Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.Ved tilmelding accepterer du vores persondatapolitik.
Du kan altid afmelde dig igen.
I 2010 og 2012 udkom bestselleren "DANMARKS DYBESTE HEMMELIGHED, REGAN VEST - regeringens og kongehusets atombunker". For at bogen kunne udgives, skulle den censureres af forsvaret, beredskabsstyrelsen og NATO, men for første gang nogensinde, fortælles alle hemmelighederne uden censur - i den 3. og sidste udgave.Interessen for det tophemmelige regeringsanlæg, blev efter udgivelsen af DANMARKS DYBESTE HEMMELIGHED, så stor, at myndighederne i 2013 blev presset til at tage REGAN VEST ud af de nationale beredskabsplaner, og det forventes, at anlægget åbner for offentligheden som museum i løbet af et par år.Med baggrund i fortrolige konstruktionstegninger som myndighederne på snedig vis forsøgte at lægge røgslør henover, aktindsigt i centrale dokumenter, interviews med nøglepersoner - der nu uden tavspligt - kan fortælle de sidste hemmeligheder udgives den UCENSUREREDE udgave af DANMARKS DYBESTE HEMMELIGHED.Den UCENSUREREDE udgave afslører i skræmmende detaljeret grad, hvordan det civile beredskab, ned til mindste detalje, og ukendt for befolkningen, forberedte sig på det værst tænkelige senarie - en atomkrig mod Warszawa-pagten. Der fortælles hvordan flyveforbuddet over det tophemmelige byggeri en halv kilometer inde i bakken, 60 meter under jorden, blev håndhævet med ransagninger af fly til følge. Bogen afslører hvor længe regeringen i REGAN VEST kunne videreføre landet under atomangreb og fortæller hvor mange danskere man forventede ville dø, hvis fjenden forsøgte at bombe REGAN VEST med atombomber.
Københavns Befæstning fortæller historien om et af Danmarkshistoriens største og mest omstridte forsvarsværker. Københavns Befæstning, der blev opført fra 1885-1894, var ikke mindst et svar på de nye sikkerhedspolitiske udfordringer, der meldte sig efter det traumatiske nederlag i 1864. Da 1. Verdenskrig brød ud i 1914, blev Københavns Befæstning gjort klar til kamp og bemandet med næsten 50.000 soldater. Krigen kom aldrig til Danmark. Til gengæld viste den, at tiden og den teknologiske udvikling var løbet fra befæstningen, og i 1920 blev Københavns Befæstning nedlagt som forældet. I denne første samlede fremstilling af Københavns Befæstnings militære historie fortælles om Danmarks sikkerhedspolitiske problemer i spillet mellem stormagterne og den rivende militærteknologiske udvikling i årene op til 1. Verdenskrig; om de forsvarspolitiske overvejelser bag anlægget, om den planlagte anvendelse af Københavns Befæstning i kamp og om de centrale aktører i en dramatisk periode af Danmarkshistorien. Københavns Befæstning er skrevet af en gruppe historikere tilknyttet Statens Forsvarshistoriske Museum med seniorforsker Jens Ole Christensen, seniorforsker Michael H. Clemmesen og museumsdirektør Ole L. Frantzen i spidsen.
Bogen handler generelt om de tyske ubåde, men koncentrerer sig især om ubådstype VII, som blev produceret i langt større antal end de øvrige ubådstyper, og som forblev rygraden i ubådsvåbnet under hele 2. verdenskrig. Der blev bygget intet mindre end 709 eksemplarer af denne type, hvilket er mere end alle de øvrige typer tilsammen. Den var med til at sænke flere tusinde allierede handelsskibe under krigen og fik også ram på flere af de mest berømte britiske krigsskibe - både slagskibe og hangarskibe. Bogen fortæller detaljeret om typens historie og udvikling, dens bygning, indretning og funktioner samt om de mænd, som var om bord i dem, og om de enorme betonbunkers, hvorfra de udgik. Af de 40.000 søfolk, som gjorde tjeneste i ubådene, omkom 29.000, medens andre 5.000 blev krigsfanger. Et særligt kapitel omhandler de mest berømte ubådschefer og deres bedrifter. Deriblandt sænkningen af slagskibet HMS Royal Oak midt inde i den britiske flådebase Scapa Flow og torpederingen af hangarskibet HMS Courageous. Dette har givet forfatteren en unik mulighed for med en række enestående ogdetaljerede farvefotos at kunne genskabe både det ydre og det indre af denne specielle og berygtede fartøjstype. Hertil kommer et par hundrede andre historiske fotos om ubåde i 2. verdenskrig, hvoraf mange er hentet fra samlinger, som man hidtil ikke har haft adgang til.
Danmark står foran tidens nok største indkøb af kampfly. Skal vi tage del i det teknologisk tophemmelige fly F-35 Lightning II, som amerikanerne har holdt for sig selv indtil nu, eller bør vi kigge nærmere på dets konkurrenter? Intentionen med denne bog er at præsentere kampflyet F-35 Lightning II, beskrive den historiske udvikling, som førte til dette fly, samt hvad flyet rummer af teknologiske fremskridt. Bogen afslører tidligere hemmeligheder og den opgraderede teknologi, som findes i kampflyet, der inden længe afløser flere ældre kampfly i mange lande. Stealth-teknologien og hvordan stealth vil revolutionere brugen af kampfly er et centralt tema i bogen. Endvidere beskrives de avancerede sensorer og våbensystemer, som skiller sig ud ved dette fly. I den vestlige verden er der syv flytyper, der konkurrerer om at erstatte de ældre kampfly. Ni lande har allerede planlagt at erstatte syv ældre kampfly med F-35 Lightning II. Disse 14 fly – de gamle og de konkurrerende fly - får hver sin omtale og sammenlignes på en overskuelig måde. For at kunne følge med i den videre debat er det nødvendigt at forstå de nye teknologier, der danner basis for de beslutninger, Danmark ender op med at tage, teknologier, som på mange måder vil ændre traditionel opfattelse af brug af kampfly.
THE NEW YORK TIMES BESTSELLINGFOLLOW-UP TOAMERICAN SNIPERJoin Chris Kyle on a journedy to discoverhow 10 firearms changed United States history (New York Times Book Review)Drawing on his legendary firearms knowledge and combatexperience, U.S. Navy SEAL and #1 bestselling author of American Sniper Chris Kyle dramatically chronicles the story ofAmericafrom the Revolution to the presentthrough the lens of ten iconic gunsand the remarkable heroes who used them to shape history: the American longrifle, Spencer repeater, Colt .45 revolver, Winchester 1873 rifle, SpringfieldM1903 rifle, M1911 pistol, Thompson submachine gun, M1 Garand, .38 Specialpolice revolver, and the M16 rifle platform Kyle himself used. American Gun is a sweeping epic ofbravery, adventure, invention, and sacrifice.Featuring a foreword and afterword by Taya Kyle andillustrated with more than 100 photographs, this new paperback edition featuresa bonus chapter, The Eleventh Gun, on shotguns, derringers, and the BrowningM2 machine gun.
Hvem var de oprindelige kommandosoldater?Hvordan bliver almindelige soldater optaget i en eliteenhed?Hvordan taler soldater med hinanden med tegnsprog?Hvad er forskellen på HALO og HAHO?Mød nogle af verdens barskeste elitesoldater, der har gennemgået den hårdeste træning, der findes. De er klar til at gennemføre de farligste operationer i ethvert klima og imod enhver fjende - uden at føle frygt.
Kastellet Frederikshavns fængselshistorie gennem 250 årDenne bog er en moderniseret, opdateret version af Victor Krohns ”Kastellets Fængselshistorie” der oprindeligt udkom i blot 100 spritduplikerede eksemplarer i 1926. Bogen har lige siden været hovedværket for denne både spændende og tragiske del af Kastellets 350-årige historie, men grundet sin sjældenhed har den været svær at opdrive. Derfor har ”Kastellets Venner & Historisk Samling” valgt at fejre Kastellets 350 års jubilæum ved at genudsende bogen, men i Krohns ånd i en stærkt udvidet, opdateret og moderniseret udgave. Victor Krohn stræbte selv efter at bestandigt forbedre sine publikationer – vi tror, han ville have kunnet lide denne nye version.
While German and Japanese scientists also laboured unsuccessfully to create an atomic bomb, by the summer of 1945, the American-led team was ready to test its first weapon. As the clock ticked down to the detonation time of 05.30 hours on 16 July 1945, the nervous team of technicians and scientists waited ten miles away from ‘Ground Zero’ deep in the New Mexico desert. No one knew how powerful the explosion would be or whether even at such a distance they would be safe from the blast. Even so, some chose to observe the detonation from a point four miles nearer at the control bunker; but then no one was even sure that the bomb would work.What if that is actually what happened? Under schedule pressure from the White House, the scientists assembled the device in part with tape and tissue paper, knowing some components were flawed. These are verifiable facts. It means that, as many of those who gathered in the New Mexico desert feared at the time, the bomb might not have worked during that first test.In The First Atomic Bomb, Jim Mangi explores what might happened in the event that the world’s first atomic bomb had not been ready for use when it was. How would this have affected the end of the war in the Pacific, and indeed the Second World War as a whole? Would Emperor Hirohito’s armed forces have battled on? When might Colonel Paul W. Tibbets, at the controls of his Boeing B-24 Superfortress Enola Gay have then made his historic flight over Hiroshima – and would that city even have remained the target? How would Stalin and the Soviets have reacted to such developments, and how would this have played out in the post-war world?
Die Bundeswehr wurde erst nach der Staatsgrundung im politischen und gesellschaftlichen System der Bundesrepublik Deutschland verortet und etabliert. Vor diesem Hintergrund wird in diesem Band gefragt, inwieweit die Entwicklung der Bundeswehr im Vergleich zu den Streitkraften anderer Lander - nicht nur in Westeuropa - einen Sonderfall darstellt. Ausgehend von der Strategie und Operationsfahigkeit der Bundeswehr und der NVA in ihren jeweiligen Bundnissen werden in den hier versammelten 20 Beitragen die Integration der Streitkrafte in das gesellschaftliche System analysiert sowie die organisationsphilosophien und Strategiekulturen verglichen. Der Fokus richtet sich ebenso auf die individuelle und institutionelle Vergangenheitsbewaltigung, die Traditionsbildung und die Reformfahigkeit, auf technische Innovationen und wirtschaftliche Kooperationen.
We live in a world in which events and actors not conceived of as posing an imminent danger during most of the twentieth century are now directly threatening human security. Critical infrastructures from electric power grids to nuclear power plants, from water distribution systems to banks and air traffic control systems are vulnerable to cyber attacks by state and non-state actors. Climate change threatens to disrupt people s lives and livelihoods, escalating disputes over access to key resources. Global inequality of income and wealth is undermining living conditions, especially in densely populated parts of the world that are often breeding grounds for the viruses that precipitate pandemics. Telecommunications and transportation are creating fertile ground for transnational criminal networks that engage in illegal arms transfers, drug trade, prostitution, slave trade, and other illicit activities. Beyond these human security concerns is the ongoing challenge of proliferation of weapons of mass destruction to other states and terrorists and the previously unthinkable specter of the weaponization of space. In addition to these and other new threats are the old realities of state and non-state actors interacting in a still anarchic world that lacks any central authority over that exercised by sovereign states. In this increasingly globalized world, we still face inter-state wars and armed interventions, inter-communal strife that spills over national borders, and insurgencies or other movements and groups that resort to terrorism or other forms of political violence. US National Security: New Threats, Old Realities addresses these threats, and the reciprocal use of force they engender, through a constructivist lens: one that assumes the ideas in the heads of policy makers, and their particular interpretations of facts, to be part of a highly subjective process. After analyzing and explaining the key threats and the vehicles in which they become manifest war, armed intervention, insurgency, countering insurgency and terrorism, and intelligence the book examines the projection of force and elements of force maximization, in chapters on civil-military relations, a diverse military of citizen volunteers, and organization and budget. And it traces how the role of the US dollar, as a globally accepted currency, gives a particular advantage to US business and banking interests, and to the US government, when it comes to financing the costs of global diplomatic, military, and other operations. Taking into account these threats and opportunities, Paul Viotti identifies a number of strategies and policies for the US that are central to the maintaining of peace and security over the next few decades. Key amongst these is the forging and maintaining of relations with other great powers and the developing and reinforcing of cooperative norms and institutions among these and other states. Alongside this is the need for the distribution of the typically asymmetric gains that stem from such cooperation. However, he cautions that these strategies can be enacted only if great powers exhibit the enlightened self interest necessary for them to attend to the demands of states that lack the capital or other resources that are core to their relative power positions. In conclusion, he posits that successful management of inter-state relations by the US and other great powers will require a careful and adept application of a reconstructed realism that emphasizes the ways and means of cooperative security. US National Security: New Threats, Old Realities is an important volume for all collections focused on the making and implementation of both foreign and national security policy.
With the advent of the information revolution, security competition and warfare have become intensely dynamic and diverse. Technological innovations generate unprecedented capabilities that empower more individuals with skills and access. Continued diffusion of information and influence is stretching the boundaries of security competition and warfare. Adaptive adversaries are using asymmetric, hybrid strategies that blend confrontation with cooperation. In contrast, the United States focuses on combat capability, precision engagement, and preemptive strike against armed combatants. We organize for security in terms of functions rather than performance, sculpted by the National Security Act of 1947. Recent Defense Strategic Guidance announcing a rebalance toward the Asia Pacific region intends to deter and defeat aggression with combined arms while predicting that wars are ending. Like the National Security Policy, the guidance also calls for an international order of universal individual rights. This approach to strategy does not generate effective power against complex threats. American traditions of superior firepower and exceptional culture inhibit our ability to counter effective, sometimes brutal, strategies of complex warfare. The problem with a technological approach rooted in exceptionalism is that situational strategy matters. As proactive competitors evolve techniques to circumvent US strengths, it is clear that the profession of arms needs to become a profession of effects. This study intends to overcome three American weaknesses of strategy-making: (1) weapons-centric identities, which inhibit intellectual and operational flexibility; (2) ingrained beliefs in enduring lessons, which kills full consideration of new solutions; and (3) the projection of our own cultural expectations onto other societies and groups, which creates false standards and poor threat assessment. Taken together, these limit envisioning and executing more effective strategies. This book develops new theory for superior strategy in complex warfare. The approach is comprehensive and practical, and it is applied to three contemporary security crises involving the United States, China, the Koreas, and Japan. Beginning with existing theories on strategy and culture, a new interpretation of combined effects strategy is introduced based on research and years of experience. Drawing from security theory and military doctrine, combined effects strategy is presented as a comprehensive process that subsumes the prevailing paradigm of combined arms. The entire book is written using the language of combined effects theory developed in the first chapter. Extensive use of symbols, text boxes, and charts orients the reader on combined effects in the three cases that follow. Unlike previous works, this study considers security culture as a way to understand warfare conceived and waged broadly: patterns of confrontation and cooperation, threat perception and assessment, and strategic effectiveness. Also for the first time, contemporary crises detail the interaction of strategies operating as lines of effect which when combined, create powerful synergies. A summary analysis of each case develops implications for future strategy. The concluding chapter is unique in its discussion of the influence of security culture on operational concepts, when lines of effect combine, and how security culture informs combined effects strategy, particularly for the United States. A New Strategy for Complex Warfare: Combined Effects in East Asia is an important book for students, faculty, policy makers and practitioners with interests in strategy, global and US national security, defense policy, Asian regional security, Asian studies, military culture, military effectiveness, the future of warfare, and foreign policy.
The United States has enjoyed overwhelming military technological superiority in the post-Cold War era, but China has begun to chip away at this dominance. As distrust and strategic rivalry becomes more prominent in US-China relations, this is helping to turn what had previously been parallel but separate military research and development efforts by both countries into a directly connected competition. This contest for leadership in defense technology and innovation promises to be a long-term and highly expensive endeavor for the United States and China While there are some similarities between this emerging US China defense strategic competition and the twentieth-century Cold War, there are also significant differences. The US Soviet confrontation was primarily an ideological, geostrategic, and militarized rivalry between two countries and supporting alliances that were largely sealed from each other. This twenty-first century rivalry takes place against a backdrop of globalized interdependence, the blurring of military and civilian boundaries, and the growing prominence of geo-economic determinants. US-China military technological competition lies at the heart of the growing strategic contest between the United States and China. This is largely because this technological rivalry straddles the geostrategic and geo-economic domains covering drivers ranging from industrial policy and foreign direct investment to weapons development programs and threat assessments. Examining the nature of the US-China defense technological competition requires a more comprehensive and nuanced understanding of the complex military, economic, innovation, and other drivers at play. Moreover, this technological race is still in the early stages of development and can be expected to grow larger, more complex, and more intense, so this book provides an invaluable resource for understanding the origins and patterns of competition in different domains. This is a pioneering examination of the burgeoning US-China defense technological competition and provides perspectives not only from US analysts but also from China and Russia. One of the major contributions of the book is the use of a competitive strategies framework that outlines some of the key considerations in the assessment of US China military technological competition. A rich and expansive discussion of this competition across a diverse range of domains, including air, sea, space, and emerging technologies, provides a comprehensive understanding of how complex and varied this contest is becoming, as well as its strategic and global implications. The Gathering Pacific Storm is a timely and valuable volume for students, scholars, security practitioners, and anyone involved international relations, security studies, and political science.
Deterrence theory helps conceptualize how threats can be used and communicated to influence or alter an adversary s behavior. In practice, deterrence works by weighing on an actor s perceived costs and benefits of pursuing an unwanted action. Deterrence and its close relatives, coercion, compellence, dissuasion, and influence can be accomplished by using threats of punishment (i.e., retaliation) or by denying adversaries the gains they seek (i.e., defense, resilience, and failure). During much of the Cold War deterrence by punishment largely overshadowed deterrence by denial. The proliferation of nuclear weapons, and later, of missile technology, tipped the deterrent calculus in favor of retaliation: the ultimate weapon epitomized the ultimate deterrent. Deterrence by denial largely fell to the wayside as a result and the logic of punishment came to pervade the classical literature on deterrence theory. Contemporary security dynamics, however, have changed dramatically. Security concerns are increasingly sub- and non-state in nature, and they are much more diffused. While nuclear weapons and deterrence by punishment still matter, the rise of sophisticated international terrorist organizations, conventional military challenges, digital-based threats, and threats short of open conflict have today cumulatively tipped the deterrent calculus in favor of denial. Deterrence by denial reduces the perceived benefits an action is expected to provide an adversary. Decision making takes into account both costs and benefits, so while punishment manipulates behavior by augmenting costs, denial works by stripping away benefits. Unfortunately, given the field s longstanding focus on deterrence by punishment, very little research has systematically explored denial theory and strategy in contemporary security settings. And the limited denial scholarship that does exist rests largely on the dynamics inherent to the Cold War, like great power rivalry, strategic weapons, and military power. Deterrence by Denial: Theory and Practice is the first study to focus exclusively on contemporary denial, bridging the theoretical gap that persists between classical deterrence theory and contemporary insecurity. The book significantly advances the scholarship on deterrence by denial with empirically driven and policy-relevant contributions written by leading international scholars of conventional military aggression, missile defense, terrorism and militancy, crime, and cybersecurity. Deterrence by Denial: Theory and Practice is an important and unique book, of interest to scholars of international relations, political science, terrorism and intelligence studies, and cybersecurity, as well as to policy analysts, practitioners, and members of the armed forces and intelligence community.
The fourth industrial revolution a convergence of breakthroughs in bioscience, nanotechnology, robotics, artificial intelligence, autonomy, 3D printing, clean energy, and materials science is transforming all aspects of society. However, unlike the previous industrial revolutions that increased globalization (the global integration of trade, services, investments, and ideas enhanced by the free movement of people), the fourth industrial revolution will drive deglobalization. The fourth industrial revolution will also create a new generation of small, smart, and cheap weapons that will challenge the military dominance of the United States in every domain. These weapons will give small states and even non-state actors capabilities that used to be the preserve of major powers. These two trends deglobalization and the evolution of cheap, smart weapons will fundamentally alter world economic and security orders. The return of production and services to the United States will reduce the interest of the American people in maintaining stability in the international system. Reinforcing this trend, resultant employment disruptions, the oncoming U.S. debt and budget crises will force national leaders to choose whether to allocate resources to domestic, particularly entitlement, spending or to overseas efforts. Even more important, the new generation of weapons will dramatically increase the cost in blood and treasure of U.S. military engagements. In sum, the fourth industrial revolution will see major shifts in economic and military conditions facing the United States. Fortunately, the United States is very well positioned to exploit this opportunity to greatly improve both its economy and defense. Deglobalization and International Security illuminates how the fourth industrial revolution will fundamentally alter global economic and security arrangements and offers options that allow U.S. leaders to exploit the fourth industrial revolution to provide economic and military security for the nation. It provides important insights for a range of fields from strategy to trade to defense. This is an important book for those in political science, international relations, and conflict and security studies. The primary audiences for this book are academics, practitioners of the policy community, military personnel, and defense department professionals. Both the entire book and specific chapters will be suitable for undergraduate and graduate education in the national security field.
Real-time testing and simulation of open- and closed-loop radio frequency (RF) systems for signal generation, signal analysis and digital signal processing require deterministic, low-latency, high-throughput capabilities afforded by user reconfigurable field programmable gate arrays (FPGAs). This comprehensive book introduces LabVIEW FPGA, provides best practices for multi-FPGA solutions, and guidance for developing high-throughput, low-latency FPGA based RF systems. Written by a recognized expert with a wealth of real-world experience in the field, this is the first book written on the subject of FPGAs for radar and other RF applications.
Professionally converted for accurate flowing-text e-book format reproduction, the Multiservice Procedures for Aviation Urban Operations Field Manual (FM 3-06.1) covers the planning and conduct of air attacks in urban settings.
Firearms have been studied by imperial historians mainly as means of human destruction and material production. Yet firearms have always been invested with a whole array of additional social and symbolical meanings. By placing these meanings at the centre of analysis, the essays presented in this volume extend the study of the gun beyond the confines of military history and the examination of its impact on specific colonial encounters. By bringing cultural perspectives to bear on this most pervasive of technological artefacts, the contributors explore the densely interwoven relationships between firearms and broad processes of social change. In so doing, they contribute to a fuller understanding of some of the most significant consequences of British and American imperial expansions. Not the least original feature of the book is its global frame of reference. Bringing together historians of different periods and regions, A Cultural History of Firearms in the Age of Empire overcomes traditional compartmentalisations of historical knowledge and encourages the drawing of novel and illuminating comparisons across time and space.
Innovation is the lifeline of national development. This handbook is a collection of chapters that provide techniques and methodologies for achieving the transfer of defense-targeted science and technology development for general industrial applications. The handbook shows how to translate theory and ideas into practical applications. Experts from national defense institutions, government laboratories, business, and industry contributed chapters to this handbook. The handbook also serves as an archival guide for nations, communities, and businesses expecting to embark upon science and technology transfer to industry. Included are several domestic and international case examples of practical innovation. Since the dawn of history, nations have engrossed themselves in developing new tools, techniques, and methodologies to protect their geographical boundaries. From the crude implements used by prehistorical people to very modern technologies, the end game has been the same. That is, to protect the homeland. Even in times of peace, efforts must be made to develop new machinery, equipment, processes, and devices targeted for the protection of the nation. The emergence of organized nations and structured communities facilitated even more innovative techniques of national defense. Evolution, revolution, and innovation have defined human existence for millennia. From the Ice Age to the Stone Age, the Bronze Age, the Iron Age, and to the modern age, innovation, rudimentary as it may be in many cases, has determined how humans move from one stage to the next. This comprehensive handbook provides a clear guide on the nuances of initiating and actualizing innovation. Both the qualitative and quantitative aspects of innovation are covered in the handbook.Features: Uses a systems framework to zero in on science and technology transfer Focuses on leveraging technical developments in defense organizations for general societal applications Coalesces the transfer strategies collated from various sources and practical applications Represents a world-class diverse collection of science and technology development, utilization, and transfer Highlights a strategy for government, academia, and industry partnerships
This volume examines the connection between culture and defence by providing an inside look at Brazil's aerospace strategies. Brazil is becoming increasingly important geopolitically, and several studies have sought to further understanding of this new position in the international arena. This volume aims to provide a better understanding of the Brazilian nation, its security dilemmas, and how the country seeks to develop its defence training process and improve its professional military education. Organised into two parts, the chapters offer academic dialogues on several aspects of this topic, including public politics and the law, joint operations, human factors and the government interchanges with industry. The first section analyses Brazilian defence policy and strategy, discussing different aspects of aerospace power and Brazilian security perspectives. Chapters discuss the relationship between Brazil and the United States, which blend aspects of the generation of knowledge, science, technology and innovation, and point to economic issues and the Defence Industrial Base. Specific implications of the Brazilian air space, compared with Europe and the United States, also are exposed. In addition, a vision of cyberspace implications for the national power, a present-day question for the entire planet, is also presented. Thereafter, the second section looks at specific aspects of professional military education and explains the Brazilian approach to strengthening its aerospace power. This includes military education and performance, interdisciplinary studies, working jointly, multivariate analysis and cases.This book will be of much interest to students of military studies, defence studies, gender issues, crises management and decision making, Latin American politics and International Relations in general.
Many different social scientists have been challenged by the origins of wars, their immediate causes and the mechanisms leading to the breakdown of peaceful relations. Many have speculated whether conflicts were avoidable and whether alternative policies might have prevented conflict. The Ashgate Research Companion to War provides contributions from a number of theorists and historians with a focus on long term, systemic conflicts. The problematique is introduced by the Editors highlighting the need for interdisciplinary approaches to the study of war as a global phenomenon. The following 29 essays provide a comprehensive study guide in four sections: Part I explicates differing theories as to the origins of war under the general concept of 'polemology'. Part II analyzes significant conflicts from the Peloponnesian wars to World War II. Part III examines the ramifications of Cold War and post-Cold War conflict. Part IV looks at long cycles of systemic conflict, and speculates, in part, whether another global war is theoretically possible, and if so, whether it can be averted. This comprehensive volume brings us a much needed analysis of wars throughout the ages, their origins, their consequences, and their relationship to the present. A valuable understanding that is ideal for social scientists from a variety of backgrounds.
The topic of civil-military relations has high significance for academics, for policy makers, for military commanders, and for serious students of public policy in democratic and other societies. The post-Cold War and post-9-11 worlds have thrown up traditional as well as new challenges to the effective management of armed forces and defense establishments. Further, the present century has seen a rising arc in the use of armed violence on the part of non-state actors, including terrorists, to considerable political effect. Civil-military relations in the United States, and their implications for US and allied security policies, is the focus of most discussions in this volume, but other contributions emphasize the comparative and cross-national dimensions of the relationship between the use or threat of force and public policy. Authors contributing to this study examine a wide range of issues, including: the contrast between theory and practice in civil-military relations; the role perceptions of military professionals across generations; the character of civil-military relations in authoritarian or other democratically-challenged political systems; the usefulness of business models in military management; the attributes of civil-military relations during unconventional conflicts; the experience of the all-volunteer force and its meaning for US civil-military relations; and other topics. Contributors include civilian academic and policy analysts as well as military officers with considerable academic expertise and experience with the subject matter at hand.
These essays explore the increase in interest in non-lethal weapons. Such devices have meant that many armed forces and law enforcement agencies are able to act against undesirables without being accused of acting in an inhumane way. Topics for discussion in this volume include: an overview of the future of non-lethal weapons; emerging non-lethal technologies; military and police operational deployment of non-lethal weapons; a scientific evaluation of the effectiveness of non-lethal weapons; changes in international law needed to take into account non-lethal technologies; developments in genomics leading to new chemical incapacitants; implications for arms control and proliferation; the role of non-lethal weapons in human rights abuses; conceptual, theoretical and analytical perspectives on the nature of non-lethal weapons development.
Traditionally few people challenged the distinction between absolute and selective conscientious objection by those being asked to carry out military duties. The former is an objection to fighting all wars - a position generally respected and accommodated by democratic states, while the latter is an objection to a specific war or conflict - theoretically and practically a much harder idea to accept and embrace for military institutions. However, a decade of conflict not clearly aligned to vital national interests combined with recent acts of selective conscientious objection by members of the military have led some to reappraise the situation and argue that selective conscientious objection ought to be legally recognised and permitted. Political, social and philosophical factors lie behind this new interest which together mean that the time is ripe for a fresh and thorough evaluation of the topic. This book brings together arguments for and against selective conscientious objection, as well as case studies examining how different countries deal with those who claim the status of selective conscientious objectors. As such, it sheds new light on a topic of increasing importance to those concerned with military ethics and public policy, within military institutions, government, and academia.
This book provides an introduction to important socio-political issues and selected demographic data underlying recurrent debates concerning both the mythic and actual social composition and quality of U.S. enlisted forces
First published in 1986. Based on the theme that defense procurement serves as an instrument of alliance and domestic politics, this book provides the first comprehensive analysis of post-war West German approaches to and experience with procurement strategies. Dr. Cowen explores how successive German governments have used military procurement to facilitate the rehabilitation of the new West German state and later to consolidate the German position within the alliance. The author shows that by the mid-1970s the Federal Republic had succeeded in its procurement policy, acting as a serious partner for defense projects in Europe and building a flourishing defense industry. The book's final chapters describe the structural tensions between competing procurement objectives that have recently emerged. The FRG must decide whether to continue to maintain a whole range of defense industrial capacities or to specialize nationally and purchase other necessary commodities in the United States. According to the author, national specialization is not seriously considered by the German government. Such a step, the author suggests, would diminish Germany's role in the alliance and jeopardize one of its foremost foreign policy goals: equality with Great Britain and France
Rigorous operational testing (OT) of weapon systems procured by the U.S. Department of Defense (DoD) is fundamental to ensuring that these sophisticated systems not only meet their stated requirements, but also perform under realistic operational conditions when faced by determined adversaries employing their own highly capable offensive and defensive weaponry. DoD's test and training range enterprise provides the geography, infrastructure, technology, expertise, processes, and management that make safe, secure, and comprehensive OT possible. The challenges facing the nation's range infrastructure are both increasing and accelerating. Limited test capacity in physical resources and workforce, the age of test infrastructure, the capability to test advanced technologies, and encroachment impact the ability to inform system performance, integrated system performance and the overall pace of testing.Necessary DoD Range Capabilities to Ensure Operational Superiority of U.S. Defense Systems assesses the physical and technical suitability of DoD test and evaluation ranges, infrastructure, and tools for determining the operational effectiveness, suitability, survivability, and lethality of military systems. This report explores modernization, sustainment, operations, and resource challenges for test and evaluation ranges, and makes recommendations to put the DoD range enterprise on a modernization trajectory to meet the needs of OT in the years ahead.
At the request of the Deputy Assistant Secretary of the Army for Research and Technology, Powering the U.S. Army of the Future examines the U.S. Army's future power requirements for sustaining a multi-domain operational conflict and considers to what extent emerging power generation and transmission technologies can achieve the Army's operational power requirements in 2035. The study was based on one operational usage case identified by the Army as part of its ongoing efforts in multi-domain operations. The recommendations contained in this report are meant to help inform the Army's investment priorities in technologies to help ensure that the power requirements of the Army's future capability needs are achieved.
The effective use of data science - the science and technology of extracting value from data - improves, enhances, and strengthens acquisition decision-making and outcomes. Using data science to support decision making is not new to the defense acquisition community; its use by the acquisition workforce has enabled acquisition and thus defense successes for decades. Still, more consistent and expanded application of data science will continue improving acquisition outcomes, and doing so requires coordinated efforts across the defense acquisition system and its related communities and stakeholders. Central to that effort is the development, growth, and sustainment of data science capabilities across the acquisition workforce.At the request of the Under Secretary of Defense for Acquisition and Sustainment, Empowering the Defense Acquisition Workforce to Improve Mission Outcomes Using Data Science assesses how data science can improve acquisition processes and develops a framework for training and educating the defense acquisition workforce to better exploit the application of data science. This report identifies opportunities where data science can improve acquisition processes, the relevant data science skills and capabilities necessary for the acquisition workforce, and relevant models of data science training and education.