ehudeilam9Israel’s military doctrine was aimed at defeating powerful Arab militaries, mostly those of Egypt, Syria and Jordan. In the years 1948-1982 Israel and Arab states had a series of wars i.e. high intensity wars. Israel, since 1948, also dealt with guerrilla and terror attacks. Since 1982 and mostly in the last 15 years Israel faced hybrid forces, Hamas and Hezbollah. Those groups are a mix between a conventional military and a guerrilla group. Israel fought against Hezbollah in Lebanon in 2006 and against Hamas in the Gaza Strip, mostly in two wars, in 2008-2009 and in 2014.

Israel’s Military Doctrine begins with explaining Israel’s national security policy. Ehud Eilam then focuses on how the IDF (Israel defense forces) had to adjust its doctrine and build up to confront hybrid forces, by examining Israel’s air and the ground corps and major issues such as offense and defense, infrastructure and manpower.

The IDF can inflict heavy casualties and damages to a hybrid foe. Yet destroying the latter is a tall order because Hezbollah and Hamas are too elusive, they hide inside populated areas etc. However, compared with past wars against Arab states, there is much less danger to Israel let alone to its survival since even a coalition between Hezbollah, Hamas and other groups can’t defeat the IDF. Furthermore since fighting a hybrid force is less demanding than running a high intensity war against an Arab state, then Israel does not rely that much on the United States in receiving weapon systems, ammunition and spare parts. Read more

bookavivaSwitzerland suffered four major terrorist attacks in 1969 and 1970, which forced the Swiss government to address the issue of international terrorism for the first time. Subsequently, “neutral” Switzerland worked closely with Western Cold War powers to develop international counterterrorism measures and forged a European-Israeli counterterrorist alignment to counter Palestinian terrorism in Europe.

Using recently declassified archival records, this book is the first study to examine how the Swiss government positioned the country within the international struggle against terrorism. The book brings to light the creation of the Club de Berne, a secret European network of intelligence agencies connected to Israel and the United States. It offers new insights about the history of Swiss, Western European, and Israeli security cooperation. Read more

ddrspionageBook Summary

The edited volume, edited by Helmut Muller-Enbergs and Thomas Wegener Friis, is the first step of the project “DDR-espionage in the World”, which explores the intelligence activities of the GDR outside of Germany. East Germany and certainly its secret police “The Stasi” is a legend within the World of intelligence – for better and for worse. But what is behind the scenes? How well did the German communist agents actually do, when they went beyond the comfort zone of the German language?

The first volume in the series presents 13 articles concerning 10 countries: Albania, America, Andorra, Belgium, Bulgaria, Denmark, Finland, France, Greece, and Great Britain. It's a broad variation of small and big states, of partners and foes. The authors present the current state of art, and their work is meant to encourage new research into Cold War espionage. Although, the first East German archives were made accessible already in the early 1990s, research German focused primarily of local history. Today, several other Central European and even Western archives are open improving the possibilities to systematic research in historical espionage considerably.

This volume - as well as the following - is meant to give new impulses, especially to a strengthened cooperation between European researchers. It should rather be a point of departure than the final answer to all questions. Read more

secindefThe Research Institute for European and American Studies (RIEAS) joins the Security-Intelligence and Defense (SECINDEF) Israel-USA International Consulting Counterterrorism as well as the International Observatory for the prevention of jihadist terrorism (OCATRY). Read more

safemanual18Copyright: Research Institute for European and American Studies (www.rieas.gr)
First Publication date: 23 July 2016

Το Research Institute for European and American Studies (RIEAS)- Ερευνητικό Ινστιτούτο Ευρωπαικών και Αμερικανικών Μελετών δημοσιεύει Εγχειρίδιο Επικοινωνίας σε Τρομοκρατικές Κρίσεις της SAFE COOMS για Δημόσιες Αρχές. Read more

mpalomenosΔΙΑΧΕΙΡΙΣΗ ΤΡΟΜΟΚΡΑΤΙΚΩΝ ΚΡΙΣΕΩΝ

Οι εκδόσεις Ποιότητα κυκλοφορούν το βιβλίο του Κωνσταντίνου Μπαλωμένου, Διεθνής τρομοκρατία και στρατηγική επικοινωνία, διαχείριση τρομοκρατικών κρίσεων.
Read more

Στο παρόν βιβλίο ο συγγραφέας με έναν άμεσο και επιστημονικό ταυτόχρονα τρόπο αναλύει το εξαιρετικά επίκαιρο θέμα της τρομοκρατίας από τις απαρχές της ως και σήμερα και θεμελιώνει γιατί η τρομοκρατία πληροί όλες τις προϋποθέσεις και τα δομικά στοιχεία μιας κρίσης και γιατί ως τέτοια πρέπει να αντιμετωπίζεται. Ταυτόχρονα, μελετά την τρομοκρατία ως ένα διεθνικό φαινόμενο και επισημαίνει ότι τα αίτια που την προκαλούν οφείλονται στη φύση του άναρχου διεθνούς συστήματος και στον ανταγωνισμό των κρατών για να αυξήσουν την ισχύ τους ως επακόλουθο της διαιώνισης τους διεθνούς προβλήματος που προσδιορίζεται από την άνιση ανάπτυξη, τον ηγεμονισμό και τις διεθνείς επεμβάσεις...Read more

LeobookLin L.S.F., Nomikos J. (2018) Cybercrime in East and Southeast Asia: The Case of Taiwan. In: Masys A., Lin L. (eds) Asia-Pacific Security Challenges. Advanced Sciences and Technologies for Security Applications. Springer, Cham.

Copyright: © Springer International Publishing AG 2018
https://link.springer.com/book/10.1007%2F978-3-319-61729-9

Abstract

This chapter aims to scrutinize cybercrime as one of the security threat types of transnational organized crime (TOC) in East and Southeast Asia region in the era of globalization. This chapter examines the nature of cybercrime and how it has evolved in the Asia-Pacific region in the era of globalization. Following the booming economy in East and Southeast Asia, the internet has been used as a terrain to conduct transnational crimes, and the criminals try to utilize the loopholes between legal and judicial systems among the countries in the region. This chapter examines the threats that have been posted by cybercrime, which is different from the “traditional” organized crime activities. This chapter uses Taiwan (the official name is the Republic of China, R.O.C.) as a case study. Following globalization and technological development, Taiwan’s underworld went into a new stage of development, penetrating political, economic and other aspects in the society. Thus, many organized crime groups vigorously expand their organizations oversees into East and Southeast Asia. As a result, Taiwan exported many masterminds of telecommunication and internet fraud crime and those criminals form organized crime groups in the third countries. The whole region is affected by the telecommunication frauds conducted by transnational criminal groups that are in many cases headed by Taiwanese. This phenomenon has become a security threat to the region that requires cross-border cooperation and joint effort. Read more


davidDr. David Priess served during the Bill Clinton and George W. Bush administrations as an award-winning intelligence officer, manager, and daily intelligence briefer at the Central Intelligence Agency (CIA), as well as desk officer at the State Department. He obtained his PhD in political science from Duke University and has published articles in journals such as Security Studies, Middle East Policy, and the Mershon International Studies Review, as well as book reviews and eclectic articles in outlets ranging from Forward to Skeptic. Dr. Priess is currently director of analytic services for Analytic Advantage, Inc., offering specialized training, mentoring, and consulting services to the intelligence community, other government offices, and the private sector.

Copyright: @ 2016 by David Priess – Published in the United States by Public Affairs, a Member of the Perseus Book Group.

Summary of Book

Every President has had a unique and complicated relationship with the intelligence community. While some have been coolly distant, even adversarial, others have found
their intelligence agencies to be among the most valuable instruments of policy and power.

Since John F. Kennedy’s presidency, this relationship has been distilled into a personalized daily report: a short summary of what the intelligence apparatus considers the most crucial information for the president to know that day about global threats and opportunities. This top-secret document is known as the President’s Daily Brief (PDB’s), or within national security circles, simply “the Book.”

Presidents have spent anywhere from a few moments (Richard Nixon) to a healthy part of their day (George W. Bush) consumed by its contents; some (Bill Clinton and George H. W, Bush) consider it far and away the most important document they saw on a regular basis while commander in chief.

The details of most PDBs are highly classified, and will remain so for many years. But the process by which the intelligence community develops and presents the Book is a fascinating look into the operation of power at the highest levels.
David Priess, a former intelligence officer and daily briefer, has interviewed every living president and vice president as well as more than one hundred others intimately involved with the production and delivery of the president’s book of secrets. He offers an unprecedented window into the decision-making of every president from Kennedy to Obama, with many character-rich stories revealed here for the first time.

elite
















Ruslan Pukhov is the cofounder and director of the Centre for Analysis of Strategies and Technologies (CAST), a private Moscow-based think tank, founded in 1997. Pukhov graduated from the Moscow State Institute of International Relations (MGIMO) in 1996 and attended the French-Russian Master d’Etudes Internationales Sciences Po as a postgraduate student in 1996-1997, while serving as a researcher for the Conventional Arms Project (PIR Center). Pukhov has been a member of the Public Advisory Board of the Russian Defense Ministry since 2007.

Christopher Marsh is a Professor of National Security and Strategic Studies at the School of Advanced Military Studies (SAMS), US Army Command and General Staff College, Fort Leavenworth. He teaches courses on the topics of operational art, counterinsurgency, international security and strategy, and morality and war. Previously Marsh taught international terrorism and irregular warfare at the US Air Force Special Operations School, Hurlburt Field. And prior to that he was a full professor of political science (with tenure) at Baylor University. Marsh is the president of the Special Operations Research Association (SORA) and editor of its professional journal, Special Operations Journal (www.specopsjournal.org).

Copyright: http://cast.ru/eng/news/cast-s-new-book-about-special-operations-forces-is-out.html

Book Summary

Elite Warriors: Special Operations Forces From Around the World (edited by Ruslan Pukhov and Christopher Marsh) is the latest book from the Centre for Analysis of Strategies and Technologies (CAST), a Moscow-based think tank focused on military and security issues. Presenting a collection of essays by leading military and security analysts, Elite Warriors offers a detailed assessment of the organization and capabilities of a selection of special operations forces from around the world. Including countries Algeria, China, Colombia, France, Germany, Iran, Israel, Italy, Jordan, Poland, Russia, Singapore, Turkey, Ukraine.Elite Warriors gives a comprehensive breakdown of the current composition, roles and chain of command of the various types of elite forces within each country. Also included are details concerning personnel recruitment and training, weapons and gear, brief histories and select combat records. Elite Warriors is an ideal reference for anyone interested in the unique role that these special forces play in their respective countries.

We use cookies

We use cookies on our website. Some of them are essential for the operation of the site, while others help us to improve this site and the user experience (tracking cookies). You can decide for yourself whether you want to allow cookies or not. Please note that if you reject them, you may not be able to use all the functionalities of the site.