![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
This book is an absorbing account of secret operations and political intrigue in wartime Thailand. During World War II Free Thai organizations cooperated with Allied intelligence agencies in an effort to rescue their nation from the consequences of its 1941 alliance with Japan. They largely succeeded despite internal differences and the conflicting interests and policies of their would-be-allies, China, Great Britain and the United States. London's determination to punish Thailand placed the British Special Operations Executive (SOE) at a serious disadvantage in its rivalry with the American Office of Strategic Services (OSS). The US State Department, in contrast, strongly supported OSS operations in Thailand, viewing them as a vehicle for promoting American political and economic influence in mainland Southeast Asia. Declassification of the records of the OSS and the SOE now permits full revelation of this complex story of heroic action and political intrigue.
This book examines the digital explosion that has ripped across the battlefield, weaponising our attention and making everyone a participant in wars without end. 'Smart' devices, apps, archives and algorithms remove the bystander from war, collapsing the distinctions between audience and actor, soldier and civilian, media and weapon. This has ruptured our capacity to make sense of war. Now we are all either victims or perpetrators. In 'Radical War', Ford and Hoskins reveal how contemporary war is legitimised, planned, fought, experienced, remembered and forgotten in a continuous and connected way, through digitally saturated fields of perception. Plotting the emerging relationship between data, attention and the power to control war, the authors chart the complex digital and human interdependencies that sustain political violence today. Through a unique, interdisciplinary lens, they map our disjointed experiences of conflict and illuminate this dystopian new ecology of war.
The United Arab Emirates (UAE) has elaborated its own philosophy of security. Driven by emergencies and increasing risks, both in the region and globally, Emirati authorities have developed a sense of anticipation as well as an agility to react promptly to new threats through the ability to assess the risks in any given situation. War and the avatars of conflict are a constant reality in the Middle East. Transnational threats, including the regional context, the war in Yemen, insecurity in the Levant and tensions with Iran affect the overall stability of the Peninsula and consequently that of the UAE. Owing to the inclusion of the UAE in the networks of globalization, non-traditional security issues are not relegated to the background. Issues such as COVID-19, immigration, cybersecurity and human trafficking need to be addressed domestically as well as globally. This volume offers a comprehensive and multifaceted examination of the traditional and non-traditional security measures present in the UAE that allow the country to remain politically stable in an otherwise volatile region, and aims to offer a comprehensive overview of all forms of security in the UAE.
This book, first published in 1985, is an in-depth analysis of the Luftwaffe in the Second World War, using previously untapped German archives and newly-released 'Ultra' intelligence records. It looks at the Luftwaffe within the context of the overall political decision-making process within the Third Reich. It is especially valuable for its careful study of industrial production and pilot losses in the conduct of operations.
This book provides an institutional costs framework for intelligence and security communities to examine the factors that can encourage or obstruct cooperation. The governmental functions of security and intelligence require various organisations to interact in a symbiotic way. These organisations must constantly negotiate with each other to establish who should address which issue and with what resources. By coupling adapted versions of transaction costs theories with socio-political perspectives, this book provides a model to explain why some cooperative endeavours are successful, whilst others fail. This framework is applied to counterterrorism and defence intelligence in the UK and the US to demonstrate that the view of good cooperation in the former and poor cooperation in the latter is overly simplistic. Neither is necessarily more disposed to behave cooperatively than the other; rather, the institutional costs created by their respective organisational architectures incentivise different cooperative behaviour in different circumstances. This book will be of much interest to students of intelligence studies, organisational studies, politics and security studies.
Words of Intelligence: An Intelligence Professional's Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels. The intelligence community has undergone massive changes since it developed after World War II. Intelligence work now involves several different processes, including the planning, collection, analysis, and production of information. It also requires extensive expertise in its terminology. And in the post-9/11 era, the intelligence community has expanded, requiring the transmission of information to state and local public administrators, health officials, and transportation planners in times of a possible domestic attack. The number of people who need to know the specialized terminology of the intelligence community continues to grow. This dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues from both a foreign intelligence perspective and a local perspective for law enforcement officials. The number of terms, abbreviations, and acronyms has more than doubled for this new edition, and it includes a topical index and extensively cross-referenced entries. This book explains terms that relate to intelligence operations, intelligence strategies, security classifications, obscure names of intelligence boards and organizations, and methodologies used to produce intelligence analysis. Both entry-level and experienced intelligence professionals in the domestic and foreign intelligence communities find this book useful. This book is more than just a reference book; it is a book to read and enjoy, and from which to learn the art and science of intelligence analysis.
Did President Roosevelt and other high-ranking U.S. government officials know about Japanese plans to attack Pearl Harbor in advance, and fail to warn U.S. Navy leadership in Hawaii? Drawing on recently declassified materials and revelations from other writers, this book traces the flow of intelligence and concludes the imminent attack was known about and was allowed to happen to win the support of the American public in a war against Japan. An epilogue describes the fate of Commander-in-Chief of the U.S. Pacific Fleet Admiral Husband E. Kimmel, the intelligence he received from Washington before the attack, and the intelligence he did not.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
This book examines intelligence analysis in the digital age and demonstrates how intelligence has entered a new era. While intelligence is an ancient activity, the digital age is a relatively new phenomenon. This volume uses the concept of the "digital age" to highlight the increased change, complexity, and pace of information that is now circulated, as new technology has reduced the time it takes to spread news to almost nothing. These factors mean that decision-makers face an increasingly challenging threat environment, which in turn increases the demand for timely, relevant, and reliable intelligence to support policymaking. In this context, the book demonstrates that intelligence places greater demands on analysis work, as the traditional intelligence cycle is no longer adequate as a process description. In the digital age, it is not enough to accumulate as much information as possible to gain a better understanding of the world. To meet customers' needs, the intelligence process must be centred around the analysis work - which in turn has increased the demand for analysts. Assessments, not least predictions, are now just as important as revealing someone else's secrets. This volume will be of much interest to students of intelligence studies, security studies, and international relations.
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
Published for the first time, the history of the CIA's clandestine short-wave radio broadcasts to Eastern Europe and the USSR during the early Cold War is covered in-depth. Chapters describe the "gray" broadcasting of Radio Free Europe and Radio Liberty in Munich; clandestine or "black" radio broadcasts from Radio Nacional de Espana in Madrid to Estonia, Latvia, Lithuania and Ukraine; transmissions to Bulgaria, Romania, Albania, Ukraine and the USSR from a secret site near Athens; and broadcasts to Byelorussia and Slovakia. Infiltrated behind the Iron Curtain through dangerous air drops and boat landings, CIA and other intelligence service agents faced counterespionage, kidnapping, assassination, arrest and imprisonment. Excerpts from broadcasts taken from monitoring reports of Eastern Europe intelligence agencies are included.
Despite publicity given to the successes of British and American codebreakers during the Second World War, the study of signals intelligence is still complicated by governmental secrecy over even the most elderly peacetime sigint. This book, first published in 1986, lifts the veil on some of these historical secrets. Christopher Andrew and Keith Neilson cast new light on how Tsarist codebreakers penetrated British code and cypher systems. John Chapman's study of German military codebreaking represents a major advance in our understanding of cryptanalysis during the Weimar Republic. The history of the Government Code and Cypher School - forerunner of today's GCHQ - by its operational head, the late A.G. Denniston, provides both a general assessment of the achievements of British cryptanalysis between the wars and a tantalising glimpse of what historians may one day find in GCHQ's forbidden archives. The distinguished cryptanalyst of Bletchley Park, the late Gordon Welchman, describes in detail how the Ultra programme defeated the German Enigma machine, while another Bletchley Park cryptographer, Christopher Morris, reminds us in his account of the valuable work on hand cyphers that wartime sigint consisted of much more than Ultra. Roger Austin's study of surveillance under the Vichy regime shows the continuing importance of older and simpler methods of message interception such as letter-opening. Taken together, the articles establish sigint as an essential field of study for both the modern historian and the political scientist.
With intensified threats to global security from international terrorism worldwide, education systems themselves face these same unprecedented security threats. Schools and universities have become marked loci of interest for the monitoring of extremism and counter-terrorism by security and intelligence agencies. The relationship between education systems and national security is nothing new though - it extends in surprising and unexpected ways into territory which is by turns open and covert, even secret. Acknowledging the genuine political and security concerns which have drawn educational systems ever closer to the intelligence community, this book shows how and why this has happened, and explains why the relationship between education and the security and intelligence communities extends beyond contemporary concerns with counter-terrorism. As the title of this book demonstrates, this is as much an intellectual challenge as a security struggle. Education, Security and Intelligence Studies thus critically engages with multi-disciplinary perspectives on a complex and contentious interface: between systems of often secret and covert national security and intelligence and open systems of national education. Delving into difficult to access and often closely guarded aspects of public life, the book provides the pathfinding groundwork and theoretical modelling for research into a complex of little explored institutional and epistemological interconnectedness between universities and the security and intelligence agencies. This book was originally published as a special issue of the British Journal of Educational Studies.
From the author of the Pulitzer Prize-winning history The Dead Hand comes the riveting story of a spy who cracked open the Soviet military research establishment and a penetrating portrait of the CIA's Moscow station, an outpost of daring espionage in the last years of the Cold War While driving out of the American embassy in Moscow on the evening of February 16, 1978, the chief of the CIA's Moscow station heard a knock on his car window. A man on the curb handed him an envelope whose contents stunned U.S. intelligence: details of top-secret Soviet research and developments in military technology that were totally unknown to the United States. In the years that followed, the man, Adolf Tolkachev, an engineer in a Soviet military design bureau, used his high-level access to hand over tens of thousands of pages of technical secrets. His revelations allowed America to reshape its weapons systems to defeat Soviet radar on the ground and in the air, giving the United States near total superiority in the skies over Europe. One of the most valuable spies to work for the United States in the four decades of global confrontation with the Soviet Union, Tolkachev took enormous personal risks--but so did the Americans. The CIA had long struggled to recruit and run agents in Moscow, and Tolkachev was a singular breakthrough. Using spy cameras and secret codes as well as face-to-face meetings in parks and on street corners, Tolkachev and his handlers succeeded for years in eluding the feared KGB in its own backyard, until the day came when a shocking betrayal put them all at risk. Drawing on previously secret documents obtained from the CIA and on interviews with participants, David Hoffman has created an unprecedented and poignant portrait of Tolkachev, a man motivated by the depredations of the Soviet state to master the craft of spying against his own country. Stirring, unpredictable, and at times unbearably tense, The Billion Dollar Spy is a brilliant feat of reporting that unfolds like an espionage thriller.
In 1974 Frederick W. WinterbothaM's book "The Ultra Secret" disclosed the Allied success in breaking the German high command ciphers in World War II, and a new form of history began--the study of intelligence and its impact on military operations and international politics. This guide documents and annotates over 800 sources that have appeared in the past 20 years. It examines and evaluates primary and secondary sources dealing with the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also covers sources on the Sigint and cryptanalytic programs of the Axis and neutral powers. The book examines and annotates primary and secondary sources on the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also provides details on sources concerned with Sigint and cryptanalytic programs of the Axis and neutral powers.
Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.
In World War I and the Origins of U.S. Military Intelligence, military historian James L. Gilbert provides an authoritative overview of the birth of modern Army intelligence. Following the natural division of the intelligence war, which was fought on both the home front and overseas, Gilbert traces the development and use of intelligence and counterintelligence through the eyes of their principal architects: General Dennis E. Nolan and Colonel Ralph Van Deman. Gilbert explores how on the home front, US Army counterintelligence faced both internal and external threats that began with the Army's growing concerns over the loyalty of resident aliens who were being drafted into the ranks and soon evolved into the rooting out of enemy saboteurs and spies intent on doing great harm to America's war effort. To achieve their goals, counterintelligence personnel relied upon major strides in the areas of code breaking and detection of secret inks. Overseas, the intelligence effort proved far more extensive in terms of resources and missions, even reaching into nearby neutral countries. Intelligence within the American Expeditionary Forces was heavily indebted to its Allied counterparts who not only provided an organizational blueprint but also veteran instructors and equipment needed to train newly arriving intelligence specialists. Rapid advances by American intelligence were also made possible by the appointment of competent leaders and the recruitment of highly motivated and skilled personnel; likewise, the Army's decision to assign the bulk of its linguists to support intelligence proved critical. World War I would witness the linkage between intelligence and emerging technologies-from the use of cameras in aircraft to the intercept of enemy radio transmissions. Equally significant was the introduction of new intelligence disciplines-from exploitation of captured equipment to the translation of enemy documents. These and other functions that emerged from World War I would continue to the present to provide military intelligence with the essential tools necessary to support the Army and the nation. World War I and the Origins of U.S. Military Intelligence is ideal not only for students and scholars of military history and World War I, but will also appeal to any reader interested in how modern intelligence operations first evolved.
As a British Intelligence Officer during World War II, Hugh Trevor-Roper was expressly forbidden from keeping a diary due to the sensitive and confidential nature of his work. However, he confided a record of his thoughts in a series of slender notebooks inscribed OHMS (On His Majesty's Service). The Wartime Journals reveal the voice and experiences of Trevor-Roper, a war-time 'backroom boy' who spent most of the war engaged in highly-confidential intelligence work in England - including breaking the cipher code of the German secret service, the Abwehr. He became an expert in German resistance plots and after the war interrogated many of Hitler's immediate circle, investigated Hitler's death in the Berlin bunker and personally retrieved Hitler's will from its secret hiding place. The posthumous discovery of Trevor-Roper's secret journals - unknown even to his family and closest confidants - is an exciting archival find and provides an unusual and privileged view of the Allied war effort against Nazi Germany. At the same time they offer an engaging - sometimes mischievous - and reflective study of both the human comedy and personal tragedy of wartime.
For three years during World War II, future Director of Central Intelligence Allen Dulles commanded the OSS mission in Bern, Switzerland. From Hitler's Doorstep provides an annotated selection of his reports to Washington from 1942 to 1945. Dulles was a leading source of Allied intelligence on Nazi Germany and the occupied nations. The messages presented in this volume were based on information received through agents and networks operating in France, Italy, Austria, Eastern Europe, and Germany itself. They deal with subjects ranging from enemy troop strength and military plans to political developments, support of resistance movements, secret weapons, psychological warfare, and peace feelers. The Dulles reports reveal his own vision of grand strategy and presage the postwar turmoil in Europe. One of the largest collections of OSS records ever published, these telegrams and radiotelephone transmissions from the National Archives provide an exciting account of the course of the European war, offer insight on the development of American intelligence, and illuminate the origins of the Cold War. They will interest diplomatic and military historians as well as specialists on modern Europe. This volume is almost unique as document-based intelligence history and serves as a badly needed bridge between diplomatic history and intelligence studies.
This book delves into the secret histories of the CIA, the FBI, and British and Italian intelligence to study how policymakers can control intelligence agencies and when these agencies will try to remove their own government. For every government they serve, intelligence agencies are both a threat and a necessity. They often provide vital information for national security, but the secrets they possess can also be used against their own masters. This book introduces subversion paradox theory to provide a social scientific explanation of the unequal power dynamic resulting from an often fraught relationship between agencies and their 'masters'. The author also makes a case for the existence of 'deep state' conspiracies, including in highly developed democracies, and cautions those who denounce their existence that trying to control intelligence by politicizing it is likely to backfire. An important intervention in the field of intelligence studies, this book will be indispensable for intelligence professionals and policymakers in understanding and bridging the cultural divide between these two groups. It will also make for a fascinating and informative read to scholars and researchers of diplomacy, foreign policy, international relations, strategic and defence studies, security studies, political studies, policymaking and comparative politics.
This book delves into the secret histories of the CIA, the FBI, and British and Italian intelligence to study how policymakers can control intelligence agencies and when these agencies will try to remove their own government. For every government they serve, intelligence agencies are both a threat and a necessity. They often provide vital information for national security, but the secrets they possess can also be used against their own masters. This book introduces subversion paradox theory to provide a social scientific explanation of the unequal power dynamic resulting from an often fraught relationship between agencies and their 'masters'. The author also makes a case for the existence of 'deep state' conspiracies, including in highly developed democracies, and cautions those who denounce their existence that trying to control intelligence by politicizing it is likely to backfire. An important intervention in the field of intelligence studies, this book will be indispensable for intelligence professionals and policymakers in understanding and bridging the cultural divide between these two groups. It will also make for a fascinating and informative read to scholars and researchers of diplomacy, foreign policy, international relations, strategic and defence studies, security studies, political studies, policymaking and comparative politics.
During the Second World War a major part of the strategy of the Grand Alliance was shipping. The Germans fully appreciated the vulnerability of this and their attack on it, largely by means of submarines, became known as the Battle of the Atlantic. The attack was overcome, with some difficulty, by a number of means. One, which remained generally unknown until the 1970s, was the decryption of German coded signals, now usually called Ultra. Subsequent histories often tended to attribute the outcome of the Battle largely to the operation of this factor almost by itself, sometimes because of a lack of rigorous analysis and also because of a failure to set this important subject into the full and complex contexts in which it operated. This study rectifies this deficiency, setting out the full story of the series of campaigns and carefully assessing the complicated pattern of factors, thus allowing a much more balanced understanding of code-breaking. |
You may like...
Intelligence Operations - Understanding…
Erik Kleinsmith
Paperback
An Intelligence Studies Anthology…
Richard M. Denholm II
Paperback
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
Secret Soldiers of the Revolution…
Raymond W. Leonard
Hardcover
|