![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
There is a growing distance between experts and the public on the subject of nuclear strategy; this reader sets the terms for an effective public debate on the issue. It provides the significant essays and excerpts from longer works, from Berbard Brodie and Herman Kahn to Henry Kissinger and Fred Ikle, that have charted the development of American nuclear strategy. Each section is introduced by an essay outlining the major events of the period and relating the excerpts to them. It ends with questions for study and analaysis with suggested further reading.
A review of the full range of recent official and non-official schemes for improving NATO's conventional posture, from exploitation of emerging technologies to non-provocative defences, in the light of prevailing military, political, economic and demographic trends.
Decisions about war have always been made by humans, but now intelligent machines are on the cusp of changing things - with dramatic consequences for international affairs. This book explores the evolutionary origins of human strategy, and makes a provocative argument that Artificial Intelligence will radically transform the nature of war by changing the psychological basis of decision-making about violence. Strategy, Evolution, and War is a cautionary preview of how Artificial Intelligence (AI) will revolutionize strategy more than any development in the last three thousand years of military history. Kenneth Payne describes strategy as an evolved package of conscious and unconscious behaviors with roots in our primate ancestry. Our minds were shaped by the need to think about warfare-a constant threat for early humans. As a result, we developed a sophisticated and strategic intelligence. The implications of AI are profound because they depart radically from the biological basis of human intelligence. Rather than being just another tool of war, AI will dramatically speed up decision making and use very different cognitive processes, including when deciding to launch an attack, or escalate violence. AI will change the essence of strategy, the organization of armed forces, and the international order. This book is a fascinating examination of the psychology of strategy-making from prehistoric times, through the ancient world, and into the modern age.
In this new and fully revised edition Pinar Bilgin provides an accessible yet critical analysis of regional security in the Middle East, analysing the significant developments that have taken place in the past years. Drawing from a wide range of critical approaches to security, the book offers a comprehensive study of pasts, presents, and futures of security in the region. The book distinguishes itself from previous (critical) studies on regional security by opening up both 'region' and 'security'. Different from those approaches that bracket one or the other, this study takes seriously the constitutive relationship between (inventing) regions, and (conceptions and practices of) security. There is not one Middle East but many, shaped by the insecurities of those who voice them. This book focuses on how present-day insecurities have their roots in practices that have, throughout history, been shaped by 'geopolitical inventions of security'. In doing so, the book lays the contours of a framework for thinking critically about regional security in this part of the world. This second edition of Regional Security in the Middle East is a key resource for students and scholars interested in International Relations and Political Science, Security Studies, and Middle East Studies.
Known as the science of strategy, game theory is a branch of mathematics that has gained broad acceptance as a legitimate methodological tool, and has been widely adapted by a number of other fields. Frank C. Zagare provides an introduction to the application of game theory in the fields of security studies and diplomatic history, demonstrating the advantages of using a formal game-theoretic framework to explain complex events and strategic relationships. Comprised of three parts, the first illustrates the basic concepts of game theory, initially with abstract examples but later in the context of real world foreign policy decision-making. The author highlights the methodological problems of using game theory to construct an analytic narrative and the advantages of working around these obstacles. Part II develops three extended case studies that illustrate the theory at work: the First Moroccan Crisis of 1905-1906, the July Crisis of 1914, and the Cuban Missile Crisis of 1962. Finally, in Part III, Zagare describes a general theory of interstate conflict initiation, limitation, escalation, and resolution and rebuts criticisms of the methodology. Logically demanding, Game Theory, Diplomatic History and Security Studies conveys an intuitive understanding of the theory of games through the use of real-world examples to exemplify the 'theory in action'.
Between 2021 and 2031, the UK government is set to spend over GBP230 billion on its military. Who decides how to use these funds, and how can we be sure that the UK's armed forces can meet the threats of tomorrow? This book provides the answers to these crucial questions. Concentrating on decisions taken below the political level, it uncovers the factors that underpin the translation of strategic direction into military capability. In a series of interviews, over 30 top admirals, generals and air marshals give their own views on the procurement and maintenance of the nation's current and future military capability. Their unrivalled professional knowledge and experience affords a fascinating insight into the higher management of national defence.
This revised and updated second edition features over twenty new chapters and offers a wide-ranging collection of cutting-edge essays from leading scholars in the field of Security Studies. The field of Security Studies has undergone significant change during the past 20 years, and is now one of the most dynamic sub-disciplines within International Relations. This second edition has been significantly updated to address contemporary and emerging security threats with chapters on organised crime, migration and security, cyber-security, energy security, the Syrian conflict and resilience, amongst many others. Comprising articles by both established and up-and-coming scholars, The Routledge Handbook of Security Studies provides a comprehensive overview of the key contemporary topics of research and debate in the field of Security Studies. The volume is divided into four main parts: * Part I: Theoretical Approaches to Security * Part II: Security Challenges * Part III: Regional (In)Security * Part IV: Security Governance This new edition of the Handbook is a benchmark publication with major importance for both current research and the future of the field. It will be essential reading for all scholars and students of Security Studies, War and Conflict Studies, and International Relations.
Since its formation in 1948, and particularly since the assassination of Prime Minister Yitzak Rabin in 1995, Israel has experienced turbulent political change and numerous ongoing security challenges, including major party splits, collapsed peace talks with the Palestinians and Syria, nuclear threats from Iran, and even the specter of civil war as Israel withdrew from Gaza. This essential survey brings together Israeli and American scholars to provide a much-needed balanced introduction to Israel's domestic politics and foreign policy. Experts tackle this difficult subject in three parts: domestic politics, foreign policy challenges, and strategic challenges. Domestic topics include the Israeli Right and Left; religious, Russian, and Arab parties; the Supreme Court; and the economy. Part two discusses Israel's complicated and often fractious relationships with the Palestinians and the Arab world, as well as its improved relations with Turkey and India and continuing close relationship with the United States. The Israel-Hizbollah War of 2006 and existential threats to Israel, including the threat from Iran, are detailed in part three. This compelling and authoritative coverage provides students with the necessary framework to understand Israel's political past and present, as well as the direction Israel is likely to take in the future. Contents 1. Introduction (Robert O. Freedman) Part One: Israeli Domestic Politics Part Two: Israel's Foreign Policy Challenges Part Three: Israel's Strategic Challenges
At first sight it seems that there is little in common between the security dynamics of Northeast Asia and South Asia. They are geographically situated in different parts of Eurasia. Their threat perceptions are different, being informed by their unique historical experience. These geo-strategic particularities have molded their security postures. Both these regions are distinguished by the presence of adversarial dyads- North Korea-South Korea and Pakistan-India. These countries have single-mindedly pursued their quest for nuclear weapons, except for South Korea, that was dissuaded in its own nuclear endeavor by the by the United States.
As a concept, deterrence has launched a thousand books and
articles. It has dominated Western strategic thinking for more than
four decades. In this important and groundbreaking new book,
Lawrence Freedman develops a distinctive approach to the evaluation
of deterrence as both a state of mind and a strategic option. This
approach is applied to post-cold war crisis management, and the
utility and relevance of the concept is addressed in relation to US
strategic practice post-9/11, particularly in the light of the
apparent preference of the Bush Administration for the alternative
concept of pre-emption. The study of deterrence has been hampered by the weight of the intellectual baggage accumulated since the end of the Second World War. Exaggerated notions of what deterrence might achieve were developed, only to be to knocked down by academic critique. In this book, Freedman charts the evolution of the contemporary concept of deterrence, and discusses whether - and how - it still has relevance in today's world. He considers constructivist as well as realist approaches and draws on criminological as well as strategic studies literature to develop a concept of a norms-based, as opposed to an interest-based, deterrence. This book will be essential reading for students of politics and international relations as well as all those interested in contemporary strategic thought.
This new handbook provides a comprehensive overview of the issues facing naval strategy and security in the twenty-first century. Featuring contributions from some of the world's premier researchers and practitioners in the field of naval strategy and security, this handbook covers naval security issues in diverse regions of the world, from the Indian Ocean and the Mediterranean to the Arctic and the piracy-prone waters off East Africa's coast. It outlines major policy challenges arising from competing claims, transnational organized crime and maritime terrorism, and details national and alliance reactions to these problems. While this volume provides detailed analyses on operational, judicial, and legislative consequences that contemporary maritime security threats pose, it also places a specific emphasis on naval strategy. With a public very much focused on the softer constabulary roles naval forces play (such as humanitarian assistance, disaster relief, naval diplomacy, maintenance of good order at sea), the overarching hard-power role of navies has been pushed into the background. In fact, navies and seapower have been notably absent from many recent academic discussions and deliberations of maritime security. This handbook provides a much-desired addition to the literature for researchers and analysts in the social sciences on the relationship between security policy and military means on, under, and from the sea. It comprehensively explains the state of naval security in this maritime century and the role of naval forces in it. This book will be of much interest to students of naval security and naval strategy, security studies and IR, as well as practitioners in the field.
Did the Trump administration have a cybersecurity strategy, or was it hell-bent on dismantling years of consensus-building on how the nation should respond to an existential threat to its digital life blood? Based on insider accounts and exclusive interviews with experts, Cyber in the Age of Trump offers a first-time chronicle and analysis of the Trump administration's approach to cybersecurity, its curious decisions and strategic choices, places where its work has earned applause, and the places where cyber pros see major signs of danger. The new administration came in with a strong faith in technology, a sense that the U.S. could better deploy its cyber weaponry to deter foes, and a willingness to continue popular Obama-era policies on collaborating with industry. But it didn't seem to have a cyber vision, or one that was applied consistently. And in the absence of such a strategic overview, the threat to the nation would only grow. Cyber in the Age of Trump is the first book to examine the impact of President Trump on the nation's greatest long-term strategic challenge and how a "disruptor presidency" has upended consensus and threatened to derail cyber policy.
During the Cold War the concept of international security was understood in military terms as the threat or use of force by states. The end of EastDWest hostilities, however, brought critical perspectives to the fore as scholars sought to explain the emergence of new challenges to international stability, such as environmental degradation, immigration and terrorism. The second edition of this popular and highly respected text offers a wide-ranging and comprehensive analysis of the growing field of critical security studies. All the chapters have been fully revised and updated to map the on-going evolution of debates about international security since 1989, including the more recent shift in emphasis from critiques of the realist practices of states to those of global liberal governance. Topics covered include the relationship between security and change, identity, the production of danger, fear and trauma, human insecurity and emancipation. The book explores the meaning and use of these concepts and their relevance to real-life situations ranging from the War on Terror to the Arab Spring, migration, suffering in war, failed states and state-building, and the changing landscape of the international system, with the emergence of a multipolar world and the escalation of global climate change. Written with verve and clarity and incorporating new seminar activities and questions for class discussion, this book will be an invaluable resource for students of international relations and security studies.
This collection of essays combines historical research with cutting-edge strategic analysis and makes a significant contribution to the study of the early history of strategic thinking. There is a debate as to whether strategy in its modern definition existed before Napoleon and Clausewitz. The case studies featured in this book show that strategic thinking did indeed exist before the last century, and that there was strategy making, even if there was no commonly agreed word for it. The volume uses a variety of approaches. First, it explores the strategy making of three monarchs whose biographers have claimed to have identified strategic reasoning in their warfare: Edward III of England, Philip II of Spain and Louis XIV of France. The book then analyses a number of famous strategic thinkers and practitioners, including Christine de Pizan, Lazarus Schwendi, Matthew Sutcliffe, Raimondo Montecuccoli and Count Guibert, concluding with the ideas that Clausewitz derived from other authors. Several chapters deal with reflections on naval strategy long thought not to have existed before the nineteenth century. Combining in-depth historical documentary research with strategic analysis, the book illustrates that despite social, economic, political, cultural and linguistic differences, our forebears connected warfare and the aims and considerations of statecraft just as we do today. This book will be of great interest to students of strategic history and theory, military history and IR in general.
This collection of essays combines historical research with cutting-edge strategic analysis and makes a significant contribution to the study of the early history of strategic thinking. There is a debate as to whether strategy in its modern definition existed before Napoleon and Clausewitz. The case studies featured in this book show that strategic thinking did indeed exist before the last century, and that there was strategy making, even if there was no commonly agreed word for it. The volume uses a variety of approaches. First, it explores the strategy making of three monarchs whose biographers have claimed to have identified strategic reasoning in their warfare: Edward III of England, Philip II of Spain and Louis XIV of France. The book then analyses a number of famous strategic thinkers and practitioners, including Christine de Pizan, Lazarus Schwendi, Matthew Sutcliffe, Raimondo Montecuccoli and Count Guibert, concluding with the ideas that Clausewitz derived from other authors. Several chapters deal with reflections on naval strategy long thought not to have existed before the nineteenth century. Combining in-depth historical documentary research with strategic analysis, the book illustrates that despite social, economic, political, cultural and linguistic differences, our forebears connected warfare and the aims and considerations of statecraft just as we do today. This book will be of great interest to students of strategic history and theory, military history and IR in general.
In a time where US deployments are uncertain, this book shows how US service members can either build the necessary support to sustain their presence or create added animosity towards the military presence. The United States stands at a crossroads in international security. The backbone of its international position for the last 70 years has been the massive network of overseas military deployments. However, the US now faces pressures to limit its overseas presence and spending. In Beyond the Wire, Michael Allen, Michael Flynn, Carla Martinez Machain, and Andrew Stravers argue that the US has entered into a "Domain of Competitive Consent" where the longevity of overseas deployments relies upon the buy-in from host-state populations and what other major powers offer in security guarantees. Drawing from three years of surveys and interviews across fourteen countries, they demonstrate that a key component of building support for the US mission is the service members themselves as they interact with local community members. Highlighting both the positive contact and economic benefits that flow from military deployments and the negative interactions like crime and anti-base protests, this book shows in the most rigorous and concrete way possible how US policy on the ground shapes its ability to advance its foreign policy goals.
Many historians of U.S. foreign relations think of the post-World War II period as a time when the United States, as an anti-colonial power, advocated collective security through the United Nations and denounced territorial aggrandizement. Yet between 1945 and 1947, the United States violated its wartime rhetoric and instead sought an imperial solution to its postwar security problems in East Asia by acquiring unilateral control of the western Pacific Islands and dominating influence throughout the entire Pacific Basin. This detailed study examines American foreign policy from the beginning of the Truman Administration to the implementation of Containment in the summer and fall of 1947. As a case study of the Truman Administration's Early Cold War efforts, it explores pre-Containment policy in light of U.S. security concerns vis-a-vis the Pearl Harbor Syndrome. The American pursuit of a secure Pacific Basin was inconsistent at the time with its foreign policy toward other areas of the world. Thus, the consolidation of power in this region was an exception to the avowed goal of a multilateral response to the policies of the Soviet Union. This example of national or strategic security went much further than simple military control; it included the cultural assimilation of the indigenous population and the unilateral exclusion of all other powers. Analyzing traditional archival records in a new light, Friedman also investigates the persisting American notions of a Westward moving frontier that stretches beyond North American territorial bounds.
Arms purchases are among the most expensive, technologically challenging and politically controversial decisions made by modern-day governments. Superpower spending on weapons systems is widely analysed and discussed. But defence procurement in smaller industrial countries involves different issues which receive less attention. This volume presents a general framework for understanding smaller country defence procurement supported by country, industry and project studies. Part I provides a general framework for analysing smaller country defence procurement, focusing on the formation of national defence capabilities. The framework is then used to analyse issues around the development of procurement demand, the characteristics of defence industry supply, contracts and relationships between buyers and sellers, and government policy for defence procurement and industry development. Part II focuses on defence procurement in seven smaller industrial nations with widely varying historical and political settings (Australia, Canada, Israel, Singapore, Spain, Sweden and The Netherlands). Part III consists of two Australian case studies of the procurement issues raised in, respectively, the naval shipbuilding industry and in a major, complex defence project. The book addresses the needs of public and private sector managers, military planners, procurement specialists, industry policy-makers, and defence procurement and industry educators. It presents general principles in an accessible manner and points to real-world experience to illustrate the principles at work. Therefore it will be of interest to scholars and practitioners in defence economics, strategic procurement, public sector procurement, and defence industry policy.
The relationship between intelligence organizations and the national security policymakers which they support has its ups and downs. Sometimes the relationship is a good one; communication flows and both sides benefit from the interaction, but sometimes difficulties arise and problems develop. For example, when knowledge is required for decision but is not available or is inaccurate the outcome is frequently described as an intelligence failure. A subset of this kind of intelligence failure occurs when knowledge is distorted in order to reinforce or oppose policymaker preferences or expectations. Another less successful outcome occurs when good, accurate knowledge is not used to improve policy, but is instead set aside or ignored by those who have the responsibility and obligation to make decisions. This collection explores the difficulties that can arise in the relationship between intelligence and policy. The chapters consider both politicization of, and lack of receptiveness to, intelligence on the part of policymakers from a variety of different angles. Readers will find that this book challenges conventional wisdom and offers new ways of thinking about this important but understudied area. This book was published as a special issue of Intelligence and National Security.
Located in the center of Asia with one of the largest land frontiers in the world and 14 neighbors whose dispositions could not easily be predicted, China has long been obsessed with security. In this Handbook, an internationally renowned team of contributors provide a comprehensive and systematic analysis of contemporary thinking about Chinese national security. Chapters cover the PRC's historical, ideological and doctrinal heritage related to security, its security arrangements and policies targeting key regions and nations of the world, the security aspects of the PRC's ground, air, sea, space and cyber forces, as well as the changing and expanding definition and scope of China's security theory and practice. The Handbook is divided into three thematic parts: Part I focuses on national security, covering traditional views of security and the impact of China's historical experience on current security dispositions as well as non-traditional security. Part II looks at China's relations with the great powers, regional security and China's involvement with collective security organizations. Part III provides an overview of China's institutionalized security forces; looking at the army, navy, air force and Second Artillery (strategic nuclear forces) and offering analysis of China's recent interest in space as a security concern and cybersecurity. This volume is essential reading for all students of Asian Security, Chinese Politics and International Relations.
This book provides the first systematic comparative analysis of climate security discourses. It analyses the securitisation of climate change in four different countries: USA, Germany, Turkey, and Mexico. The empirical analysis traces how specific climate-security discourses have become dominant, which actors have driven this process, what political consequences this has had and what role the broader context has played in enabling these specific securitisations. In doing so, the book outlines a new and systematic theoretical framework that distinguishes between different referent objects of securitisation (territorial, individual and planetary) and between a security and risk dimension. It thereby clarifies the ever-increasing literature on different forms of securitisation and the relationship between security, risk and politics. Whereas securitisation studies have traditionally focused on either a single country case study or a global overview, consequently failing to reconstruct detailed securitisation dynamics, this is the first book to provide a systematic comparative analysis of climate security discourses in four countries and thus closes an empirical gap in the present literature. In addition, this comparative framework allows the drawing of conclusions about the conditions for and consequences of successful securitisation based on empirical and comparative analysis rather than theoretical debate only. This book will of interest to students of climate change, environmental studies, critical security, global governance, and IR in general.
The history of bourgeois modernity is a history of the Enemy. This book is a radical exploration of an Enemy that has recently emerged from within security documents released by the US security state: the Universal Adversary. The Universal Adversary is now central to emergency planning in general and, more specifically, to security preparations for future attacks. But an attack from who, or what? This book - the first to appear on the topic - shows how the concept of the Universal Adversary draws on several key figures in the history of ideas, said to pose a threat to state power and capital accumulation. Within the Universal Adversary there lies the problem not just of the 'terrorist' but, more generally, of the 'subversive', and what the emergency planning documents refer to as the 'disgruntled worker'. This reference reveals the conjoined power of the contemporary mobilisation of security and the defence of capital. But it also reveals much more. Taking the figure of the disgruntled worker as its starting point, the book introduces some of this worker's close cousins - figures often regarded not simply as a threat to security and capital but as nothing less than the Enemy of all Mankind: the Zombie, the Devil and the Pirate. In situating these figures of enmity within debates about security and capital, the book engages an extraordinary variety of issues that now comprise a contemporary politics of security. From crowd control to contagion, from the witch-hunt to the apocalypse, from pigs to intellectual property, this book provides a compelling analysis of the ways in which security and capital are organized against nothing less than the 'Enemies of all Mankind'.
Military capability is delivered operationally at a team and collective level, be it a unit as small as a squad or section, or as large as a maritime task group. Modern military forces are required to deal with a potentially wide range of missions frequently involving multiple alliance partners, within a geopolitical environment which can seem to change rapidly. Individual performance, while being important, is not the primary determinant of mission success - force integration, interoperability, adaptability and teamwork are key factors. Team and collective training which fully addresses these factors is fundamental to the development and delivery of military capability. As a consequence, the requirement to determine training requirements and specify effective systems for the delivery of team and collective training is critical to operational success. Training Needs Analysis (also known as Front End Analysis), is a well-established methodology for analysing training requirements and specifying training solutions used extensively by the UK and its NATO partners. However, the analytical techniques employed are optimised for individual training, with little guidance being offered on its application in the team and collective context. Team and Collective Training Needs Analysis (TCTNA) has been developed to close this methodological gap. It addresses the issues of the relationship of individual and team tasks, teamwork, command and control, task and training environments, scenario definition, instructional strategy, team training approaches, instructional functions, and wide-ranging organisational and procurement considerations. Part One of the book develops an integrated set of models which underpin the analytical approach presented in Part Two. Worked examples and case studies illustrate the application of the approach. Between 2005 and 2015 the authors worked on numerous training-related research projects at Cranfield University and Coventry University for the Human Factors Integration Defence Technology Centre and the Defence Human Capability Science and Technology Centre on behalf of the Defence Science and Technology Laboratory, UK Ministry of Defence.
|
You may like...
|