![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Canada is a key member of the world's most important international intelligence-sharing partnership, the Five Eyes, along with the US, the UK, New Zealand, and Australia. Until now, few scholars have looked beyond the US to study how effectively intelligence analysts support policy makers, who rely on timely, forward-thinking insights to shape high-level foreign, national security, and defense policy. Intelligence Analysis and Policy Making provides the first in-depth look at the relationship between intelligence and policy in Canada. Thomas Juneau and Stephanie Carvin, both former analysts in the Canadian national security sector, conducted seventy in-depth interviews with serving and retired policy and intelligence practitioners, at a time when Canada's intelligence community underwent sweeping institutional changes. Juneau and Carvin provide critical recommendations for improving intelligence performance in supporting policy-with implications for other countries that, like Canada, are not superpowers but small or mid-sized countries in need of intelligence that supports their unique interests.
In A Sense of Place, renowned wine expert and writer Steven Kolpan tells the story of how Francis Ford Coppola brought California's most distinguished and historic vineyard back to life. Gustave Niebaum's Inglenook Estate, started in 1879, was one of the Napa Valley's first established vineyards and the birthplace of its premium wine industry. Generations after Niebaum's death, the vineyard was sold to Heublein, the wine and spirits monolith, who broke up the land and changed the Inglenook brand from a premium, connoisseur wine to a mass-market jug wine. In 1975, Francis Coppola bought the Niebaum residence and the surrounding estate. Along with the original estate's reputation, he also brought back some of its original workers, including Rafael Rodriquez, who, in h is late seventies, now serves as the vineyard manager and historian. Coppola overcame naysayers, red tape, and financial turmoil to reestablish the winery as a defender of quality, producing wine under four different labels, including the revered wine Rubicon. In 1995, Coppola purchased the Inglenook Chateau and its adjacent vineyards, fulfilling his dream of reuniting the original Napa Valley estate. Kolpan's luscious, flavorful narrative is worth enjoying now and keeping for later.
The enigmatic science of military intelligence is examined in this personal record, written by Brig.Gen. Oscar W. Koch, who served during World War II as chief of intelligence for General George S. Patton, Jr., one of the most colorful military leaders in American history. General Koch traces the growth and development of the infant science through detailed accounts of the intelligence role in some of the most celebrated battles of the war, and through his personal remembrances of Patton and his relationships with members of his intelligence staff. His story moves from the African campaign through Sicily, into France on D-Day and on to the Battle of the Bulge, pointing out how the work of the intelligence staff made the differences in the final reckoning. General Koch's book is more than a historical study, however. It is the exciting story of the operations behind the cloak and dagger illusions.
Based on OSS records only recently released to US National Archives, and on evidence from British archival sources, this is a thoroughly researched study of the Office of Strategic Services in London. The OSS was a critical liaison and operational outpost for American intelligence during World War II. Dr MacPherson puts the activities of the OSS into the larger context of the Anglo-American relationship and the various aspects of intelligence theory, while examining how a modern American intelligence capability evolved.
Students and enthusiasts of American history are familiar with the Revolutionary War spies Nathan Hale and Benedict Arnold, but few studies have closely examined the wider intelligence efforts that enabled the colonies to gain their independence. Spies, Patriots, and Traitors provides readers with a fascinating, well-documented, and highly readable account of American intelligence activities during the era of the Revolutionary War, from 1765 to 1783, while describing the intelligence sources and methods used and how our Founding Fathers learned and practiced their intelligence role. The author, a retired CIA officer, provides insights into these events from an intelligence professional's perspective, highlighting the tradecraft of intelligence collection, counterintelligence, and covert actions and relating how many of the principles of the era's intelligence practice are still relevant today. Kenneth A. Daigler reveals the intelligence activities of famous personalities such as Samuel Adams, George Washington, Benjamin Franklin, Nathan Hale, John Jay, and Benedict Arnold, as well as many less well-known figures. He examines the important role of intelligence in key theaters of military operations, such as Massachusetts, New York, New Jersey, Pennsylvania, and in General Nathanael Greene's campaign in South Carolina; the role of African Americans in the era's intelligence activities; undertakings of networks such as the Culper Ring; and intelligence efforts and paramilitary actions conducted abroad. Spies, Patriots, and Traitors adds a new dimension to our understanding of the American Revolution. The book's scrutiny of the tradecraft and management of Revolutionary War intelligence activities will be of interest to students, scholars, intelligence professionals, and anyone who wants to learn more about this fascinating era of American history.
Classical Spies is the first insiders' account of the operations of the American intelligence service in World War II Greece. Initiated by archaeologists in Greece and the eastern Mediterranean, the network drew on scholars' personal contacts and knowledge of languages and terrain. While modern readers might think Indiana Jones is just a fantasy character, Classical Spies discloses events where even Indy would feel at home: burying Athenian dig records in an Egyptian tomb, activating prep-school connections to establish spies code-named Vulture and Chickadee, and organizing parachute drops.
Asia represented the hottest theatre of the Cold War, with several declared and undeclared wars always in progress. Examining the Asian dimension of this struggle, this volume describes and analyzes a range of clandestine activities from intelligence and propaganda to special operations and security support. It draws on documents declassified after the end of the Cold War.
Ben Morgan is back, and the stakes have never been higher.In Iraq, a surprise attack decimates the IS leadership. Revenge is sworn. A terrorist mastermind conceives a double-strike against America and Britain. Ten years later, cyberattacks hit both sides of the Atlantic. SAS soldiers are stricken by a silent chemical killer as London faces a devastating bombing attack. But the bigger and most dangerous threat is to Washington D.C., an attack that could cripple the West. In Washington, with the terrorist deadline looming, Ben Morgan puts the pieces together and finally glimpses the full extent of the plot. But stopping it will take everything he's got. And more. A scintillating technothriller from a bestselling author and a cybersecurity expert, Cyberstrike DC is perfect for fans of Tom Clancy and James Swallow.
This is the first book to appear on British intelligence operations based in both India and London, which defended the Indian Empire against subversion during the first two decades of the twentieth century. It is concerned with the threat to the British Raj posed by the Indian revolutionary movement, the resulting development of the imperial intelligence service and the role it played during the First World War.
The codebreaking efforts at Bletchley Park have obtained greater recognition since the release of the film The Imitation Game in 2014.
Civil Air Transport (CAT), founded in China after World War II by Claire Chennault and Whiting Willauer, was initially a commercial carrier specializing in air freight. Its role quickly changed as CAT became first a paramilitary adjunct of the Nationalist Chinese Air Force, then the CIA's secret "air force" in Korea, then "the most shot-at airline in the world" in French Indochina, and eventually becoming reorganized as Air America at the height of the Vietnam War. William M. Leary's detailed operational history of CAT sets the story in the perspective of Asian and Cold War geopolitics and shows how CAT allowed the CIA to operate with a level of flexibility and secrecy that it would not have attained through normal military or commercial air transportation.
You know about MI5. You know about MI6.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as 'target centric' intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject. The book is general enough in nature that a lay student-interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement-will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations. Uses numerous hands-on activities-that can easily be modified by instructors to be more or less challenging depending on the course level-to reinforce concepts As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information As such, the non-sensitive information presented is appropriate-and methods applicable-for use for education and training overseas and internationally Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.
The most comprehensive history of Canadian military intelligence and its influence on key military operations Canadian intelligence has become increasingly central to the operations of the Canadian Armed Forces (CAF). Canadian Military Intelligence: Operations and Evolution from the October Crisis to the War in Afghanistan is the first comprehensive history that examines the impact of tactical, operational, and strategic intelligence on the Canadian military. Drawing upon a wide range of original documents and interviews with participants in specific operations, author David A. Charters provides an inside perspective on the development of military intelligence since the Second World War. He shows how intelligence influenced key military operations, from domestic internal security to peacekeeping efforts to high-intensity air campaigns-including the October Crisis of 1970, the Oka Crisis, the Gulf War, peacekeeping and enforcement operations in the Balkans, and the war in Afghanistan. He describes how decades of experience, innovation, and increasingly close cooperation with its Five Eyes and NATO allies allowed Canada's military intelligence to punch above its weight. Its tactical effectiveness and ability to overcome challenges reshaped the outlook of military commanders, and intelligence emerged from the margins to become a central feature of military and defense operations. Canadian Military Intelligence offers lessons from the past and critical implications for future intelligence support with the creation of the Canadian Forces Intelligence Command. This book will be essential to both intelligence history and military history readers and collections.
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures. Covering the apartheid period of 1948-90, the transition from apartheid to democracy of 1990-94, and the post-apartheid period of new intelligence dispensation from 1994-2005, this book examines not only the apartheid government's intelligence dispensation and operations, but also those of the African National Congress, and its partner, the South African Communist Party (ANC/SACP) - as well as those of other liberation movements and the 'independent homelands' under the apartheid system. Examining the civilian, military and police intelligence structures and operations in all periods, as well as the extraordinarily complicated apartheid government's security bureaucracy (or 'securocracy') and its structures and units, the book discusses how South Africa's Cold War 'position' influenced its relationships with various other world powers, especially where intelligence co-operation came to bear. It outlines South Africa's regional relationships and concerns - the foremost being its activities in South-West Africa (Namibia) and its relationship with Rhodesia through 1980. Finally, it examines the various legislative and other governance bases for the existence and operations of South Africa's intelligence structures - in all periods - and the influences that such activities as the Rivonia Trial (at one end of the history) or the Truth and Reconciliation Commission (at the other end) had on the evolution of these intelligence questions throughout South Africa's modern history. This book will be of great interest to all students of South African politics, intelligence studies and international politics in general.
Master of Deception is a biography of Peter Fleming, elder brother of Ian Fleming, creator of James Bond. Peter Fleming worked as a travel writer and journalist, serving with distinction throughout World War II and played a crucial role in British intelligence operations in the Far East. This biography ranges from the personal life of Fleming such as his marriage to Celia Johnson, a famous actor of the time, to his extensive military intelligence career which took him from Norway and Greece to the Far East. Framed through the life of Peter Fleming this book offers an in-depth study of British intelligence operations in the Far East during World War II.
The Cambridge Spies continue to fascinate - but one of them, John Cairncross, has always been more of an enigma than the others. He worked alone and was driven by his hostility to Fascism rather than to the promotion of Communism. During his war-time work at Bletchley Park, he passed documents to the Soviets which went on to influence the Battle of Kursk. Geoff Andrews gained exclusive access to the Cairncross papers and secrets, and has spoken to friends, relatives and former colleagues. In his portrait, a complex individual emerges – a scholar as well as a spy – whose motivations have often been misunderstood. After his resignation from the Civil Service, Cairncross moved to Italy and there he rebuilt his life as a foreign correspondent, editor and university professor. This gave him new circles and friendships – which included the writer Graham Greene – while he always lived with the fear that his earlier espionage would come to light. The full account of Cairncross's spying, his confession and his dramatic public exposure as the ‘fifth man’ is told here for the first time, unveiling the story of his post-espionage life.
This is the first major study based on Soviet documents and revelations of the Soviet state security during the period 1939-1953--a period about which relatively little is known. The book documents the role of Stalin and the major players in massive crimes carried out during this period against the Soviet people. It also provides the first detailed biography of V. S. Abakumov, Minister of State Security, 1946-1951. Based on Glasnost revelations and recently released archival material, this study covers the operations of Soviet state security from Beriia's appointment in 1938 until Stalin's death. The book pays particular attention to the career of V. S. Abakumov, head of SMERSH counterintelligence during the war and minister in charge of the MGB (the predecessor of the KGB) from 1946 until his removal and arrest in July 1951. The author argues that terror remained the central feature of Stalin's rule even after the Great Terror and he provides examples of how he micromanaged the repressions. The book catalogs the major crimes committed by the security organs and the leading perpetrators and provides evidence that the crimes were similar to those for which the Nazi leaders were punished after the war. Subjects covered include Katyn and its aftermath, the arrest and execution of senior military officers, the killing of political prisoners near Orel in September 1941, and the deportations of various nationalities during the war. The post-war period saw the Aviator and Leningrad affairs as well as the anti-cosmopolitan campaign whose target was mainly Jewish intellectuals. Later chapters cover AbakumoV's downfall, the hatching of the Mingrelian and Doctors plots and the events that followed Stalin's death. Finally, there are chapters on the fate of those who ran Stalin's machinery of terror in the last 13 years of his rule. These and other topics will be of concern to all students and scholars of Soviet history and those interested in secret police and intelligence operations.
Developing Intelligence Theory analyses the current state of intelligence theorisation, provides a guide to a range of approaches and perspectives, and points towards future research agendas in this field. Key questions discussed include the role of intelligence theory in organising the study of intelligence, how (and how far) explanations of intelligence have progressed in the last decade, and how intelligence theory should develop from here. Significant changes have occurred in the security intelligence environment in recent years-including transformative information technologies, the advent of 'new' terrorism, and the emergence of hybrid warfare-making this an opportune moment to take stock and consider how we explain what intelligence does and how. The material made available via the 2013 Edward Snowden leaks and subsequent national debates has contributed much to our understanding of contemporary intelligence processes and has significant implications for future theorisation, for example, in relation to the concept of 'surveillance'. The contributors are leading figures in Intelligence Studies who represent a range of different approaches to conceptual thinking about intelligence. As such, their contributions provide a clear statement of the current parameters of debates in intelligence theory, while also pointing to ways in which the study of intelligence continues to develop. This book was originally published as a special issue of Intelligence and National Security.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners.
What makes a good missionary makes a good American spy, or so thought Office of Special Services (OSS) founder "Wild" Bill Donovan when he recruited religious activists into the first ranks of American espionage. Called upon to serve Uncle Sam, Donovan's recruits saw the war as a means of expanding their godly mission, believing an American victory would guarantee the safety of their fellow missionaries and their coreligionists abroad. Drawing on never-before-seen archival materials, acclaimed historian Matthew Sutton shows how religious activists proved to be true believers in Franklin Roosevelt's crusade for global freedom of religion. Sutton focuses on William Eddy, a warrior for Protestantism who was fluent in Arabic; Stewart Herman, a young Lutheran minister rounded up by the Nazis while pastoring in Berlin; Stephen B. L. Penrose, Jr., who left his directorship over missionary schools in the Middle East to join the military rank and file; and John Birch, a fundamentalist missionary in China. Donovan chose these men because they already had the requisite skills for good intelligence analysis, espionage, and covert operations, skills that allowed them to seamlessly blend into different environments. Working for eternal rewards rather than temporal spoils, they proved willing to sacrifice and even to die for their country during the conflict, becoming some of the United States' most loyal secret soldiers. Acutely aware of how their actions conflicted with their spiritual calling, these spies nevertheless ran covert operations in the centers of global religious power, including Mecca, the Vatican, and Palestine. In the end, they played an outsized role in leading the US to victory in WWII: Eddy laid the groundwork for the Allied invasion of North Africa, while Birch led guerilla attacks against the Japanese and, eventually, Chinese Communists. After the war, some of them -- those who survived -- helped launch the Central Intelligence Agency, so that their nation, and American Christianity, could maintain a strong presence throughout the rest of the world. Surprising and absorbing at every turn, Double Crossedis an untold story of World War II spycraft and a profound account of the compromises and doubts that war forces on those who wage it.
The world's fastest growing continent demographically, Africa displays nearly all the features of today's global security challenges: armed conflict, terrorism, irregular migration, organized crime, great power competition, public discontent, and economic turbulence. John Siko and Jonah Victor present their lessons from professional practice and pedagogical approach from the classroom in a concise guidebook that leads students and professionals through the most important issues, dynamics, challenges, and considerations for analysing and planning responses to security developments in Africa. This book provides issue-by-issue primers on the causes and consequences of Africa's security challenges that include: -how to anticipate security problems across current political and economic events -how to analyse African security institutions and military capabilities -how to understand historical trends across the African continent and appreciate unique variations among countries. -how to identify key drivers of future trends -how to connect security analysis to policy planning Learning is supported through the following features: - Thematic chapters which are optimized to help the reader quickly connect to the key concepts and analytic frameworks within the field. - The most relevant historical case studies, enabling students to engage in sophisticated analysis and discussion. - Connections and contrasts between the situations in North Africa and sub-Saharan Africa, which are traditionally studied separately. - Special sections on understanding race and ethnicity, and advice on traveling in Africa. - Chapter-end checklists of key questions to enable practical engagement with the topics covered.
During the Second World War, the only way Winston Churchill and his American counterpart Franklin D. Roosevelt could communicate was via a top secret transatlantic telephone link. All other Atlantic telephone cables had been disconnected to prevent the Germans intercepting information. Ruth Ive, then a young stenographer working in the Ministry of Information, had the job of censoring the line, and she spent the rest of the war listening in to the conversations across the Atlantic, ready to cut the line if anything was said that might compromise security. Ruth was sworn to secrecy about her work, and at the end of the war all documentation proving the existence of the telephone line was destroyed. It was not until 1995, when Churchill's private files were finally declassified, that Ruth was able to research her story. Now, for the first time, one of the Second World War's key workers describes the details of her incredible story, and the private conversations of two of the war's most important players can be revealed. |
![]() ![]() You may like...
At School in the World - Developing…
Carine E. Ullom, Nilufer Guler
Paperback
R1,133
Discovery Miles 11 330
Collaborative Approaches to Recruiting…
Maria Peterson-Ahmad, Vicki L. Luther
Hardcover
R5,784
Discovery Miles 57 840
Annotated Leading Cases of International…
Andre Klip, Goran Sluiter
Paperback
R5,870
Discovery Miles 58 700
Computer and Intrusion Forensics
George Mohay, Alison Anderson, …
Hardcover
R2,797
Discovery Miles 27 970
|