You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Swarming is a seemingly amorphous, but deliberately structured, coordinated, strategic way to perform military strikes from all directions. It employs a sustainable pulsing of force and/or fire that is directed from both close-in and stand-off positions. It will work best--perhaps it will only work--if it is designed mainly around the deployment of myriad, small, dispersed, networked maneuver units. This calls for an organizational redesign--involving the creation of platoon-like pods joined in company-like clusters--that would keep but retool the most basic military unit structures. It is similar to the corporate redesign principle of flattening, which often removes or redesigns middle layers of management. This has proven successful in the ongoing revolution in business affairs and may prove equally useful in the military realm.
Netwar-like cyberwar-describes a new spectrum of conflict that is emerging in the wake of the information revolution. Netwar includes conflicts waged, on the one hand, by terrorists, criminals, gangs, and ethnic extremists; and by civil-society activists (such as cyber activists or WTO protestors) on the other. What distinguishes netwar is the networked organizational structure of its practitioners-with many groups actually being leaderless-and their quickness in coming together in swarming attacks. To confront this new type of conflict, it is crucial for governments, military, and law enforcement to begin networking themselves.
None
Based on a detailed study of 35 cases in Africa, Asia, Latin America, and post-communist Eurasia, this book explores the fate of competitive authoritarian regimes between 1990 and 2008. It finds that where social, economic, and technocratic ties to the West were extensive, as in Eastern Europe and the Americas, the external cost of abuse led incumbents to cede power rather than crack down, which led to democratization. Where ties to the West were limited, external democratizing pressure was weaker and countries rarely democratized. In these cases, regime outcomes hinged on the character of state and ruling party organizations. Where incumbents possessed developed and cohesive coercive party structures, they could thwart opposition challenges, and competitive authoritarian regimes survived; where incumbents lacked such organizational tools, regimes were unstable but rarely democratized.
The information revolution--which is as much an organizational as a technological revolution--is transforming the nature of conflict across the spectrum: from open warfare, to terrorism, crime, and even radical social activism. The era of massed field armies is passing, because the new information and communications systems are increasing the lethality of quite small units that can call in deadly, precise missile fire almost anywhere, anytime. In social conflicts, the Internet and other media are greatly empowering individuals and small groups to influence the behavior of states. Whether in military or social conflicts, all protagonists will soon be developing new doctrines, strategies, and ...
Traces the recent evolution of international terrorism against civilian and U.S. military targets, looks ahead to where terrorism is going, and assesses how it might be contained. The authors consider the threat of information-based terrorism and of weapons of mass destruction, with an emphasis on how changes in the sources and nature of terrorism may affect the use of unconventional terror. The authors propose counterterrorism strategies that address the growing problem of homeland defense.
The marriage of computers and telecommunications, the global integration of these technologies and their availability at low cost is bringing about a fundamental transformation in the way humans communicate and interact. But however much consensus there may be on the growing importance of information technology today, agreement is far more elusive when it comes to pinning down the impact of this development on security issues. Written by scholars in international relations, this volume focuses on the role of the state in defending against cyber threats and in securing the information age. The manuscript is captivating with the significance and actuality of the issues discussed and the logical, knowledgeable and engaged presentation of the issues. The essays intrigue and provoke with a number of 'fresh' hypotheses, observations and suggestions, and they contribute to mapping the diverse layers, actors, approaches and policies of the cyber security realm.
In the world of terrorism, knowledge is a critical asset. Recent studies have revealed that, among international terrorists, there is a global sharing of ideas, tactics, strategies, and lessons learned. Teaching Terror examines this sharing of information in the terrorist world, shaping our understanding of, and response to, the global threat of terrorism. Chapters cover various aspects of individual and organizational learning, some using a general level of analysis and others presenting case studies of individual terrorist groups. These groups teach each other through a variety of means, including training camps and the Internet. Terrorist networks are also learning organizations, drawing on situational awareness, adapting their behavior, and, to give one example, improving not just their use of improvised explosive devices, but also rendering technology such as unmanned aerial vehicles and satellite phones ineffective. This book provides a wealth of insights on the transfer of knowledge in the world of terrorism, and offers policy implications for counterterrorism professionals, scholars, and policymakers.
Why the world’s most resilient dictatorships are products of violent revolution Revolution and Dictatorship explores why dictatorships born of social revolution—such as those in China, Cuba, Iran, the Soviet Union, and Vietnam—are extraordinarily durable, even in the face of economic crisis, large-scale policy failure, mass discontent, and intense external pressure. Few other modern autocracies have survived in the face of such extreme challenges. Drawing on comparative historical analysis, Steven Levitsky and Lucan Way argue that radical efforts to transform the social and geopolitical order trigger intense counterrevolutionary conflict, which initially threatens regime survival, but ...
Defining terrorism -- The end of empire and the origins of contemporary terrorism -- The internationalization of terrorism -- Religion and terrorism -- Suicide terrorism -- The old media, terrorism, and public opinion -- The new media, terrorism, and the shaping of global opinion -- The modern terrorist mind-set: tactics, targets, tradecraft, and technologies -- Terrorism today and tomorrow.