Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The most comprehensive history of Canadian military intelligence and its influence on key military operations Canadian intelligence has become increasingly central to the operations of the Canadian Armed Forces (CAF). Canadian Military Intelligence: Operations and Evolution from the October Crisis to the War in Afghanistan is the first comprehensive history that examines the impact of tactical, operational, and strategic intelligence on the Canadian military. Drawing upon a wide range of original documents and interviews with participants in specific operations, author David A. Charters provides an inside perspective on the development of military intelligence since the Second World War. He shows how intelligence influenced key military operations, from domestic internal security to peacekeeping efforts to high-intensity air campaigns-including the October Crisis of 1970, the Oka Crisis, the Gulf War, peacekeeping and enforcement operations in the Balkans, and the war in Afghanistan. He describes how decades of experience, innovation, and increasingly close cooperation with its Five Eyes and NATO allies allowed Canada's military intelligence to punch above its weight. Its tactical effectiveness and ability to overcome challenges reshaped the outlook of military commanders, and intelligence emerged from the margins to become a central feature of military and defense operations. Canadian Military Intelligence offers lessons from the past and critical implications for future intelligence support with the creation of the Canadian Forces Intelligence Command. This book will be essential to both intelligence history and military history readers and collections.
Security intelligence continues to be of central importance to the contemporary world: individuals, organizations and states all seek timely and actionable intelligence in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and to what ends? How can we ensure that intelligence is not abused? In this third edition of their classic text, Peter Gill and Mark Phythian set out a comprehensive framework for the study of intelligence, discussing how states organize the collection and analysis of information in order to produce intelligence, how it is acted upon, why it may fail and how the process should be governed in order to uphold democratic rights. Fully revised and updated throughout, the book covers recent developments, including the impact of the Snowden leaks on the role of intelligence agencies in Internet and social media surveillance and in defensive and offensive cyber operations, and the legal and political arrangements for democratic control. The role of intelligence as part of 'hybrid' warfare in the case of Russia and Ukraine is also explored, and the problems facing intelligence in the realm of counterterrorism is considered in the context of the recent wave of attacks in Western Europe. Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of inquiry - one that everyone has an interest in understanding.
Based on OSS records only recently released to US National Archives, and on evidence from British archival sources, this is a thoroughly researched study of the Office of Strategic Services in London. The OSS was a critical liaison and operational outpost for American intelligence during World War II. Dr MacPherson puts the activities of the OSS into the larger context of the Anglo-American relationship and the various aspects of intelligence theory, while examining how a modern American intelligence capability evolved.
The Cold War, which lasted from the end of the Second World War to the collapse of the Soviet Union in 1991, was fought mostly in the shadows, with the superpowers manoeuvring for strategic advantage in an anticipated global armed confrontation that thankfully never happened. How did the intelligence organisations of the major world powers go about their work? What advantages were they looking for? Did they succeed? By examining some of the famous, infamous, or lesser-known intelligence operations from both sides of the Iron Curtain, this book explains how the superpowers went about gathering intelligence on each other, examines the type of information they were looking for, what they did with it, and how it enabled them to stay one step ahead of the opposition. Possession of these secrets threatened a Third World War, but also helped keep the peace for more than four decades. With access to previously unreleased material, the author explores how the intelligence organisations, both civilian and military, took advantage of rapid developments in technology, and how they adapted to the changing threat. The book describes the epic scale of some of these operations, the surprising connections between them, and how they contributed to a complex multi-layered intelligence jigsaw which drove decision making at the highest level. On top of all the tradecraft, gadgets and cloak and dagger', the book also looks at the human side of espionage: their ideologies and motivations, the winners and losers, and the immense courage and frequent betrayal of those whose lives were touched by the Secrets of the Cold War.
Asia represented the hottest theatre of the Cold War, with several declared and undeclared wars always in progress. Examining the Asian dimension of this struggle, this volume describes and analyzes a range of clandestine activities from intelligence and propaganda to special operations and security support. It draws on documents declassified after the end of the Cold War.
This is the first book to appear on British intelligence operations based in both India and London, which defended the Indian Empire against subversion during the first two decades of the twentieth century. It is concerned with the threat to the British Raj posed by the Indian revolutionary movement, the resulting development of the imperial intelligence service and the role it played during the First World War.
The incredible true story of the only woman to have worked during the Second World War as a codebreaker at both Bletchley Park and the Pentagon   Betty Webb is the only surviving codebreaker to have worked on both Nazi and Japanese codes at Bletchley Park during the Second World War. This is the tale of her extraordinary life. Betty has had a ringside seat to history. Born one hundred years ago, she spent her childhood in the Shropshire countryside during the 1920s – without heating, electricity or running water. As a schoolgirl, thanks to her mother’s desire for her to learn to speak German proficiently, she took part in an exchange programme and spent time in Nazi Germany. It was 1937 and Germany was on the cusp of war. As a small act of rebellion, she refused to give the Nazi salute alongside her classmates. Back in England, after graduating from school, Betty faced the usual limited opportunities for employment on offer to women at the time. However, with the war in full swing, fate intervened and in 1941, wanting to play her part in the war effort, Betty joined the Auxiliary Territorial Service (Women’s Army). After being interviewed by an intelligence officer, she found herself at Euston station with her kit-bag, a travel warrant in her pocket and instructions to get off the train at Bletchley Park. There, having signed the Official Secrets Act with a gun laid next to her on the table highlighting the enormous importance of the work she was about to do, she joined the ranks of the other men and women ‘codebreakers’. Between 1941 and 1945 Betty Webb played a vital role in the top-secret efforts being made to decipher the secret communications of the Germans and later the Japanese. In 1945, as other members of the forces returned home from the war in Europe, she was sent to the Pentagon and was in Washington DC when the atomic bombs fell and when Eisenhower announced the end of the war. Betty was unable to reveal the true nature of her work, even to her parents, until years later. In this fascinating book, she revisits the key moments of her life and recounts the incredible stories from her time at Bletchley Park.
The enigmatic science of military intelligence is examined in this personal record, written by Brig.Gen. Oscar W. Koch, who served during World War II as chief of intelligence for General George S. Patton, Jr., one of the most colorful military leaders in American history. General Koch traces the growth and development of the infant science through detailed accounts of the intelligence role in some of the most celebrated battles of the war, and through his personal remembrances of Patton and his relationships with members of his intelligence staff. His story moves from the African campaign through Sicily, into France on D-Day and on to the Battle of the Bulge, pointing out how the work of the intelligence staff made the differences in the final reckoning. General Koch's book is more than a historical study, however. It is the exciting story of the operations behind the cloak and dagger illusions.
You know about MI5. You know about MI6.
Foreword by Rabbi Abraham Cooper, Associate Dean, Simon Wiesenthal Center A real-life adventure story told by a New York Times bestselling author and war correspondent who reveals how he became a hostage, an arms dealer, and an Israeli spy. And the Rest Is History takes readers on a traveling circus from Paris to Beirut, Baghdad, and beyond, introducing them to spies and terrorists, arms dealers and crooks, and along the way reveals a few surprises about the secret underbelly of recent history you won't find in WikiLeaks. This book pinpoints precisely when the era of "fake news" actually began in America, and will change the way you think about journalism and journalists. It includes: * riveting testimony of the author's torture and born-again experience as a hostage in a Beirut cellar; * unusual insight into the beginnings of the Iran-Contra scandal; * eyewitness reporting from the battlefields of the Middle East; * the inside scoop on Saddam Hussein's WMD programs; * astonishing stories of French government dirty tricks, the intelligence underworld, Israeli hostage negotiations, and the real-life escapades of a Soviet sleeper agent. And the Rest Is History is a reporter's journey from Left-Bank leftist to born-again Christian conservative. But most of all it's a rollicking good read full of unusual characters, places, and events you will never hear about on the evening news. "Ken Timmerman is a superb investigative reporter-and old school-which means he does his research. His behind-the-scenes adventures in Iraq, Syria, Egypt, Israel, and even France are a terrific read for those of us who share his passion for tracking down the facts, not molding the facts to a 'narrative.'" -Peter Schweizer, president of the Government Accountability Institute and NY Times bestselling author of Clinton Cash and Profiles in Corruption "I have followed for some time your excellent reporting on the Mid-East. You consistently provide insights and facts nowhere else available to the public. Your professionalism and persistence make a great contribution to our understanding, to the public debate, and ultimately to our national security." -R. James Woolsey, former director, Central Intelligence Agency "I have spent my life tracking the murderers of yesterday. Mr. Timmerman is tracking the murderers of tomorrow." -Nazi hunter Simon Wiesenthal, introducing the author to an audience in Paris, France, in 2002
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as 'target centric' intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject. The book is general enough in nature that a lay student-interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement-will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations. Uses numerous hands-on activities-that can easily be modified by instructors to be more or less challenging depending on the course level-to reinforce concepts As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information As such, the non-sensitive information presented is appropriate-and methods applicable-for use for education and training overseas and internationally Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.
Developing Intelligence Theory analyses the current state of intelligence theorisation, provides a guide to a range of approaches and perspectives, and points towards future research agendas in this field. Key questions discussed include the role of intelligence theory in organising the study of intelligence, how (and how far) explanations of intelligence have progressed in the last decade, and how intelligence theory should develop from here. Significant changes have occurred in the security intelligence environment in recent years-including transformative information technologies, the advent of 'new' terrorism, and the emergence of hybrid warfare-making this an opportune moment to take stock and consider how we explain what intelligence does and how. The material made available via the 2013 Edward Snowden leaks and subsequent national debates has contributed much to our understanding of contemporary intelligence processes and has significant implications for future theorisation, for example, in relation to the concept of 'surveillance'. The contributors are leading figures in Intelligence Studies who represent a range of different approaches to conceptual thinking about intelligence. As such, their contributions provide a clear statement of the current parameters of debates in intelligence theory, while also pointing to ways in which the study of intelligence continues to develop. This book was originally published as a special issue of Intelligence and National Security.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners.
'One of the biggest intelligence coups in recent years' The Times For years KGB operative Vasili Mitrokhin risked his life hiding top-secret material from Russian secret service archives beneath his family dacha. When he was exfiltrated to the West he took with him what the FBI called 'the most complete and extensive intelligence ever received from any source'. This extraordinary bestselling book is the result. 'Co-authored in a brilliant partnership by Christopher Andrew and the renegade Soviet archivist himself ... This is a truly global expose of major KGB penetrations throughout the Western world' The Times 'This tale of malevolent spymasters, intricate tradecraft and cold-eyed betrayal reads like a cold war novel' Time 'Sensational ... the most informed and detailed study of Soviet subversive intrigues worldwide' Spectator 'The most comprehensive addition to the subject ever published' Sunday Telegraph
This is the first major study based on Soviet documents and revelations of the Soviet state security during the period 1939-1953--a period about which relatively little is known. The book documents the role of Stalin and the major players in massive crimes carried out during this period against the Soviet people. It also provides the first detailed biography of V. S. Abakumov, Minister of State Security, 1946-1951. Based on Glasnost revelations and recently released archival material, this study covers the operations of Soviet state security from Beriia's appointment in 1938 until Stalin's death. The book pays particular attention to the career of V. S. Abakumov, head of SMERSH counterintelligence during the war and minister in charge of the MGB (the predecessor of the KGB) from 1946 until his removal and arrest in July 1951. The author argues that terror remained the central feature of Stalin's rule even after the Great Terror and he provides examples of how he micromanaged the repressions. The book catalogs the major crimes committed by the security organs and the leading perpetrators and provides evidence that the crimes were similar to those for which the Nazi leaders were punished after the war. Subjects covered include Katyn and its aftermath, the arrest and execution of senior military officers, the killing of political prisoners near Orel in September 1941, and the deportations of various nationalities during the war. The post-war period saw the Aviator and Leningrad affairs as well as the anti-cosmopolitan campaign whose target was mainly Jewish intellectuals. Later chapters cover AbakumoV's downfall, the hatching of the Mingrelian and Doctors plots and the events that followed Stalin's death. Finally, there are chapters on the fate of those who ran Stalin's machinery of terror in the last 13 years of his rule. These and other topics will be of concern to all students and scholars of Soviet history and those interested in secret police and intelligence operations.
During the Second World War, the only way Winston Churchill and his American counterpart Franklin D. Roosevelt could communicate was via a top secret transatlantic telephone link. All other Atlantic telephone cables had been disconnected to prevent the Germans intercepting information. Ruth Ive, then a young stenographer working in the Ministry of Information, had the job of censoring the line, and she spent the rest of the war listening in to the conversations across the Atlantic, ready to cut the line if anything was said that might compromise security. Ruth was sworn to secrecy about her work, and at the end of the war all documentation proving the existence of the telephone line was destroyed. It was not until 1995, when Churchill's private files were finally declassified, that Ruth was able to research her story. Now, for the first time, one of the Second World War's key workers describes the details of her incredible story, and the private conversations of two of the war's most important players can be revealed.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
The world's fastest growing continent demographically, Africa displays nearly all the features of today's global security challenges: armed conflict, terrorism, irregular migration, organized crime, great power competition, public discontent, and economic turbulence. John Siko and Jonah Victor present their lessons from professional practice and pedagogical approach from the classroom in a concise guidebook that leads students and professionals through the most important issues, dynamics, challenges, and considerations for analysing and planning responses to security developments in Africa. This book provides issue-by-issue primers on the causes and consequences of Africa's security challenges that include: -how to anticipate security problems across current political and economic events -how to analyse African security institutions and military capabilities -how to understand historical trends across the African continent and appreciate unique variations among countries. -how to identify key drivers of future trends -how to connect security analysis to policy planning Learning is supported through the following features: - Thematic chapters which are optimized to help the reader quickly connect to the key concepts and analytic frameworks within the field. - The most relevant historical case studies, enabling students to engage in sophisticated analysis and discussion. - Connections and contrasts between the situations in North Africa and sub-Saharan Africa, which are traditionally studied separately. - Special sections on understanding race and ethnicity, and advice on traveling in Africa. - Chapter-end checklists of key questions to enable practical engagement with the topics covered.
When the Germans invaded her small Belgian village in 1914, Marthe Cnockaert's home was burned and her family separated. After getting a job at a German hospital, and winning the Iron Cross for her service to the Reich, she was approached by a neighbor and invited to become an intelligence agent for the British. Not without trepidation, Cnockaert embarked on a career as a spy, providing information and engaging in sabotage before her capture and imprisonment in 1916. After the war, she was paid and decorated by a grateful British government for her service. Cnockaert's is only one of the surprising and gripping stories that comprise Female Intelligence. This is the first history of the female spies who served Britain during World War I, focusing on both the powerful cultural images of these women and the realities, challenges, and contradictions of intelligence service. Between the founding of modern British intelligence organizations in 1909 and the demobilization of 1919, more than 6,000 women served the British government in either civil or military occupations as members of the intelligence community. These women performed a variety of services, and they represented an astonishing diversity of nationality, age, and class. From Aphra Behn, who spied for the British government in the seventeenth century, to the most well known example, Mata Hari, female spies have a long history, existing in juxtaposition to the folkloric notion of women as chatty, gossipy, and indiscreet. Using personal accounts, letters, official documents and newspaper reports, Female Intelligence interrogates different, and apparently contradictory, constructions of gender in the competing spheres of espionage activity.
The harrowing, and inspiring, story of the capture of one of Britain's top SOE agents in World War Two, his refusal to crack under the most horrific torture, and his final imprisonment in a concentration camp. 'The White Rabbit' was the code name of Wing Commander F.F.E. Yeo-Thomas when he parachuted into France in 1942 as a member of the Special Operations Executive with the Resistance. For the next eighteen months he was responsible for organising all the separate factions of the French Resistance into one combined 'secret army'. On three separate missions into occupied France he met with the heads of Resistance movements all over the country, and he spoke personally with Winston Churchill in order to ensure they were properly supplied. His capture by the Gestapo in March 1944 was therefore a terrible blow for the Resistance movement. For months he was submitted to the most horrific torture in an attempt to get him to spill his unparalleled knowledge of the Resistance, but he refused to crack. Finally he was sentenced to death, and sent to Buchenwald, one of the most infamous German concentration camps. The story of his endurance, and survival, is an inspiring study in the triumph of the human spirit over the most terrible adversity.
Cover Name: Dr. Rantzau is a gripping diary-like personal account of espionage during the Second World War and is one of very few historic memoirs written by an ex- Abwehr officer. Detailed is how Colonel Nikolaus Ritter, following a brief World War I career and over ten years as a businessman in America, returned to Germany in spring of 1935 and became Chief of Air Intelligence in the Abwehr. He was assigned to establish a network of agents to gather information on British and US airfields, aircrafts, and state-of-the-art developments in the aerospace industry. Among others, Ritter's cover names were Dr. Rantzau and Dr. Reinhard in Holland, Belgium, and Luxembourg, Dr. Jansen in Hungary, Dr. Renken in Germany, and Mr. Johnson in America. Throughout his service in the Abwehr, Ritter smuggled America's most jealously guarded secret, the Norden bombsight and the Sperry gyroscope, into Germany, and coordinated the planning for the invasion of the British Isles (Operation Sea Lion). Ritter was incarcerated by the British in 1945 and sent to the Bad Nenndorf interrogation centre. Katharine Ritter Wallace, the daughter of Col. Ritter, presents the first English translation of the German World War II memoir. With a combination of collected documents, correspondences, personal notes, communications with peers, and from memory, this captivating account by an espionage agent reveals an insider's glimpse of the German intelligence service and of a handler's expansive and diverse agent network.
Many aspects of the Tet offensive of 1968 are brought to light here. The offensive is acknowledged as the turning point of the Vietnam War. Using Communist Vietnamese documents combined with Western sources, the author provides a more accurate version of the events, their significance, and reveals the crucial role played by US intelligence. This book illustrates that in the 1960s the Communist Vietnamese were well aware of the political and diplomatic nature of a People's War.
The real story of how Winston Churchill and the British mastered deception to defeat the Nazis - by conning the Kaiser, hoaxing Hitler and using brains to outwit brawn. By June 1940, most of Europe had fallen to the Nazis and Britain stood alone. So, with Winston Churchill in charge the British bluffed their way out of trouble, drawing on the trickery which had helped them win the First World War. They broadcast outrageous British propaganda on pretend German radio stations, broke German secret codes and eavesdropped on their messages. Every German spy in Britain was captured and many were used to send back false information to their controllers. Forged documents misled their intelligence. Bogus wireless traffic from entire phantom armies, dummy airfields with model planes, disguised ships and inflatable rubber tanks created a vital illusion of strength. Culminating in the spectacular misdirection that was so essential to the success of D-Day in 1944, Churchill's Wizards: The British Genius for Deception 1914-1945 is a thrilling work of popular military history filled with almost unbelievable stories of bravery, creativity and deception. Nicholas Rankin is the author of Dead Man's Chest, Telegram From Guernica and Ian Fleming's Commandos. 'This is a story clamouring to be told. We could not have imagined the scope of the inventiveness, the daring of these people's imaginations . . . I could not stop reading this book.' Doris Lessing |
You may like...
The Central Intelligence Agency…
Athan G. Theoharis, Richard H. Immerman, …
Hardcover
R2,804
Discovery Miles 28 040
Secrets in a Dead Fish - The Spying Game…
Melanie King
Hardcover
(1)
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,578
Discovery Miles 55 780
The Billion Dollar Spy - A True Story of…
David E. Hoffman
Paperback
(1)
|