![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
The Organization of European Security Governance investigates what impact the changing nature of security challenges has had on the organization of security governance in Europe. As the most pervasive security challenges today are difficult to classify as either internal or external, the traditional divide between domestic and international security has become blurred. In response, European leaders have emphasized the need to develop comprehensive and horizontal approaches to security in the European Union. But has the European Union been able to deliver a coherent response to this new security environment? In a detailed comparative study of two crucial policy fields - EU counter-terrorism and post-conflict crisis management the book outlines the scope of the ongoing transformation of Europe's security order, examines its challenges and explains its defects. This important volume will be of interest to students and scholars of Security Studies and European Politics.
Countless attempts at analyzing Russia's actions focus on Putin to understand Russia's military imbroglio in Ukraine, hostility towards America, and disdain of 'Gayropa'. This book invites its readers to look beyond the man and delve into the online lives of millions of Russians. It asks not the question of what the threats are to Russia's security, but what they are perceived to be by digital Russia. The author examines how enemy images are manufactured, threats magnified, stereotypes revived, memories implanted and fears harnessed. It looks at the legacy of the Soviet Union in shaping discussions ranging from the Ukraine crisis to the Pussy Riots trial, and explores the complex inter-relation between enemy images at the governmental level and their articulation by the general public. By drawing on the fields of international relations, memory studies, visual studies, and big data, this book addresses the question of why securitization succeeds - and why it fails. "Security theory meets the visual turn and goes to Russia, where old tsarist and Soviet tropes are flooding the internet in support of Putin's neo-tsarism. A magical mystery tour that comes recommended. Iver B. Neumann, author of "Russia and the Idea of Europe" "The novelty of her approach is in going beyond the traditional top down perspective and capturing the receptivity and contribution of various social groups to securitized discourses." Andrei P.Tsygankov, author of "Russia's Foreign Policy: Change and Continuity in National Identity". "When do scary proclamations of security threats attract an audience? When does securitization work? 'Security Threats and Public Perception' combines in-depth analysis of the Ukraine Crisis in the Russian digital media with discourse theory to make an innovative argument about how and when people believe that they are insecure. A must read!" Laura Sjoberg, Assistant Professor of Political Science, University of Florida, USA
This book assesses the use of mercenaries by states, and their integration into the national armed forces as part of a new hybridisation trend of contemporary armies. Governments, especially in the West, are undertaking an unprecedented wave of demilitarisation and military budget cuts. Simultaneously, these same governments are increasingly opening their armies up to foreign nationals and outsourcing military operations to private companies. This book explores the impact of this hybridisation on the values, cohesion and effectiveness of the armed forces by comparing and contrasting the experiences of the French Foreign Legion, private military companies in Angola, and the merging of private contractors and American troops in Iraq. Examining the employment of foreign citizens and private security companies as military forces and tools of foreign policy, and their subsequent impact on the national armed forces, the book investigates whether the difficulties of coordinating soldiers of various nationalities and allegiances within public-private joint military operations undermines the legitimacy of the state. Furthermore, the author questions whether this trend for outsourcing security can realistically provide a long term and positive contribution to national security. This book will be of much interest to students of private military companies, strategic studies, international security and IR in general."
As the rest of the world worries about what a future might look like under Chinese supremacy, Edward Luttwak worries about China's own future prospects. Applying the logic of strategy for which he is well known, Luttwak argues that the most populous nation on Earth-and its second largest economy-may be headed for a fall. For any country whose rising strength cannot go unnoticed, the universal logic of strategy allows only military or economic growth. But China is pursuing both goals simultaneously. Its military buildup and assertive foreign policy have already stirred up resistance among its neighbors, just three of whom-India, Japan, and Vietnam-together exceed China in population and wealth. Unless China's leaders check their own ambitions, a host of countries, which are already forming tacit military coalitions, will start to impose economic restrictions as well. Chinese leaders will find it difficult to choose between pursuing economic prosperity and increasing China's military strength. Such a change would be hard to explain to public opinion. Moreover, Chinese leaders would have to end their reliance on ancient strategic texts such as Sun Tzu's Art of War. While these guides might have helped in diplomatic and military conflicts within China itself, their tactics-such as deliberately provoking crises to force negotiations-turned China's neighbors into foes. To avoid arousing the world's enmity further, Luttwak advises, Chinese leaders would be wise to pursue a more sustainable course of economic growth combined with increasing military and diplomatic restraint.
This book offers the first comprehensive examination of Russia's Arctic strategy, ranging from climate change issues and territorial disputes to energy policy and domestic challenges. As the receding polar ice increases the accessibility of the Arctic region, rival powers have been manoeuvering for geopolitical and resource security. Geographically, Russia controls half of the Arctic coastline, 40 percent of the land area beyond the Circumpolar North, and three quarters of the Arctic population. In total, the sea and land surface area of the Russian Arctic is about 6 million square kilometres. Economically, as much as 20 percent of Russia's GDP and its total exports is generated north of the Arctic Circle. In terms of resources, about 95 percent of its gas, 75 percent of its oil, 96 percent of its platinum, 90 percent of its nickel and cobalt, and 60 percent of its copper reserves are found in Arctic and Sub-Arctic regions. Add to this the riches of the continental shelf, seabed, and waters, ranging from rare earth minerals to fish stocks. After a spike of aggressive rhetoric when Russia planted its flag in the Arctic seabed in 2007, Moscow has attempted to strengthen its position as a key factor in developing an international consensus concerning a region where its relative advantages are manifest, despite its diminishing military, technological, and human capacities.
Concerns over the changing nature of gangs and cartels and their relationships to states in the late 20th and early 21st centuries has resulted in the emergence of a scholarly body of work focused on their national security threat potentials. This body of work, utilizing the third generation gangs and third phase cartel typologies, represents an alternative to traditional gang and organized crime research and one that is increasingly influencing the US defense community. Rather than being viewed only as misguided youth and opportunistic criminals or, in their mature forms, as criminal organizations with no broader social or political agendas, more evolved gangs and cartels, are instead seen as developing political, mercenary, and state-challenging capacities. This evolutionary process has emerged due to the growing illicit economy and other unintended consequences of globalization. This important anthology of writings by Robert J. Bunker and John P. Sullivan draws upon a collection of their works from the mid-1990s to the present with the addition of new essays written specifically for this publication. The work will be of great interest to academics and students in the fields of political science and criminal justice and to military, law enforcement, and governmental professionals and policy makers. This book is a collection of new and previously published works from a variety of publications, a full list of which is on the Citation Information page.
This volume examines the ethical issues that arise as a result of national security intelligence collection and analysis. Powerful new technologies enable the collection, communication and analysis of national security data on an unprecedented scale. Data collection now plays a central role in intelligence practice, yet this development raises a host of ethical and national security problems, such as privacy; autonomy; threats to national security and democracy by foreign states; and accountability for liberal democracies. This volume provides a comprehensive set of in-depth ethical analyses of these problems by combining contributions from both ethics scholars and intelligence practitioners. It provides the reader with a practical understanding of relevant operations, the issues that they raise and analysis of how responses to these issues can be informed by a commitment to liberal democratic values. This combination of perspectives is crucial in providing an informed appreciation of ethical challenges that is also grounded in the realities of the practice of intelligence. This book will be of great interest to all students of intelligence studies, ethics, security studies, foreign policy and international relations. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license.
The end of the Cold War was supposed to bring a "peace dividend" and the opportunity to redirect military policy in the United States. Instead, according to Daniel Wirls, American politics following the Cold War produced dysfunctional defense policies that were exacerbated by the war on terror. Wirls's critical historical narrative of the politics of defense in the United States during this "decade of neglect" and the military buildup in Afghanistan and Iraq explains how and why the U.S. military has become bloated and aimless and what this means for long-term security. Examining the recent history of U.S. military spending and policy under presidents George H. W. Bush, Bill Clinton, and George W. Bush, Wirls finds that although spending decreased from the close of the first Bush presidency through the early years of Clinton's, both administrations preferred to tinker at the edges of defense policy rather than redefine it. Years of political infighting escalated the problem, leading to a military policy stalemate as neither party managed to craft a coherent, winning vision of national security. Wirls argues that the United States has undermined its own long-term security through profligate and often counterproductive defense policies while critical national problems have gone unmitigated and unsolved. This unified history of the politics of U.S. military policy from the end of the Cold War through the beginning of the Obama presidency provides a clear picture of why the United States is militarily powerful but "otherwise insecure."
The software industry continues to expand as new products enter into the technological marketplace in order to meet increasing demand. As a result of the popularity of often-expensive software products, companies face the growing challenge of protecting their products against copyright infringement. Judiciary-Friendly Forensics of Software Copyright Infringement discusses the forensics of software copyright infringement. This book highlights theoretical, functional, and procedural matters in the investigation of copyright infringement of software products, as well as the development of forensic technologies to detect and eliminate software piracy. As this publication will explore comprehensive topics on the forensic process of software piracy, it is an essential resource for software forensic experts, lawyers in the field of copyright infringement, judges, software professionals, software developers, and students.
Since its publication in 1911, Sir Julian's Corbett's Some Principles of Maritime Strategy has remained a key document within naval strategic thinking. Yet despite his undoubted influence, Corbett's theories have not been subjected to scientific review and systematic comparison with other naval thinkers. In this assessment, Dr Widen has provided a fresh interpretation of Corbett's legacy and his continued relevance as a classic theorist of naval war. Divided into three parts, the book begins with a brief biographical overview of Corbett's life, highlighting in particular his bibliographic history and the influences on his thinking. The latter two sections then describe and assess Corbett's views on military and naval theory, respectively. Together these two parts represent his overall theory of maritime strategy, including his conception of limited war, his intellectual debt to Clausewitz, command of the sea, his critic of decisive battle, as well as the different methods of naval operations. By means of a thorough assessment of Corbett's theory of maritime strategy, Dr Widen highlights the continued relevance of his theories. Both the strengths and shortcomings of Corbett's thinking are discussed and reflections offered on their intellectual, practical and doctrinal value. In so doing, Dr Widen has written a book that deserves to be read by anyone with an interest in the past, present or future of maritime strategy.
In the summer of 793 AD Viking raiders attacked and looted the monastic island of Lindisfarne, off the coast of Northumberland. This assault was only the beginning, within 18 months huge areas of the British coast was being devastated by the terrifying shi
The Operational Energy textbook provides military officers the knowledge and skills to effectively plan for the operational energy needs of their forces and missions. After completion, students should be able to carry out relevant analysis, planning and strategy across the Services and organizations of the US national security enterprise. The Pentagon defines Operational Energy (OE) as "energy required for training, moving, and sustaining military forces and weapons platforms for military operations." Planning and strategizing for these energy needs is an integral part of all combat and regular operations. Energy is one of the biggest constraints and at the same time most important enablers of ability to fulfill military missions. Moreover, proper operational energy strategies and tactics can reduce casualties and save lives. The most recent example is that fuel and water delivery missions accounted for more than one-tenth of the US military casualties in Iraq and Afghanistan. The book also examines issues that have not been discussed in previously published academic or policy literature, such as the impact of civilian demands for the military to use increased amounts of renewable energy as well as threats from the use of civilian supply chains for energy supplies. The US military is the largest consumer of energy in the US federal government. In light of this, many US public officials as part of their drive to promote greater use of renewable energy and reduction of climate altering emissions, may require that the military fuel mix include significant amounts of renewable energy and that the military reduce its carbon emissions. Accordingly, the book will examine how the US armed forces can adjust to these rising public demands, while still fulfilling its military mission. The book will also look at the security challenges of use of civilian supply chains. The US military procures most of its energy from civilian suppliers. In 2019, the US military purchased 49 percent of its fuel supplies from outside the United States, including in Asia and the Middle East. As the Covid-19 challenge revealed, critical US supply lines depend on production in China and other US adversaries. Washington recently initiated policies to reduce US vulnerability to supply disruptions of critical materials and products through reducing exposure to needs of products and materials produced in China and other countries. The implementation of these initiatives will require new strategies and policies for the US military to meet its energy needs securely.
Again and again, American taxpayers are asked to open their wallets and pay for a national security machine that costs $1 trillion operate. Yet time and time again, the US government gets it wrong on critical issues. So what can be done? Enter bestselling author Thom Shanker and defense expert Andrew Hoehn. With decades of national security expertise between them and access to virtually every expert, they look at what's going wrong in national security and how to make it go right. Age of Danger looks at the major challenges facing America-from superpowers like Russia and China to emerging threats like pandemics, cybersecurity, climate change, and drones-and reimagines the national security apparatus into something that can truly keep Americans safe. Weaving together expert analysis with exclusive interviews from a new generation of national security leaders, Shanker and Hoehn argue that the United States must create an industrial-grade, life-saving machine out of a system that, for too long, was focused only on deterring adversaries and carrying out global military operations. It is a timely and crucial call to action-a call that if heeded, could save Americans lives, money, and our very future on the global stage.
How a new understanding of warfare can help the military fight today's conflicts more effectively The way wars are fought has changed starkly over the past sixty years. International military campaigns used to play out between large armies at central fronts. Today's conflicts find major powers facing rebel insurgencies that deploy elusive methods, from improvised explosives to terrorist attacks. Small Wars, Big Data presents a transformative understanding of these contemporary confrontations and how they should be fought. The authors show that a revolution in the study of conflict--enabled by vast data, rich qualitative evidence, and modern methods-yields new insights into terrorism, civil wars, and foreign interventions. Modern warfare is not about struggles over territory but over people; civilians-and the information they might choose to provide-can turn the tide at critical junctures. The authors draw practical lessons from the past two decades of conflict in locations ranging from Latin America and the Middle East to Central and Southeast Asia. Building an information-centric understanding of insurgencies, the authors examine the relationships between rebels, the government, and civilians. This approach serves as a springboard for exploring other aspects of modern conflict, including the suppression of rebel activity, the role of mobile communications networks, the links between aid and violence, and why conventional military methods might provide short-term success but undermine lasting peace. Ultimately the authors show how the stronger side can almost always win the villages, but why that does not guarantee winning the war. Small Wars, Big Data provides groundbreaking perspectives for how small wars can be better strategized and favorably won to the benefit of the local population.
This book sheds light on the process in which the sub-state actor of Greenland has expanded its autonomy and strengthened its de jure participation in the national security of Denmark. By focusing on the case of the US Thule Air Base in Greenland, the largest military base in the Arctic, the authors endeavor to show that in the relationship between great powers, small countries and local actors within them, it is possible for local actors (sub-national entities) to have an influence on higher-level actors in the field of diplomacy on the national security level. For that purpose, the book examines political trends involving Greenland, Denmark, the US and Russia by using the multilateral multi-archive approach. The authors also take up the cases of Okinawa (Japan) and Olongapo (the Philippines) as reference points that provide additional insight into the interaction between the US policy regarding overseas military bases and the host countries' polities. The competition involving political and economic interests of a number of countries in the Arctic region has been intensifying in recent years, causing significant concern in the international community. Due to the accelerated melting of sea ice and the increase in the accessibility of natural resources and water lanes, the security situation in the Arctic has been changing rapidly, and this book helps meet the need for understanding the political and military factors behind those changes.
Invitation to Peace Studies is the first textbook in the field to emphasize 21st-century research and controversies and to encourage the more frequent use of a gender perspective in analyzing peace, war and violence. Recent empirical research forms the core of most chapters, but substantial attention is also given to faith-based ideas, movements, and peace pioneers. The book examines compelling contemporary topics like cyber warfare, drones, robots, digital activism, hactivism, the physiology of peace, rising rates of suicide, and peace through health. It is also unique in its use of a single coherent perspective-that of a global peace network-to make sense of the historically unprecedented and interconnected web of diverse ideas, individuals, groups, organizations, and movements currently promoting peace across the world.
"If you want peace, prepare for war." "A buildup of offensive weapons can be purely defensive." "The worst road may be the best route to battle." Strategy is made of such seemingly self-contradictory propositions, Edward Luttwak shows-they exemplify the paradoxical logic that pervades the entire realm of conflict. In this widely acclaimed work, now revised and expanded, Luttwak unveils the peculiar logic of strategy level by level, from grand strategy down to combat tactics. Having participated in its planning, Luttwak examines the role of air power in the 1991 Gulf War, then detects the emergence of "post-heroic" war in Kosovo in 1999-an American war in which not a single American soldier was killed. In the tradition of Carl von Clausewitz, Strategy goes beyond paradox to expose the dynamics of reversal at work in the crucible of conflict. As victory is turned into defeat by over-extension, as war brings peace by exhaustion, ordinary linear logic is overthrown. Citing examples from ancient Rome to our own days, from Barbarossa and Pearl Harbor down to minor combat affrays, from the strategy of peace to the latest operational methods of war, this book by one of the world's foremost authorities reveals the ultimate logic of military failure and success, of war and peace.
A sweeping yet concise account of history's empires that managed to maintain dominance for long stretches. What should the United States do with its power? What goals should it have, and how should it pursue them? Ultimately, what do Americans want their country to be? These are questions of grand strategy. The United States is the most powerful actor in the international system, but it is facing a set of challenges that might lead to its decline as this century unfolds. In The Pursuit of Dominance, Christopher J. Fettweis examines the grand strategy of previous superpowers to see how they maintained, or failed to maintain, their status. Over the course of six cases, from Ancient Rome to the British Empire, he seeks guidance from the past for present US policymakers. Like the United States, the examples Fettweis uses were the world' strongest powers at particularly moments in time, and they were hoping to stay that way. Rather than focusing on those powers' rise or how they ruled, however, Fettweis looks at how they sought to maintain their power. From these cases, one paramount lesson becomes clear: Dominant powers usually survive even the most incompetent leaders. Fettweis is most interested in how these superpowers defined their interests, the grand strategies these regimes followed to maintain superiority over their rivals, and how the practice of that strategy worked. A sweeping history of grand strategy, The Pursuit of Dominance looks at the past 2,000 years to highlight what-if anything-current US strategists can learn from the experience of earlier superpowers.
This textbook provides a comprehensive introduction to modern strategy, covering the context, theory, and practice of military strategy in all its different forms. Covering all the main issues in the field, the book explores the major themes through a combination of classical and modern strategic theory, history, and current practice. It is split into three main sections: The first provides the context for contemporary strategy and includes discussions of the human, technological, intelligence, ethical, and grand strategic dimensions. The second part explores the theory and practice of strategy in different geographical domains, including land, sea, air, space, and cyberspace. The final part engages with three of the most challenging forms of strategy in the contemporary era: nuclear weapons, terrorism, and insurgency. This second edition brings the book up to date by including discussions of the rise and fall of the Islamic State of Iraq and Syria (ISIS); the emergence of robotics and artificial intelligence; major events in space and cyberspace; and the growing profile of nuclear weapons. Each chapter presents the reader with a succinct summary of the topic, provides a challenging analysis of current issues, and finishes with key points, questions for discussion, and further reading. This book will be essential reading for upper-level students of strategic studies, war studies, military history, and international security.
Military Strategy in the 21st Century explores military strategy and the new challenges facing Western democracies in the twenty- first century, including strategy in cyber operations and peacekeeping, challenges for civil-military relations, and the strategic choices of great powers and small states. The volume contributes to a better understanding of military strategy in the twenty- first century, through exploring strategy from three perspectives: first, the study of strategy, and how our understanding of strategy has changed over time; second, new areas for strategic theory, such as peacekeeping and cyberspace; and third, the makers of strategy, and why states choose suboptimal strategies. With the increasing number of threats challenging strategy makers, such as great power rivalry, terrorism, intrastate wars, and transnational criminal organisations, Military Strategy in the 21st Century will be of great value to scholars of IR, Security Studies, Strategic Studies, and War Studies as well as policymakers and practitioners working with military strategy in particular and international security and war in general. The chapters were originally published as a special issue of the Journal of Strategic Studies.
How do military organizations assess strategic policy in war? In this book Scott Gartner develops a theory to explain how military and government leaders evaluate wartime performance, how much they change strategies in response to this evaluation, and why they are frequently at odds when discussing the success or failure of strategic performance. Blending history, decision theory, and mathematical modeling, Gartner argues that military personnel do reevaluate their strategies and that they measure the performance of a strategy through quantitative, "dominant" indicators. But different actors within a government use different indicators of success: some will see the strategy as succeeding when others see it as failing because of their different dominant indicators. Gartner tests his argument with three case studies: the British shift to convoys in World War I following the German imposition of unrestricted submarine warfare; the lack of change in British naval policy in the Battle of the Atlantic following the German introduction of Wolf Packs in World War II; and the American decision to deescalate in Vietnam after the Tet Offensive. He also tests his approach in a nonwar situation, analyzing the Carter Administration's decision to launch the hostage rescue attempt. In each case, his dominant indicator model better predicts the observed behavior than either a standard-organization or an action-reaction approach.
The SIPRI Yearbook is an authoritative and independent source of data and analysis on armaments, disarmament and international security. It provides an overview of developments in international security, military expenditure, weapons and technology, arms production and the arms trade, armed conflict and conflict management, and efforts to control conventional, nuclear, chemical and biological weapons. This 53rd edition of the SIPRI Yearbook covers developments during 2021, including: US BLArmed conflict and conflict management, with an overview of armed conflict and peace processes across the Americas, Asia and Oceania, Europe, the Middle East and North Africa, and sub-Saharan Africa, as well as a focus on global and regional trends in peace operationsBE UE US BLMilitary expenditure, international arms transfers and developments in arms productionBE UE US BLWorld nuclear forces, with an overview of each of the nine nuclear-armed states and their nuclear modernization programmesBE UE US BLNuclear arms control, featuring developments in the Russian-United States strategic dialogue, Iran's nuclear deal and the multilateral nuclear arms control and disarmament treaties, including the entry into force of the Treaty on the Prohibition of Nuclear WeaponsBE UE US BLChemical, biological and health security threats, including the impact of the Covid-19 pandemic, the investigation of allegations of chemical weapon use in Syria and developments in the international legal instruments against chemical and biological warfare BE UE US BLConventional arms control and regulation of new weapon technologies, with a focus on inhumane weapons and other conventional weapons of humanitarian concern, including efforts to regulate autonomous weapon systems, state behaviour in cyberspace and space, and developments in the Open Skies TreatyBE UE US BLDual use and arms trade controls, including developments in the Arms Trade Treaty, multilateral arms embargoes and export control regimes, and review processes in the legal framework of the European Union for such controls as well as annexes listing arms control and disarmament agreements, international security cooperation bodies, and key events in 2021.BE UE
This is the first such study of Operation Banner, the British Army's campaign in Northern Ireland. Drawing upon extensive interviews with former soldiers, primary archival sources including unpublished diaries and unit log-books, this book closely examines soldiers' behaviour at the small infantry-unit level (Battalion downwards), including the leadership, cohesion and training that sustained, restrained and occasionally misdirected soldiers during the most violent period of the Troubles in Northern Ireland. It contends that there are aspects of wider scholarly literatures - including from sociology, anthropology, criminology, and psychology - that can throw new light on our understanding of the British Army in Northern Ireland. It also offers fresh insights and analysis of incidents involving the British Army during the early years of Operation Banner, including the 1972 'Pitchfork murders' of Michael Naan and Andrew Murray in County Fermanagh, and that of Warrenpoint hotel owner Edmund Woolsey in South Armagh. The central argument of this book is that British Army small infantry units enjoyed considerable autonomy during the early years of Operation Banner and could behave in a vengeful, highly aggressive or benign and conciliatory way as their local commanders saw fit. The strain of civil-military relations at a senior level was replicated operationally as soldiers came to resent the limitations of waging war in the UK. The unwillingness of the Army's senior leadership to thoroughly investigate and punish serious transgressions of standard operating procedures in Northern Ireland created uncertainty among soldiers over expected behaviour and desired outcomes. Overly aggressive groups of soldiers could also be mistaken for high-functioning units - with negative consequences for the Army's overall strategy in Northern Ireland. |
You may like...
Essays on Mathematical Robotics
John Baillieul, Shankar S. Sastry, …
Hardcover
R2,862
Discovery Miles 28 620
Bug Club Pro Guided Y3 Bright Sparks
Trish Cooke, Paul Bright, …
Paperback
R282
Discovery Miles 2 820
Jolly Phonics Activity Book 3 - in…
Sara Wernham, Sue Lloyd
Paperback
(1)
Corpus Linguistics and Statistics with R…
Guillaume Desagulier
Hardcover
R4,237
Discovery Miles 42 370
Easy Statistics for Food Science with R
Abbas F Mubarek Al-Karkhi, Wasin A. A. Alqaraghuli
Paperback
R2,440
Discovery Miles 24 400
|