Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
This book examines intelligence analysis in the digital age and demonstrates how intelligence has entered a new era. While intelligence is an ancient activity, the digital age is a relatively new phenomenon. This volume uses the concept of the "digital age" to highlight the increased change, complexity, and pace of information that is now circulated, as new technology has reduced the time it takes to spread news to almost nothing. These factors mean that decision-makers face an increasingly challenging threat environment, which in turn increases the demand for timely, relevant, and reliable intelligence to support policymaking. In this context, the book demonstrates that intelligence places greater demands on analysis work, as the traditional intelligence cycle is no longer adequate as a process description. In the digital age, it is not enough to accumulate as much information as possible to gain a better understanding of the world. To meet customers' needs, the intelligence process must be centred around the analysis work - which in turn has increased the demand for analysts. Assessments, not least predictions, are now just as important as revealing someone else's secrets. This volume will be of much interest to students of intelligence studies, security studies, and international relations.
Codenames were a vital feature of World War II, serving as mental shorthand for those in the know, and obscuring the issues for those who were not. Codenames were used from the highest level, in the planning of grand strategic moves affecting the conduct of the whole war, to the lowest command divisions, in the conduct of small-scale tactical operations. This encyclopedia, first published in 1986, removes the mystery surrounding many of the important code names from the era. With around 3,000 entries drawn from all sides - the U.K., U.S.A., Germany, the U.S.S.R. and Japan - Christopher Chant's work provides a uniquely comprehensive and full overview of major operations, names and code words. Thorough and exciting, this key reference reissue is an exceptionally valuable resource for military historians, enthusiasts and general readers with an interest in World War II.
Did President Roosevelt and other high-ranking U.S. government officials know about Japanese plans to attack Pearl Harbor in advance, and fail to warn U.S. Navy leadership in Hawaii? Drawing on recently declassified materials and revelations from other writers, this book traces the flow of intelligence and concludes the imminent attack was known about and was allowed to happen to win the support of the American public in a war against Japan. An epilogue describes the fate of Commander-in-Chief of the U.S. Pacific Fleet Admiral Husband E. Kimmel, the intelligence he received from Washington before the attack, and the intelligence he did not.
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
Despite publicity given to the successes of British and American codebreakers during the Second World War, the study of signals intelligence is still complicated by governmental secrecy over even the most elderly peacetime sigint. This book, first published in 1986, lifts the veil on some of these historical secrets. Christopher Andrew and Keith Neilson cast new light on how Tsarist codebreakers penetrated British code and cypher systems. John Chapman's study of German military codebreaking represents a major advance in our understanding of cryptanalysis during the Weimar Republic. The history of the Government Code and Cypher School - forerunner of today's GCHQ - by its operational head, the late A.G. Denniston, provides both a general assessment of the achievements of British cryptanalysis between the wars and a tantalising glimpse of what historians may one day find in GCHQ's forbidden archives. The distinguished cryptanalyst of Bletchley Park, the late Gordon Welchman, describes in detail how the Ultra programme defeated the German Enigma machine, while another Bletchley Park cryptographer, Christopher Morris, reminds us in his account of the valuable work on hand cyphers that wartime sigint consisted of much more than Ultra. Roger Austin's study of surveillance under the Vichy regime shows the continuing importance of older and simpler methods of message interception such as letter-opening. Taken together, the articles establish sigint as an essential field of study for both the modern historian and the political scientist.
With intensified threats to global security from international terrorism worldwide, education systems themselves face these same unprecedented security threats. Schools and universities have become marked loci of interest for the monitoring of extremism and counter-terrorism by security and intelligence agencies. The relationship between education systems and national security is nothing new though - it extends in surprising and unexpected ways into territory which is by turns open and covert, even secret. Acknowledging the genuine political and security concerns which have drawn educational systems ever closer to the intelligence community, this book shows how and why this has happened, and explains why the relationship between education and the security and intelligence communities extends beyond contemporary concerns with counter-terrorism. As the title of this book demonstrates, this is as much an intellectual challenge as a security struggle. Education, Security and Intelligence Studies thus critically engages with multi-disciplinary perspectives on a complex and contentious interface: between systems of often secret and covert national security and intelligence and open systems of national education. Delving into difficult to access and often closely guarded aspects of public life, the book provides the pathfinding groundwork and theoretical modelling for research into a complex of little explored institutional and epistemological interconnectedness between universities and the security and intelligence agencies. This book was originally published as a special issue of the British Journal of Educational Studies.
Published for the first time, the history of the CIA's clandestine short-wave radio broadcasts to Eastern Europe and the USSR during the early Cold War is covered in-depth. Chapters describe the "gray" broadcasting of Radio Free Europe and Radio Liberty in Munich; clandestine or "black" radio broadcasts from Radio Nacional de Espana in Madrid to Estonia, Latvia, Lithuania and Ukraine; transmissions to Bulgaria, Romania, Albania, Ukraine and the USSR from a secret site near Athens; and broadcasts to Byelorussia and Slovakia. Infiltrated behind the Iron Curtain through dangerous air drops and boat landings, CIA and other intelligence service agents faced counterespionage, kidnapping, assassination, arrest and imprisonment. Excerpts from broadcasts taken from monitoring reports of Eastern Europe intelligence agencies are included.
Historical Dictionary of Chinese Intelligence, Second Edition covers the history of Chinese Intelligence from 400 B.C. to modern times. The dictionary section has over 400 cross-referenced entries on the agencies and agents, the operations and equipment, the tradecraft and jargon, and many of the countries involved.
This book delves into the secret histories of the CIA, the FBI, and British and Italian intelligence to study how policymakers can control intelligence agencies and when these agencies will try to remove their own government. For every government they serve, intelligence agencies are both a threat and a necessity. They often provide vital information for national security, but the secrets they possess can also be used against their own masters. This book introduces subversion paradox theory to provide a social scientific explanation of the unequal power dynamic resulting from an often fraught relationship between agencies and their 'masters'. The author also makes a case for the existence of 'deep state' conspiracies, including in highly developed democracies, and cautions those who denounce their existence that trying to control intelligence by politicizing it is likely to backfire. An important intervention in the field of intelligence studies, this book will be indispensable for intelligence professionals and policymakers in understanding and bridging the cultural divide between these two groups. It will also make for a fascinating and informative read to scholars and researchers of diplomacy, foreign policy, international relations, strategic and defence studies, security studies, political studies, policymaking and comparative politics.
This book delves into the secret histories of the CIA, the FBI, and British and Italian intelligence to study how policymakers can control intelligence agencies and when these agencies will try to remove their own government. For every government they serve, intelligence agencies are both a threat and a necessity. They often provide vital information for national security, but the secrets they possess can also be used against their own masters. This book introduces subversion paradox theory to provide a social scientific explanation of the unequal power dynamic resulting from an often fraught relationship between agencies and their 'masters'. The author also makes a case for the existence of 'deep state' conspiracies, including in highly developed democracies, and cautions those who denounce their existence that trying to control intelligence by politicizing it is likely to backfire. An important intervention in the field of intelligence studies, this book will be indispensable for intelligence professionals and policymakers in understanding and bridging the cultural divide between these two groups. It will also make for a fascinating and informative read to scholars and researchers of diplomacy, foreign policy, international relations, strategic and defence studies, security studies, political studies, policymaking and comparative politics.
The Routledge Handbook on Israeli Security provides an authoritative survey of both the historical roots of Israel's national security concerns and their principal contemporary expressions. Following an introduction setting out its central themes, the Handbook comprises 27 independent chapters, all written by experts in their fields, several of whom possess first-hand diplomatic and/or military experience at senior levels. An especially noteworthy feature of this volume is the space allotted to analyses of the impact of security challenges not just on Israel's diplomatic and military postures (nuclear as well as conventional) but also on its cultural life and societal behavior. Specifically, it aims to fulfill three principal needs. The first is to illustrate the dynamic nature of Israel's security concerns and the ways in which they have evolved in response to changes in the country's diplomatic and geo-strategic environment, changes that have been further fueled by technological, economic and demographic transformations; Second, the book aims to examine how the evolving character of Israel's security challenges has generated multiple - and sometimes conflicting - interpretations of the very concept of "security", resulting in a series of dialogues both within Israeli society and between Israelis and their friends and allies abroad; Finally, it also discusses how areas of private and public life elsewhere considered inherently "civilian" and unrelated to security, such as artistic and cultural institutions, nevertheless do mirror the broader legal, economic and cultural consequences of this Israeli preoccupation with national security. This comprehensive and up-to-date collection of studies provides an authoritative and interdisciplinary guide to both the dynamism of Israel's security dilemmas and to their multiple impacts on Israeli society. In addition to its insights and appeal for all people and countries forced to address the security issue in today's world, this Handbook is a valuable resource for upper-level undergraduates and researchers with an interest in the Middle East and Israeli politics, international relations and security studies.
The Soviet military concept of operational art and the associated theories such as war of annihilations, deep battle, and deep operations have been observed by the West since World War II. The Soviet government hid their military-theoretical work behind a veil of secrecy. Here, the Soviet theories are revealed in the words of those who created them in peacetime and applied them in war.
"Of all the books on Native American service in the U.S. armed forces, this is the best.... Readers will find the story of the Comanche Code Talkers compelling, humorous, thought-provoking, and inspiring." -- Tom Holm, author of Strong Hearts, Wounded Souls: Native American Veterans of the Vietnam War Among the allied troops that came ashore in Normandy on D-Day, June 6, 1944, were thirteen Comanches in the 4th Infantry Division, 4th Signal Company. Under German fire they laid communications lines and began sending messages in a form never before heard in Europe-- coded Comanche. For the rest of World War II, the Comanche Code Talkers played a vital role in transmitting orders and messages in a code that was never broken by the Germans. This book tells the full story of the Comanche Code Talkers for the first time. Drawing on interviews with all surviving members of the unit, their original training officer, and fellow soldiers, as well as military records and news accounts, William C. Meadows follows the group from their recruitment and training to their active duty in World War II and on through their postwar lives up to the present. He also provides the first comparison of Native American code talking programs, comparing the Comanche Code Talkers with their better-known Navajo counterparts in the Pacific and with other Native Americans who used their languages, coded or not, for secret communication. Meadows sets this history in a larger discussion of the development of Native American code talking in World Wars I and II, identifying two distinct forms of Native American code talking, examining the attitudes of the American military toward Native American codetalkers, and assessing the complex cultural factors that led Comanche and other Native Americans to serve their country in this way.
In 1974 Frederick W. WinterbothaM's book "The Ultra Secret" disclosed the Allied success in breaking the German high command ciphers in World War II, and a new form of history began--the study of intelligence and its impact on military operations and international politics. This guide documents and annotates over 800 sources that have appeared in the past 20 years. It examines and evaluates primary and secondary sources dealing with the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also covers sources on the Sigint and cryptanalytic programs of the Axis and neutral powers. The book examines and annotates primary and secondary sources on the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also provides details on sources concerned with Sigint and cryptanalytic programs of the Axis and neutral powers.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
The official line is clear: the UK does not 'participate in, solicit, encourage or condone' torture. And yet, the evidence is irrefutable: when faced with potential threats to our national security, the gloves always come off. Drawing on previously unseen official documents, and the accounts of witnesses, victims and experts, prize-winning investigative journalist Ian Cobain looks beyond the cover-ups and the equivocations, to get to the truth. From WWII to the War on Terror, via Kenya and Northern Ireland, Cruel Britannia shows how the British have repeatedly and systematically resorted to torture, bending the law where they can, and issuing categorical denials all the while. What emerges is a picture of Britain that challenges our complacency and exposes the lie behind our reputation for fair play.
During the Second World War a major part of the strategy of the Grand Alliance was shipping. The Germans fully appreciated the vulnerability of this and their attack on it, largely by means of submarines, became known as the Battle of the Atlantic. The attack was overcome, with some difficulty, by a number of means. One, which remained generally unknown until the 1970s, was the decryption of German coded signals, now usually called Ultra. Subsequent histories often tended to attribute the outcome of the Battle largely to the operation of this factor almost by itself, sometimes because of a lack of rigorous analysis and also because of a failure to set this important subject into the full and complex contexts in which it operated. This study rectifies this deficiency, setting out the full story of the series of campaigns and carefully assessing the complicated pattern of factors, thus allowing a much more balanced understanding of code-breaking.
Through in-depth research and interviews with veterans, William Fowler has produced the most complete history of this elite and elusive unit to date. Out of Africa 1941 - 1943 Into Italy 1943 - 1945 Overlord and Europe 1944 - 1945 Post War Phoenix Malaya 1948 - 1960 The Confrontation 1962 - 1966 Oman 1970 - 1976 The Cold War 1945 - 1990 The Falklands Interlude 1982 The First Gulf War 1990 - 1991 Back to Africa 1981 - 2000 Balkan interlude 1994 - Afghanistan 2001 - The Second Gulf War 2003 C Squadron to 1 SAS Regiment (Rhodesia) 1951 - 1980 Enter the Kiwis 1954 - The Australian Experience 1957 - The Future
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilise AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference.
It is not hyperbole to suggest that the foundations of post-cold war security in Europe have been badly damaged by the conflict in Ukraine since 2014. Russia's annexation of Crimea and intervention in eastern Ukraine appear to have created a 'simmering' conflict, which may take years to resolve and have profound consequences for the European security environment. This volume explores the various political, economic and social aspects of these profound changes and their wider significance for Europe, bringing together contributions by scholars from across the continent and in various disciplinary fields to offer an authoritative, in-depth examination of the complex causes of the Ukraine crisis and the consequences for Ukrainian statehood, Ukraine's relations with Russia, Russia's own domestic governance and Russia's relations with Europe. This book was originally published as a special issue of Europe-Asia Studies.
At the end of the Second World War, Germany lay at the mercy of its occupiers, all of whom launched programmes of scientific and technological exploitation. Each occupying nation sought to bolster their own armouries and industries with the spoils of war, and Britain was no exception. Shrouded in secrecy yet directed at the top levels of government and driven by ingenuity from across the civil service and armed forces, Britain made exploitation a key priority. By examining factories and laboratories, confiscating prototypes and blueprints, and interrogating and even recruiting German experts, Britain sought to utilise the innovations of the last war to prepare for the next. This ground-breaking book tells the full story of British exploitation for the first time, sheds new light on the legacies of the Second World War, and contributes to histories of intelligence, science, warfare and power in the midst of the twentieth century.
This book describes and analyzes the history of the Mediterranean "Double-Cross System" of the Second World War, an intelligence operation run primarily by British officers which turned captured German spies into double agents. Through a complex system of coordination, they were utilized from 1941 to the end of the war in 1945 to secure Allied territory through security and counter-intelligence operations, and also to deceive the German military by passing false information about Allied military planning and operations. The primary questions addressed by the book are: how did the double-cross-system come into existence; what effects did it have on the intelligence war and the broader military conflict; and why did it have those effects? The book contains chapters assessing how the system came into being and how it was organized, and also chapters which analyze its performance in security and counter-intelligence operations, and in deception.
This research guide is an introduction to military intelligence, a neglected aspect of warfare that provides commanders and national leaders with essential information for decision making. The introduction provides the general reader with an explanation of the terminology, procedures, and institutional problems of military intelligence, while outlining the history of this field and identifying areas for further research. The core of the guide is an extensively annotated bibliography of unclassified English language materials on military intelligence, the evolution of intelligence operations, the role of intelligence in air, ground, and naval operations, and specialized fields of espionage, counter intelligence, technical intelligence, and aerial photography. This guide is intended to fill a void in the literature for soldiers, historians, and general readers. |
You may like...
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,578
Discovery Miles 55 780
The Central Intelligence Agency…
Athan G. Theoharis, Richard H. Immerman, …
Hardcover
R2,804
Discovery Miles 28 040
|