![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
This volume investigates the connection between intelligence history, domestic policy, military history and foreign relations in a time of increasing bureaucratization of the modern state. The issues of globalization of foreign relations and the development of modern, electronic means of communication are also discussed.
In the second half of 1991, the Soviet Union collapsed. It was an
event of major historic and global dimensions, yet this strategic
transformation of international relations took the entire world
totally by suprise - despite the fact that the West saw in the
Communist power an ideological foe and a major military
threat.
This volume covers European intelligence in the first half of the 20th century. It reveals that the Imperial German Government had a remarkable source at the Russian Embassy in London prior to the outbreak of the World War I; describes in detail Swedish-German cryptanalytical co-operation during the Great War in intercepting and solving Russian diplomatic telegram traffic; adds an intriguing new twist to the murder of the Tsar and his family; provides an authoritative account of Swedish cryptanalytical success against German and Soviet traffic during the World War II; and includes an anecdote suggesting that Allied security surrounding Overlord may have in fact been breached, while at the same time offering a reason as to why this leak led nowhere.
Decisions about defence and security are becoming increasingly open to public influence. This book therefore aims to give both the voter and the decision maker a new vision of how to manage crises and avert hostilities with non-traditional means.
National intelligence cultures are shaped by their country's history and environment. This book examines the national intelligence cultures of Africa. Focusing on nearly sixty countries, the volume offers a concise account of African intelligence and security services by examining the environmental factors that informs the countries' intelligence cultures. The chapters address each countries' history, national and international settings, ethnic and religious groups, the legal framework for intelligence, and key intelligence events. They also look at the intelligence cycle, including describing the consumers of intelligence and targets, as well as resources and reputation. Each chapter is written by an expert with detailed knowledge of the countries' intelligence agencies. The authors explore the factors that shape how intelligence services in Africa are structured and operate as well as how the services' role in security and government. For the first time, African intelligence and security is front-and-center in a handbook that examines the issues that influence intelligence operations and collection, and how the intelligence services shape African governments and society.
This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.
From the 1930's to the 1950's a significant number of left-wing men
and women in the United States, Britain, Europe, Australia and
Canada were recruited to the Soviet intellgence services.
Intelligence was a central element of the Cold War and the need for
it was expected to diminish after the USSR's collapse, yet in
recent years it has been in greater demand than ever. The
atrocities of 11 September and the subsequent "war on terrorism"
now call for an even more intensive effort. Important questions
arise on how intelligence fits into the world of increased threats,
globalization and expanded international action. This volume
contains the recent work on this subject by Michael Herman, British
intelligence professional for 35 years and Oxford University
academic. It compares intelligence with other government
information services, and discusses the British intelligence system
and the case for its reform. It also addresses the ethical issues
raised by intelligence's methods and results: "do they on balance
make for a better world or a worse one?." Other chapters explore a
wide range of intelligence topics past and present, including the
transatlantic relationship, the alliance strategies of Norway and
New Zealand, Mrs Thatcher's "de-unionization" of British Sigint,
and personal memories of the British Cabinet Office in the
1970s.
Contrary to popular misconceptions and public branding as "dirty tricks," covert action and counterintelligence can have considerable value. Democracies, while wary of these instruments, have benefited significantly from their use, saving lives, treasure, and gaining strategic advantage. As liberal democracies confront the post-Cold War mix of rogue states and non-state actors, such as criminals and terrorists, and weapons of mass destruction and mass disruption, these clandestine arts may prove to be important tools of statecraft, and perhaps trump cards in the twenty-first century. Godson defines covert action as influencing events in other parts of the world without attribution, and counterintelligence as identifying, neutralizing, and exploiting the secret activities of others. Together they provide the capability to resist manipulation and control others to advantage. Counterintelligence protects U.S. military, technological, and diplomatic secrets and turns adversary intelligence to U.S. advantage. Covert action enables the United States to weaken adversaries and to assist allies who may be hampered by open acknowledgment of foreign support. Drawing on contemporary and historical literature, broad-ranging contacts with senior intelligence officials in many countries, as well as his own research and experience as a longtime consultant to the U.S. government, Godson traces the history of U.S. covert action and counterintelligence since 1945, showing that covert action works well when it is part of a well-coordinated policy and when policy makers are committed to succeeding in the long-term. Godson argues that the best counterintelligence is an offensive defense. His exposition of the essential theoretical foundations of both covert action and counterintelligence, supported by historical examples, lays out the ideal conditions for their use, as well as demonstrating why they are so difficult to attain. This book will be of interest to students and general readers interested in political science, national security, foreign policy, and military policy.
This work considers, for the first time, the intelligence relationship between three important North Atlantic powers in the Twenty-first century, from WWII to post-Cold War. As demonstrated in the case studies in this volume, World War II cemented loose and often informal inter-allied agreements on security intelligence that had preceded it, and created new and important areas of close and formal co-operation in such areas as codebreaking and foreign intelligence.
Asia represented the "hottest" theatre of the Cold War, with several declared and undeclared wars always in progress. Examining the Asian dimension of this struggle, this volume describes and analyzes a range of clandestine activities from intelligence and propaganda to special operations and security support. It draws on documents declassified after the end of the Cold War.
This is a history of the Norwegian Intelligence Service (NIS) during the Cold War, based on its secret archives. The author presents detailed descriptions of the build-up of a network of Norwegian signals intelligence stations in the north; border crossings by clandestine agents; the reporting of Norwegian merchant mariners from ports behind the Iron Curtain; the intimate co-operation between the NIS and the secret services of the United States and other countries; as well as the establishment of a stay behind network.
Audley End House in Essex - or Station 43 as it was known during the Second World War - was used as the principal training school for SOE's Polish Section between 1942 and 1944. Polish agents at the stately home undertook a series of arduous training courses in guerilla warfare before being parachuted into occupied Europe. In 1943, Audley End was placed exclusively under polish control, a situation unique within SOE. The training was tough and the success rate low, but a total of 527 agents passed through Audley End between 1942 and 1944. Ian Valentine has consulted a wide range of primary sources and interviewed Polish instructors and former agents who trained at Audley End to write the definitive account of this Essex country house and the vital but secret part it played in defeating Hitler. He examines the comprehensive training agents at Audley End and describes the work undertaken by Station 43's agents in Europe, set against the background of Polish wartime history. He also covers the vital link with the RAF's Special Duties squadrons, whose crews risked their lives dropping agents into occupied Europe. Station 43 breaks new ground in telling the hitherto until story of Audley End house and its role as a vital SOE training school.
Shortly after the end of the First World War, General Sir George Macdonagh, wartime director of British Military Intelligence, revealed that Lord Allenby's victory in Palestine had never been in doubt because of the success of his intelligence service. Seventy-five years later this book explains Macdonagh's statement. Sheffy also adopts a novel approach to traditional heroes of the campaign such as T E Lawrence.
Little attention has been paid to the murky, ultra-business of gathering intelligence among and forming estimates about friendly powers, and friendly or allied military forces. How rarely have scholars troubled to discover when states entered into coalitions or alliances mainly and explicitly because their intelligence evaluation of the potential partner concluded that making the alliance was, from the originator's national security interest, the best game in town. The twentieth century has been chosen to enhance the coherence of and connections between, the subject matter of this under-explored part of intelligence studies.
Little attention has been paid to the murky, ultra-business of gathering intelligence among and forming estimates about friendly powers, and friendly or allied military forces. How rarely have scholars troubled to discover when states entered into coalitions or alliances mainly and explicitly because their intelligence evaluation of the potential partner concluded that making the alliance was, from the originator's national security interest, the best game in town. The twentieth century has been chosen to enhance the coherence of and connections between, the subject matter of this under-explored part of intelligence studies.
A Cross of Iron provides the fullest account yet of the national security state that emerged in the first decade of the Cold War. Michael J. Hogan traces the process of state-making through struggles to unify the armed forces, harness science to military purposes, mobilize military manpower, control the defense budget, and distribute the cost of defense across the economy. President Harry S. Truman and his successor were in the middle of a fundamental contest over the nation's political identity and postwar purpose, and their efforts determined the size and shape of the national security state that finally emerged.
Of the many functions carried out by intelligence agencies, analysis and assessment has received comparatively little scholarly attention. In October 1994 the Canadian Association for Security and Intelligence Studies (CASIS) and the Intelligence Section of the International Studies Association (ISA) attended to this deficit by holding a special international conference on the subject in Ottawa. This volume is the product of that conference. The essays may be divided into four self-contained sets. The first examines critically the assessment systems now in place in Britain, the USA, Germany and Australia. The second looks at the bureaucratic dynamics of analysis and assessment. The changing ground that intelligence is currently experiencing is the focus of the third section. Finally, the volume considers the impact of new technologies and modes of communication on intelligence gathering and analysis.
Introduction to Intelligence Studies (third edition) provides an overview of the US intelligence community, to include its history, organization, and function. Since the attacks of 9/11, the United States Intelligence Community (IC) has undergone an extensive overhaul. This textbook provides a comprehensive overview of intelligence and security issues, defining critical terms and reviewing the history of intelligence as practiced in the United States. Designed in a practical sequence, the book begins with the basics of intelligence, progresses through its history, describes best practices, and explores the way the intelligence community looks and operates today. The authors examine the "pillars" of the American intelligence system―collection, analysis, counterintelligence, and covert operations―and demonstrate how these work together to provide "decision advantage." The book offers equal treatment to the functions of the intelligence world―balancing coverage on intelligence collection, counterintelligence, information management, critical thinking, and decision-making. It also covers such vital issues as laws and ethics, writing and briefing for the intelligence community, and the emerging threats and challenges that intelligence professionals will face in the future. This revised and updated third edition addresses issues such as the growing influence of Russia and China, the recent history of the Trump and Biden administrations and the IC, and the growing importance of the cyber world in the intelligence enterprise. This book will be essential reading for students of intelligence studies, US national security, foreign policy and International Relations in general.
In 1953, Ian Fleming's literary sensation James Bond emerged onto the world's stage. Nearly seven decades later, he has become a multi-billion-pound film franchise, now equipped with all the gizmos of the modern world. Yet Fleming's creation, who battled his way through the fourteen novels from 1953 to 1966, was a maverick - a man out of place. Bond even admits it, wishing he was back in the real war ... the Second World War. Indeed, the thread of the Second World War runs through the whole of the Bond series, and many were inspired by the real events and people Fleming came across during his time in Naval Intelligence. In Ian Fleming's War, Mark Simmons explores these remarkable similarities, from Fleming's scheme to capture a German naval codebook that appears in Thunderball as Plan Omega, to the exploits of 30 Assault Unit, the commando team he helped to create, which inspired Moonraker.
The Soviet military concept of operational art and the associated theories such as "war of annihilations," "deep battle," and "deep operations" have been observed by the West since World War II. The Soviet government hid their military-theoretical work behind a veil of secrecy. Here, the Soviet theories are revealed in the words of those who created them in peacetime and applied them in war.
Nicholas Eftimiades examines the infiltration of Chinese espionage agents into foreign governments and private businesses. These efforts have been going on mostly uninterrupted for decades, while Western intelligence services focused on the Soviet Union. He draws on his expertise as a counterintelligence analyst to examine the structure, objectives and methodology of Chinese clandestine activities. The book specifically addresses the human source in intelligence operations, such as agent and double-agent recruitment, and how these tactics fit into the conduct of internal and foreigh affairs in China. |
![]() ![]() You may like...
Teaching History for the Contemporary…
Adele Nye, Jennifer Clark
Hardcover
R4,585
Discovery Miles 45 850
Next Generation Digital Tools and…
Mary T Grassetti, Julie Zoino-Jeannetti
Hardcover
R5,815
Discovery Miles 58 150
Gender and Careers in the Legal Academy
Ulrike Schultz, Gisela Shaw, …
Hardcover
R5,305
Discovery Miles 53 050
Check-list of North American Birds…
American Ornithologists Union
Hardcover
R1,038
Discovery Miles 10 380
The How Not To Die Cookbook - Over 100…
Michael Greger
Paperback
![]()
|