Leadership Decapitation


Book Description

One of the central pillars of US counterterrorism policy is that capturing or killing a terrorist group's leader is effective. Yet this pillar rests more on a foundation of faith than facts. In Leadership Decapitation, Jenna Jordan examines over a thousand instances of leadership targeting—involving groups such as Hamas, al Qaeda, Shining Path, and ISIS—to identify the successes, failures, and unintended consequences of this strategy. As Jordan demonstrates, group infrastructure, ideology, and popular support all play a role in determining how and why leadership decapitation succeeds or fails. Taking heed of these conditions is essential to an effective counterterrorism policy going forward.




Military Strategy: A Very Short Introduction


Book Description

Military Strategy: A Very Short Introduction adapts Clausewitz's framework to highlight the dynamic relationship between the main elements of strategy: purpose, method, and means. Drawing on historical examples, Antulio J. Echevarria discusses the major types of military strategy and how emerging technologies are affecting them. This second edition has been updated to include an expanded chapter on manipulation through cyberwarfare and new further reading.




Talking Conflict


Book Description

In today's information era, the use of specific words and language can serve as powerful tools that incite violence—or sanitize and conceal the ugliness of war. This book examines the complex, "twisted" language of conflict. Why is the term "collateral damage" used when military strikes kill civilians? What is a "catastrophic success"? What is the difference between a privileged and unprivileged enemy belligerent? How does deterrence differ from detente? What does "hybrid warfare" mean, and how is it different from "asymmetric warfare"? How is shell shock different from battle fatigue and PTSD? These are only a few of the questions that Talking Conflict: The Loaded Language of Genocide, Political Violence, Terrorism, and Warfare answers in its exploration of euphemisms, "warspeak," "doublespeak," and propagandistic terms. This handbook of alphabetically listed entries is prefaced by an introductory overview that provides background information about how language is used to obfuscate or minimize descriptions of armed conflict or genocide and presents examples of the major rhetorical devices used in this subject matter. The book focuses on the "loaded" language of conflict, with many of the entries demonstrating the function of given terms as euphemisms, propaganda, or circumlocutions. Each entry is accompanied by a list of cross references and "Further Reading" suggestions that point readers to pertinent sources for further research. This book is ideal for students—especially those studying political science, international relations, and genocide—as well as general readers.




Surprise Attack


Book Description

Surprise Attack explores sixty plus years of military and terror threats against the United States. It examines the intelligence tools and practices that provided warnings of those attacks and evaluates the United States' responses, both in preparedness – and most importantly – the effectiveness of our military and national command authority. Contrary to common claims, the historical record now shows that warnings, often very solid warnings, have preceded almost all such attacks, both domestic and international. Intelligence practices developed early in the Cold War, along with intelligence collection techniques have consistently produced accurate warnings for our national security decision makers. Surprise Attack traces the evolution and application of those practices and explores why such warnings have often failed to either interdict or intercept actual attacks. Going beyond warnings, Surprise Attack explores the real world performance of the nation's military and civilian command and control history – exposing disconnects in the chain of command, failures of command and control and fundamental performance issues with national command authority. America has faced an ongoing series of threats, from the attacks on Hawaii and the Philippines in 1941, through the crises and confrontations of the Cold War, global attacks on American personnel and facilities to the contemporary violence of jihadi terrorism. With a detailed study of those threats, the attacks related to them, and America's response, a picture of what works – and what doesn't – emerges. The attacks have been tragic and we see the defensive preparations and response often ineffective. Yet lessons can be learned from the experience; Surprise Attack represents a comprehensive effort to identify and document those lessons.




Astropolitik


Book Description

This volume identifies and evaluates the relationship between outer-space geography and geographic position (astrogeography), and the evolution of current and future military space strategy. In doing so, it explores five primary propositions.




The News Media At War


Book Description

Tarek Cherkaoui reveals how geo-political and ideological legacies of the past, which divide the world into a dichotomy of 'us' against 'them', play a dominant role in reinforcing the ensuing polarisation of our media.




A Toolbox for the Application of the Rules of Targeting


Book Description

How military commanders interpret the rules of targeting impacts not only on whether civilians and civilian objects are harmed in the course of a military operation, but also on the scale of harm that ensues. Commentators have queried whether military commanders observed the law even when parties to a conflict acted in accordance with mandates to protect civilians, as was the case when a coalition of states bombed targets in Libya in 2011. However, limited guidance is publicly available on how military commanders apply these rules on the battlefield. In order to allow military commanders to exercise judgment in determining what steps they are required to take to spare civilians in a specific set of circumstances, the rules of targeting are formulated in an open-ended fashion, which complicates one’s ability to evaluate whether a particular military operation complies with the law. By examining case studies ranging from Operation Desert Storm in 1991 to Operation Protective Edge in 2014, this book addresses lacunae in current scholarship. It puts forward principles which capture how military commanders deliberate while interpreting what the rules of targeting require in particular scenarios. International humanitarian law, this book contends, places a duty on attackers to assume risk in order to mitigate danger to civilians. Drawing on the field of psychology, this study provides an explanation of how military commanders assess when circumstances do not permit them to inform civilians about a forthcoming attack.




How to Do Critical Discourse Analysis


Book Description

"How great to have this practical introduction to doing critical discourse analysis, especially one that provides examples of multimodal discourse analysis. Extremely useful for students who need tools for the study of text, talk and images." - Teun van Dijk, Pompeu Fabra University "The authors have truly achieved the impossible: to make extremely complex phenomena accessible for students and scholars alike. Thus, this textbook will provide a most helpful guide when looking for adequate ways to grasp and analyze the intricate interdependence of written, oral and visual forms of semiosis." - Ruth Wodak, Lancaster University How do media texts manipulate and persuade us? How do language and images play out the ideas, values and identities? This book shows readers exactly how language, power and ideology are negotiated in media texts, from magazine and advertising, to YouTube and music videos. Presenting a systematic toolkit of theories, concepts and techniques for doing language and image analysis, students learn how to dig deep into discourses and the media landscape. With case studies and examples from a range of traditional and new media content, the book equips students to understand the relationship between language, discourse and social practices.




America's Achilles' Heel


Book Description

Nuclear, biological, and chemical (NBC) weapons delivered covertly by terrorists or hostile governments pose a significant and growing threat to the United States and other countries. Although the threat of NBC attack is widely recognized as a central national security issue, most analysts have assumed that the primary danger is military use by states in war, with traditional military means of delivery. The threat of covert attack has been imprudently neglected.Covert attack is hard to deter or prevent, and NBC weapons suitable for covert attack are available to a growing range of states and groups hostile to the United States. At the same time, constraints on their use appear to be eroding. This volume analyzes the nature and limits of the covert NBC threat and proposes a measured set of policy responses, focused on improving intelligence and consequence-management capabilities to reduce U.S. vulnerability.About the authors: Richard A. Falkenrath is Assistant Professor of Public Policy at Harvard's Kennedy School of Government. He served as Executive Director of the Belfer Center for Science and International Affairs (BCSIA) and, before that, as a Research Fellow. He is the author and co-author of Shaping Europe's Military Order (1995), Avoiding Nuclear Anarchy (1996), America's Achilles' Heel:Nuclear, Biological, Chemical Terrorism and Covert Attack (1998), and numerous journal articles and chapters of edited volumes. Falkenrath has been a Visiting Research Fellow at the German Society of Foreign Affairs (DGAP) in Bonn. He holds a PhD from the Department of War Studies, King's College, London, where he was a British Marshall Scholar, and is a summa cum laude graduate of Occidental College, Los Angeles, with degrees in economics and international relations. He is on leave in 2001-2002 and is currently serving as Director for Counterproliferation and Homeland Defense at the National Security Council.Bradley A. Thayer is Assistant Professor of Political Science at the University of Minnesota, Duluth.




Nuclear War


Book Description

The INSTANT New York Times bestseller Instant Los Angeles Times bestseller “In Nuclear War: A Scenario, Annie Jacobsen gives us a vivid picture of what could happen if our nuclear guardians fail…Terrifying.”—Wall Street Journal There is only one scenario other than an asteroid strike that could end the world as we know it in a matter of hours: nuclear war. And one of the triggers for that war would be a nuclear missile inbound toward the United States. Every generation, a journalist has looked deep into the heart of the nuclear military establishment: the technologies, the safeguards, the plans, and the risks. These investigations are vital to how we understand the world we really live in—where one nuclear missile will beget one in return, and where the choreography of the world’s end requires massive decisions made on seconds’ notice with information that is only as good as the intelligence we have. Pulitzer Prize finalist Annie Jacobsen’s Nuclear War: A Scenario explores this ticking-clock scenario, based on dozens of exclusive new interviews with military and civilian experts who have built the weapons, have been privy to the response plans, and have been responsible for those decisions should they have needed to be made. Nuclear War: A Scenario examines the handful of minutes after a nuclear missile launch. It is essential reading, and unlike any other book in its depth and urgency.