![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
This book sheds new light on the origins and nature of modern military thinking. The ideas of Carl von Clausewitz (1780-1831) - which remain at the heart of strategic analysis today - have hitherto been examined largely in isolation from their cultural and philosophical roots in the eighteenth and early nineteenth centuries. Azar Gat now demonstrates the extent to which culture affects military theory. Dr Gat relates a series of military thinkers to their cultural background, demonstrating how the major currents of modern military thought have evolved from the world-view of the Enlightenment on the one hand and Romanticism on the other. Tracing the development of Clausewitz's ideas, he provides a provocative critique of Clausewitz's classic work, On War. In the process, he offers an illuminating insight into a great period of European culture and into warfare in the age of Napoleon.
The United Arab Emirates (UAE) has elaborated its own philosophy of security. Driven by emergencies and increasing risks, both in the region and globally, Emirati authorities have developed a sense of anticipation as well as an agility to react promptly to new threats through the ability to assess the risks in any given situation. War and the avatars of conflict are a constant reality in the Middle East. Transnational threats, including the regional context, the war in Yemen, insecurity in the Levant and tensions with Iran affect the overall stability of the Peninsula and consequently that of the UAE. Owing to the inclusion of the UAE in the networks of globalization, non-traditional security issues are not relegated to the background. Issues such as COVID-19, immigration, cybersecurity and human trafficking need to be addressed domestically as well as globally. This volume offers a comprehensive and multifaceted examination of the traditional and non-traditional security measures present in the UAE that allow the country to remain politically stable in an otherwise volatile region, and aims to offer a comprehensive overview of all forms of security in the UAE.
'Soft' Counterinsurgency reviews the promise and actual achievement of Human Terrain Teams, the small groups of social scientists that were eventually embedded in every combat brigade in Iraq and Afghanistan. The book, based on interviews with both HTT personnel and their military commanders, examines the military's need for sociocultural information, the ethical issues surrounding research carried out in combat zones, and the tensions between military and social science organizational cultures. The account provides a close, detailed account of HTT activities, a critical reflection on the possibilities of creating a 'softer, ' less violent counterinsurgency, and the difficulty of attempting to make war more 'intelligent' and discriminating.
Israel's flawed intelligence assessment in October 1973 has been studied intensively and been the subject of much public and professional debate. This book adds a unique dimension to previously disclosed material, as its author served as head of the Research Branch of Israeli Military Intelligence on the eve of and during the Yom Kippur War and as such was responsible for the national intelligence assessment at the time. Drawing on his personal records, and on interviews and extensive research conducted in the intervening decades, Aryeh Shalev examines the preconceptions and common beliefs that prevailed among Israeli intelligence officials and ultimately contributed to their flawed assessment: the excessive self-confidence in Israel's prowess, particularly in the aftermath of the Six Day War; the confidence that any surprise attack could be repelled with the regular army until the reserves were mobilised; the accepted profile of Sadat as a weak leader with limited powers and initiative; and the belief in Israel's correct understanding of Egyptian and Syrian operational plans . . . Beyond explaining where Israeli intelligence erred, the book probes expectations of military intelligence in general and the relationship between military and political assessments. It considers what kind of assessment an intelligence branch is capable of producing with a great degree of certainty, and conversely, what kind of assessment it should not be asked to produce. Based on the intelligence failure of the Yom Kippur War, this book also reviews possible organisational changes and methodological improvements to guard as much as possible against surprise attacks in the future, relevant not only to Israel's circumstances but to all countries with enemies capable of launching an attack. Published in association with the Institute for National Strategic Studies.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
Students and enthusiasts of American history are familiar with the Revolutionary War spies Nathan Hale and Benedict Arnold, but few studies have closely examined the wider intelligence efforts that enabled the colonies to gain their independence. Spies, Patriots, and Traitors provides readers with a fascinating, well-documented, and highly readable account of American intelligence activities during the era of the Revolutionary War, from 1765 to 1783, while describing the intelligence sources and methods used and how our Founding Fathers learned and practiced their intelligence role. The author, a retired CIA officer, provides insights into these events from an intelligence professional's perspective, highlighting the tradecraft of intelligence collection, counterintelligence, and covert actions and relating how many of the principles of the era's intelligence practice are still relevant today. Kenneth A. Daigler reveals the intelligence activities of famous personalities such as Samuel Adams, George Washington, Benjamin Franklin, Nathan Hale, John Jay, and Benedict Arnold, as well as many less well-known figures. He examines the important role of intelligence in key theaters of military operations, such as Massachusetts, New York, New Jersey, Pennsylvania, and in General Nathanael Greene's campaign in South Carolina; the role of African Americans in the era's intelligence activities; undertakings of networks such as the Culper Ring; and intelligence efforts and paramilitary actions conducted abroad. Spies, Patriots, and Traitors adds a new dimension to our understanding of the American Revolution. The book's scrutiny of the tradecraft and management of Revolutionary War intelligence activities will be of interest to students, scholars, intelligence professionals, and anyone who wants to learn more about this fascinating era of American history.
The emergence of COVID-19 has raised urgent and important questions about the role of Canadian intelligence and national security within a global health crisis. Some argue that the effects of COVID-19 on Canada represent an intelligence failure, or a failure of early warning. Others argue that the role of intelligence and national security in matters of health is-and should-remain limited. At the same time, traditional security threats have rapidly evolved, themselves impacted and influenced by the global pandemic.Stress Tested brings together leading experts to examine the role of Canada's national security and intelligence community in anticipating, responding to, and managing a global public welfare emergency. This interdisciplinary collection offers a clear-eyed view of successes, failures, and lessons learned in Canada's pandemic response. Addressing topics including supply chain disruptions, infrastructure security, the ethics of surveillance within the context of pandemic response, the threats and potential threats of digital misinformation and fringe beliefs, and the challenges of maintaining security and intelligence operations during an ongoing pandemic, Stress Tested is essential reading for anyone interested in the lasting impacts of the COVID-19 pandemic.
This book, first published in 1985, is an in-depth analysis of the Luftwaffe in the Second World War, using previously untapped German archives and newly-released 'Ultra' intelligence records. It looks at the Luftwaffe within the context of the overall political decision-making process within the Third Reich. It is especially valuable for its careful study of industrial production and pilot losses in the conduct of operations.
This book provides an institutional costs framework for intelligence and security communities to examine the factors that can encourage or obstruct cooperation. The governmental functions of security and intelligence require various organisations to interact in a symbiotic way. These organisations must constantly negotiate with each other to establish who should address which issue and with what resources. By coupling adapted versions of transaction costs theories with socio-political perspectives, this book provides a model to explain why some cooperative endeavours are successful, whilst others fail. This framework is applied to counterterrorism and defence intelligence in the UK and the US to demonstrate that the view of good cooperation in the former and poor cooperation in the latter is overly simplistic. Neither is necessarily more disposed to behave cooperatively than the other; rather, the institutional costs created by their respective organisational architectures incentivise different cooperative behaviour in different circumstances. This book will be of much interest to students of intelligence studies, organisational studies, politics and security studies.
This book examines intelligence analysis in the digital age and demonstrates how intelligence has entered a new era. While intelligence is an ancient activity, the digital age is a relatively new phenomenon. This volume uses the concept of the "digital age" to highlight the increased change, complexity, and pace of information that is now circulated, as new technology has reduced the time it takes to spread news to almost nothing. These factors mean that decision-makers face an increasingly challenging threat environment, which in turn increases the demand for timely, relevant, and reliable intelligence to support policymaking. In this context, the book demonstrates that intelligence places greater demands on analysis work, as the traditional intelligence cycle is no longer adequate as a process description. In the digital age, it is not enough to accumulate as much information as possible to gain a better understanding of the world. To meet customers' needs, the intelligence process must be centred around the analysis work - which in turn has increased the demand for analysts. Assessments, not least predictions, are now just as important as revealing someone else's secrets. This volume will be of much interest to students of intelligence studies, security studies, and international relations.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
With intensified threats to global security from international terrorism worldwide, education systems themselves face these same unprecedented security threats. Schools and universities have become marked loci of interest for the monitoring of extremism and counter-terrorism by security and intelligence agencies. The relationship between education systems and national security is nothing new though - it extends in surprising and unexpected ways into territory which is by turns open and covert, even secret. Acknowledging the genuine political and security concerns which have drawn educational systems ever closer to the intelligence community, this book shows how and why this has happened, and explains why the relationship between education and the security and intelligence communities extends beyond contemporary concerns with counter-terrorism. As the title of this book demonstrates, this is as much an intellectual challenge as a security struggle. Education, Security and Intelligence Studies thus critically engages with multi-disciplinary perspectives on a complex and contentious interface: between systems of often secret and covert national security and intelligence and open systems of national education. Delving into difficult to access and often closely guarded aspects of public life, the book provides the pathfinding groundwork and theoretical modelling for research into a complex of little explored institutional and epistemological interconnectedness between universities and the security and intelligence agencies. This book was originally published as a special issue of the British Journal of Educational Studies.
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
Words of Intelligence: An Intelligence Professional's Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels. The intelligence community has undergone massive changes since it developed after World War II. Intelligence work now involves several different processes, including the planning, collection, analysis, and production of information. It also requires extensive expertise in its terminology. And in the post-9/11 era, the intelligence community has expanded, requiring the transmission of information to state and local public administrators, health officials, and transportation planners in times of a possible domestic attack. The number of people who need to know the specialized terminology of the intelligence community continues to grow. This dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues from both a foreign intelligence perspective and a local perspective for law enforcement officials. The number of terms, abbreviations, and acronyms has more than doubled for this new edition, and it includes a topical index and extensively cross-referenced entries. This book explains terms that relate to intelligence operations, intelligence strategies, security classifications, obscure names of intelligence boards and organizations, and methodologies used to produce intelligence analysis. Both entry-level and experienced intelligence professionals in the domestic and foreign intelligence communities find this book useful. This book is more than just a reference book; it is a book to read and enjoy, and from which to learn the art and science of intelligence analysis.
Despite publicity given to the successes of British and American codebreakers during the Second World War, the study of signals intelligence is still complicated by governmental secrecy over even the most elderly peacetime sigint. This book, first published in 1986, lifts the veil on some of these historical secrets. Christopher Andrew and Keith Neilson cast new light on how Tsarist codebreakers penetrated British code and cypher systems. John Chapman's study of German military codebreaking represents a major advance in our understanding of cryptanalysis during the Weimar Republic. The history of the Government Code and Cypher School - forerunner of today's GCHQ - by its operational head, the late A.G. Denniston, provides both a general assessment of the achievements of British cryptanalysis between the wars and a tantalising glimpse of what historians may one day find in GCHQ's forbidden archives. The distinguished cryptanalyst of Bletchley Park, the late Gordon Welchman, describes in detail how the Ultra programme defeated the German Enigma machine, while another Bletchley Park cryptographer, Christopher Morris, reminds us in his account of the valuable work on hand cyphers that wartime sigint consisted of much more than Ultra. Roger Austin's study of surveillance under the Vichy regime shows the continuing importance of older and simpler methods of message interception such as letter-opening. Taken together, the articles establish sigint as an essential field of study for both the modern historian and the political scientist.
Did President Roosevelt and other high-ranking U.S. government officials know about Japanese plans to attack Pearl Harbor in advance, and fail to warn U.S. Navy leadership in Hawaii? Drawing on recently declassified materials and revelations from other writers, this book traces the flow of intelligence and concludes the imminent attack was known about and was allowed to happen to win the support of the American public in a war against Japan. An epilogue describes the fate of Commander-in-Chief of the U.S. Pacific Fleet Admiral Husband E. Kimmel, the intelligence he received from Washington before the attack, and the intelligence he did not.
Published for the first time, the history of the CIA's clandestine short-wave radio broadcasts to Eastern Europe and the USSR during the early Cold War is covered in-depth. Chapters describe the "gray" broadcasting of Radio Free Europe and Radio Liberty in Munich; clandestine or "black" radio broadcasts from Radio Nacional de Espana in Madrid to Estonia, Latvia, Lithuania and Ukraine; transmissions to Bulgaria, Romania, Albania, Ukraine and the USSR from a secret site near Athens; and broadcasts to Byelorussia and Slovakia. Infiltrated behind the Iron Curtain through dangerous air drops and boat landings, CIA and other intelligence service agents faced counterespionage, kidnapping, assassination, arrest and imprisonment. Excerpts from broadcasts taken from monitoring reports of Eastern Europe intelligence agencies are included.
A Sunday Times and FT Book of the Year When a rising power threatens to displace a ruling one, the most likely outcome is war. In this razor-sharp analysis, Harvard scholar Graham Allison examines the phenomenon known as Thucydides’s Trap, which is currently playing out between the world’s two biggest superpowers: the US and China. Through uncanny historical parallels, Destined for War shows how close we are to the unthinkable. Yet, stressing that war is not inevitable, Allison also reveals how clashing powers have kept the peace in the past ― and what painful steps international leaders can and must take to avoid disaster.
Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.
In 1974 Frederick W. WinterbothaM's book "The Ultra Secret" disclosed the Allied success in breaking the German high command ciphers in World War II, and a new form of history began--the study of intelligence and its impact on military operations and international politics. This guide documents and annotates over 800 sources that have appeared in the past 20 years. It examines and evaluates primary and secondary sources dealing with the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also covers sources on the Sigint and cryptanalytic programs of the Axis and neutral powers. The book examines and annotates primary and secondary sources on the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also provides details on sources concerned with Sigint and cryptanalytic programs of the Axis and neutral powers.
Intelligence Operations: Understanding Data, Tools, People, and Processes helps readers understand the various issues and considerations an intelligence professional must tackle when reviewing, planning, and managing intelligence operations, regardless of level or environment. The book opens by introducing the reader to the many defining concepts associated with intelligence, as well as the main subject of intelligence: the threat. Additional chapters examine the community of intelligence, revealing where intelligence is actually practiced, as well as what defines and characterizes intelligence operations. Readers learn about the four critical components to every intelligence operation-data, tools, people, and processes-and then explore the various operational and analytic processes involved in greater detail. Throughout, the text encourages discovery and discussion, urging readers to first understand the material, then break it down, adapt it, and apply it in a way that supports their particular operations or requirements. Unique in approach and designed to assist professionals at all levels, Intelligence Operations is an excellent resource for both academic courses in the subject and practical application by intelligence personnel.
The Routledge Handbook on Israeli Security provides an authoritative survey of both the historical roots of Israel's national security concerns and their principal contemporary expressions. Following an introduction setting out its central themes, the Handbook comprises 27 independent chapters, all written by experts in their fields, several of whom possess first-hand diplomatic and/or military experience at senior levels. An especially noteworthy feature of this volume is the space allotted to analyses of the impact of security challenges not just on Israel's diplomatic and military postures (nuclear as well as conventional) but also on its cultural life and societal behavior. Specifically, it aims to fulfill three principal needs. The first is to illustrate the dynamic nature of Israel's security concerns and the ways in which they have evolved in response to changes in the country's diplomatic and geo-strategic environment, changes that have been further fueled by technological, economic and demographic transformations; Second, the book aims to examine how the evolving character of Israel's security challenges has generated multiple - and sometimes conflicting - interpretations of the very concept of "security", resulting in a series of dialogues both within Israeli society and between Israelis and their friends and allies abroad; Finally, it also discusses how areas of private and public life elsewhere considered inherently "civilian" and unrelated to security, such as artistic and cultural institutions, nevertheless do mirror the broader legal, economic and cultural consequences of this Israeli preoccupation with national security. This comprehensive and up-to-date collection of studies provides an authoritative and interdisciplinary guide to both the dynamism of Israel's security dilemmas and to their multiple impacts on Israeli society. In addition to its insights and appeal for all people and countries forced to address the security issue in today's world, this Handbook is a valuable resource for upper-level undergraduates and researchers with an interest in the Middle East and Israeli politics, international relations and security studies.
In World War I and the Origins of U.S. Military Intelligence, military historian James L. Gilbert provides an authoritative overview of the birth of modern Army intelligence. Following the natural division of the intelligence war, which was fought on both the home front and overseas, Gilbert traces the development and use of intelligence and counterintelligence through the eyes of their principal architects: General Dennis E. Nolan and Colonel Ralph Van Deman. Gilbert explores how on the home front, US Army counterintelligence faced both internal and external threats that began with the Army's growing concerns over the loyalty of resident aliens who were being drafted into the ranks and soon evolved into the rooting out of enemy saboteurs and spies intent on doing great harm to America's war effort. To achieve their goals, counterintelligence personnel relied upon major strides in the areas of code breaking and detection of secret inks. Overseas, the intelligence effort proved far more extensive in terms of resources and missions, even reaching into nearby neutral countries. Intelligence within the American Expeditionary Forces was heavily indebted to its Allied counterparts who not only provided an organizational blueprint but also veteran instructors and equipment needed to train newly arriving intelligence specialists. Rapid advances by American intelligence were also made possible by the appointment of competent leaders and the recruitment of highly motivated and skilled personnel; likewise, the Army's decision to assign the bulk of its linguists to support intelligence proved critical. World War I would witness the linkage between intelligence and emerging technologies-from the use of cameras in aircraft to the intercept of enemy radio transmissions. Equally significant was the introduction of new intelligence disciplines-from exploitation of captured equipment to the translation of enemy documents. These and other functions that emerged from World War I would continue to the present to provide military intelligence with the essential tools necessary to support the Army and the nation. World War I and the Origins of U.S. Military Intelligence is ideal not only for students and scholars of military history and World War I, but will also appeal to any reader interested in how modern intelligence operations first evolved.
Bletchley Park was where one of the war's most famous - and crucial - achievements was made: the cracking of Germany's "Enigma" code in which its most important military communications were couched. This country house in the Buckinghamshire countryside was home to Britain's most brilliant mathematical brains, like Alan Turing, and the scene of immense advances in technology - indeed, the birth of modern computing. The military codes deciphered there were instrumental in turning both the Battle of the Atlantic and the war in North Africa. But, though plenty has been written about the boffins, and the codebreaking, fictional and non-fiction - from Robert Harris and Ian McEwan to Andrew Hodges' biography of Turing - what of the thousands of men and women who lived and worked there during the war? What was life like for them - an odd, secret territory between the civilian and the military? Sinclair McKay's book is the first history for the general reader of life at Bletchley Park, and an amazing compendium of memories from people now in their eighties - of skating on the frozen lake in the grounds (a depressed Angus Wilson, the novelist, once threw himself in) - of a youthful Roy Jenkins, useless at codebreaking, of the high jinks at nearby accommodation hostels - and of the implacable secrecy that meant girlfriend and boyfriend working in adjacent huts knew nothing about each other's work. |
You may like...
|