![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Bletchley Park was where one of the war's most famous - and crucial - achievements was made: the cracking of Germany's "Enigma" code in which its most important military communications were couched. This country house in the Buckinghamshire countryside was home to Britain's most brilliant mathematical brains, like Alan Turing, and the scene of immense advances in technology - indeed, the birth of modern computing. The military codes deciphered there were instrumental in turning both the Battle of the Atlantic and the war in North Africa. But, though plenty has been written about the boffins, and the codebreaking, fictional and non-fiction - from Robert Harris and Ian McEwan to Andrew Hodges' biography of Turing - what of the thousands of men and women who lived and worked there during the war? What was life like for them - an odd, secret territory between the civilian and the military? Sinclair McKay's book is the first history for the general reader of life at Bletchley Park, and an amazing compendium of memories from people now in their eighties - of skating on the frozen lake in the grounds (a depressed Angus Wilson, the novelist, once threw himself in) - of a youthful Roy Jenkins, useless at codebreaking, of the high jinks at nearby accommodation hostels - and of the implacable secrecy that meant girlfriend and boyfriend working in adjacent huts knew nothing about each other's work.
In World War I and the Origins of U.S. Military Intelligence, military historian James L. Gilbert provides an authoritative overview of the birth of modern Army intelligence. Following the natural division of the intelligence war, which was fought on both the home front and overseas, Gilbert traces the development and use of intelligence and counterintelligence through the eyes of their principal architects: General Dennis E. Nolan and Colonel Ralph Van Deman. Gilbert explores how on the home front, US Army counterintelligence faced both internal and external threats that began with the Army's growing concerns over the loyalty of resident aliens who were being drafted into the ranks and soon evolved into the rooting out of enemy saboteurs and spies intent on doing great harm to America's war effort. To achieve their goals, counterintelligence personnel relied upon major strides in the areas of code breaking and detection of secret inks. Overseas, the intelligence effort proved far more extensive in terms of resources and missions, even reaching into nearby neutral countries. Intelligence within the American Expeditionary Forces was heavily indebted to its Allied counterparts who not only provided an organizational blueprint but also veteran instructors and equipment needed to train newly arriving intelligence specialists. Rapid advances by American intelligence were also made possible by the appointment of competent leaders and the recruitment of highly motivated and skilled personnel; likewise, the Army's decision to assign the bulk of its linguists to support intelligence proved critical. World War I would witness the linkage between intelligence and emerging technologies-from the use of cameras in aircraft to the intercept of enemy radio transmissions. Equally significant was the introduction of new intelligence disciplines-from exploitation of captured equipment to the translation of enemy documents. These and other functions that emerged from World War I would continue to the present to provide military intelligence with the essential tools necessary to support the Army and the nation. World War I and the Origins of U.S. Military Intelligence is ideal not only for students and scholars of military history and World War I, but will also appeal to any reader interested in how modern intelligence operations first evolved.
This book delves into the secret histories of the CIA, the FBI, and British and Italian intelligence to study how policymakers can control intelligence agencies and when these agencies will try to remove their own government. For every government they serve, intelligence agencies are both a threat and a necessity. They often provide vital information for national security, but the secrets they possess can also be used against their own masters. This book introduces subversion paradox theory to provide a social scientific explanation of the unequal power dynamic resulting from an often fraught relationship between agencies and their 'masters'. The author also makes a case for the existence of 'deep state' conspiracies, including in highly developed democracies, and cautions those who denounce their existence that trying to control intelligence by politicizing it is likely to backfire. An important intervention in the field of intelligence studies, this book will be indispensable for intelligence professionals and policymakers in understanding and bridging the cultural divide between these two groups. It will also make for a fascinating and informative read to scholars and researchers of diplomacy, foreign policy, international relations, strategic and defence studies, security studies, political studies, policymaking and comparative politics.
This book delves into the secret histories of the CIA, the FBI, and British and Italian intelligence to study how policymakers can control intelligence agencies and when these agencies will try to remove their own government. For every government they serve, intelligence agencies are both a threat and a necessity. They often provide vital information for national security, but the secrets they possess can also be used against their own masters. This book introduces subversion paradox theory to provide a social scientific explanation of the unequal power dynamic resulting from an often fraught relationship between agencies and their 'masters'. The author also makes a case for the existence of 'deep state' conspiracies, including in highly developed democracies, and cautions those who denounce their existence that trying to control intelligence by politicizing it is likely to backfire. An important intervention in the field of intelligence studies, this book will be indispensable for intelligence professionals and policymakers in understanding and bridging the cultural divide between these two groups. It will also make for a fascinating and informative read to scholars and researchers of diplomacy, foreign policy, international relations, strategic and defence studies, security studies, political studies, policymaking and comparative politics.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
During the Second World War a major part of the strategy of the Grand Alliance was shipping. The Germans fully appreciated the vulnerability of this and their attack on it, largely by means of submarines, became known as the Battle of the Atlantic. The attack was overcome, with some difficulty, by a number of means. One, which remained generally unknown until the 1970s, was the decryption of German coded signals, now usually called Ultra. Subsequent histories often tended to attribute the outcome of the Battle largely to the operation of this factor almost by itself, sometimes because of a lack of rigorous analysis and also because of a failure to set this important subject into the full and complex contexts in which it operated. This study rectifies this deficiency, setting out the full story of the series of campaigns and carefully assessing the complicated pattern of factors, thus allowing a much more balanced understanding of code-breaking.
This volume gathers 19 papers first presented at the 5th International Symposium of the ICA Commission on the History of Cartography, which took place at the University of Ghent, Belgium on 2-5 December 2014. The overall conference theme was 'Cartography in Times of War and Peace', but preference was given to papers dealing with the military cartography of the First World War (1914-1918). The papers are classified by period and regional sub-theme, i.e. Military Cartography from the 18th to the 20th century; WW I Cartography in Belgium, Central Europe, etc.
Based on OSS records only recently released to US National Archives, and on evidence from British archival sources, this is a thoroughly researched study of the Office of Strategic Services in London. The OSS was a critical liaison and operational outpost for American intelligence during World War II. Dr MacPherson puts the activities of the OSS into the larger context of the Anglo-American relationship and the various aspects of intelligence theory, while examining how a modern American intelligence capability evolved.
Naval intelligence is one of the most vital, and sometimes decisive, forms of intelligence. Over the centuries, and with particular velocity over recent decades, the techniques of detecting and destroying military (and commercial) shipping have improved, leapfrogging the equally frantic race to keep ahead of them and safeguard the huge investments involved. Today the new challenges range from an increasingly aggressive strategy adopted by Pyongyang's submarine fleet and the exclusion of illegal immigrants heading for Australia and southern Europe to the capture of cocaine-laded submarines in the Caribbean and the interdiction of Somali pirates off the Gulf of Aden. Any accurate assessment of the comparative threat these activities pose is just as dependent on good intelligence today as it was to Admiral Lord Nelson in the days of sail. The Historical Dictionary of Naval Intelligence relates the long and fascinating history of naval intelligence through a chronology, an introduction, a bibliography, and hundreds of cross-referenced dictionary entries on the organizations, operations, and events that made Naval intelligence what it is today.
Startling new revelations about collaboration between the Allies and the German Secret Service. Based on extensive primary source research, John Bryden's Fighting to Lose presents compelling evidence that the German intelligence service - the Abwehr - undertook to rescue Britain from certain defeat in 1941. Recently opened secret intelligence files indicate that the famed British double-cross or double-agent system was in fact a German triple-cross system. These files also reveal that British intelligence secretly appealed to the Abwehr for help during the war, and that the Abwehr's chief, Admiral Canaris, responded by providing Churchill with the ammunition needed in order to persuade Roosevelt to lure the Japanese into attacking Pearl Harbor. These findings and others like them make John Bryden's Fighting to Lose one of the most fascinating books about World War II to be published for many years.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
This research guide is an introduction to military intelligence, a neglected aspect of warfare that provides commanders and national leaders with essential information for decision making. The introduction provides the general reader with an explanation of the terminology, procedures, and institutional problems of military intelligence, while outlining the history of this field and identifying areas for further research. The core of the guide is an extensively annotated bibliography of unclassified English language materials on military intelligence, the evolution of intelligence operations, the role of intelligence in air, ground, and naval operations, and specialized fields of espionage, counter intelligence, technical intelligence, and aerial photography. This guide is intended to fill a void in the literature for soldiers, historians, and general readers.
It is not hyperbole to suggest that the foundations of post-cold war security in Europe have been badly damaged by the conflict in Ukraine since 2014. Russia's annexation of Crimea and intervention in eastern Ukraine appear to have created a 'simmering' conflict, which may take years to resolve and have profound consequences for the European security environment. This volume explores the various political, economic and social aspects of these profound changes and their wider significance for Europe, bringing together contributions by scholars from across the continent and in various disciplinary fields to offer an authoritative, in-depth examination of the complex causes of the Ukraine crisis and the consequences for Ukrainian statehood, Ukraine's relations with Russia, Russia's own domestic governance and Russia's relations with Europe. This book was originally published as a special issue of Europe-Asia Studies.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
This book describes and analyzes the history of the Mediterranean "Double-Cross System" of the Second World War, an intelligence operation run primarily by British officers which turned captured German spies into double agents. Through a complex system of coordination, they were utilized from 1941 to the end of the war in 1945 to secure Allied territory through security and counter-intelligence operations, and also to deceive the German military by passing false information about Allied military planning and operations. The primary questions addressed by the book are: how did the double-cross-system come into existence; what effects did it have on the intelligence war and the broader military conflict; and why did it have those effects? The book contains chapters assessing how the system came into being and how it was organized, and also chapters which analyze its performance in security and counter-intelligence operations, and in deception.
At the end of the Second World War, Germany lay at the mercy of its occupiers, all of whom launched programmes of scientific and technological exploitation. Each occupying nation sought to bolster their own armouries and industries with the spoils of war, and Britain was no exception. Shrouded in secrecy yet directed at the top levels of government and driven by ingenuity from across the civil service and armed forces, Britain made exploitation a key priority. By examining factories and laboratories, confiscating prototypes and blueprints, and interrogating and even recruiting German experts, Britain sought to utilise the innovations of the last war to prepare for the next. This ground-breaking book tells the full story of British exploitation for the first time, sheds new light on the legacies of the Second World War, and contributes to histories of intelligence, science, warfare and power in the midst of the twentieth century.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
Drawing on oral testimony, previously unseen personal papers, and newly released archival information, this book provides a comprehensive account of British and American intelligence on the Soviet nuclear weapons program from 1945 to 1956. The book charts new territory, revising traditional accounts of Anglo-American nuclear relations and intelligence cooperation. It reveals how intelligence was collected: the roles played by defectors, aerial reconnaissance, and how novel forms of espionage were perfected to penetrate the Soviet nuclear program. It documents what conclusions were drawn from this information, and assesses the resulting estimates. Throughout the book a central theme is the Anglo-American partnership, depicting how it developed and how legal restrictions could be circumvented by cunning and guile.
Today the vast archipelago of Southeast Asia islands known as Indonesia is in the headlines because of political instability, religious tension, and violence in the streets. Forty years ago similar conditions led the Central Intelligence Agency to mount a top-secret covert action campaign designed to hold that nation's left-leaning President Sukarno's feet to the fire and prevent a strategic crossroad from falling into the communist camp. The Agency supported rebels with weapons, planes, and a memorable cast of bigger-than-life American agents. In a fast-paced, engrossing narrative evoking the novels of John LeCarré and Graham Greene, the authors provide the first unclassified, detailed case study of an operation that has escaped public scrutiny for decades. Their work adds significantly to our understanding of the CIA and American involvement in Asia. Drawing on declassified documents and an extraordinary number of interviews with CIA and Indonesian participants, Kenneth Conboy and James Morrison reconstruct the delicate, dangerous game played by American intelligence agents across the Indonesian archipelago. This is a story of ideologues and soldiers of fortune--historic CIA legends like Allen Dulles and Franklin Wisner, and notorious special operators like Tony ""Poe"" Poshepny, whose reputation reached mythic proportions later in Laos, and Allen Pope, an indefatigable B-26 pilot who was captured and sentenced to die. But it also includes the transfixing exploits of Montana smokejumpers, Polish aircrews, Muslim anti-communist guerrillas, U.S. Navy submarine crews, and Filipino mercenary pilots flying P-51 Mustangs. With the problems in today's Indonesia far from solved and the complex U.S.-Indonesian relationship coming under close scrutiny, this fascinating account of an American covert operation gone bad will play a significant role in shedding new light on the CIA's efforts in Southeast Asia.
‘One of our very best writers on France.’ Antony Beevor After publishing an acclaimed biography of Jean Moulin, leader of the French Resistance, Patrick Marnham received an anonymous letter from a person who claimed to have worked for British Intelligence during the war. The ex-spy praised his book but insisted that he had missed the real ‘treasure’. The letter drew Marnham back to the early 1960s when he had been taught French by a mercurial woman – a former Resistance leader, whose SOE network was broken on the same day that Moulin was captured and who endured eighteen months in Ravensbrück concentration camp. Could these two events have been connected? His anonymous correspondent offered a tantalising set of clues that seemed to implicate Churchill and British Intelligence in the catastrophe. Drawing on a deep knowledge of France and original research in British and French archives, War in the Shadows exposes the ruthless double-dealing of the Allied intelligence services and the Gestapo through one of the darkest periods of the Second World War. It is a story worthy of Le Carré, but with this difference – it is not fiction. ‘A melange of Le Grand Meaulnes and The Spy Who Came in from the Cold. It is unforgettable.’ Ferdinand Mount, TLS, Books of the Year ‘A masterly analysis, impeccably presented.’ Allan Mallinson, Spectator ‘Fascinating… Marnham has a vast and scholarly knowledge of this often treacherous world.’ Caroline Moorehead, Literary Review
Intelligence is now acknowledged as the hidden dimension to international diplomacy and national security. It is the hidden piece of the jigsaw puzzle of global relations that cements relationships, undermines alliances and topples tyrants, and after many decades of being deliberately overlooked or avoided, it is now regarded as a subject of legitimate study by academics and historians. This second edition of Historical Dictionary of International Intelligence covers its history through a chronology, an introductory essay, and an extensive bibliography. The dictionary section has over 500 cross-referenced entries on espionage techniques, categories of agents, crucial operations spies, defectors, moles, double and triple agents, and the tradecraft they apply. This book is an excellent access point for students, researchers, and anyone wanting to know more about the international intelligence.
The Soviet military concept of operational art and the associated theories such as war of annihilations, deep battle, and deep operations have been observed by the West since World War II. The Soviet government hid their military-theoretical work behind a veil of secrecy. Here, the Soviet theories are revealed in the words of those who created them in peacetime and applied them in war.
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilise AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference.
During the decade that preceded Mr Gorbachev's era of glasnost and perestroika, the KGB headquarters in Moscow was putting out a constant stream of instructions to its Residencies abroad. Unknown to the KGB, however, many of these highly classified documents were being secretly copied by Oleg Gordievsky, at that time not only a high-ranking KGB officer based in London but also a long-serving undercover agent for the British. The selected documents in this volume, translated and analysed by the editors with a commentary by Christopher Andrew to set them in context, offer a revealing insight into the attitudes, prejudices and fears of the KGB during what were to prove its declining years.
In this thoroughly updated second edition, Derek S. Reveron provides a comprehensive analysis of the shift in US foreign policy from coercive diplomacy to cooperative military engagement. The US military does much more than fight wars; it responds to humanitarian crises and natural disasters, assists advanced militaries to support international peace, and trains and equips almost every military in the world. Rather than intervening directly, the United States can respond to crises by sending weapons, trainers, and advisers to assist other countries in tackling their own security deficits created by subnational, transnational, and regional challengers. By doing so, the United States seeks to promote partnerships and its soft power, strengthen the state sovereignty system, prevent localized violence from escalating into regional crises, and protect its national security by addressing underlying conditions that lead to war. Since coalition warfare is the norm, security cooperation also ensures partners are interoperable with US forces when the US leads international military coalitions. Exporting Security takes into account the Obama administration's foreign policy, the implications of more assertive foreign policies by Russia and China, and the US military's role in recent humanitarian crises and nation-building efforts. |
You may like...
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, …
Hardcover
R7,311
Discovery Miles 73 110
New Approaches in Intelligent Image…
Roumen Kountchev, Kazumi Nakamatsu
Hardcover
Complex Systems: Spanning Control and…
Peng Shi, Jovan Stefanovski, …
Hardcover
R4,099
Discovery Miles 40 990
|