![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
This book delves into the secret histories of the CIA, the FBI, and British and Italian intelligence to study how policymakers can control intelligence agencies and when these agencies will try to remove their own government. For every government they serve, intelligence agencies are both a threat and a necessity. They often provide vital information for national security, but the secrets they possess can also be used against their own masters. This book introduces subversion paradox theory to provide a social scientific explanation of the unequal power dynamic resulting from an often fraught relationship between agencies and their 'masters'. The author also makes a case for the existence of 'deep state' conspiracies, including in highly developed democracies, and cautions those who denounce their existence that trying to control intelligence by politicizing it is likely to backfire. An important intervention in the field of intelligence studies, this book will be indispensable for intelligence professionals and policymakers in understanding and bridging the cultural divide between these two groups. It will also make for a fascinating and informative read to scholars and researchers of diplomacy, foreign policy, international relations, strategic and defence studies, security studies, political studies, policymaking and comparative politics.
In 1974 Frederick W. WinterbothaM's book "The Ultra Secret" disclosed the Allied success in breaking the German high command ciphers in World War II, and a new form of history began--the study of intelligence and its impact on military operations and international politics. This guide documents and annotates over 800 sources that have appeared in the past 20 years. It examines and evaluates primary and secondary sources dealing with the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also covers sources on the Sigint and cryptanalytic programs of the Axis and neutral powers. The book examines and annotates primary and secondary sources on the role of ULTRA and MAGIC in the Pearl Harbor attack, the battles of the Atlantic, Coral Sea, and Midway, and the campaigns in the Mediterranean, Northwest Europe, the Middle East, and the Pacific, as well as in the realm of espionage and special operations. It also provides details on sources concerned with Sigint and cryptanalytic programs of the Axis and neutral powers.
In World War I and the Origins of U.S. Military Intelligence, military historian James L. Gilbert provides an authoritative overview of the birth of modern Army intelligence. Following the natural division of the intelligence war, which was fought on both the home front and overseas, Gilbert traces the development and use of intelligence and counterintelligence through the eyes of their principal architects: General Dennis E. Nolan and Colonel Ralph Van Deman. Gilbert explores how on the home front, US Army counterintelligence faced both internal and external threats that began with the Army's growing concerns over the loyalty of resident aliens who were being drafted into the ranks and soon evolved into the rooting out of enemy saboteurs and spies intent on doing great harm to America's war effort. To achieve their goals, counterintelligence personnel relied upon major strides in the areas of code breaking and detection of secret inks. Overseas, the intelligence effort proved far more extensive in terms of resources and missions, even reaching into nearby neutral countries. Intelligence within the American Expeditionary Forces was heavily indebted to its Allied counterparts who not only provided an organizational blueprint but also veteran instructors and equipment needed to train newly arriving intelligence specialists. Rapid advances by American intelligence were also made possible by the appointment of competent leaders and the recruitment of highly motivated and skilled personnel; likewise, the Army's decision to assign the bulk of its linguists to support intelligence proved critical. World War I would witness the linkage between intelligence and emerging technologies-from the use of cameras in aircraft to the intercept of enemy radio transmissions. Equally significant was the introduction of new intelligence disciplines-from exploitation of captured equipment to the translation of enemy documents. These and other functions that emerged from World War I would continue to the present to provide military intelligence with the essential tools necessary to support the Army and the nation. World War I and the Origins of U.S. Military Intelligence is ideal not only for students and scholars of military history and World War I, but will also appeal to any reader interested in how modern intelligence operations first evolved.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
During the Second World War a major part of the strategy of the Grand Alliance was shipping. The Germans fully appreciated the vulnerability of this and their attack on it, largely by means of submarines, became known as the Battle of the Atlantic. The attack was overcome, with some difficulty, by a number of means. One, which remained generally unknown until the 1970s, was the decryption of German coded signals, now usually called Ultra. Subsequent histories often tended to attribute the outcome of the Battle largely to the operation of this factor almost by itself, sometimes because of a lack of rigorous analysis and also because of a failure to set this important subject into the full and complex contexts in which it operated. This study rectifies this deficiency, setting out the full story of the series of campaigns and carefully assessing the complicated pattern of factors, thus allowing a much more balanced understanding of code-breaking.
Naval intelligence is one of the most vital, and sometimes decisive, forms of intelligence. Over the centuries, and with particular velocity over recent decades, the techniques of detecting and destroying military (and commercial) shipping have improved, leapfrogging the equally frantic race to keep ahead of them and safeguard the huge investments involved. Today the new challenges range from an increasingly aggressive strategy adopted by Pyongyang's submarine fleet and the exclusion of illegal immigrants heading for Australia and southern Europe to the capture of cocaine-laded submarines in the Caribbean and the interdiction of Somali pirates off the Gulf of Aden. Any accurate assessment of the comparative threat these activities pose is just as dependent on good intelligence today as it was to Admiral Lord Nelson in the days of sail. The Historical Dictionary of Naval Intelligence relates the long and fascinating history of naval intelligence through a chronology, an introduction, a bibliography, and hundreds of cross-referenced dictionary entries on the organizations, operations, and events that made Naval intelligence what it is today.
It is not hyperbole to suggest that the foundations of post-cold war security in Europe have been badly damaged by the conflict in Ukraine since 2014. Russia's annexation of Crimea and intervention in eastern Ukraine appear to have created a 'simmering' conflict, which may take years to resolve and have profound consequences for the European security environment. This volume explores the various political, economic and social aspects of these profound changes and their wider significance for Europe, bringing together contributions by scholars from across the continent and in various disciplinary fields to offer an authoritative, in-depth examination of the complex causes of the Ukraine crisis and the consequences for Ukrainian statehood, Ukraine's relations with Russia, Russia's own domestic governance and Russia's relations with Europe. This book was originally published as a special issue of Europe-Asia Studies.
At the end of the Second World War, Germany lay at the mercy of its occupiers, all of whom launched programmes of scientific and technological exploitation. Each occupying nation sought to bolster their own armouries and industries with the spoils of war, and Britain was no exception. Shrouded in secrecy yet directed at the top levels of government and driven by ingenuity from across the civil service and armed forces, Britain made exploitation a key priority. By examining factories and laboratories, confiscating prototypes and blueprints, and interrogating and even recruiting German experts, Britain sought to utilise the innovations of the last war to prepare for the next. This ground-breaking book tells the full story of British exploitation for the first time, sheds new light on the legacies of the Second World War, and contributes to histories of intelligence, science, warfare and power in the midst of the twentieth century.
This research guide is an introduction to military intelligence, a neglected aspect of warfare that provides commanders and national leaders with essential information for decision making. The introduction provides the general reader with an explanation of the terminology, procedures, and institutional problems of military intelligence, while outlining the history of this field and identifying areas for further research. The core of the guide is an extensively annotated bibliography of unclassified English language materials on military intelligence, the evolution of intelligence operations, the role of intelligence in air, ground, and naval operations, and specialized fields of espionage, counter intelligence, technical intelligence, and aerial photography. This guide is intended to fill a void in the literature for soldiers, historians, and general readers.
This book describes and analyzes the history of the Mediterranean "Double-Cross System" of the Second World War, an intelligence operation run primarily by British officers which turned captured German spies into double agents. Through a complex system of coordination, they were utilized from 1941 to the end of the war in 1945 to secure Allied territory through security and counter-intelligence operations, and also to deceive the German military by passing false information about Allied military planning and operations. The primary questions addressed by the book are: how did the double-cross-system come into existence; what effects did it have on the intelligence war and the broader military conflict; and why did it have those effects? The book contains chapters assessing how the system came into being and how it was organized, and also chapters which analyze its performance in security and counter-intelligence operations, and in deception.
This powerful study makes a compelling case about the key U.S. role in state terrorism in Latin America during the Cold War. Long hidden from public view, Operation Condor was a military network created in the 1970s to eliminate political opponents of Latin American regimes. Its key members were the anticommunist dictatorships of Chile, Argentina, Uruguay, Bolivia, Paraguay, and Brazil, later joined by Peru and Ecuador, with covert support from the U.S. government. Drawing on a wealth of testimonies, declassified files, and Latin American primary sources, J. Patrice McSherry examines Operation Condor from numerous vantage points: its secret structures, intelligence networks, covert operations against dissidents, political assassinations worldwide, commanders and operatives, links to the Pentagon and the CIA, and extension to Central America in the 1980s. The author convincingly shows how, using extralegal and terrorist methods, Operation Condor hunted down, seized, and executed political opponents across borders. McSherry argues that Condor functioned within, or parallel to, the structures of the larger inter-American military system led by the United States, and that declassified U.S. documents make clear that U.S. security officers saw Condor as a legitimate and useful 'counterterror' organization. Revealing new details of Condor operations and fresh evidence of links to the U.S. security establishment, this controversial work offers an original analysis of the use of secret, parallel armies in Western counterinsurgency strategies. It will be a clarion call to all readers to consider the long-term consequences of clandestine operations in the name of 'democracy.'
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilise AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference.
Intelligence is now acknowledged as the hidden dimension to international diplomacy and national security. It is the hidden piece of the jigsaw puzzle of global relations that cements relationships, undermines alliances and topples tyrants, and after many decades of being deliberately overlooked or avoided, it is now regarded as a subject of legitimate study by academics and historians. This second edition of Historical Dictionary of International Intelligence covers its history through a chronology, an introductory essay, and an extensive bibliography. The dictionary section has over 500 cross-referenced entries on espionage techniques, categories of agents, crucial operations spies, defectors, moles, double and triple agents, and the tradecraft they apply. This book is an excellent access point for students, researchers, and anyone wanting to know more about the international intelligence.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
Drawing on oral testimony, previously unseen personal papers, and newly released archival information, this book provides a comprehensive account of British and American intelligence on the Soviet nuclear weapons program from 1945 to 1956. The book charts new territory, revising traditional accounts of Anglo-American nuclear relations and intelligence cooperation. It reveals how intelligence was collected: the roles played by defectors, aerial reconnaissance, and how novel forms of espionage were perfected to penetrate the Soviet nuclear program. It documents what conclusions were drawn from this information, and assesses the resulting estimates. Throughout the book a central theme is the Anglo-American partnership, depicting how it developed and how legal restrictions could be circumvented by cunning and guile.
This book is an absorbing account of secret operations and political intrigue in wartime Thailand. During World War II Free Thai organizations cooperated with Allied intelligence agencies in an effort to rescue their nation from the consequences of its 1941 alliance with Japan. They largely succeeded despite internal differences and the conflicting interests and policies of their would-be-allies, China, Great Britain and the United States. London's determination to punish Thailand placed the British Special Operations Executive (SOE) at a serious disadvantage in its rivalry with the American Office of Strategic Services (OSS). The US State Department, in contrast, strongly supported OSS operations in Thailand, viewing them as a vehicle for promoting American political and economic influence in mainland Southeast Asia. Declassification of the records of the OSS and the SOE now permits full revelation of this complex story of heroic action and political intrigue.
The United States and Mexico share a history shaped in the 19th century by numerous US forces interventions into Mexican territory and US expropriation of considerable swaths of Mexican territory. However, in spite of structural impediments and a history of resentment by Mexico of US intervention into its affairs and territory, the levels of cooperation and understanding slowly began to improve following a series of international and domestic factors. The decline of the former Soviet Union and the fall of the Berlin Wall at a global level, coupled with major political and economic challenges and reforms within Mexico are a starting point from which to assess the evolution of the bilateral defense relationship between the United States and Mexico. The American and Mexican militaries have evolved differently over the past 100 years and they each have very different responsibilities, mission sets, orientations, and capabilities. Yet in recent years, the Mexican armed forces have cooperated more closely with their US counterparts. This may be due to explicit direction coming from senior levels of the Mexican government and to operational requirements of the armed forces themselves as they seek to increase their capability and capacity to confront the growing levels in drug trafficking related violence. Today, both countries are dealing with the effects of this increased violence and insecurity in Mexico. Relying primarily on one-on-one interviews with senior practitioners and analysts on both sides of the border, the text examines the evolution of the U.S.-Mexican bilateral defense relationship to better understand how and why this unique relationship has improved, in fits and starts, over the past 25 years. It offers a new understanding of how defense policymakers from each respective country perceive the other, as well as how the lack of trust and understanding between the two neighbors has delayed greater cooperation.
Israel's flawed intelligence assessment in October 1973 has been studied intensively and been the subject of much public and professional debate. This book adds a unique dimension to previously disclosed material, as its author served as head of the Research Branch of Israeli Military Intelligence on the eve of and during the Yom Kippur War and as such was responsible for the national intelligence assessment at the time. Drawing on his personal records, and on interviews and extensive research conducted in the intervening decades, Aryeh Shalev examines the preconceptions and common beliefs that prevailed among Israeli intelligence officials and ultimately contributed to their flawed assessment: the excessive self-confidence in Israel's prowess, particularly in the aftermath of the Six Day War; the confidence that any surprise attack could be repelled with the regular army until the reserves were mobilised; the accepted profile of Sadat as a weak leader with limited powers and initiative; and the belief in Israel's correct understanding of Egyptian and Syrian operational plans . . . Beyond explaining where Israeli intelligence erred, the book probes expectations of military intelligence in general and the relationship between military and political assessments. It considers what kind of assessment an intelligence branch is capable of producing with a great degree of certainty, and conversely, what kind of assessment it should not be asked to produce. Based on the intelligence failure of the Yom Kippur War, this book also reviews possible organisational changes and methodological improvements to guard as much as possible against surprise attacks in the future, relevant not only to Israel's circumstances but to all countries with enemies capable of launching an attack. Published in association with the Institute for National Strategic Studies.
During the decade that preceded Mr Gorbachev's era of glasnost and perestroika, the KGB headquarters in Moscow was putting out a constant stream of instructions to its Residencies abroad. Unknown to the KGB, however, many of these highly classified documents were being secretly copied by Oleg Gordievsky, at that time not only a high-ranking KGB officer based in London but also a long-serving undercover agent for the British. The selected documents in this volume, translated and analysed by the editors with a commentary by Christopher Andrew to set them in context, offer a revealing insight into the attitudes, prejudices and fears of the KGB during what were to prove its declining years.
The United States and Mexico share a history shaped in the 19th century by numerous US forces interventions into Mexican territory and US expropriation of considerable swaths of Mexican territory. However, in spite of structural impediments and a history of resentment by Mexico of US intervention into its affairs and territory, the levels of cooperation and understanding slowly began to improve following a series of international and domestic factors. The decline of the former Soviet Union and the fall of the Berlin Wall at a global level, coupled with major political and economic challenges and reforms within Mexico are a starting point from which to assess the evolution of the bilateral defense relationship between the United States and Mexico. The American and Mexican militaries have evolved differently over the past 100 years and they each have very different responsibilities, mission sets, orientations, and capabilities. Yet in recent years, the Mexican armed forces have cooperated more closely with their US counterparts. This may be due to explicit direction coming from senior levels of the Mexican government and to operational requirements of the armed forces themselves as they seek to increase their capability and capacity to confront the growing levels in drug trafficking related violence. Today, both countries are dealing with the effects of this increased violence and insecurity in Mexico. Relying primarily on one-on-one interviews with senior practitioners and analysts on both sides of the border, the text examines the evolution of the U.S.-Mexican bilateral defense relationship to better understand how and why this unique relationship has improved, in fits and starts, over the past 25 years. It offers a new understanding of how defense policymakers from each respective country perceive the other, as well as how the lack of trust and understanding between the two neighbors has delayed greater cooperation.
"An eye-opening account of our intelligence establishment." "An outstanding book, clearly the best recent, up-to-date survey
of the American intelligence community, ranking with the top
half-dozen ever." Recent years have seen numerous books about the looming threat posed to Western society by biological and chemical terrorism, by narcoterrorists, and by the unpredictable leaders of rogue nations. Some of these works have been alarmist. Some have been sensible and measured. But none has been by Loch Johnson. Johnson, author of the acclaimed "Secret Agencies "and "an experienced overseer of intelligence" ("Foreign Affairs"), here examines the present state and future challenges of American strategic intelligence. Written in his trademark style--dubbed "highly readable" by "Publishers Weekly"--and drawing on dozens of personal interviews and contacts, Johnson takes advantage of his insider access to explore how America today aspires to achieve nothing less than "global transparency," ferreting out information on potential dangers in every corner of the world. And yet the American security establishment, for all its formidable resources, technology, and networks, currently remains a loose federation of individual fortresses, rather than a well integrated "community" of agencies working together to provide the President with accurate information on foreign threats and opportunities. Intelligence failure, like the misidentified Chinese embassy in Belgrade accidentally bombed by a NATO pilot, is the inevitable outcome when the nation's thirteen secret agencies steadfastly resist the need for centralcoordination. Ranging widely and boldly over such controversial topics as the intelligence role of the United Nations (which Johnson believes should be expanded) and whether assassination should be a part of America's foreign policy (an option he rejects for fear that the U.S. would then be cast not only as global policeman but also as global godfather), Loch K. Johnson here maps out a critical "and" prescriptive vision of the future of American intelligence.
This is a study of the British military intelligence operations during the Crimean War. It details the beginnings of the intelligence operations as a result of the British Commander, Lord Raglan's, need for information on the enemy, and traces the subsequent development of the system.
Shortly after the end of the First World War, General Sir George Macdonagh, wartime director of British Military Intelligence, revealed that Lord Allenby's victory in Palestine had never been in doubt because of the success of his intelligence service. Seventy-five years later this book explains Macdonagh's statement. Sheffy also adopts a novel approach to traditional heroes of the campaign such as T E Lawrence.
Like No Other Soldier continues the true story told in Fishers of Men of Rob Lewis’s life after he leaves the Force Research Unit (FRU). Staying on in Northern Ireland as a civilian after years of working on undercover missions against terrorists, Rob eventually gains employment in Bristol, undertaking security work, but things don’t work out and Rob ends up living in a squat. After a job offer from an old colleague, Rob heads to London to work in close-protection security for some of Hollywood’s royalty - Tom Cruise, Liam Neeson, Nicole Kidman and Mel Gibson among them - and later becomes involved in the rescue of some very well-connected people from a dangerous religious cult. Rob’s life seems to be getting back on track. But Rob’s work soon becomes more covert, and he ends up being on the wrong side of a police armed response unit whilst undertaking surveillance tasks, and is later arrested as a suspect when the ‘Stevens Enquiry’ building in Belfast - where detectives investigating the alleged collusion between his old unit and Loyalist paramilitaries are based - is set on fire. As Rob becomes involved in ever more shadowy surveillance and private security operations, he attracts further unwanted police attention, this time from the Serious Organised Crime Agency, and he is charged with fraud, found guilty and sentenced to prison at HMP Wandsworth. Can Rob prove his innocence and reclaim his life?
From the 1930s to the 1950s a large number of left-wing men and women in the USA, Britain, Europe, Australia and Canada were recruited to the Soviet intelligence services. They were amateurs and the reason for their success is intriguing. Using Soviet archives, this work explores these successes. |
![]() ![]() You may like...
|