![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
This volume gathers 19 papers first presented at the 5th International Symposium of the ICA Commission on the History of Cartography, which took place at the University of Ghent, Belgium on 2-5 December 2014. The overall conference theme was 'Cartography in Times of War and Peace', but preference was given to papers dealing with the military cartography of the First World War (1914-1918). The papers are classified by period and regional sub-theme, i.e. Military Cartography from the 18th to the 20th century; WW I Cartography in Belgium, Central Europe, etc.
During the Second World War a major part of the strategy of the Grand Alliance was shipping. The Germans fully appreciated the vulnerability of this and their attack on it, largely by means of submarines, became known as the Battle of the Atlantic. The attack was overcome, with some difficulty, by a number of means. One, which remained generally unknown until the 1970s, was the decryption of German coded signals, now usually called Ultra. Subsequent histories often tended to attribute the outcome of the Battle largely to the operation of this factor almost by itself, sometimes because of a lack of rigorous analysis and also because of a failure to set this important subject into the full and complex contexts in which it operated. This study rectifies this deficiency, setting out the full story of the series of campaigns and carefully assessing the complicated pattern of factors, thus allowing a much more balanced understanding of code-breaking.
The Routledge Handbook on Israeli Security provides an authoritative survey of both the historical roots of Israel's national security concerns and their principal contemporary expressions. Following an introduction setting out its central themes, the Handbook comprises 27 independent chapters, all written by experts in their fields, several of whom possess first-hand diplomatic and/or military experience at senior levels. An especially noteworthy feature of this volume is the space allotted to analyses of the impact of security challenges not just on Israel's diplomatic and military postures (nuclear as well as conventional) but also on its cultural life and societal behavior. Specifically, it aims to fulfill three principal needs. The first is to illustrate the dynamic nature of Israel's security concerns and the ways in which they have evolved in response to changes in the country's diplomatic and geo-strategic environment, changes that have been further fueled by technological, economic and demographic transformations; Second, the book aims to examine how the evolving character of Israel's security challenges has generated multiple - and sometimes conflicting - interpretations of the very concept of "security", resulting in a series of dialogues both within Israeli society and between Israelis and their friends and allies abroad; Finally, it also discusses how areas of private and public life elsewhere considered inherently "civilian" and unrelated to security, such as artistic and cultural institutions, nevertheless do mirror the broader legal, economic and cultural consequences of this Israeli preoccupation with national security. This comprehensive and up-to-date collection of studies provides an authoritative and interdisciplinary guide to both the dynamism of Israel's security dilemmas and to their multiple impacts on Israeli society. In addition to its insights and appeal for all people and countries forced to address the security issue in today's world, this Handbook is a valuable resource for upper-level undergraduates and researchers with an interest in the Middle East and Israeli politics, international relations and security studies.
From the author of the Pulitzer Prize-winning history The Dead Hand comes the riveting story of a spy who cracked open the Soviet military research establishment and a penetrating portrait of the CIA's Moscow station, an outpost of daring espionage in the last years of the Cold War While driving out of the American embassy in Moscow on the evening of February 16, 1978, the chief of the CIA's Moscow station heard a knock on his car window. A man on the curb handed him an envelope whose contents stunned U.S. intelligence: details of top-secret Soviet research and developments in military technology that were totally unknown to the United States. In the years that followed, the man, Adolf Tolkachev, an engineer in a Soviet military design bureau, used his high-level access to hand over tens of thousands of pages of technical secrets. His revelations allowed America to reshape its weapons systems to defeat Soviet radar on the ground and in the air, giving the United States near total superiority in the skies over Europe. One of the most valuable spies to work for the United States in the four decades of global confrontation with the Soviet Union, Tolkachev took enormous personal risks--but so did the Americans. The CIA had long struggled to recruit and run agents in Moscow, and Tolkachev was a singular breakthrough. Using spy cameras and secret codes as well as face-to-face meetings in parks and on street corners, Tolkachev and his handlers succeeded for years in eluding the feared KGB in its own backyard, until the day came when a shocking betrayal put them all at risk. Drawing on previously secret documents obtained from the CIA and on interviews with participants, David Hoffman has created an unprecedented and poignant portrait of Tolkachev, a man motivated by the depredations of the Soviet state to master the craft of spying against his own country. Stirring, unpredictable, and at times unbearably tense, The Billion Dollar Spy is a brilliant feat of reporting that unfolds like an espionage thriller.
Naval intelligence is one of the most vital, and sometimes decisive, forms of intelligence. Over the centuries, and with particular velocity over recent decades, the techniques of detecting and destroying military (and commercial) shipping have improved, leapfrogging the equally frantic race to keep ahead of them and safeguard the huge investments involved. Today the new challenges range from an increasingly aggressive strategy adopted by Pyongyang's submarine fleet and the exclusion of illegal immigrants heading for Australia and southern Europe to the capture of cocaine-laded submarines in the Caribbean and the interdiction of Somali pirates off the Gulf of Aden. Any accurate assessment of the comparative threat these activities pose is just as dependent on good intelligence today as it was to Admiral Lord Nelson in the days of sail. The Historical Dictionary of Naval Intelligence relates the long and fascinating history of naval intelligence through a chronology, an introduction, a bibliography, and hundreds of cross-referenced dictionary entries on the organizations, operations, and events that made Naval intelligence what it is today.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
Startling new revelations about collaboration between the Allies and the German Secret Service. Based on extensive primary source research, John Bryden's Fighting to Lose presents compelling evidence that the German intelligence service - the Abwehr - undertook to rescue Britain from certain defeat in 1941. Recently opened secret intelligence files indicate that the famed British double-cross or double-agent system was in fact a German triple-cross system. These files also reveal that British intelligence secretly appealed to the Abwehr for help during the war, and that the Abwehr's chief, Admiral Canaris, responded by providing Churchill with the ammunition needed in order to persuade Roosevelt to lure the Japanese into attacking Pearl Harbor. These findings and others like them make John Bryden's Fighting to Lose one of the most fascinating books about World War II to be published for many years.
This research guide is an introduction to military intelligence, a neglected aspect of warfare that provides commanders and national leaders with essential information for decision making. The introduction provides the general reader with an explanation of the terminology, procedures, and institutional problems of military intelligence, while outlining the history of this field and identifying areas for further research. The core of the guide is an extensively annotated bibliography of unclassified English language materials on military intelligence, the evolution of intelligence operations, the role of intelligence in air, ground, and naval operations, and specialized fields of espionage, counter intelligence, technical intelligence, and aerial photography. This guide is intended to fill a void in the literature for soldiers, historians, and general readers.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
It is not hyperbole to suggest that the foundations of post-cold war security in Europe have been badly damaged by the conflict in Ukraine since 2014. Russia's annexation of Crimea and intervention in eastern Ukraine appear to have created a 'simmering' conflict, which may take years to resolve and have profound consequences for the European security environment. This volume explores the various political, economic and social aspects of these profound changes and their wider significance for Europe, bringing together contributions by scholars from across the continent and in various disciplinary fields to offer an authoritative, in-depth examination of the complex causes of the Ukraine crisis and the consequences for Ukrainian statehood, Ukraine's relations with Russia, Russia's own domestic governance and Russia's relations with Europe. This book was originally published as a special issue of Europe-Asia Studies.
At the end of the Second World War, Germany lay at the mercy of its occupiers, all of whom launched programmes of scientific and technological exploitation. Each occupying nation sought to bolster their own armouries and industries with the spoils of war, and Britain was no exception. Shrouded in secrecy yet directed at the top levels of government and driven by ingenuity from across the civil service and armed forces, Britain made exploitation a key priority. By examining factories and laboratories, confiscating prototypes and blueprints, and interrogating and even recruiting German experts, Britain sought to utilise the innovations of the last war to prepare for the next. This ground-breaking book tells the full story of British exploitation for the first time, sheds new light on the legacies of the Second World War, and contributes to histories of intelligence, science, warfare and power in the midst of the twentieth century.
This book describes and analyzes the history of the Mediterranean "Double-Cross System" of the Second World War, an intelligence operation run primarily by British officers which turned captured German spies into double agents. Through a complex system of coordination, they were utilized from 1941 to the end of the war in 1945 to secure Allied territory through security and counter-intelligence operations, and also to deceive the German military by passing false information about Allied military planning and operations. The primary questions addressed by the book are: how did the double-cross-system come into existence; what effects did it have on the intelligence war and the broader military conflict; and why did it have those effects? The book contains chapters assessing how the system came into being and how it was organized, and also chapters which analyze its performance in security and counter-intelligence operations, and in deception.
Today the vast archipelago of Southeast Asia islands known as Indonesia is in the headlines because of political instability, religious tension, and violence in the streets. Forty years ago similar conditions led the Central Intelligence Agency to mount a top-secret covert action campaign designed to hold that nation's left-leaning President Sukarno's feet to the fire and prevent a strategic crossroad from falling into the communist camp. The Agency supported rebels with weapons, planes, and a memorable cast of bigger-than-life American agents. In a fast-paced, engrossing narrative evoking the novels of John LeCarré and Graham Greene, the authors provide the first unclassified, detailed case study of an operation that has escaped public scrutiny for decades. Their work adds significantly to our understanding of the CIA and American involvement in Asia. Drawing on declassified documents and an extraordinary number of interviews with CIA and Indonesian participants, Kenneth Conboy and James Morrison reconstruct the delicate, dangerous game played by American intelligence agents across the Indonesian archipelago. This is a story of ideologues and soldiers of fortune--historic CIA legends like Allen Dulles and Franklin Wisner, and notorious special operators like Tony ""Poe"" Poshepny, whose reputation reached mythic proportions later in Laos, and Allen Pope, an indefatigable B-26 pilot who was captured and sentenced to die. But it also includes the transfixing exploits of Montana smokejumpers, Polish aircrews, Muslim anti-communist guerrillas, U.S. Navy submarine crews, and Filipino mercenary pilots flying P-51 Mustangs. With the problems in today's Indonesia far from solved and the complex U.S.-Indonesian relationship coming under close scrutiny, this fascinating account of an American covert operation gone bad will play a significant role in shedding new light on the CIA's efforts in Southeast Asia.
Intelligence is now acknowledged as the hidden dimension to international diplomacy and national security. It is the hidden piece of the jigsaw puzzle of global relations that cements relationships, undermines alliances and topples tyrants, and after many decades of being deliberately overlooked or avoided, it is now regarded as a subject of legitimate study by academics and historians. This second edition of Historical Dictionary of International Intelligence covers its history through a chronology, an introductory essay, and an extensive bibliography. The dictionary section has over 500 cross-referenced entries on espionage techniques, categories of agents, crucial operations spies, defectors, moles, double and triple agents, and the tradecraft they apply. This book is an excellent access point for students, researchers, and anyone wanting to know more about the international intelligence.
This book provides a definitive overview of the relationships of influence between civil society and intelligence elites. The secrecy surrounding intelligence means that publication of intelligence is highly restricted, barring occasional whistle-blowing and sanitised official leaks. These characteristics mean that intelligence, if publicised, can be highly manipulated by intelligence elites, while civil society's ability to assess and verify claims is compromised by absence of independent evidence. There are few studies on the relationship between civil society and intelligence elites, which makes it hard to form robust assessments or practical recommendations regarding public oversight of intelligence elites. Addressing that lacuna, this book analyses two case studies of global political significance. The intelligence practices they focus on (contemporary mass surveillance and Bush-era torture-intelligence policies) have been presented as vital in fighting the 'Global War on Terror', enmeshing governments of scores of nation-states, while challenging internationally established human rights to privacy and to freedom from torture and enforced disappearance. The book aims to synthesise what is known on relationships of influence between civil society and intelligence elites. It moves away from disciplinary silos, to make original recommendations for how a variety of academic disciplines most likely to study the relationship between civil society and intelligence elites (international relations, history, journalism and media) could productively cross-fertilise. Finally, it aims to create a practical benchmark to enable civil society to better hold intelligence elites publicly accountable. This book will be of great interest to students of intelligence studies, surveillance, media, journalism, civil society, democracy and IR in general.
The Soviet military concept of operational art and the associated theories such as war of annihilations, deep battle, and deep operations have been observed by the West since World War II. The Soviet government hid their military-theoretical work behind a veil of secrecy. Here, the Soviet theories are revealed in the words of those who created them in peacetime and applied them in war.
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilise AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference.
Israel's flawed intelligence assessment in October 1973 has been studied intensively and been the subject of much public and professional debate. This book adds a unique dimension to previously disclosed material, as its author served as head of the Research Branch of Israeli Military Intelligence on the eve of and during the Yom Kippur War and as such was responsible for the national intelligence assessment at the time. Drawing on his personal records, and on interviews and extensive research conducted in the intervening decades, Aryeh Shalev examines the preconceptions and common beliefs that prevailed among Israeli intelligence officials and ultimately contributed to their flawed assessment: the excessive self-confidence in Israel's prowess, particularly in the aftermath of the Six Day War; the confidence that any surprise attack could be repelled with the regular army until the reserves were mobilised; the accepted profile of Sadat as a weak leader with limited powers and initiative; and the belief in Israel's correct understanding of Egyptian and Syrian operational plans . . . Beyond explaining where Israeli intelligence erred, the book probes expectations of military intelligence in general and the relationship between military and political assessments. It considers what kind of assessment an intelligence branch is capable of producing with a great degree of certainty, and conversely, what kind of assessment it should not be asked to produce. Based on the intelligence failure of the Yom Kippur War, this book also reviews possible organisational changes and methodological improvements to guard as much as possible against surprise attacks in the future, relevant not only to Israel's circumstances but to all countries with enemies capable of launching an attack. Published in association with the Institute for National Strategic Studies.
In this thoroughly updated second edition, Derek S. Reveron provides a comprehensive analysis of the shift in US foreign policy from coercive diplomacy to cooperative military engagement. The US military does much more than fight wars; it responds to humanitarian crises and natural disasters, assists advanced militaries to support international peace, and trains and equips almost every military in the world. Rather than intervening directly, the United States can respond to crises by sending weapons, trainers, and advisers to assist other countries in tackling their own security deficits created by subnational, transnational, and regional challengers. By doing so, the United States seeks to promote partnerships and its soft power, strengthen the state sovereignty system, prevent localized violence from escalating into regional crises, and protect its national security by addressing underlying conditions that lead to war. Since coalition warfare is the norm, security cooperation also ensures partners are interoperable with US forces when the US leads international military coalitions. Exporting Security takes into account the Obama administration's foreign policy, the implications of more assertive foreign policies by Russia and China, and the US military's role in recent humanitarian crises and nation-building efforts.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
During the decade that preceded Mr Gorbachev's era of glasnost and perestroika, the KGB headquarters in Moscow was putting out a constant stream of instructions to its Residencies abroad. Unknown to the KGB, however, many of these highly classified documents were being secretly copied by Oleg Gordievsky, at that time not only a high-ranking KGB officer based in London but also a long-serving undercover agent for the British. The selected documents in this volume, translated and analysed by the editors with a commentary by Christopher Andrew to set them in context, offer a revealing insight into the attitudes, prejudices and fears of the KGB during what were to prove its declining years.
The United States and Mexico share a history shaped in the 19th century by numerous US forces interventions into Mexican territory and US expropriation of considerable swaths of Mexican territory. However, in spite of structural impediments and a history of resentment by Mexico of US intervention into its affairs and territory, the levels of cooperation and understanding slowly began to improve following a series of international and domestic factors. The decline of the former Soviet Union and the fall of the Berlin Wall at a global level, coupled with major political and economic challenges and reforms within Mexico are a starting point from which to assess the evolution of the bilateral defense relationship between the United States and Mexico. The American and Mexican militaries have evolved differently over the past 100 years and they each have very different responsibilities, mission sets, orientations, and capabilities. Yet in recent years, the Mexican armed forces have cooperated more closely with their US counterparts. This may be due to explicit direction coming from senior levels of the Mexican government and to operational requirements of the armed forces themselves as they seek to increase their capability and capacity to confront the growing levels in drug trafficking related violence. Today, both countries are dealing with the effects of this increased violence and insecurity in Mexico. Relying primarily on one-on-one interviews with senior practitioners and analysts on both sides of the border, the text examines the evolution of the U.S.-Mexican bilateral defense relationship to better understand how and why this unique relationship has improved, in fits and starts, over the past 25 years. It offers a new understanding of how defense policymakers from each respective country perceive the other, as well as how the lack of trust and understanding between the two neighbors has delayed greater cooperation.
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
This is a study of the British military intelligence operations during the Crimean War. It details the beginnings of the intelligence operations as a result of the British Commander, Lord Raglan's, need for information on the enemy, and traces the subsequent development of the system. |
You may like...
The Art and Science of Military…
Hy Rothstein, Barton Whaley
Hardcover
R3,191
Discovery Miles 31 910
Keeping Us Safe - Secret Intelligence…
Arthur S. Hulnick
Hardcover
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
Destined for War - Can America and China…
Graham Allison
Paperback
(1)
|