Author: Paul A.L. Ducheine
Release Date: 2017-08-12
International conflict resolution increasingly involves the use of non-military powerand non-kinetic capabilities alongside military capabilities in the face of hybrid threats.In this book, counter-measures to those threats are addressed by academics with bothpractical and theoretical experience and knowledge, providing strategic and operationalinsights into non-kinetic conflict resolution and on the use of power to influence, affect,deter or coerce states and non-state actors. This volume in the NL ARMS series deals with the non-kinetic capabilities to addressinternational crises and conflicts and as always views matters from a global perspective.Included are chapters on the promise, practice and challenges of non-kinetic instrumentsof power, the instrumentality of soft power, information as a power instrumentand manoeuvring in the information environment, Russia's use of deception andmisinformation in conflict, applying counter-marketing techniques to fight ISIL, usingstatistics to profile terrorists, and employing tools such as Actor and Audience Analysis.Such diverse subjects as lawfare, the Law of Armed Conflict rules for non-kinetic cyberattacks, navigation warfare, GPS-spoofing, maritime interception operations, andfinally, as a prerequisite, innovative ways for intelligence collection in UN Peacekeepingin Mali come up for discussion. The book will provide both professionals such as (foreign) policy makers and thoseactive in the military services, academics at a master level and those with an interestin military law and the law of armed conflict with useful and up-to-date insights intothe wide range of subjects that are contained within it. Paul A.L. Ducheine and Frans P.B. Osinga are General Officers and full professors at theFaculty of Military Sciences of the Netherlands Defence Academy in Breda, The Netherlands.
Author: Frans P.B. Osinga
Release Date: 2007-01-24
John Boyd is often known exclusively for the so-called ‘OODA’ loop model he developed. This model refers to a decision-making process and to the idea that military victory goes to the side that can complete the cycle from observation to action the fastest. This book aims to redress this state of affairs and re-examines John Boyd’s original contribution to strategic theory. By highlighting diverse sources that shaped Boyd’s thinking, and by offering a comprehensive overview of Boyd’s work, this volume demonstrates that the common interpretation of the meaning of Boyd’s OODA loop concept is incomplete. It also shows that Boyd’s work is much more comprehensive, richer and deeper than is generally thought. With his ideas featuring in the literature on Network Centric Warfare, a key element of the US and NATO’s so-called ‘military transformation’ programmes, as well as in the debate on Fourth Generation Warfare, Boyd continues to exert a strong influence on Western military thinking. Dr Osinga demonstrates how Boyd’s work can helps us to understand the new strategic threats in the post- 9/11 world, and establishes why John Boyd should be regarded as one of the most important (post)modern strategic theorists.
Author: Scott Timcke
Release Date: 2017
Genre: Social Science
The United States presents the greatest source of global geo-political violence and instability. Guided by the radical political economy tradition, this book offers an analysis of the USA's historical impulse to weaponize communication technologies. Scott Timcke explores the foundations of this impulse and how the militarization of digital society creates structural injustices and social inequalities. He analyses how new digital communication technologies support American paramountcy and conditions for worldwide capital accumulation. Identifying selected features of contemporary American society, Capital, State, Empire undertakes a materialist critique of this digital society and of the New American Way of War. At the same time it demonstrates how the American security state represses activists--such as Black Lives Matter--who resist this emerging security leviathan. The book also critiques the digital positivism behind the algorithmic regulation used to control labour and further diminish prospects for human fl ourishing for the '99%'. Capital, State, Empire contributes to a broader understanding of the dynamics of global capitalism and political power in the early 21st century.
Author: Air Univeristy Press
Publisher: Military Bookshop
Release Date: 2014-09-01
Genre: Political Science
With many scholars and analysts questioning the relevance of deterrence as a valid strategic concept, this volume moves beyond Cold War nuclear deterrence to show the many ways in which deterrence is applicable to contemporary security. It examines the possibility of applying deterrence theory and practice to space, to cyberspace, and against non-state actors. It also examines the role of nuclear deterrence in the twenty-first century and reaches surprising conclusions.
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose. Discusses the conceptual and ideological foundation of hackers and hacker groups Provides concrete footholds regarding hacker group strategy Discusses how cyber guerillas are changing the face of cyber warfare and cyber security through asymmetrical, flexible and stealthy means and methods Explains the tactics, techniques, and procedures these hacker groups use in their operations Describes how cyber guerrillas and hackers use the media and influence the public Serves as a must-have guide for anyone who wants to understand—or is responsible for defending against—cyber warfare attacks
Author: Annet Dekker
Release Date: 2018-05-04
Genre: Social Science
Collecting and Conserving Net Art explores the qualities and characteristics of net art and its influence on conservation practices. By addressing and answering some of the challenges facing net art and providing an exploration of its intersection with conservation, the book casts a new light on net art, conservation, curating and museum studies. Viewing net art as a process rather than as a fixed object, the book considers how this is influenced by and executed through other systems and users. Arguing that these processes and networks are imbued with ambiguity, the book suggests that this is strategically used to create suspense, obfuscate existing systems and disrupt power structures. The rapid obsolescence of hard and software, the existence of many net artworks within restricted platforms and the fact that artworks often act as assemblages that change or mutate, make net art a challenging case for conservation. Taking the performative and interpretive roles conservators play into account, the book demonstrates how practitioners can make more informed decisions when responding to, critically analysing or working with net art, particularly software-based processes. Collecting and Conserving Net Art is intended for researchers, academics and postgraduate students, especially those engaged in the study of museum studies, conservation and heritage studies, curatorial studies, digital art and art history. The book should also be interesting to professionals who are involved in the conservation and curation of digital arts, performance, media and software.
Author: United States Air Force Research Institute
Publisher: Createspace Independent Publishing Platform
Release Date: 2017-08-24
Discussions concerning civilian casualties in warfare continue to elicit very emotional responses among the public at large. Dr. Sarah Sewall, in Chasing Success: Air Force Efforts to Reduce Civilian Harm, depicts the US Air Force's efforts over the past twenty-plus years being at the vanguard of minimizing civilian harm in conflict while still effectively pursuing military objectives. When the Air Force Research Institute turned to Dr. Sewall to write this work, we understood that warfare is a messy business. At its core, when other elements of national power have failed to persuade and deter, warfare is about forcing one's will upon an adversary, including applying controlled violence. History is rife with examples of civilizations falling after their armies in the field are defeated and their cities are sacked, looted, and burned. The nature of modern warfare extracted an increasingly high toll on civilians as weapons became more deadly. As early as our own Civil War, the American military has become increasingly aware of civilian casualties-as has the international community, following the close of World War II. Nazi Germany's attacks on London utilizing terror weapons, such as the V-1 and V-2, and the Allied bombings of Dresden and Hiroshima demonstrated the totality of warfare in the modern era. The Geneva Conventions of 1949 attempted to define the basic rights of not just wartime prisoners but also to establish protection for civilians in and around a war zone. Warfare has become increasingly more complex. Some organizations, like the Islamic State in Iraq and the Levant (ISIL), are following the old historical examples in which they convert, enslave, or murder the civilian residents in conquered territories. In other conflicts, with the rise of insurgencies across the globe, standing militaries no longer meet on a battlefield where identifiable fronts and protected zones exist. In Iraq and Afghanistan, adversaries hiding within civilian populations have become the norm rather than the exception. Precision-guided munitions (PGM) have enabled more accurate delivery of kinetic effects, improving airpower's effectiveness while reducing risk to friendly forces. PGMs have also enabled airpower to reduce collateral damage and civilian casualties through more precise targeting. Yet PGMs, and the humans who deliver them, are not infallible, nor is the targeting information obtained during wartime perfect. Thus, unintended effects can be reduced but never completely eliminated. An open dialogue on such controversial issues as civilian vi casualties depicts the true strength of our Air Force and demonstrates the best attributes of a military operating inside a democratic society. It is in this spirit of open dialogue that we present Dr. Sewall's work on a very timely and emotionally charged subject.
Many intelligence practitioners feel that the statutory footing on which intelligenceagencies have been placed forms an impediment to confronting unprecedented contemporarychallenges. On the basis of case studies spanning the period from the First WorldWar to the present, this book argues that while the intelligence community in the era ofglobalization has indeed come to face new and complex challenges that require adaptation,operating in demanding and changing environments is not new at all. This book questionsthe conventional wisdom of 9/11 or the end of the Cold War as caesurae. It also argues thatthe ability to adapt, innovate, question and learn from past experience is crucial for thesuccess of intelligence organizations, rather than ever-expanding funding. Agencies’ ability to reflect, adapt and learn from experience determines their subsequentcapability to deliver. One key development resulting from globalization is the markedincrease in cooperation between intelligence agencies of different countries on the onehand, and between investigative agencies and intelligence agencies on the other. This hasled to concerns over human rights and privacy and to increased calls for accountability andimproved oversight as the increase in cooperation between organizations operating globallyalso provides scope for the circumvention of domestic restrictions. This book proposes an instrument to assess the effectiveness of existing accountabilityarrangements and offers new insights into the role of (military) intelligence in anumber of crises, e.g., the 1962 Cold War confrontation over Western New Guinea, and thefunctioning of intelligence in peacekeeping operations ranging from Srebrenica to Mali. Thematically comprehensive, it offers a mixture of historical, legal, operational, and policyaspects, analyzed through the lens of institutional learning, bringing together academic andpractitioners’ perspectives. The focus lies not only on the familiar Anglo-Saxon experiencebut also on cases from India, the Netherlands, South East Asia, Bosnia, Lebanon, and Mali. The book is aimed at both scholars and practitioners studying and/or working in the fieldof civil and military intelligence, and those involved in international relations and internationalhumanitarian law/human rights law. It brings together contributions from authorswho spoke at the Conference to commemorate the 100th anniversary of the Dutch MilitaryIntelligence and Security Service, organized by the Netherlands Intelligence Studies Association(NISA), and from a number of authors who were specifically invited to participate.
Author: Stuart Maslen
Release Date: 2018-08-16
Genre: Political Science
Drone strikes have become a key feature of counterterrorism operations in an increasing number of countries. This work explores the various domestic and international legal regimes that govern the manufacture, transfer, and use of armed drones as well as fully autonomous weapons systems where computer algorithms decide who or what to target and when to fire.
Author: Ab Klink
Publisher: The Owls Foundation
Release Date: 2015-04-22
Genre: Business & Economics
This book, the first published by The Owls Foundation, tells you how brilliant ideas and inventions can be transformed into innovations and breakthroughs that make a real impact, and analyses why others fail. In the global world of today there is great interdependency. No country, no institution, no company can do it alone. And we cannot ignore the international context. On top of that, no innovation comes on its own. The active engagement and quality of the leading figures who are interviewed is one of the distinguishing features of this project. These remarkable individuals were generous with their time and thought hard to reflect on their experiences.
Author: Theo Farrell
Publisher: Stanford University Press
Release Date: 2013-07-17
Genre: Political Science
When NATO took charge of the International Security Assistance Force (ISAF) for Afghanistan in 2003, ISAF conceptualized its mission largely as a stabilization and reconstruction deployment. However, as the campaign has evolved and the insurgency has proved to more resistant and capable, key operational imperatives have emerged, including military support to the civilian development effort, closer partnering with Afghan security forces, and greater military restraint. All participating militaries have adapted, to varying extents, to these campaign imperatives and pressures. This book analyzes these initiatives and their outcomes by focusing on the experiences of three groups of militaries: those of Britain, Canada, Denmark, the Netherlands, and the US, which have faced the most intense operational and strategic pressures; Germany, who's troops have faced the greatest political and cultural constraints; and the Afghan National Army (ANA) and the Taliban, who have been forced to adapt to a very different sets of circumstances.
Author: Robert Beeres
Release Date: 2016-07-28
NL ARMS 2016 offers a collection of studies on the interrelatedness of safety and security in military organizations so as to anticipate or even prepare for dire situations. The volume contains a wide spectrum of contributions on organizing for safety and security in a military context that are theoretically as well as empirically relevant. Theoretically, the contributions draw upon international security studies, safety science and organizational studies. Empirically, case studies address the reality of safety and security in national crisis management, logistics and unconventional warfare, focusing, amongst others, on rule of law during missions in which expeditionary military forces are involved in policing tasks to restore and reinforce safety and security and on the impact of rule of law on societal security. The result is a truly unique volume that may serve practitioners, policymakers and academics in gaining a better understanding of organizing for the security-safety nexus.
Author: Hal W. Hendrick
Publisher: CRC Press
Release Date: 2007-11-26
Genre: Technology & Engineering
Written by two certified human factors/ergonomics professionals and a criminalist and firearms expert, all of whom have testified as expert witnesses, Human Factors in Handgun Safety and Forensics draws on their formidable collective knowledge and professional experience to present the first scientifically based volume in the field. This seminal work identifies numerous human factors in handgun design, training, and related human behavior in unintentional and inadvertent shooting incidents. The book provides an overview of handgun use in general but focuses on firearm handling in unintentional and inadvertent shootings. It describes the discipline of human factors and ergonomics and includes available statistics on shootings, examines their limitations, and reviews actual cases to determine human causes in unintentional and inadvertent shootings. It provides a history of firearms and details the components and mechanics of handguns and ammunition to reveal safety problems in current designs. It explains the fundamentals of shooting and how violation of those principles can result in unintentional or inadvertent shootings. The authors stress the importance of firearms safety training. They evaluate various safety training programs (including those from the National Rifle Association), investigate inconsistencies in basic safety rules, and make suggestions to improve safety training. The importance of instructor training is also emphasized. The book concludes with a summary and application of the previous topics to forensic and investigative settings and gives advice for human factors/ergonomics professionals as expert witnesses. The book comes with an accompanying DVD with hundreds of color photos to support the topics covered in the text.
Biodiversity observation systems are almost everywhere inadequate to meet local, national and international (treaty) obligations. As a result of alarmingly rapid declines in biodiversity in the modern era, there is a strong, worldwide desire to upgrade our monitoring systems, but little clarity on what is actually needed and how it can be assembled from the elements which are already present. This book intends to provide practical guidance to broadly-defined biodiversity observation networks at all scales, but predominantly the national scale and higher. This is a practical how-to book with substantial policy relevance. It will mostly be used by technical specialists with a responsibility for biodiversity monitoring to establish and refine their systems. It is written at a technical level, but one that is not discipline-bound: it should be intelligible to anyone in the broad field with a tertiary education.
Author: Serge Morand
Publisher: Oxford University Press
Release Date: 2010-07-01
This edited volume demonstrates how the latest developments in biogeography (for example in phylogenetics, macroecology, and geographic information systems) can be applied to studies in the evolutionary ecology of host-parasite interactions in order to integrate spatial patterns with ecological theory.