How do military organizations assess strategic policy in war? This work develops a theory to explain how military and government leaders evaluate wartime performance, how much they change strategies in response to this evaluation, and why they are often at odds when discussing success or failure.
Examines the different aspects that characterise a war, from the centre of gravity to be attacked to the elements constituting military decision, as they are manifested in 'simple' symmetrical wars; asymmetrical wars versus a state opponent; guerrilla warfare; parallel warfare; and next generation warfare.
Presents the distillation of best practices and lessons learned from the contemporary operating environment in Iraq and Afghanistan with regard to security force assistance, and offers recommendations that build upon initiatives within the Department of Defense to create a comprehensive approach to improve US security force assistance (SFA).
Examines US border issues, key agencies and their missions and the commercial trucking across the Mexican border. This book discusses the south-west border violence related to gun and drug-trafficking from Mexico, border searches of laptop computers and other electronic storage devices.
The US Navy plans to build a number of new surface ships in the coming decades according to its most recent 30-year shipbuilding plan. This book examines the cost-effectiveness of nuclear power for navy surface ships and the issues and options for Congress.
It is no secret that twentieth century Britain was governed through a culture of secrecy, and secrecy was particularly endemic in military research and defence policy surrounding biological and chemical warfare. This book investigates significant episodes in the history of biological and chemical warfare.
Attempts to answer two main questions: 'Is there a gap between EU and Turkish security cultures?' and 'To what extent is Turkey an advantage for Europe?'. This book examines Turkey's crucial role with NATO and details its relations and priorities in the Mediterranean, the Middle East and the Black Sea regions, comparing these with EU relations.
Bernard Brodie (1910-1978) was a leading 20th century theorist and philosopher of war. A key architect of American nuclear strategy, Brodie was one of the first civilian defense intellectuals to cross over into the military world. This book examines Bernard Brodie's strategic and philosophical response to the nuclear age.
A guide for security professionals, and a useful resource for those who need a reference work to support their continuing education. It also emphasizes on topics particularly those relating to homeland security, terrorism, threats to national infrastructures, risk assessment, disaster mitigation and remediation, and weapons of mass destruction.
The Department of Defense (DoD) and the intelligence community rely on various systems to provide imagery to tactical commanders and intelligence analysts. This book examines the costs and potential performance of four possible designs for a Space Radar System.
The Department of Defense (DOD) purchases goods and services from contractors to support military operations. Any purchase of a good or service by DOD is defined as a procurement. This book examines the DOD's defence acquisition structure and considers the DODs efforts to improve how the department acquires weapon systems.
Dyson explains the convergence and divergence between British, French and German defence reforms in the post-Cold War era. He engages with cultural and realist theories and develops a neoclassical realist approach to change and stasis in defence policy, bringing new material to bear on the factors which have affected defence reforms.
Presents an overview of the US nuclear stockpile and the issues relating to maintenance and replacement of warheads. This book discusses extending the service lives of warheads without nuclear testing; and developing, building, and deploying a new generation of warheads without testing to replace the current stockpile.
The HAARP project in Alaska has many possible scientific and military applications, from raising a planetary defence shield to probing deep into the Earth, and its futuristic technology ranges from the super-beam weapon to worldwide mind control. This text examines this controversial project.
The third edition of this successful textbook has been completely revised and updated in light of recent events. Its comprehensive coverage of issues of war and peace such as terrorism, intelligence, and weapons of mass destruction makes it the major strategic studies textbook in the field.
The President and Congress have historically played different roles when sending US troops into hostile situations. The War Powers Resolution was enacted to ensure that the President and Congress share decisions where US troops may become involved in hostilities. This sharing of power has often resulted in controversy.
The Channel Islands fortifications can be seen as the pinnacle of German engineering during the war. This book describes the design, construction and manning of these defensive positions, as well as the occupation of the Channel Islands by the Germans. It also explores the living conditions on the islands.
Defence and strategy is never far from international press interest. This book covers the background to the topic, and provides concise definitions for complicated military terms. It contains over 400 entries detailing various aspects of military defence and strategy. It includes a list of abbreviations and acronyms.
Identifying vulnerabilities can allow us to apply our full range of capabilities to ensure space superiority and continued support to joint military operations across the spectrum of conflict. This book explores the United States reliance on space operations for its security.
Ballistic missile defense (BMD) has been a key national security priority for some time, even though such interest has been ongoing since the end of World War II. This book provides a brief overview of the history of the BMD efforts undertaken to defend the United States and begins with a summary of the provisions of the 1972 ABM Treaty.
A primary mission of the Department of Homeland Security (DHS) is to prevent terrorist attacks within the United States. This book provides an overview of the DHS Intelligence Enterprise and how it is organised and examines the key departmental activities and issues involved in thwarting terrorism.
In the Service of Peace - simple words that adorn the obverse of every United Nations medal, yet behind this elegance lurks violence and an unheralded heroism invisible to an often misunderstood quarter of Canada's military history. This book provides a rare, visceral inner perspective of the various Canadian missions.
Originally published in 1902, this volume presents an account of the pivotal events of the Bohemian campaign during the Austro-Prussian War of 1866. The framework of this account is based upon the journals of Count Blumenthal who was the Chief of Staff of the Prussian Second Army.
Countering the threat of improvised explosive devices (IED)s is a challenging, multilayered problem. This book focuses on the human dimension of terror campaigns and also on improving the ability to predict these activities using collected and interpreted data from a variety of sources. It summarizes two workshops held in 2008.
The Strategy Bridge presents and explains the general theory of strategy and demonstrates the relevance of that theory to the real world of practice. The author explains what strategy is and how it relates to politics and warfare. The book is not 'about' the theory of strategy, rather it is that theory.
This is an in-depth study of Pakistan's security link with arms suppliers and defence industrial capacity, and the influence of Pakistan's army on conventional and non-conventional defence decisions. The analysis is backed with numerous case studies of defence decisions carried out from 1979-99.
Utilizing previously classified documents, the author shows how Lyndon Johnson and his principal advisers came face to face with the failure of their Vietnam policy. It reveals the bankruptcy of the bombing campaign against North Vietnam and the failure of political reform in South Vietnam.
Offers a resource for those involved in security policymaking, analysis and research. This book features a region-by-region analysis of the major military and economic developments affecting defence and security policies, and the trade in weapons and other military equipment. It includes tables that detail major military training activities.
Given the realities of the Taliban's persistence and the desire of US policymakers - and the public - to find a way out, what can and should be the goals of the US and its allies in Afghanistan? This title provides a comprehensive assessment of the alternatives for restoring peace and stability to Afghanistan.
The years from 1914 to 1918 saw a whole series of complex and rapid changes in infantry tactics, which fundamentally altered the way wars had been fought for 150 years. This study describes the development of infantry equipment and weapons and how these items and techniques were employed in battle.
For military planners, the control of information is critical to military success, and communications networks and computers are of vital operational importance. This book focuses on electronic warfare which is defined as a military action involving the use of electromagnetic and directed energy to control the to attack the enemy.
The air cargo system is vulnerable to several security risks. Several procedural and technology-based initiatives to enhance air cargo security and deter terrorist and criminal threats have been put in place. This book examines aviation security with a focus on the background and policy options for screening and securing air cargo.
Takes a look at the greatest military minds who ever lived, yet whose names are seldom recognized and whose ideas are seldom acknowledged. They represent the military genius of Europe from the 16th through the 19th centuries, and their writings influenced the rise and fall of every European power during the early modern era.
Makes gathering intelligence on land-based air defence systems easy. This title provides details of the system development and status, technical description, variants, specifications, country inventories, manufacturer details, and over 900 photographs to support recognition.
The appointment of a Supreme Court Justice is an event of major significance in American politics. Each appointment is important because of the enormous judicial power the Supreme Court exercises as the highest appellate court in the federal judiciary. This book reviews the procedure for appointing a Supreme Court Justice.
Professor Raymond Tanter headed a fact-finding delegation to Iraq to interview Sunni Awakening members, Iraqi Shiites, Iraqi and American officials, and the Iranian opposition based in Iraq. This book explains why insurgents ceased attacking US forces in Iraq and turned against al Qaeda.
The threats to homeland security are exposed in this comprehensive resource. It takes readers through the natural and accidental disasters, as well as premeditated acts of domestic and international terrorism that threaten this country. They'll also find a detailed examination of terrorism, its processes and consequences.
This work examines the defence and security challenges facing the new South Africa in the context of development and nation-building priorities. The transformation of security policy during the transition from apartheid and since the April 1994 elections is examined.
Nuclear security measures refer to a wide range of actions to prevent theft or diversion of nuclear material or sabotage at an installation or in transit. This book examines the international effort to secure vulnerable nuclear material around the world to prevent nuclear terrorism.
Helps us to understand the developing trends and underlying assumptions of British Defence Policy. This volume places policy developments in a post-11 September context and assesses the impact of such events on key aspects of the defence policy spectrum, notably the perennial concern of military overstretch.
Explores America's national security strategy, which focuses on renewing American leadership; recognises the fundamental connection between our national security, our national competitiveness, resilience, and moral example; and, reaffirms America's commitment to pursue our interests through an international system.
Contrary to popular opinion, Canada has always utilised military force to further its security, as well as its economic and political well-being. This collection of essays spans the entirety of the Canadian military experience. It underlines the reality that the government has consistently used its armed forces to achieve political purpose.
Provides information on the Department of Defense's (DODs) progress toward developing an acquisition process for information capabilities and discusses the time frame for implementation. This title discusses the legislative changes that may be required to fully implement the acquisition process.
An examination of British nuclear policy and official government attempts to justify the deployment of nuclear weapons, this book analyzes the rationales that have been offered by British governments for making, possessing and employing weapons of mass destruction.
The US Secret Service has two missions: criminal investigations and protection. This book frames potential policy questions concerning the Service's mission and organisation through an examination of the US Secret Service history and its statutory authorities, mission, and present activities within the Department of Homeland Security.
Explains how strategic reasoning makes sense of the complexity of war on land, at sea, in the air, in space, and even 'cyberspace'. This book shows how strategy works in all geographical environments and with all kinds of weapons. Giving an account of strategy since the Cold War ended, it is for students of modern strategy and security studies.
Offers information on the activities of, and products bought by the armed forces and those that supply them. This book contains contact details and provides a database of Indian and Foreign companies in defence manufacture and supplies. It also provides information on the registration of vendors and contains a who's who of defence in India.
After the conclusion of World War II, the United States adopted the national-security strategy of containment. This book discusses the new strategy, which identifies two new problems that have arisen in the national-security sphere, and proposes military solutions to each of these problems.
This book advances a coherent statement of defensive realism as a theory of strategy for our time and adds to our understanding of defensive realism as a grand theory of IR in particular and our understanding of IR in general and contributes to the ongoing debates among major paradigms of international relations.
Counterinsurgency is the greatest challenge facing the armed forces of the US and NATO countries. This book explains how insurgents think, and how this is different from how the armed forces think. It includes a chapter exploring the type of thinking that insurgents use, and case studies that can be used to train the military.
This text surveys 100 years of military inefficiency from the Crimean War to World War II. It examines the social psychology of military organizations, provides case studies of individual commanders and indentifies an alarming pattern in the causes of military disaster.
Since 1945, the European states which had previously glamorised their military elites, and made going to war the highest expression of patriotism, have renounced violence as a way of settling their disputes. Violence has been eclipsed as a tool of statesmen. This book discusses about this subject.
The US Border Patrol (USBP) has a long and storied history as our nation's first line of defence against unauthorised migration. This book serves as a primer on the key federal agencies charged with border security and describing each agency's role. It explores US border security and the role of the key agencies and their missions.
Covers national security, corporate security, intelligence work, and disaster/emergency management and planning. This book is suitable for senior managers, security and intelligence experts, law enforcement personnel, disaster and emergency management practitioners, and policy makers and their advisors, and academics and university students.
The pillbox is the iconic defence structure of the Second World War. Covering renaissance caponiers, Martello Towers, Boer War blockhouses and the pillboxes of the First World War, this work describes the development of defence structures in the Second World War and analyses the different pillbox types: hexagonal, square, rectangular, and others.
The Maori people of New Zealand were experienced field engineers and it was common practice to protect villages with surrounding entrenchments and wooden palisades, known as pas. This book explores the evolution and design of Maori fortifications, and charts the course of a conflict that would ultimately see the British break the Maori pas.
Karl von Clausewitz (1780-1831) is acknowledged to be a great writer on war. Even though he wrote his work at a time when the range of firearms was fifty yards, much of what he had to say remains relevant. This book explains his ideas in terms of his experiences as a soldier in the Napoleonic Wars, and of the intellectual background of his time.
Explores how the joint forces must operate to counter irregular threats and guide force development, material and non-material capability development, and experimentation when directed by the President or Secretary of Defense, to prevent, deter, disrupt and defeat non-state actors, as well as state actors who pose irregular threats.
Presenting essays on strategic theory, this reader guides students through the theoretical and practical aspects of Strategic Studies. It provides a survey of the ideas and themes in the field of Strategic Studies. It is suitable for students of strategic studies, international security and modern warfare, and for professional military students.
Congress has expressed a great deal of interest in using Unmanned Aircraft Systems (UASs) to surveil the United States' international land border. This book examines the strengths and limitations of deploying UASs along the borders and related issues for Congress.
Focusing on arguments about US national security, this book provides an analysis of a policy and strategy for deterrence; the long-term US bid to transform its armed forces' capabilities, with particular reference to strategic surprise, in the face of many great uncertainties; and the problems posed by enemies who fight using irregular methods.
Examines US border security roles and issues including the United States Border Patrol's (USBP) biometric database of illegal aliens and the FBI's biometric database of criminals and terrorists; the number of unauthorised aliens who die attempting to enter the country each year; and, the increasing attacks on Border Patrol agents.
On 2 March 2010, the Secretary of Defense appointed a working group to undertake a comprehensive review of the impacts of repealing the 'Don't Ask, Don't Tell' law. This book assesses the impact of 'Don't Ask, Don't Tell' on the basis of military readiness, military effectiveness, unit cohesion, recruiting, retention and family readiness.