Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 7 of 7 matches in All Departments
This book builds on the six years of hands-on experience that the author had while working in the North Atlantic Treaty Organization. It provides an overview and history of NATO, looks at the political and military components of the Alliance, as well as the military command from the perspective of real-world contemporary NATO operations and planning. The author also looks at the military training, lessons, and exercise components and how it prepares forces to support upcoming NATO Response Force (NRF) rotations to ensure that NATO is a viable threat deterrent and responsive organization to both Article 5 and non-Article 5 operations. This book will serve as a primer into the world's longest enduring Alliance and one that has made an impact on real world operations over the last 20 years in Europe (Bosnia and Kosovo), Africa (Libya), Asia (Afghanistan and Pakistan), and the Middle East (Iraq).
This study turned the tables on a conventional understanding of the four instruments of national power (diplomacy, information, military and economic measures/D.I.M.E.) to see how potential adversaries could use these against the national security interests of Canada and the United States. Moreover, this particular work focuses on qualitative research regarding cyber threats that have continually beleaguered these nations by malevolent actors mostly over the last five years. This study also affords consideration to how nefarious individuals, non-state actors, or nation states can implement the instruments of national power through the application of a new model named the York Intelligence Red Team Model-Cyber (YIRTM-C) using sources guided by the Federal Qualitative Secondary Data Case Study Triangulation Model to arrive at results.
This book analyzes intelligence relations in an unsecure world and provides contributions on intelligence processes, interstate intelligence relations and hybrid warfare. Tactical, operational and strategic intelligence relations, both within and between intelligence agencies, and between states, are essential to support decision makers. This book ties together how intelligence adapts to security changes, global power shifts and the trend from globalization to a more nationalistic approach. During such changes, there is a need to analyze intelligence sharing relationships. Bringing together practitioners and academics, the book presents a plurality of approaches relative to intelligence relations that seek to advance the debate in the field.
One of the prevailing issues regarding security to North America and more pointedly, the United States, gravitates on the topic of cyber threats confronting this nation. These threats are becoming more disruptive and destructive and many nations' infrastructure is vulnerable to them. This book makes use of a qualitative research methodology looking at a conventional understanding of the four instruments of power that include diplomacy, information, military and economic (D.I.M.E.) efforts through the use of the York Intelligence Red Team Model-Cyber (Modified) and seeing how adversaries are using them against the United States. Moreover, this project uses secondary data and makes use of the Federal Secondary Data Case Study Triangulation Model to ensure a balance of sources to dissect the problem.
This book analyzes intelligence relations in an unsecure world and provides contributions on intelligence processes, interstate intelligence relations and hybrid warfare. Tactical, operational and strategic intelligence relations, both within and between intelligence agencies, and between states, are essential to support decision makers. This book ties together how intelligence adapts to security changes, global power shifts and the trend from globalization to a more nationalistic approach. During such changes, there is a need to analyze intelligence sharing relationships. Bringing together practitioners and academics, the book presents a plurality of approaches relative to intelligence relations that seek to advance the debate in the field.
Threats to peace and stability are real and will likely continue into the foreseeable future. Likewise, globalization and its proliferation has made it increasingly difficult in knowing whether one is a friend or foe. This is particularly true when turning to the relationship of the five permanent members of the United Nations Security Council (UNSC); the relationships are not as clear as was the case two decades ago. Intelligence professionals the world over would be remiss in their assessments if they fail to take into account the position of each in the context of contemporary issues. Countries can be aligned on one issue and yet diametrically opposed on others. This research looks to enhance what Ernest Boyer refers to as scholarship of integration and uses the Federal Qualitative Secondary Data Case Study Triangulation Model and a variation of a model referred to as the York Intelligence Red Team Model-Modified (YIRTM-M) to conduct the analysis. More pointedly, this book looks at issues from the U.S. perspective to see how the YIRTM-M can be applied to advance its own interests on the world stage and to better understand when each can be seen as a friend or foe.
The United States is seemingly confronted with more global issues now than it has ever experienced. The U.S., under a relatively new presidential administration, is looking to depart from globalisation though there are still inextricable linkages among all countries in the world; in 2018 both the Defense Department and State Department provided updates to their strategies and security plans. This book provides an open source intelligence analysis of regions, countries and non-state actors from around the world that could have an impact on the United States. These areas and actors are dissected using predominately qualitative analysis techniques focusing on secondary data sources in order to provide an open source intelligence look at threats as seen by the United States using two models (the York Intelligence Red Team Model and the Federal Secondary Data Case Study Triangulation Model). The key audience for this book include the 17 members of the U.S. intelligence community, members of the U.S. National Security Council, governments of other countries that share the United States' assessment of current threats, non-governmental organisations (NGOs) looking to provide support abroad, and private sector companies considering expanding their operations overseas.
|
You may like...
|