682 resultados para Siege warfare


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The recent explosion of interest in the archaeology of warfare is examined, and some possible reasons behind this trend are explored. Characteristics in the archaeology of warfare are identified in relation to prehistoric and historical archaeology and their contrasting sources of evidence. The androcentric tendency of the archaeology of warfare is discussed, and the major themes of the volume are introduced, including memorial landscapes, commemorative monuments and their conflicting meanings, and the social context of warfare.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Major General Orde Wingate was a highly controversial figure in his time and remains so among historians. However, his eccentric and colourful personality has drawn attention away from the nature of his military ideas, the most important of which was his concept of long-range penetration, which originated from his observations of his operations in Italian-occupied Ethiopia in 1941, and evolved into the model he put into practice in the Chindit operations in Burma in 1943-44. A review of Wingate's own official writings on this subject reveals that long-range penetration combined local guerrilla irregulars, purpose-trained regular troops and airpower into large-scale offensive operations deep in the enemy rear, with the intention of disrupting his planning process and creating situations regular forces could exploit. This evolved organically from Major General Colin Gubbins' doctrine for guerrilla resistance in enemy occupied areas, and bears some resemblance to the operational model applied by US and Allied forces, post September 2001.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter evaluates the potential for legal regulation of the resort to cyber warfare between states under the ‘jus ad bellum’ (the law on the use of force). Debate in the literature has largely concerned whether cyber warfare falls within the scope of Article 2(4) UNC. The first part of this chapter sets out this debate. It then goes on to argue that the ‘Article 2(4) debate’ often misses the fact that an act of cyber warfare can be considered a breach of a different legal rule: the principle of non-intervention. The chapter further considers some of the issues in applying either the prohibition of the use of force or the principle of non-intervention to cyber warfare, and then concludes by arguing that the debate should be reoriented to focus on another existing international legal obligation: the duty to prevent cyber-attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber warfare is an increasingly important emerging phenomenon in international relations. The focus of this edited volume is on this notion of cyber warfare, meaning interstate cyber aggression, as distinct from cyber-terrorism or cyber-crime. Waging warfare in cyberspace has the capacity to be as devastating as any conventional means of conducting armed conflict. However, while there is a growing amount of literature on the subject within disciplines, there has been very little work done on cyber warfare across disciplines, which necessarily limits our understanding of it. This book is a major multidisciplinary analysis of cyber warfare, featuring contributions by world-leading experts from a mixture of academic and professional backgrounds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The military offers a form of welfare-for-work but when personnel leave they lose this safety net, a loss exacerbated by the rollback neoliberalism of the contemporary welfare state. Increasingly the third sector has stepped in to address veterans’ welfare needs through operating within and across military/civilian and state/market/community spaces and cultures. In this paper we use both veterans’ and military charities’ experiences to analyse the complex politics that govern the liminal boundary zone of post-military welfare. Through exploring ‘crossing’ and ‘bridging’ we conceptualise military charities as ‘boundary subjects’, active yet dependent on the continuation of the civilian-military binary, and argue that the latter is better understood as a multidirectional, multiscalar and contextual continuum. Post-military welfare emerges as a competitive, confused and confusing assemblage that needs to be made more navigable in order to better support the ‘heroic poor’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sociologisk Forsknings digitala arkiv

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.