Sunday, October 21, 2018
Subscription Centre
Receive our free e-newsletter.
Click here for more information

Book Reviews

Apartheid Guns and Money - a tale of profit

Review of apartheid Guns and Mioney“Apartheid Guns and Money - a tale of profit” is the latest addition to the stable of South African non-fiction providing much-needed and valuable insight into the darker workings of government, both pre- and post-apartheid.

Book Review: Firearms Developed and Manufactured in Southern Africa 1949-2000

Firearms Developed and Manufactured in Southern Africa 1949-2000This weighty tome is a definitive reference guide to firearms developed during the region’s golden age of gunmaking.

It took seventeen contributors eight years to produce the book and in the process they accumulated a library of 30 000 documents. A vast amount of original research was undertaken, from interviews to digging through patent documents.

Initially planned to reach no more than 200 pages, the book takes 540 to cover some 200 local firearms, covering everything from hunting rifles, sporting weapons, handguns, machineguns and sniper rifles. Even experimental, one-off and prototype designs are covered, such as a farmer-specific BXP submachinegun, the early prototypes of the Neostead shotgun and experimental assault rifles like the Vektor CR21 and Truvelo Raptor.

Although 1949-2000 was the golden age of firearm production in Southern Africa, the book does cover many firearms up to the date of publication in a wonderful effort to conclude or complete the stories of different manufacturers. For instance Truvelo's CMS 20x42 mm weapon, referred to in the book as a 'pirate gun', is there.

Although focussed on firearms, the book also gives good coverage to the people who designed them and also provides a history of the companies that built them.

Much effort was also put into photographing firearms from every angle, inside and out, to explain the variants, internal workings and identifiers.

The book's mandate is to cover Southern Africa, but as only two such countries produced firearms, there is a comprehensive chapter on Rhodesia, focussing on the busy period of the 1970s. It also becomes evident how big an influence Rhodesian gunsmiths had on South African developments.

Southern African Firearms is a detailed and fascinating firearms study and the effort taken in producing it is clear. The book is an excellent reference work for historians, experts and aficionados alike. Collectors in particular will find the book most useful as it provides much detail on markings, serial numbers and other identifiers.

The fact that there are many firearms covered that the majority of people have never heard of before - such as the Vektor H5 Zip Gun, Quattro Derringer, TS V submachinegun, and NIAST 5.56 mm assault rifle - is testament to the depth of this book and a guarantee it will remain the definitive guide to South African firearms.

Firearms: Developed and Manufactured in Southern Africa 1949-2000
Compiled by the Pretoria Arms Ammunition Association/Pretoria Wapen En Ammunisievereniging - -
Edited By Chas Lotter
Pretoria Arms Ammunition Association 2017
540 pages
1 200 photos
ISBN 9780620728744

“Composite Warfare” - a composite insight into conflict and war in Africa

Eeben Barlow Composite WarfareEeben Barlow is a name well-known to those who are practitioners of military arts and skills, especially in Africa.

He has now taken all his considerable experience and distilled it into a 500 plus page publication titled “Composite Warfare”, which he sees as an African “Art of War”.

Split into three parts – “Understanding conflict and war in Africa”, “Conventional manoeuvre during composite warfare operations” and “Unconventional manoeuvre during composite warfare operations” – there are 22 chapters covering virtually every imaginable aspect of planning and executing war at whatever level in Africa.

Barlow’s introduction sets the tone for his textbook. He writes: “Africa has seen numerous conflicts and wars since the end of the Cold War. I have partaken in some of them as a soldier, an intelligence officer, a covert operative and as chairman of Executive Outcomes, a private military company that focussed on resolving Africa’s problems during the 1990s and more recently as chairman of STTEP International Ltd” adding “international resistance to both Executive Outcomes and STTEP’s desire to end conflicts and wars and see a stable Africa remains unparalleled”.

He has lectured and delivered papers at many African defence and military colleges, including some in South Africa where his insights into the planning and execution of various military tasks have been well received. After reading “Composite Warfare” this reviewer, not qualified in a military sense but a long-time observer of defence and security in South Africa and to a lesser extent, north of the Limpopo River, would venture Barlow’s venture into, for want of a better phrase “teaching writing”, should be compulsory issue for libraries at military education institutions from Cape Town to Cairo.

The author’s conviction that Africa will not see any full-scale conventional war but will have to endure conflicts where a mixture of conventional and guerrilla warfare tactics and operations are employed is carefully and thoroughly explained. Adding more value, from an operational and execution point of view is his comment to this reviewer “that everything in ‘Composite Warfare’ works. Nothing is theory; everything has been put into practice”.

This is in line with the hands-on manner and methods Barlow has worked out and put into practice on the ground in Africa. Again, his own words describe it best – “what is in the book has been successfully employed against groups and organisations including Boko Haram and Lord’s Resistance Army (LRA)”.

He adds ruefully that “outside interference” put an end to what would ultimately have been successful operations. That the interference hasn’t worked can be measured against the activities of both Boko Haram and LRA, both of which are still active and operational.

Barlow introduces each chapter with an appropriate quotation, the majority his own words, and these serve as an able stimulant for the student to delve properly into the wise words that follow.

As an example: “We need to not only look at how we organise ourselves, we also need to take a step back and revisit our principles of war. If we look at post-1945 conflicts and wars – and there have been many in Africa – we will note they have been very different from those beyond our shores. We seem to have a misguided belief that we can simply accept the principles of war of other nations and then all will be well. Our conflicts and wars are different. Besides, where exactly have those principles worked in Africa?” he asks before discussing the modern principles of war.

Barlow takes a different view on some aspects of war, but agrees with military scholars on others. As an example he told a division commander “somewhere in Central Africa” in 2011 that “firepower, mobility and manoeuvre are critical to our success”.

“Without these we cannot achieve our operational and tactical objectives. If we cannot meet our objectives, we give the enemy an advantage he certainly does not deserve. Give us firepower, mobility and the ability to manoeuvre and we will give you the enemy”.

Writing about defence and protection of the pillars of state, he notes: “We (soldiers) are merely an extension of politics. As long as Africa remains at war with itself, it will be unable to flourish and take its place in a vibrant, economically powerful and politically stable international community”.

Barlow’s seven pillars of state are intelligence, law enforcement, armed forces, governance, economy, populace and perceptions. He points out a personal analysis and dissection of every African conflict and/or war since 1945 allowed him to identify numerous commonalities.

“These led to the pillars of state theory, a theory that has proved itself in every conflict and war in Africa.”

An example of how well Barlow reads and knows the Africa situation comes in a single line caption to one of the many photographs illustrating the book. A photograph and Barlow and two unidentified Libyans is accompanied by the words: “In Benghazi in 2013 the author tried to warn the Libyans of what was coming … they opted to believe others”. Those who study and keep a weather eye on African affairs will know Libya today is not a well state.

There are other pithy comments by Barlow which all add value to a work that should be ignored - at their peril – by those wanting to learn about conflict and war on the African continent.

“Composite Warfare” is published by Thirty Degrees South Publishers.


Book Review: China’s Cyber Power

altThe cyber domain has become central to the struggle for strategic advantage between the US and the West on the one hand, and China and other authoritarian states on the other.

If there is any outsider, who can present a coherent view of China’s rise as a cyber power, it is the author of this short book. Nigel Inkster was the deputy chief of the UK’s Secret Intelligence Service, MI6, speaks Mandarain, is well versed in the country’s history and seems to show a good understanding of the psyche of Beijing’s leadership and its options. He is currently the Director of Future Conflict and Cyber Security at the International Institute for Strategic Studies in London.

Informing China’s stance is the Soviet era doctrine of information warfare as a tool to ensure internal political control and a favourable external narrative. The US, of course, has its own cyber war capacity, and its efficacy may have been damaged by Edward Snowden, who blew the whistle on the US's extensive snooping programme. Where the West and the East importantly differ is the degree of liberty they are willing to tolerate in the cybersphere.

China’s Cyber Power argues that state control of the cyber domain is a critical factor in China’s pursuit of military strength and protection from internal and external threats. “What the leadership fear most of all is the prospect of an irrecoverable breakdown in internal order,” writes Inkster.

“There are signs that the Party’s ideologues may be developing a vision for the Chinese cyber domain that enables it to exercise control over citizens by both filtering the information they access and compiling such detailed electronic data on individuals – including their entire browsing history and all their social-media posts – that any perceived infractions can be used as leverage against them,” he writes.

“For now, China appears to believe that it can have its cake and eat it: gaining the economic benefits that come from with global connectivity while excluding information as seen as detrimental to political and social stability,” Inkster writes.

On the external front, Inkster believes that the Chinese are heavily engaged in cyber espionage as a means of dulling the West's technological edge. In the wake of an agreement between President Barack Obama and Chinese President Xi Jinping, Chinese efforts to cyber-steal American intellectual property and business secrets seem to be declining. But the international fault lines on cyber issues remain clear, as does cyber's pivotal role in future armed conflicts.

In 2000, then US President Bill Clinton likened Chinese efforts to censor what was on the web to trying to “nail Jell-O to the wall.” Beijing's approach is nuanced as the authorities often refrain from censoring criticisms of the leadership, but do crack down on attempts to mobilize unauthorized public protest. The Chinese now live in what could be called a parallel web universe, overseen by a complex and multilayered monitoring and control system. This might strengthen the authoritarians' hold on power, although Inkster concludes, “it will be some time before any safe conclusions can be reached about this experiment.”

The recent example of Zimbabwe shows how the cat and mouse game is playing out in an African country. Robert Mugabe's regime is presently facing a challenge from Pastor Evan Mawarire’s #This Flag, a protest movement that makes extensive use of the internet and social media.

Shutting down the internet was probably considered too draconian, especially since opponents were likely to see it as sign of panic. When warnings about "misuse" of social media proved ineffective, says TechZim.co.zw, a Zimbabwean information technology site, the government opted instead to force Zimbabwe’s three mobile network operators to suspend sales of cheap data bundles. Eliminating special mobile data promotion bundles is the ultimate squeeze on protest, TechZim suggests.

Was Mugabe's government advised by the Chinese? Inkster believes that a large number of African countries may find the Chinese model of internet control attractive. China’s large footprint in Africa allows it to influence cyber policies through diplomatic pressure and help in telecommunications network development, he says. Chinese telecommunications giants Huawei and ZTE have built major systems in around 30 African countries. Huawei has established training centres in seven African states, a research and development facility in South Africa, and a network operations base in Cairo. Human Rights Watch has criticised both companies for providing equipment used to conduct political surveillance.

“China may exploit its control of African telecommunications infrastructure for intelligence-gathering purposes," writes Inkster. "There is no hard evidence to support this proposition, but it would scarcely be surprising if China were engaged in such activities, whether independently or in conjunction with the states concerned."

“Chinese engagement appears to have been translated into political support for some of Beijing’s policies, a notable example being the 2015 cyber-security pact between the Chinese and South African governments, which made reference to collaboration on information security,” he says.

In July 2016 South Africa, along with others, supported China by voting against a UN resolution that would have required states to commit themselves to a policy of non-interference with the flow of online information. This diplomatic victory could be a sign that Beijing is winning the cyber Cold War in Africa.

For the public, communications can be hidden from prying eyes through encrypted services such as WhatsApp, the use of Virtual Private Networks, which can camouflage internet addresses, and Tor, software that can hide the source of internet traffic. These devices are certainly sufficient to force prying eyes to work a lot harder.

Publisher: Routledge, Taylor and Francis Group, for The International Institute for Strategic Studies (30 May 2016)
ISBN 978-1-138-21116-2
Softcover: 123 pages
A Kindle edition is also available


Page 2 of 46


Company News