You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book seeks to provide a comparative assessment of the significance of ‘human factors’ in effective counter-terrorism. The phrase ‘human factors’ is used to describe personal relationships, individual capabilities, effective leadership, technical interface, organisational culture and the community engagement necessary to effectively minimise, counter and control the threat of terrorism. Unlike many works in the field, this book is constructed around the input of ‘experienced knowledge’ from over 170 semi-structured interviews of specialist military, policing, intelligence and security practitioners - those actors actually involved in countering terrorism. These practitioners ...
This book describes and explains the theory of operational art – an intermediate field of theory and practice between tactics and strategy. This book is one of relatively few works in the English language on the theory of operational art. It deals predominantly with the theory of operational art as applied to preparing, planning and conducting a high-intensity conventional war. In contrast to other works, the book is written in broad terms, rather than focusing on national military culture and experience, which allows more flexibility in adjusting to new evidence. The book explains the theory of operational art in all three physical dimensions (land, sea, and air/space) and describes/analyses various aspects of operational art in general terms, using historical examples to facilitate the understanding of the theory. The case studies focus on examples of major campaigns and operations in both the more recent and distant history of warfare, including the current Ukraine–Russia war. This book will be of much interest to students of strategic studies, military history, defense studies, and International Relations, as well as military professionals.
Global politics in the twenty-first century is complicated by dense economic interdependence, rapid technological innovation, and fierce security competition. How should governments formulate grand strategy in this complex environment? Many strategists look to deterrence as the answer, but how much can we expect of deterrence? Classical deterrence theory developed in response to the nuclear threats of the Cold War, but strategists since have applied it to a variety of threats in the land, sea, air, space, and cyber domains. If war is the continuation of politics by other means, then the diversity of technologies in modern war suggests a diversity of political effects. Some military forces or...
Survival, the IISS’s bimonthly journal, challenges conventional wisdom and brings fresh, often controversial, perspectives on strategic issues of the moment. In this issue: Alexander K. Bollfrass and Stephen Herzog argue that despite facing major challenges, the global nuclear order remains resilient Maria Shagina assesses Russia’s status as an energy superpower, concluding that it has a bleak future in the long term Erik Jones argues that the war in Ukraine has disrupted the European Central Bank’s ability to operate by consensus Jeffrey E. Kline, James A. Russell and James J. Wirtz contend that the US Navy may struggle to adapt to the pace of technological, social and environmental change Ray Takeyh revisits the Iranian Revolution, finding that Jimmy Carter did not so much ‘lose’ Iran as misunderstand it And five more thought-provoking pieces, as well as our regular Book Reviews and Noteworthy column. Editor: Dr Dana Allin Managing Editor: Jonathan Stevenson Associate Editor: Carolyn West Editorial Assistant: Charlie Zawadzki
In the CIA's 75th birthday year, veteran intelligence historian Rhodri Jeffreys-Jones presents a history of the Agency from its foundation in the early days of the Cold War, through the Bay of Pigs fiasco of 1961, its role in the war in the 1970s, the part it played in the collapse of Soviet Communism in the late 1980s and the existential crisis of the 1990s that followed, to the new role it has taken on in the war on terror since 2001. A thoughful and balanced counterpoint to both celebratory and hostile accounts, A Question of Standing argues that the Agency's original and continuing purpose was not just the delivery of intelligence, but its delivery in a manner that commanded attention. To achieve that goal, the CIA had to be in good standing. It is never helpful to convey the truth if nobody respects you enough to listen.
This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members).
"The idea of "cyber war" has played a dominant role both in academic and popular discourses concerning the nature of statecraft and conflict in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for advantage below the threshold of war? This book debates that question. The contributors unpack the conceptual and theoretical logics of the framing of cyber competition as an intelligence contest, particularly in the areas of information theft and manipulation. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts, and placing all of it in conversation with the larger fields of international relations and intelligence studies"--