![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
How can the United States guard against a clever unknown enemy while still preserving the freedoms it holds dear? Hulnick explains the need to revamp U.S. intelligence operations from a system focused on a single Cold War enemy to one offering more flexibility in combating non-state actors (including terrorists, spies, and criminals) like those responsible for the attacks of September 11, 2001. Offering possible solutions not to be found in the federal commission's official report, Hulnick's groundbreaking work examines what is really necessary to make intelligence and homeland security more efficient and competent, both at within the United States and abroad. The U.S. government's progress in establishing a system for homeland security is considerable, yet, besides shifts in alert status, most U.S. residents are unaware of the work being done to keep them safe. Describing the system already in place, Hulnick adds further ideas about what more is needed to protect Americans in the ever-changing world of intelligence. To create a truly valuable program, it is suggested the the United States consider not only new strategies and tactics, but also the need to break down the barriers between intelligence agencies and law enforcement.
In the spring of 1944, Adolf Hitler firmly believed that the Allies would invade the Continent by landing troops on the beaches of Normandy, but anti-Nazi officers in German Intelligence ultimately persuaded him that Normandy would be a mere diversion. The "real" invasion, Hitler was assured, would be at Calais. "Righteous Deception" focuses on the activities of two officers whose consciences kept them from siding with Hitler and the Nazis. Their campaign of misinformation and deception convinced Hitler to keep half of the German forces in northern France to defend against an invasion that would never come. This decision ultimately cost Hitler the war. Admiral Wilhelm Canaris, head of German Military Intelligence, turned against Hitler within a year after he had come to power. Canaris and his circle of friends in an opposition movement known as the "Schwarze Kapelle" (Black Orchestra) did everything possible to prevent Hitler from winning the war, which believed would be a catastrophe. Colonel Alexis von Roenne headed the "Fremde Heere West," the branch of Intelligence responsible for evaluating the strength of Allied forces. In a key position to alter findings and other information pertaining to Allied forces in Britain, he doubled the estimated number of troops assembling for D-Day, giving the impression that the Allies had enough men and equipment in Britain for both an invasion in Calais and a diversion in Normandy.
In this concise introduction to the complexities of contemporary western intelligence and its dynamics during an era of globalization, Adam Svendsen discusses intelligence cooperation in the early 21st century, with a sharp focus on counter-terrorism and WMD counter-proliferation during the 'War on Terror.'
The Lockwood Analytical Method for Prediction (LAMP) is a systematic technique for predicting short-term, unique behaviors. Using primarily qualitative empirical data, LAMP allows the analyst to predict the most likely outcomes for specific research questions across a wide range of intelligence problems, such as cyber threats in the U.S., the possibility of an Al Qaeda attack, the likelihood of Iran providing nuclear capability to terrorist groups, or the future actions of the Mexican drug cartel. LAMP offers an innovative and powerful method for organizing all available information based on the perceptions of the national actors, using it to make relevant predictions as to which alternate future is most likely to occur at a given moment in time. Its transparent structure enables anyone to see how an analyst gets from point A to point B to produce an intelligence estimate. LAMP differs from other analytical techniques in that it is based on determining the relative probability of a range of alternate futures, rather than attempting to determine the quantitative probability of their occurrence. After explaining its theoretical framework, the text leads the reader through the process of predictive analysis before providing practical case studies showing how LAMP is applied against real world problems, such as the possible responses of Israel, the U.S., and Lebanon to the behavior of Hezbollah or the competing visions of the future of Afghanistan. Evaluation of the method is provided with the case studies to show the effectiveness of the LAMP predictions over time. The book is complemented by a website with downloadable software for use by students of intelligence in conducting their own predictive analysis. It will be an essential tool for the analyst and the student, not only for national security issues but also for competitive intelligence.
A highly valuable resource for students of intelligence studies, strategy and security, and foreign policy, this volume provides readers with an accessible and comprehensive exploration of U.S. espionage activities that addresses both the practical and ethical implications that attend the art and science of spying. Essentials of Strategic Intelligence investigates a subject unknown to or misunderstood by most American citizens: how U.S. foreign and security policy is derived from the information collection operations and data analysis by the sixteen major U.S. intelligence agencies. The essays in this work draw back the curtain on the hidden side of America's government, explaining the roles of various intelligence missions, justifying the existence of U.S. intelligence agencies, and addressing the complex moral questions that arise in the conduct of secret operations. After an introductory overview, the book presents accessibly written essays on the key topics: intelligence collection-and-analysis, counterintelligence, covert action, and intelligence accountability. Readers will understand how intelligence directly informs policymakers and why democracies need secret agencies; learn how the CIA has become deeply involved in the war-like assassination operations that target suspected foreign terrorists, even some individuals who are American citizens; and appreciate how the existence of-and our reliance on-these intelligence agencies poses challenges for democratic governance. Provides a comprehensive, up-to-date examination of all aspects of intelligence by experts in the field, from collection-and-analysis and counterintelligence to covert action and accountability Probes into how the United States' intelligence agencies attempt to protect the nation from cyberattacks by foreign nations and terrorist groups-and documents the successes and failures Documents the involvement of the National Security Agency (NSA) in bulk "metadata" collection of information on the telephone records and social media communications of American citizens Examines the effects that have resulted from major leaks in the U.S. government, from Wikileaks to the NSA Snowden leaks
This volume gathers 19 papers first presented at the 5th International Symposium of the ICA Commission on the History of Cartography, which took place at the University of Ghent, Belgium on 2-5 December 2014. The overall conference theme was 'Cartography in Times of War and Peace', but preference was given to papers dealing with the military cartography of the First World War (1914-1918). The papers are classified by period and regional sub-theme, i.e. Military Cartography from the 18th to the 20th century; WW I Cartography in Belgium, Central Europe, etc.
This book gives the true inside picture of the CIA during the Cold War and how the agency saw the events in which it was involved. Breckinridge started his career with the CIA as a briefing officer (and within a year had become White House Briefing Officer) in 1953 and concluded it as Deputy Inspector General in 1979. The issues Breckinridge reports on--the Bay of Pigs, the Warren Commission Report, Vietnam, Watergate, Chile, plots against foreign leaders, the Ramparts controversy, Laos, the Church and Pike committees--are among the most controversial in the lives of Americans since the mid-twentieth century. Breckinridge demostrates that the CIA was not a "rogue elephant" but an agency acting under high level policy directives, and he reveals a great deal about the internal life of the CIA.
This book examines the digital explosion that has ripped across the battlefield, weaponising our attention and making everyone a participant in wars without end. 'Smart' devices, apps, archives and algorithms remove the bystander from war, collapsing the distinctions between audience and actor, soldier and civilian, media and weapon. This has ruptured our capacity to make sense of war. Now we are all either victims or perpetrators. In 'Radical War', Ford and Hoskins reveal how contemporary war is legitimised, planned, fought, experienced, remembered and forgotten in a continuous and connected way, through digitally saturated fields of perception. Plotting the emerging relationship between data, attention and the power to control war, the authors chart the complex digital and human interdependencies that sustain political violence today. Through a unique, interdisciplinary lens, they map our disjointed experiences of conflict and illuminate this dystopian new ecology of war.
With intensified threats to global security from international terrorism worldwide, education systems themselves face these same unprecedented security threats. Schools and universities have become marked loci of interest for the monitoring of extremism and counter-terrorism by security and intelligence agencies. The relationship between education systems and national security is nothing new though - it extends in surprising and unexpected ways into territory which is by turns open and covert, even secret. Acknowledging the genuine political and security concerns which have drawn educational systems ever closer to the intelligence community, this book shows how and why this has happened, and explains why the relationship between education and the security and intelligence communities extends beyond contemporary concerns with counter-terrorism. As the title of this book demonstrates, this is as much an intellectual challenge as a security struggle. Education, Security and Intelligence Studies thus critically engages with multi-disciplinary perspectives on a complex and contentious interface: between systems of often secret and covert national security and intelligence and open systems of national education. Delving into difficult to access and often closely guarded aspects of public life, the book provides the pathfinding groundwork and theoretical modelling for research into a complex of little explored institutional and epistemological interconnectedness between universities and the security and intelligence agencies. This book was originally published as a special issue of the British Journal of Educational Studies.
With a Foreword by Lord Hague of Richmond The Intelligence Corps is one of the smallest and most secretive elements of the British Army. It has existed in various guises since the early twentieth century, but it was only formally constituted in July 1940. In this book, Michael Ashcroft tells the astonishing stories of some of its most courageous and ingenious figures, who have operated all over the world from the First World War to the present day. Whether carrying out surveillance work on the street, monitoring and analysing communications, working on overseas stakeouts, receiving classified information from a well-placed contact or interrogating the enemy in the heat of war, a hugely diverse range of people have served in the Corps, often supplementing their individual professional skills with original thinking and leadership in the name of the Crown. This book pays tribute to them and shows why, in the words of the 1st Duke of Marlborough, 'No war can be conducted successfully without early and good intelligence.'
This book tells of intelligence successes never before reported, each involving the author during a most unusual career spanning three wars. It gives first-hand accounts which counter the recent bad press received by fine intelligence organizations.
Irish neutrality during the Second World War presented Britain with
significant challenges to its security. Exploring how British
agencies identified and addressed these problems, this book reveals
how Britain simultaneously planned sabotage in and spied on
Ireland, and at times sought to damage the neutral state's
reputation internationally through black propaganda operations. It
analyses the extent of British knowledge of Axis and other
diplomatic missions in Ireland, and shows the crucial role of
diplomatic code-breaking in shaping British policy. The book also
underlines just how much Ireland both interested and irritated
Churchill throughout the war.
The Very Best Men tells the story of the four men who ran covert operations for the CIA from World War II to Vietnam. Frank Wisner was a wealthy southern gentleman who arrived in Washington via Wall Street and whose wife ran the most active salon in Georgetown. He was the creator of the Office of Policy Coordination, the CIA's covert action wing. Wisner helped foment the failed revolution in Hungary in 1956. Wisner had a breakdown, and committed suicide in 1965. Richard Bissell took over the OPC after Wisner's breakdown, and presided over the Agency's wildest days. He ordered the assassination of several foreign leaders and organised a series of attempted coups. When John F. Kennedy was elected in 1960, Bissell introduced himself to the new president as 'your basic man-eating shark'. Five months later Bissell was forced to resign over the Bay of Pigs. Tracy Barnes served under Wisner and Bissell, and oversaw the Bay of Pigs operation. With Bissell he hired the mafia to kill Castro. He was never at a loss for ideas. Unfortunately, he had trouble telling the good ones from the bad. He was quietly dismissed from the Agency in 1966. Desmond Fitzgerald ran the secret wars in Laos and Tibet. Later, he organised assassination plots against Castro. He was also responsible for covering them up, fearing that the CIA would be linked to Kennedy's assassination. Drawing on extensive interviews with former operatives, Thomas has written a highly readable narrative that brings to life a crucial period of American history. About the Author Evan Thomas is assistant managing editor of Newsweek. He has written more than a hundred cover stories on national and international news. He has won two National Magazine Awards and he has taught writing at Harvard and Princeton. He has written seven books, one of which, John Paul Jones, was a New York Times bestseller. He is a fellow of the Society of American Historians. He lives in Washington DC.
This edited book provides an insight into the new approaches, challenges and opportunities that characterise open source intelligence (OSINT) at the beginning of the twenty-first century. It does so by considering the impacts of OSINT on three important contemporary security issues: nuclear proliferation, humanitarian crises and terrorism.
This book, first published in 1985, is an in-depth analysis of the Luftwaffe in the Second World War, using previously untapped German archives and newly-released 'Ultra' intelligence records. It looks at the Luftwaffe within the context of the overall political decision-making process within the Third Reich. It is especially valuable for its careful study of industrial production and pilot losses in the conduct of operations.
"Spies of the Kaiser" examines the scope and objectives of German
covert operations in Great Britain before and during the First
World War. It assesses the effect of German espionage on
Anglo-German relations and discusses the extent to which the fear
of German espionage in the United Kingdom shaped the British
intelligence community in the early twentieth century. The study is
based on original archival material, including hitherto unexploited
German records and recently declassified British documents.
This is the first full-length study of the role played by British Intelligence in influencing policy towards Japan from the decline of the Alliance to the outbreak of the Pacific War. Using many previously classified records it describes how the image of Japan generated by Intelligence during this period led Britain to underestimate Japanese military capabilities in 1941. The book shows how this image was derived from a lack of adequate intelligence resources and racially driven assumptions about Japanese national characteristics.
Codenames were a vital feature of World War II, serving as mental shorthand for those in the know, and obscuring the issues for those who were not. Codenames were used from the highest level, in the planning of grand strategic moves affecting the conduct of the whole war, to the lowest command divisions, in the conduct of small-scale tactical operations. This encyclopedia, first published in 1986, removes the mystery surrounding many of the important code names from the era. With around 3,000 entries drawn from all sides - the U.K., U.S.A., Germany, the U.S.S.R. and Japan - Christopher Chant's work provides a uniquely comprehensive and full overview of major operations, names and code words. Thorough and exciting, this key reference reissue is an exceptionally valuable resource for military historians, enthusiasts and general readers with an interest in World War II.
Reliable information on potential security threats is not just the result of diligent intelligence work but also a product of context and culture. The volume explores the nexus between the intelligence process and strategic culture. How can and does the strategic outlook of the United States and the United Kingdom in particular, influence the intelligence gathering, assessment and dissemination process? This book contains an assessment of how political agendas and ideological outlook have significant influence on both the content and process of intelligence. It looks in particular at the premise of hearts and minds policies, culture and intelligence gathering in counterinsurgency operations; at case studies from imperial Malaya and Iran in the 1950s and at instances of intelligence failure, e.g. the case of Iraq in 2003. How was intelligence, or the lack thereof, a product of political culture and how did it play a role in the political praxis? The book shows that political agendas and the ideological outlook have a significant influence upon both the content and process of intelligence. This book was originally published as a special issue of Intelligence and National Security.
There is a wide spectrum of potential threats to the U.S. homeland that do not involve overt attacks by states using long-range missiles or conventional military forces. Such threats include covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals, and independent terrorist and extremist attacks by residents of the United States. These threats are currently limited in scope and frequency, but are emerging as potentially significant issues for future U.S. security. In this comprehensive work, Cordesman argues that new threats require new thinking, and offers a range of recommendations, from expanding the understanding of what constitutes a threat and bolstering Homeland defense measures, to bettering resource allocation and improving intelligence gathering and analysis. No pattern of actual attacks on U.S. territory has yet emerged that provides a clear basis for predicting how serious any given form of attack might be in the future, what means of attack might be used, or how lethal new forms of attack might be. As a result, there is a major ongoing debate over the seriousness of the threat and how the U.S. government should react. This work is an invaluable contribution to that debate.
Richard M. Bissell, Jr., the most important CIA spymaster in history, singlehandedly led America's intelligence service from the age of Mata Hari into the space age. Under his guidance the U-2 spy-plane, the SR-71 "Blackbird," and the Corona spy satellite were developed, and the agency rose to the pinnacle of its power. Bissell was also, however, the architect of the infamous Bay of Pigs operation that failed to overthrow Castro in 1961 and led to the decline of the CIA. In this compelling memoir, Bissell gives us an insider's view of the personalities, policies, and historical forces surrounding these and other covert operations and the lessons learned during those times of conflict. Bissell begins by describing his early years as a member of America's unofficial aristocracy. Born in a house that his father bought from Samuel Clemens, he was educated at Groton and Yale and befriended by Charles and Anne Morrow Lindbergh, among others. Bissell recounts how he became acting head of the Economic Cooperation Administration, the agency in charge of the Marshall Plan after World War II, and helped to create the European Payments Union. Bissell was brought into the CIA in 1954, where he initiated a revolution in intelligence-gathering techniques. He reveals the details of these developments, as well as of the unique CIA-Lockheed partnership he pioneered, his participation in the CIA-sponsored coup to overthrow Arbenz in Guatemala, and his involvement in crises in Laos and the Congo. Bissell's memoir sheds light not only on pivotal points of American foreign policy but also on America's evolution from isolationist to interventionist superpower.
Spies and Saboteurs is the story of the origins of the Anglo-American 'Special Relationship' in human intelligence collection and special operations, which took place amidst the global conflagration that was the Second World War. It is the story of William 'Wild Bill' Donovan - the father of America's Central Intelligence Agency - and of his relationship with legendary British spymasters like William Stephenson, code named 'Intrepid', Stewart Menzies ('C'), chief of the Secret Intelligence Service, Admiral John Godfrey, the powerful and enigmatic director of Naval Intelligence, and General Colin Gubbins, Britain's master saboteur. Relying almost exclusively upon recently declassified OSS and British intelligence documents and survivor interviews, it examines the transatlantic association in espionage and sabotage, guerrilla warfare and disinformation. It explores the evolution of covert relations from a 'tutorial' arrangement with the U.S. as pupil, to an unequal then full partnership, and ultimately to competition and rivalry in the prosecution of the clandestine war.
Among the greatest developments in conventional war since 1914 has been the rise of air/land power the interaction between air forces and armies in military operations. This book examines the forging of an air support system that was used with success for the remainder of the war, the principles of which have applied ever since.
Interdoc was established in 1963 by Western intelligence services as a multinational effort to coordinate an anti-communist offensive. Drawing on exclusive sources and the memories of its participants, this book charts Interdoc's campaign, the people and ideas that lay behind it and the rise and fall of this remarkable network during the Cold War. |
![]() ![]() You may like...
|