Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
'Never in the field of human conflict was so much owed by so many to so few.' The courageous pilots of the Royal Air Force who faced the Luftwaffe in the Battle of Britain, affectionately known as 'the Few', are rightly hailed as heroes. Recently, efforts have been made to recognise the thousands who supported RAF operations behind the scenes. And yet one group remains missing from the narrative: the Women's Auxiliary Air Force. The Women Behind the Few explores the Second World War from the perspective of the WAAFs working behind the scenes to collect and disseminate vital intelligence - intelligence that resulted in Allied victory. WAAFs worked within the Dowding System, the world's most sophisticated air defence network, as well as in the Y Service, intercepting German communications. Throughout the Blitz, they used radar to aid Fighter and Bomber Commands in protecting Britain's civilians. WAAFs also assisted with the Allied offensive bombing campaign and were behind the discovery of the terrifying German V-weapons. Their work was critical ahead of the Normandy landings and they were present in their hundreds at Bletchley Park. In this thrilling book, Sarah-Louise Miller brings the women of the force back to life, celebrating their wartime contribution to British military intelligence. Hidden behind the Few but vital to their success, WAAFs supplied the RAF with life-saving information. Here, for the first time, is their story.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
In World War I and the Origins of U.S. Military Intelligence, military historian James L. Gilbert provides an authoritative overview of the birth of modern Army intelligence. Following the natural division of the intelligence war, which was fought on both the home front and overseas, Gilbert traces the development and use of intelligence and counterintelligence through the eyes of their principal architects: General Dennis E. Nolan and Colonel Ralph Van Deman. Gilbert explores how on the home front, US Army counterintelligence faced both internal and external threats that began with the Army's growing concerns over the loyalty of resident aliens who were being drafted into the ranks and soon evolved into the rooting out of enemy saboteurs and spies intent on doing great harm to America's war effort. To achieve their goals, counterintelligence personnel relied upon major strides in the areas of code breaking and detection of secret inks. Overseas, the intelligence effort proved far more extensive in terms of resources and missions, even reaching into nearby neutral countries. Intelligence within the American Expeditionary Forces was heavily indebted to its Allied counterparts who not only provided an organizational blueprint but also veteran instructors and equipment needed to train newly arriving intelligence specialists. Rapid advances by American intelligence were also made possible by the appointment of competent leaders and the recruitment of highly motivated and skilled personnel; likewise, the Army's decision to assign the bulk of its linguists to support intelligence proved critical. World War I would witness the linkage between intelligence and emerging technologies-from the use of cameras in aircraft to the intercept of enemy radio transmissions. Equally significant was the introduction of new intelligence disciplines-from exploitation of captured equipment to the translation of enemy documents. These and other functions that emerged from World War I would continue to the present to provide military intelligence with the essential tools necessary to support the Army and the nation. World War I and the Origins of U.S. Military Intelligence is ideal not only for students and scholars of military history and World War I, but will also appeal to any reader interested in how modern intelligence operations first evolved.
A riveting introduction to the complex and evolving field of geospatial intelligence. Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT. Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.
This book is an absorbing account of secret operations and political intrigue in wartime Thailand. During World War II Free Thai organizations cooperated with Allied intelligence agencies in an effort to rescue their nation from the consequences of its 1941 alliance with Japan. They largely succeeded despite internal differences and the conflicting interests and policies of their would-be-allies, China, Great Britain and the United States. London's determination to punish Thailand placed the British Special Operations Executive (SOE) at a serious disadvantage in its rivalry with the American Office of Strategic Services (OSS). The US State Department, in contrast, strongly supported OSS operations in Thailand, viewing them as a vehicle for promoting American political and economic influence in mainland Southeast Asia. Declassification of the records of the OSS and the SOE now permits full revelation of this complex story of heroic action and political intrigue.
The United States and Mexico share a history shaped in the 19th century by numerous US forces interventions into Mexican territory and US expropriation of considerable swaths of Mexican territory. However, in spite of structural impediments and a history of resentment by Mexico of US intervention into its affairs and territory, the levels of cooperation and understanding slowly began to improve following a series of international and domestic factors. The decline of the former Soviet Union and the fall of the Berlin Wall at a global level, coupled with major political and economic challenges and reforms within Mexico are a starting point from which to assess the evolution of the bilateral defense relationship between the United States and Mexico. The American and Mexican militaries have evolved differently over the past 100 years and they each have very different responsibilities, mission sets, orientations, and capabilities. Yet in recent years, the Mexican armed forces have cooperated more closely with their US counterparts. This may be due to explicit direction coming from senior levels of the Mexican government and to operational requirements of the armed forces themselves as they seek to increase their capability and capacity to confront the growing levels in drug trafficking related violence. Today, both countries are dealing with the effects of this increased violence and insecurity in Mexico. Relying primarily on one-on-one interviews with senior practitioners and analysts on both sides of the border, the text examines the evolution of the U.S.-Mexican bilateral defense relationship to better understand how and why this unique relationship has improved, in fits and starts, over the past 25 years. It offers a new understanding of how defense policymakers from each respective country perceive the other, as well as how the lack of trust and understanding between the two neighbors has delayed greater cooperation.
The United States and Mexico share a history shaped in the 19th century by numerous US forces interventions into Mexican territory and US expropriation of considerable swaths of Mexican territory. However, in spite of structural impediments and a history of resentment by Mexico of US intervention into its affairs and territory, the levels of cooperation and understanding slowly began to improve following a series of international and domestic factors. The decline of the former Soviet Union and the fall of the Berlin Wall at a global level, coupled with major political and economic challenges and reforms within Mexico are a starting point from which to assess the evolution of the bilateral defense relationship between the United States and Mexico. The American and Mexican militaries have evolved differently over the past 100 years and they each have very different responsibilities, mission sets, orientations, and capabilities. Yet in recent years, the Mexican armed forces have cooperated more closely with their US counterparts. This may be due to explicit direction coming from senior levels of the Mexican government and to operational requirements of the armed forces themselves as they seek to increase their capability and capacity to confront the growing levels in drug trafficking related violence. Today, both countries are dealing with the effects of this increased violence and insecurity in Mexico. Relying primarily on one-on-one interviews with senior practitioners and analysts on both sides of the border, the text examines the evolution of the U.S.-Mexican bilateral defense relationship to better understand how and why this unique relationship has improved, in fits and starts, over the past 25 years. It offers a new understanding of how defense policymakers from each respective country perceive the other, as well as how the lack of trust and understanding between the two neighbors has delayed greater cooperation.
Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.
Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.
Naval intelligence is one of the most vital, and sometimes decisive, forms of intelligence. Over the centuries, and with particular velocity over recent decades, the techniques of detecting and destroying military (and commercial) shipping have improved, leapfrogging the equally frantic race to keep ahead of them and safeguard the huge investments involved. Today the new challenges range from an increasingly aggressive strategy adopted by Pyongyang's submarine fleet and the exclusion of illegal immigrants heading for Australia and southern Europe to the capture of cocaine-laded submarines in the Caribbean and the interdiction of Somali pirates off the Gulf of Aden. Any accurate assessment of the comparative threat these activities pose is just as dependent on good intelligence today as it was to Admiral Lord Nelson in the days of sail. The Historical Dictionary of Naval Intelligence relates the long and fascinating history of naval intelligence through a chronology, an introduction, a bibliography, and hundreds of cross-referenced dictionary entries on the organizations, operations, and events that made Naval intelligence what it is today.
Nicholas Eftimiades examines the infiltration of Chinese espionage agents into foreign governments and private businesses. He specifically addresses the human source in intelligence operations, and how these tactics fit into the conduct of internal and foreigh affairs in China.
Building on Goldman's Words of Intelligence and Maret's On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms pertain to federal procedures, policies, and practices involving the information life cycle, national security controls over information, and collection and analysis of intelligence information. This work is intended for intelligence students and professionals at all levels, as well as information science students dealing with such issues as the Freedom of Information Act.
During the decade that preceded Mr Gorbachev's era of glasnost and perestroika, the KGB headquarters in Moscow was putting out a constant stream of instructions to its Residencies abroad. Unknown to the KGB, however, many of these highly classified documents were being secretly copied by Oleg Gordievsky, at that time not only a high-ranking KGB officer based in London but also a long-serving undercover agent for the British. The selected documents in this volume, translated and analysed by the editors with a commentary by Christopher Andrew to set them in context, offer a revealing insight into the attitudes, prejudices and fears of the KGB during what were to prove its declining years.
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
There have been a great many books written on military intelligence and the secret services rooted in the twentieth century, however there is very little covering the activities of the men involved in the establishment of this fascinating institution. There have been a great many books written on military intelligence and the secret services rooted in the twentieth century, however there is very little covering the activities of the men involved in the establishment of this fascinating institution.
"An eye-opening account of our intelligence establishment." "An outstanding book, clearly the best recent, up-to-date survey
of the American intelligence community, ranking with the top
half-dozen ever." Recent years have seen numerous books about the looming threat posed to Western society by biological and chemical terrorism, by narcoterrorists, and by the unpredictable leaders of rogue nations. Some of these works have been alarmist. Some have been sensible and measured. But none has been by Loch Johnson. Johnson, author of the acclaimed "Secret Agencies "and "an experienced overseer of intelligence" ("Foreign Affairs"), here examines the present state and future challenges of American strategic intelligence. Written in his trademark style--dubbed "highly readable" by "Publishers Weekly"--and drawing on dozens of personal interviews and contacts, Johnson takes advantage of his insider access to explore how America today aspires to achieve nothing less than "global transparency," ferreting out information on potential dangers in every corner of the world. And yet the American security establishment, for all its formidable resources, technology, and networks, currently remains a loose federation of individual fortresses, rather than a well integrated "community" of agencies working together to provide the President with accurate information on foreign threats and opportunities. Intelligence failure, like the misidentified Chinese embassy in Belgrade accidentally bombed by a NATO pilot, is the inevitable outcome when the nation's thirteen secret agencies steadfastly resist the need for centralcoordination. Ranging widely and boldly over such controversial topics as the intelligence role of the United Nations (which Johnson believes should be expanded) and whether assassination should be a part of America's foreign policy (an option he rejects for fear that the U.S. would then be cast not only as global policeman but also as global godfather), Loch K. Johnson here maps out a critical "and" prescriptive vision of the future of American intelligence.
Intelligence is now acknowledged as the hidden dimension to international diplomacy and national security. It is the hidden piece of the jigsaw puzzle of global relations that cements relationships, undermines alliances and topples tyrants, and after many decades of being deliberately overlooked or avoided, it is now regarded as a subject of legitimate study by academics and historians. This second edition of Historical Dictionary of International Intelligence covers its history through a chronology, an introductory essay, and an extensive bibliography. The dictionary section has over 500 cross-referenced entries on espionage techniques, categories of agents, crucial operations spies, defectors, moles, double and triple agents, and the tradecraft they apply. This book is an excellent access point for students, researchers, and anyone wanting to know more about the international intelligence.
This is a study of the British military intelligence operations during the Crimean War. It details the beginnings of the intelligence operations as a result of the British Commander, Lord Raglan's, need for information on the enemy, and traces the subsequent development of the system.
Shortly after the end of the First World War, General Sir George Macdonagh, wartime director of British Military Intelligence, revealed that Lord Allenby's victory in Palestine had never been in doubt because of the success of his intelligence service. Seventy-five years later this book explains Macdonagh's statement. Sheffy also adopts a novel approach to traditional heroes of the campaign such as T E Lawrence.
Ever since the publication in 2004 of the 9/11 Commission Report, the U.S. intelligence community has been in the throes of a convulsive movement for reform. In Preventing Surprise Attacks (2005), Richard A. Posner carried the story of the reform movement up to the enactment of the Intelligence Reform and Terrorism Prevention Act of 2004, which produced a defective plan for reorganizing the intelligence system, partly as result of the failure of the 9/11 Commission and Congress to bring historical, comparative, and scholarly perspectives to bear issues. At that time, however, the new structure had not yet been built. Posner's new book brings the story up to date. He argues that the decisions about structure that the Administration has made in implementation of the Act are creating too top-heavy, too centralized, an intelligence system. The book * exposes fallacies in criticisms of the performance of the U.S. intelligence services; * analyzes structures and priorities for directing and coordinating U.S. intelligence in the era of global terrorism; * presents new evidence for the need to create a domestic intelligence agency separate from the FBI, and a detailed blueprint for such an agency; * incorporates a wealth of material based on developments since the first book, including the report of the presidential commission on weapons of mass destruction and the botched response to Hurricane Katrina; * exposes the inadequacy of the national security computer networks; * critically examines Congress's performance in the intelligence field, and raises constitutional issues concerning the respective powers of Congress and the President; * emphasizes the importance of reforms that do not require questionable organizational changes. The book is published in cooperation with the Hoover Institution
Based on OSS records only recently released to US National Archives, and on evidence from British archival sources, this is a thoroughly researched study of the Office of Strategic Services in London. The OSS was a critical liaison and operational outpost for American intelligence during World War II. Dr MacPherson puts the activities of the OSS into the larger context of the Anglo-American relationship and the various aspects of intelligence theory, while examining how a modern American intelligence capability evolved.
From the 1930s to the 1950s a large number of left-wing men and women in the USA, Britain, Europe, Australia and Canada were recruited to the Soviet intelligence services. They were amateurs and the reason for their success is intriguing. Using Soviet archives, this work explores these successes.
This book is a fascinating new examination of one of the most feared and efficient secret services the world has ever known, the Stasi. The East German Stasi was a jewel among the communist secret services, the most trusted by its Russian mother organization the KGB, and even more efficient. In its attempt at total coverage of civil society, the Ministry for State Security came close to realizing the totalitarian ideal of a political police force. Based on research in archival files unlocked just after the fall of the Berlin Wall and available to few German and Western readers, this volume details the Communist Party s attempt to control all aspects of East German civil society, and sets out what is known of the regime s support for international terrorism in the 1970s and 1980s. STASI will be of much interest to students of intelligence studies, German politics and international relations."
This volume discusses the challenges the future holds for different aspects of the intelligence process and for organisations working in the field. The main focus of Western intelligence services is no longer on the intentions and capabilities of the Soviet Union and its allies. Instead, at present, there is a plethora of threats and problems that deserve attention. Some of these problems are short-term and potentially acute, such as terrorism. Others, such as the exhaustion of natural resources, are longer-term and by nature often more difficult to foresee in their implications. This book analyses the different activities that make up the intelligence process, or the 'intelligence cycle', with a focus on changes brought about by external developments in the international arena, such as technology and security threats. Drawing together a range of key thinkers in the field, "The Future of Intelligence" examines possible scenarios for future developments, including estimations about their plausibility, and the possible consequences for the functioning of intelligence and security services. This book will be of much interest to students of intelligence studies, strategic studies, foreign policy, security studies and IR in general.
"The history of Civil War espionage is usually mentioned only in passing in general accounts of the war. Lying under a cloud of romanticism, its details have had to be ferreted out in specialized sources. For his complete account of the subject, Markle draws upon just about all the available material and summarizes it with judgment, balance, clarity, and occasional wit. Among the subtopics are technology (photography for mapmaking and Confederate use of a forerunner of microfilm), the value of women spies (less subject to suspicion, they could move with greater freedom than male spies), and the roles of blacks as spies. A good case could be made that this volume is the single most valuable contribution to general Civil War literature so far this year. "--Booklist |
You may like...
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
Secrets in a Dead Fish - The Spying Game…
Melanie King
Hardcover
(1)
The Tiger Tank and Allied Intelligence…
Bruce Oliver Newsome
Hardcover
R1,086
Discovery Miles 10 860
|