic power's ground army is timely for two reasons. First, the resurgence of tensions in Northeast Asia over territorial disputes, and the emphasis recent Japanese governments have placed on using the GSDF for defending Japan's outlying islands is driving media coverage and specialist interest in the GSDF. Second, the March 11, 2011 Great East Japan Earthquake and Tsunami has focused global attention on the GSDF as Japan's lead disaster relief organization. This highly informative and thoroughly researched book provides insight for policy makers and academics interested in Japanese foreign and defense policies.
In a world that is increasingly unstable, intelligence services like the American CIA and the United Kingdom's MI6 exist to deliver security. Whether the challenge involves terrorism, cyber-security, or the renewed specter of great power conflict, intelligence agencies mitigate threats and provide decisional advantage to national leaders. But empowered intelligence services require adequate supervision and oversight, which must be about more than the narrow (if still precarious) task of ensuring the legality of covert operations and surveillance activities. Global Intelligence Oversight is a comparative investigation of how democratic countries can govern their intelligence services so that they are effective, but operate within frameworks that are acceptable to their people in an interconnected world. The book demonstrates how the institutions that oversee intelligence agencies participate in the protection of national security while safeguarding civil liberties, balancing among competing national interests, and building public trust in inherently secret activities. It does so by analyzing the role of courts and independent oversight bodies as they operate in countries with robust constitutional frameworks and powerful intelligence services. The book also illuminates a new transnational oversight dynamic that is shaping and constraining security services in new ways. It describes how global technology companies and litigation in transnational forums constitute a new form of oversight whose contours are still undefined. As rapid changes in technology bring the world closer together, these forces will complement their more traditional counterparts in ensuring that intelligence activities remain effective, legitimate, and sustainable.
Adored by many, loathed by some, General George S. Patton, Jr., was one of the most brilliant military strategists in history. War As I Knew It is the personal and candid account of his celebrated, relentless crusade across western Europe during World War II. First published in 1947, this absorbing narrative draws on Patton's vivid memories of battle and his detailed diaries, from the moment the Third Army exploded onto the Brittany Peninsula to the final Allied casualty report. The result is not only a grueling, human account of daily combat and heroic feats - including a riveting look at the Battle of the Bulge - but a valuable chronicle of the strategies and fiery personality of a legendary warrior. Patton's letters from earlier military campaigns in North Africa and Sicily, complemented by a powerful retrospective of his guiding philosophies, further reveal a man of uncompromising will and uncommon character, which made "Georgie" a household name in mid-century America. With a new introduction.
This book examines a series of questions associated with the increasing application and implications of biometrics in contemporary everyday life. In the wake of the events of 9/11, the reliance on increasingly sophisticated and invasive technologies across a burgeoning field of applications has accelerated, giving rise to the term 'biometric state'. This book explores how these 'virtual borders' are created and the effect they have upon the politics of citizenship and immigration, especially how they contribute to the treatment of citizens as suspects. Finally and most importantly, this text argues that the rationale of 'governing through risk' facilitates pre-emptory logics, a negligent attitude towards 'false positives', and an overall proliferation of borders and ubiquitous risk, which becomes integral to contemporary everyday life, far beyond the confined politics of national borders and frontiers. By focusing on specific sites, such as virtual borders in airports, trusted traveller programs like the NEXUS program and those delivered by airlines and supported by governmental authorities (TSA and CATSA respectively), this book raises critical questions about the emerging biometric state and its commitment and constitution vis-a-vis technology of 'governing through risk'. This book will be of interest to students of biopolitics, critical security, surveillance studies and International Relations in general. Benjamin J. Muller is assistant professor in International Relations at Simon Fraser University, Burnaby, Canada. He completed his PhD in the School of Politics and International Studies at Queen's University Belfast, Northern Ireland, in 2005."
This book argues that the global development and security agendas are merging. No longer is the language of security confined within the straitjacket of the state and associated national security concerns. The spotlight is shifting to the legitimate security concerns of human beings. The book examines how development is promoted by global governance institutions and how this has impacted on human security in the 1990s. Caroline Thomas focuses on the effects of trade, finance, and investment liberalisation on deepening inequality. She explores different approaches for addressing the deepening inequality which threatens the economy at all levels, from the household, to the community, to the global. The book investigates reformist and transformist visions of the future and the contrasting policies tabled for their achievements. Thomas argues that ultimately human security requires a different developmental strategy.
A strategically important natural harbor in the Orkney Islands,
Scapa Flow served as Britain's main fleet anchorage during World
Wars I and II. It held Jellicoe's Grand Fleet from 1914-18, and it
was from here that it sailed out to do battle with the Germans at
Jutland in 1916. In 1914 the British began building a comprehensive
defensive network by fortifying the entrances to Scapa Flow and
then extending these defenses to cover most of Orkney. These static
defenses were augmented with boom nets, naval patrols and
minefields, creating the largest fortified naval base in the world.
How nonstate military strategies overturn traditional perspectives on warfare Since September 11th, 2001, armed nonstate actors have received increased attention and discussion from scholars, policymakers, and the military. Underlying debates about nonstate warfare and how it should be countered is one crucial assumption: that state and nonstate actors fight very differently. In Nonstate Warfare, Stephen Biddle upturns this distinction, arguing that there is actually nothing intrinsic separating state or nonstate military behavior. Through an in-depth look at nonstate military conduct, Biddle shows that many nonstate armies now fight more "conventionally" than many state armies, and that the internal politics of nonstate actors-their institutional maturity and wartime stakes rather than their material weapons or equipment-determines tactics and strategies. Biddle frames nonstate and state methods along a continuum, spanning Fabian-style irregular warfare to Napoleonic-style warfare involving massed armies, and he presents a systematic theory to explain any given nonstate actor's position on this spectrum. Showing that most warfare for at least a century has kept to the blended middle of the spectrum, Biddle argues that material and tribal culture explanations for nonstate warfare methods do not adequately explain observed patterns of warmaking. Investigating a range of historical examples from Lebanon and Iraq to Somalia, Croatia, and the Vietcong, Biddle demonstrates that viewing state and nonstate warfighting as mutually exclusive can lead to errors in policy and scholarship. A comprehensive account of combat methods and military rationale, Nonstate Warfare offers a new understanding for wartime military behavior.
The People's Republic of China (PRC) is India's powerful neighbor since the first year of 1950's. Before that, without prejudice to the issue of its status of sovereignty or Chinese suzerainty, Tibet had de facto fulfilled the role. That fact of past unfamiliarity with Chinese way of politico-diplomatic expressions, aided by China's unilaterally adopted adversarial posture towards India, makes it imperative for India's strategic community to study China's moves very carefully, and draw conclusions for the purpose of managing the strained relationship. This book is a compilation of such observations, analyses and inferences. Study of PRC's various initiatives which have direct or indirect bearing on India and the methods adopted to implement those is a tough call. This is so because in dealing with inter-state relations, the Chinese leadership arrogate the right of defining the issues according to their partisan perceptions and exclusive stratagem. To that extent, papers contained in this book narrate the factual and honest impressions which China's policies and actions, as these relate to India's concerns, depict. The purpose of this book would be served if these impressions are taken note of in PRC's future bilateral discourse in true spirit of mutuality.
This volume in the Contemporary Military, Strategic, and Security Issues series presents a concise introduction to the evolution, key concepts, discourse, and future options for improved strategic communication in today's U.S. government. Strategic Communication: Origins, Concepts, and Current Debates is a groundbreaking study, the first book explicitly focused on strategic communication as it is currently used and discussed in the U.S. government. Written specifically for those who are new to strategic communication, this incisive book clarifies the definitional debate, explores the history of the term and its practice, and embraces a broad, practical definition. But that is only the beginning. Moving to the realities of the issue, author Christopher Paul reviews dozens of government reports on strategic communication and public diplomacy released since 2000, examining specific proposals related to improving strategic communication in the U.S. government and explaining the disagreements. Most important, he offers consensus and clarity for the way ahead, discussing how disparate elements of the government can be coordinated to master-and win-the "war of ideas" through fully integrated and synchronized communications and actions. Key document excerpts from legislation, proposed legislation, doctrine, reform proposals, and policy documents A glossary of terms An annotated bibliography of proposals and recommendations for strategic communication/public diplomacy reform
This book provides a comprehensive understanding of the evolution of India's strategic culture in the era of globalization. It examines dominant themes that have governed India's foreign and security policy and events which have shaped India's role in global politics. The author Examines the traditional and new approaches to diplomacy and the state's response to internal and external conflicts; Delineates policy pillars which are required to protect the state's strategic interests and forge new relationships in the current geopolitical climate; Compares the domestic and international security policies followed during the tenures of Narsimha Rao, Atal Bihari Vajpayee and Manmohan Singh; and Analyzes how the Narendra Modi era has brought on changes in India's security strategy and the use of soft power and diplomacy. With extensive additions, drawing on recent developments, this edition of the book will be a key text for scholars, teachers and students of defence and strategic studies, international relations, history, political science and South Asian studies.
This book includes a selection of articles from The 2018 Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS'18), held in Salinas, Peninsula de Santa Elena, Ecuador, from April 18 to 20, 2018. MICRADS is an international forum for researchers and practitioners to present and discuss the most recent innovations, trends, results, experiences and concerns in the various areas of defense and security, together with their technological development and applications. The main topics covered are: Information and Communication Technology in Education; Computer Vision in Military Applications; Engineering Analysis and Signal Processing; Cybersecurity and Cyberdefense; Maritime Security and Safety; Strategy, Geopolitics and Oceanopolitics; Defense planning; Leadership (e-leadership); Defense Economics; Defense Logistics; Health Informatics in Military Applications; Simulation in Military Applications; Computer Networks, Mobility and Pervasive Systems; Military Marketing; Military Physical Training; Assistive Devices and Wearable Technology; Naval and Military Engineering; Weapons and Combat Systems; Operational Oceanography. The book is aimed at all those dealing with defense and security issues, including practitioners, researchers and teachers as well as undergraduate, graduate, master's and doctorate students.
This book contains a collection of projects and scenarios dealing with new risks from emerging technologies, future peace keeping operations, and water distribution issues by combining analysis with dialogue. Special attention is paid to the methodology of narrative scenarios, and the role of imagination in the generation of these scenarios. Appearing as short stories, narrative scenarios include a great amount of explicit and implicit knowledge and they need story telling skills to become consistent, coherent as well as compelling and convincing pictures of the future.
This yearbook continues SIPRI's annual analyses of developments in major armed conflicts, in conflict prevention, management and resolution, and in peacekeeping, developments in chemical and biological weapons, new military technology, world military expenditure, nuclear explosions, arms production, the arms trade, and nuclear, chemical, and biological arms control. Special Studies in this volume: BL area studies of the Middle East, Russia, and Europe BL armed conflict prevention, management and resolution BL information on multilateral observer, peacekeeping and electoral operations BL the comprehensive test ban treaty BL multilateral military-related export control measures BL the trade in major conventional weapons and conventional arms control
A number of nations, conspicuously Israel and the United States, have been increasingly attracted to the use of strategic barriers to promote national defense. In " Do Good Fences Make Good Neighbors?," defense analyst Brent Sterling examines the historical use of strategic defenses such as walls or fortifications to evaluate their effectiveness and consider their implications for modern security. Sterling studies six famous defenses spanning 2,500 years, representing both democratic and authoritarian regimes: the Long Walls of Athens, Hadrian's Wall in Roman Britain, the Ming Great Wall of China, Louis XIV's Pre Carre, France's Maginot Line, and Israel's Bar Lev Line. Although many of these barriers were effective in the short term, they also affected the states that created them in terms of cost, strategic outlook, military readiness, and relations with neighbors. Sterling assesses how modern barriers against ground and air threats could influence threat perceptions, alter the military balance, and influence the builder's subsequent policy choices. Advocates and critics of strategic defenses often bolster their arguments by selectively distorting history. Sterling emphasizes the need for an impartial examination of what past experience can teach us. His study yields nuanced lessons about strategic barriers and international security and yields findings that are relevant for security scholars and compelling to general readers.
This book analyzes both NATO's and the EU's military crisis management operations and provides an explanation for the fact that it is sometimes NATO, sometimes the EU, and sometimes both international organizations that intervene militarily in a conflict. In detailed case studies on Libya, Chad/Central African Republic, and the Horn of Africa, Claudia Fahron-Hussey shows that the capabilities and preferences of the organizations matter most and the organizations' bureaucratic actors influence the decision-making process of the member states.
Japan's post-war armed forces are a paradox, both embarrassing remnants of the past and valuable repositories of experience. This book charts the development of the Japan Self-Defense Forces (JSDF) from 1954 as both unorthodox military institutions and servants of a civil society that decries militarism. Investigating JSDF contributions to Japanese and global security, the evolution of such contributions during and after the Cold War, and their possible reconfiguration for Japan's security needs ahead, Garren Mulloy offers insight into the Forces' past, present and future. He explores the characteristics and contradictions of Japanese policy, including novel approaches in response to an increasingly assertive China, the latent threat of North Korea and contributory pressure from the US. Though the American alliance remains the core of Japanese security, new partnerships and international overtures will also shape the Forces' place in Prime Minister Abe's new vision of 'proactive contributions to peace'. Defenders of Japan deconstructs how the JSDF have adapted and will continue to adapt within domestic norms, caught between unresolved legacies of Japan's imperial past and a dynamically shifting balance of future global power.
In December 2004 the 109th Congress passed and President George W. Bush signed the Intelligence Reform and Intelligence Prevention Act (IRTPA). M. Kent Bolton argues that IRTPA represented a change in the trajectory of U.S. national-security policy-the first fundamental, demonstrable change since the 1947 National Security Act (1947 NSA) became law creating a unified U.S. Department of Defense, the Central Intelligence Agency, and the National Security Council, among other entities. As the 1947 NSA presaged a new era of U.S. policymaking, so too did the IRTPA. As such the IRTPA represents an extraordinarily important piece of legislation for students and scholars of U.S. foreign and national-security policy. The author documents how and why it became law and how it has affected policymaking. He further argues that the changes begun by 9/11 and memorialized by IRTPA will likely affect U.S. national-security policymaking for decades if not generations.
This book focuses on the disagreements which existed in British political and military circles over nuclear strategy during the period from 1945 to 1964. Based on recently released documents, the book argues that British policy in this important area was much more ambiguous and much less coherent than is usually supposed.
There is little doubt that Asia- stretching from the Eurasian landmass to the maritime reaches of Australia and the South Pacific-is experiencing a major shift in the global balance of power. Expressions like the 'Indo-Pacific' and 'Asia-Pacific', contested they maybe, capture Asia's expanse and dynamism. A power shift from the West to the East is well under way. But what is not understood is how this global re-distribution of political, economic and military power will impact global and regional geopolitical order. IR experts warn that power transitions of this magnitude can prove to be destabilizing. The argument that the world is interdependent to an unprecedented degree offers some hope that the transitions to new world order may turn out to be peaceful. Interestingly, these changes are also changing the mindset of the people who are pushing for political reforms and accountability. The chapters in this edited volume take a measure of these changes and try to understand their impact on peace and stability.
After the French Revolution and the Napoleonic Wars, the leaders of Europe at the Congress of Vienna aimed to establish a new balance of power. The settlement established in 1815 ushered in the emergence of a genuinely European security culture. In this volume, leading historians offer new insights into the military cooperation, ambassadorial conferences, transnational police networks, and international commissions that helped produce stability. They delve into the lives of diplomats, ministers, police officers and bankers, and many others who were concerned with peace and security on and beyond the European continent. This volume is a crucial contribution to the debates on securitisation and security cultures emerging in response to threats to the international order.
This revised and updated second edition features over twenty new chapters and offers a wide-ranging collection of cutting-edge essays from leading scholars in the field of Security Studies. The field of Security Studies has undergone significant change during the past 20 years, and is now one of the most dynamic sub-disciplines within International Relations. This second edition has been significantly updated to address contemporary and emerging security threats with chapters on organised crime, migration and security, cyber-security, energy security, the Syrian conflict and resilience, amongst many others. Comprising articles by both established and up-and-coming scholars, The Routledge Handbook of Security Studies provides a comprehensive overview of the key contemporary topics of research and debate in the field of Security Studies. The volume is divided into four main parts: * Part I: Theoretical Approaches to Security * Part II: Security Challenges * Part III: Regional (In)Security * Part IV: Security Governance This new edition of the Handbook is a benchmark publication with major importance for both current research and the future of the field. It will be essential reading for all scholars and students of Security Studies, War and Conflict Studies, and International Relations.
This Field Manual establishes doctrine (fundamental principles) for tactical counterinsurgency (COIN) operations at the company, battalion, and brigade level. It is based on lessons learned from historic counterinsurgencies and current operations. This manual continues the efforts of FM 3-24, Counterinsurgency, in combining the historic approaches to COIN with the realities of today's operational environment (OE)- an environment modified by a population explosion, urbanization, globalization, technology, the spread of religious fundamentalism, resource demand, climate change and natural disasters, and proliferation of weapons of mass destruction. This manual is generic in its geographic focus and should be used with other doctrinal sources.
" This revised and updated edition identifies the cultural factors and specific administrative agendas that have shaped the way we view ballistic missile technology. Three new sections connect our recent, sudden shifts in foreign policy to ongoing historical patterns. Whether cautioning against the "almost neurotic pursuit of absolute security" or examining the powerful influence of religion on military buildup, Ernest J.Yanarella uncovers the deeply ingrained attitudes that will determine the future of American missile defense. |
![]() ![]() You may like...
Frontiers in Statistical Quality Control…
Sven Knoth, Wolfgang Schmid
Hardcover
R5,645
Discovery Miles 56 450
Exploring Future Opportunities of…
Madhulika Bhatia, Tanupriya Choudhury, …
Hardcover
R7,249
Discovery Miles 72 490
|