![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
What makes a good missionary makes a good American spy, or so thought Office of Special Services (OSS) founder "Wild" Bill Donovan when he recruited religious activists into the first ranks of American espionage. Called upon to serve Uncle Sam, Donovan's recruits saw the war as a means of expanding their godly mission, believing an American victory would guarantee the safety of their fellow missionaries and their coreligionists abroad. Drawing on never-before-seen archival materials, acclaimed historian Matthew Sutton shows how religious activists proved to be true believers in Franklin Roosevelt's crusade for global freedom of religion. Sutton focuses on William Eddy, a warrior for Protestantism who was fluent in Arabic; Stewart Herman, a young Lutheran minister rounded up by the Nazis while pastoring in Berlin; Stephen B. L. Penrose, Jr., who left his directorship over missionary schools in the Middle East to join the military rank and file; and John Birch, a fundamentalist missionary in China. Donovan chose these men because they already had the requisite skills for good intelligence analysis, espionage, and covert operations, skills that allowed them to seamlessly blend into different environments. Working for eternal rewards rather than temporal spoils, they proved willing to sacrifice and even to die for their country during the conflict, becoming some of the United States' most loyal secret soldiers. Acutely aware of how their actions conflicted with their spiritual calling, these spies nevertheless ran covert operations in the centers of global religious power, including Mecca, the Vatican, and Palestine. In the end, they played an outsized role in leading the US to victory in WWII: Eddy laid the groundwork for the Allied invasion of North Africa, while Birch led guerilla attacks against the Japanese and, eventually, Chinese Communists. After the war, some of them -- those who survived -- helped launch the Central Intelligence Agency, so that their nation, and American Christianity, could maintain a strong presence throughout the rest of the world. Surprising and absorbing at every turn, Double Crossedis an untold story of World War II spycraft and a profound account of the compromises and doubts that war forces on those who wage it.
The world's fastest growing continent demographically, Africa displays nearly all the features of today's global security challenges: armed conflict, terrorism, irregular migration, organized crime, great power competition, public discontent, and economic turbulence. John Siko and Jonah Victor present their lessons from professional practice and pedagogical approach from the classroom in a concise guidebook that leads students and professionals through the most important issues, dynamics, challenges, and considerations for analysing and planning responses to security developments in Africa. This book provides issue-by-issue primers on the causes and consequences of Africa's security challenges that include: -how to anticipate security problems across current political and economic events -how to analyse African security institutions and military capabilities -how to understand historical trends across the African continent and appreciate unique variations among countries. -how to identify key drivers of future trends -how to connect security analysis to policy planning Learning is supported through the following features: - Thematic chapters which are optimized to help the reader quickly connect to the key concepts and analytic frameworks within the field. - The most relevant historical case studies, enabling students to engage in sophisticated analysis and discussion. - Connections and contrasts between the situations in North Africa and sub-Saharan Africa, which are traditionally studied separately. - Special sections on understanding race and ethnicity, and advice on traveling in Africa. - Chapter-end checklists of key questions to enable practical engagement with the topics covered.
During the Second World War, the only way Winston Churchill and his American counterpart Franklin D. Roosevelt could communicate was via a top secret transatlantic telephone link. All other Atlantic telephone cables had been disconnected to prevent the Germans intercepting information. Ruth Ive, then a young stenographer working in the Ministry of Information, had the job of censoring the line, and she spent the rest of the war listening in to the conversations across the Atlantic, ready to cut the line if anything was said that might compromise security. Ruth was sworn to secrecy about her work, and at the end of the war all documentation proving the existence of the telephone line was destroyed. It was not until 1995, when Churchill's private files were finally declassified, that Ruth was able to research her story. Now, for the first time, one of the Second World War's key workers describes the details of her incredible story, and the private conversations of two of the war's most important players can be revealed.
Many aspects of the Tet offensive of 1968 are brought to light here. The offensive is acknowledged as the turning point of the Vietnam War. Using Communist Vietnamese documents combined with Western sources, the author provides a more accurate version of the events, their significance, and reveals the crucial role played by US intelligence. This book illustrates that in the 1960s the Communist Vietnamese were well aware of the political and diplomatic nature of a People's War.
When the Germans invaded her small Belgian village in 1914, Marthe Cnockaert's home was burned and her family separated. After getting a job at a German hospital, and winning the Iron Cross for her service to the Reich, she was approached by a neighbor and invited to become an intelligence agent for the British. Not without trepidation, Cnockaert embarked on a career as a spy, providing information and engaging in sabotage before her capture and imprisonment in 1916. After the war, she was paid and decorated by a grateful British government for her service. Cnockaert's is only one of the surprising and gripping stories that comprise Female Intelligence. This is the first history of the female spies who served Britain during World War I, focusing on both the powerful cultural images of these women and the realities, challenges, and contradictions of intelligence service. Between the founding of modern British intelligence organizations in 1909 and the demobilization of 1919, more than 6,000 women served the British government in either civil or military occupations as members of the intelligence community. These women performed a variety of services, and they represented an astonishing diversity of nationality, age, and class. From Aphra Behn, who spied for the British government in the seventeenth century, to the most well known example, Mata Hari, female spies have a long history, existing in juxtaposition to the folkloric notion of women as chatty, gossipy, and indiscreet. Using personal accounts, letters, official documents and newspaper reports, Female Intelligence interrogates different, and apparently contradictory, constructions of gender in the competing spheres of espionage activity.
In the winter of 1875, a young British officer set out across central Asia on an unofficial mission to investigate the latest Russian moves in the Great Game. His goal was the mysterious Central Asian city of Khiva, closed to all European travellers by the Russians following their seizure of it two years earlier. His aim was to discover whether this remote and dangerous oasis could be used as a springboard for an invasion of India. An immediate bestseller when first published in 1877, Burnaby s delight in a life of risk and adventure still burns through the pages, as does his spontaneous affection for the Cossack troopers and Tartar, Khirgiz and Turkoman tribesmen that he encounters on his way.
This volume explores the contemporary challenges to US national cybersecurity. Taking stock of the field, it features contributions by leading experts working at the intersection between academia and government and offers a unique overview of some of the latest debates about national cybersecurity. These contributions showcase the diversity of approaches and issues shaping contemporary understandings of cybersecurity in the West, such as deterrence and governance, cyber intelligence and big data, international cooperation, and public-private collaboration. The volume's main contribution lies in its effort to settle the field around three main themes exploring the international politics, concepts, and organization of contemporary cybersecurity from a US perspective. Related to these themes, this volume pinpoints three pressing challenges US decision makers and their allies currently face as they attempt to govern cyberspace: maintaining international order, solving conceptual puzzles to harness the modern information environment, and coordinating the efforts of diverse partners. The volume will be of much interest to students of cybersecurity, defense studies, strategic studies, security studies, and IR in general.
The author examines in detail the organization of the U.S. intelligence community, its attempts to monitor and predict the development of Soviet forces from the early days of the cold war, and how these attempts affected American policy and weapons production. Originally published in 1987. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
An explosive expose of how British military intelligence really
works-from the inside. This book presents the stories of two
undercover agents: Brian Nelson, who worked for the Force Research
Unit (FRU), aiding loyalist terrorists and murderers in their
bloody work; and the man known as Stakeknife, deputy head of the
IRA's infamous "Nutting Squad," the internal security force that
tortured and killed suspected informers.
Between 1942 and 1944 a very small, very secret, very successful clandestine unit of the Royal Navy, operated between Dartmouth in Devon, and the Brittany Coast in France. It was a crossing of about 100 miles, every yard of it dangerous. The unit was called the 15th Motor Gunboat Flotilla: crewed by 125 officers and men, it became the most highly decorated Royal Naval unit of the Second World War. The 15th MGBF was an extraordinary group of men thrown together in the most secret of adventures. Very few were regular Royal Naval officers: instead the unit was made up of mostly Royal Naval Volunteer Officers and 'duration only' sailors. Their home was a converted paddle steamer and luxury yacht, but their work could not have been more serious. Their mission was to ferry agents of SIS and SOE to pinpoint landing sites on the Brittany coast in Occupied France. Once they had landed their agents, together with stores for the Resistance, they picked up evaders, escaped POWs who had had the good fortune to be collected by escape lines run by M19, as well as returning SIS and SOE agents. It is a story that is inextricably entwined with that of the many agents they were responsible for - Pierre Hentic, Yves Le Tac, Virginia Hall, Albert Hue, Jeannie Rousseau, Suzanne Warengham, Francois Mitterrand and Mathilde Carre, as well as many others. Without the Flotilla, such intelligence gathering networks as Jade Fitzroy and Alliance would never have developed, and SOE's VAR Line and MI9's Shelburne Escape Line would never have been realised. Drawing on a huge amount of research on both sides of the Channel, including private archives of many of the families involved, A Dangerous Enterprise brings the story of this most clandestine of operations brilliantly to life.
World War II found the country of Albania fighting a war within a war. In addition to the threat all of Europe faced from the Germans, Albania was engaged in a civil war between the Nazi-sponsored Ballists and the Communist Partisans led by Enver Hoxha. While America was reluctant to get involved in the civil conflict, the United States was naturally inclined to lend support to whoever fought the Nazis - even if that meant an alliance with the Communists. On a cold November night in 1943, Dale McAdoo (code named Tank) secretly landed on the Albanian coast with a team of OSS (Office of Strategic Services) agents, including Ismail Carapizzi, an Albanian guide and interpreter who would later be murdered. McAdoo's team, the first of many to follow, set up a base of operations in a deep water level cave on the rocky Albanian coast that served the OSS as it carried out its mission of gathering intelligence to support the Allied war effort and harass the Germans. McAdoo was joined by Captain Tom Stefan (code name Art), an Albanian-speaking OSS officer from Boston, whose assignment was to join Hoxha at his remote mountain headquarters and bond with the reclusive Communist leader to benefit the OSS. This volume describes how the OSS aided the Communist-led Partisans in an attempt to weaken the Nazi cause in Albania and neighboring Italy. The book presents an in-depth look at the small core of hardened men who comprised these highly specialized teams, including each member's background and his special fitness for his wartime role behind enemy lines. The American and British presence in Albania during World War II and the later deterioration of Hoxha's relations with Captain Tom Stefan and the OSS mission are discussed in detail. Firsthand interviews with still-living participants and extensive onsite research make this book a unique resource for a little-known dramatic piece of World War II history.
Britain's war in the shadows of male spies and subterfuge in the heart of occupied France is a story well known, but what of the women who also risked their lives for Britain and the liberation of France? In 1942 a desperate need for new recruits, saw SOE turn to a previously overlooked group - women. These extraordinary women came from different backgrounds, but were joined in their idealistic love of France and a desire to play a part in its liberation. They formed SOE's F Section. From the famous White Mouse, Nancy Wake, to the courageous, Noor Inayat Khan, they all risked their lives for King, Country and the Resistance. Many of them died bravely and painfully, and often those who survived, like Eileen Nearne, never told their stories, yet their secret missions of intelligence-gathering and sabotage undoubtedly helped the Resistance to drive out their occupiers and free France. Here, for the first time is the extraordinary account of all forty SOE F women agents. It is a story that deserves to be read by everyone. 'They were the war's bravest women, devoted to defeating the Nazis yet reluctant ever to reveal their heroic pasts. Now a new book tells their intrepid tales.' Daily Express Squadron Leader BERYL E. ESCOTT served in the RAF and is one of the foremost experts on the women of SOE.
‘One of our very best writers on France.’ Antony Beevor After publishing an acclaimed biography of Jean Moulin, leader of the French Resistance, Patrick Marnham received an anonymous letter from a person who claimed to have worked for British Intelligence during the war. The ex-spy praised his book but insisted that he had missed the real ‘treasure’. The letter drew Marnham back to the early 1960s when he had been taught French by a mercurial woman – a former Resistance leader, whose SOE network was broken on the same day that Moulin was captured and who endured eighteen months in Ravensbrück concentration camp. Could these two events have been connected? His anonymous correspondent offered a tantalising set of clues that seemed to implicate Churchill and British Intelligence in the catastrophe. Drawing on a deep knowledge of France and original research in British and French archives, War in the Shadows exposes the ruthless double-dealing of the Allied intelligence services and the Gestapo through one of the darkest periods of the Second World War. It is a story worthy of Le Carré, but with this difference – it is not fiction. ‘A melange of Le Grand Meaulnes and The Spy Who Came in from the Cold. It is unforgettable.’ Ferdinand Mount, TLS, Books of the Year ‘A masterly analysis, impeccably presented.’ Allan Mallinson, Spectator ‘Fascinating… Marnham has a vast and scholarly knowledge of this often treacherous world.’ Caroline Moorehead, Literary Review
This volume discusses the challenges the future holds for different aspects of the intelligence process and for organisations working in the field. The main focus of Western intelligence services is no longer on the intentions and capabilities of the Soviet Union and its allies. Instead, at present, there is a plethora of threats and problems that deserve attention. Some of these problems are short-term and potentially acute, such as terrorism. Others, such as the exhaustion of natural resources, are longer-term and by nature often more difficult to foresee in their implications. This book analyses the different activities that make up the intelligence process, or the 'intelligence cycle', with a focus on changes brought about by external developments in the international arena, such as technology and security threats. Drawing together a range of key thinkers in the field, The Future of Intelligence examines possible scenarios for future developments, including estimations about their plausibility, and the possible consequences for the functioning of intelligence and security services. This book will be of much interest to students of intelligence studies, strategic studies, foreign policy, security studies and IR in general.
EUROPE, 1940. NAZI FORCES SWEEP ACROSS THE CONTINENT, WITH A BRITISH INVASION LIKELY ONLY WEEKS AWAY. NEVER BEFORE HAS A RESISTANCE MOVEMENT BEEN SO CRUCIAL TO THE WAR EFFORT. In this definitive appraisal of Anglo-Norwegian cooperation in the Second World War, Tony Insall reveals how some of the most striking successes of the Norwegian resistance were the reports produced by the heroic SIS agents living in the country's desolate wilderness. Their coast-watching intelligence highlighted the movements of the German fleet and led to counter-strikes which sank many enemy ships - most notably the Tirpitz in November 1944. Using previously unpublished archival material from London, Oslo and Moscow, Insall explores how SIS and SOE worked effectively with their Norwegian counterparts to produce some of the most remarkable achievements of the Second World War.
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process. The concept of the intelligence cycle has been central to the study of intelligence. As Intelligence Studies has established itself as a distinctive branch of Political Science, it has generated its own foundational literature, within which the intelligence cycle has constituted a vital thread - one running through all social-science approaches to the study of intelligence and constituting a staple of professional training courses. However, there is a growing acceptance that the concept neither accurately reflects the intelligence process nor accommodates important elements of it, such as covert action, counter-intelligence and oversight. Bringing together key authors in the field, the book considers these questions across a number of contexts: in relation to intelligence as a general concept, military intelligence, corporate/private sector intelligence and policing and criminal intelligence. A number of the contributions also go beyond discussion of the limitations of the cycle concept to propose alternative conceptualisations of the intelligence process. What emerges is a plurality of approaches that seek to advance the debate and, as a consequence, Intelligence Studies itself. This book will be of great interest to students of intelligence studies, strategic studies, criminology and policing, security studies and IR in general, as well as to practitioners in the field.
Home-grown terrorists equipped by a foreign power are not a new phenomenon. During the Second World War, Hitler's Germany made sustained efforts to inflict a terror campaign on the streets of Britain through the use of secret agents and agents provocateurs. The aim was to blow up military, industrial, transport and telecommunication targets, to lower morale among the civilian population and disrupt the war effort. Even before the outbreak of war, the Nazis provided the IRA with assistance for their plan to sabotage the British mainland. Prior to their planned invasion in the summer of 1940, the Nazis were also keen to recruit members of the Welsh and Scottish Nationalist Parties to engage in sabotaging British targets and, over the course of the war, infiltrated dozens of trained agents from countries including Norway, Denmark, Holland, France and Cuba. What happened to the myriad plots to blow up Britain? We know that intelligence obtained from decrypted enemy messages via Bletchley Park and double agents like ZIGZAG, SUMMER and TATE alerted MI5 to some of these spies' arrivals, but what about the others? And how successful were MI5's efforts to fake acts of sabotage and arrange media coverage to fool the enemy into thinking their agents were still at large and on task? In this book, Bernard O'Connor, a noted wartime espionage historian, tells the complete story of the successes and failures of the Nazi terror offensive on mainland Britain during 1938-1944.
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.
Carve Her Name With Pride is the inspiring story of the half-French Violette Szabo who was born in Paris Iin 1921 to an English motor-car dealer, and a French Mother. She met and married Etienne Szabo, a Captain in the French Foreign Legion in 1940. Shortly after the birth of her daughter, Tania, her husband died at El Alamein. She became a FANY (First Aid Nursing Yeomanry) and was recruited into the SOE and underwent secret agent training. Her first trip to France was completed successfully even though she was arrested and then released by the French Police. On June 7th, 1944, Szabo was parachuted into Limoges. Her task was to co-ordinate the work of the French Resistance in the area in the first days after D-Day. She was captured by the SS 'Das Reich' Panzer Division and handed over to the Gestapo in Paris for interrogation. From Paris, Violette Szabo was sent to Ravensbruck concentration camp where she was executed in January 1945. She was only 23 and for her courage was posthumously awarded The George Cross and the Croix de Guerre.
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process. The concept of the intelligence cycle has been central to the study of intelligence. As Intelligence Studies has established itself as a distinctive branch of Political Science, it has generated its own foundational literature, within which the intelligence cycle has constituted a vital thread - one running through all social-science approaches to the study of intelligence and constituting a staple of professional training courses. However, there is a growing acceptance that the concept neither accurately reflects the intelligence process nor accommodates important elements of it, such as covert action, counter-intelligence and oversight. Bringing together key authors in the field, the book considers these questions across a number of contexts: in relation to intelligence as a general concept, military intelligence, corporate/private sector intelligence and policing and criminal intelligence. A number of the contributions also go beyond discussion of the limitations of the cycle concept to propose alternative conceptualisations of the intelligence process. What emerges is a plurality of approaches that seek to advance the debate and, as a consequence, Intelligence Studies itself. This book will be of great interest to students of intelligence studies, strategic studies, criminology and policing, security studies and IR in general, as well as to practitioners in the field.
Some of the individuals who played key roles in the success of Bletchley Park in reading the secret communications of Britain's enemies during the Second World War have become well-known figures. However, the man who created and led the organisation based there, from its inception in 1919 until 1942, has, surprisingly, been overlooked - until now. In 1914 Alastair Denniston, who had been teaching French and German at Osborne Royal Navy College, was one of the first recruits into the Admiralty's fledgling codebreaking section which became known as Room 40. There a team drawn from a wide range of professions successfully decrypted intercepted German communications throughout the First World War. After the Armistice, Room 40 was merged with the British Army's equivalent section - MI.1 - to form the Government Code and Cypher School (GC&CS). Initially based in London, from August 1939 GC&CS was largely located at Bletchley Park, with Alastair Denniston as its Operational Director. Denniston was moved in 1942 from military to civilian intelligence at Berkeley Street, London. Small at first, as Enigma traffic diminished towards the end of the Second World War, diplomatic and commercial codebreaking became of increasing importance and a vital part of Britain's signal intelligence effort. GC&CS was renamed the Government Communications Headquarters (GCHQ) in June 1946, and moved to the outskirts of Cheltenham. It continues to be the UK's signal intelligence gathering organisation. With the support and assistance of the both the Denniston family and GCHQ, Joel Greenberg, author of Gordon Welchman, Bletchley Park's Architect of Ultra Intelligence, has produced this absorbing story of Commander Alexander Alastair' Guthrie Denniston OBE, CBE, CMG, RNVR, a man whose death in 1961 was ignored by major newspapers and the very British intelligence organisation that was his legacy. [Denniston was a] great man in whose debt all English-speaking people will remain for a very long time, if not for ever. That so few of them should know exactly what he did towards achievement of victory in World War I and II is the sad part of the untold story of his life and of his great contribution to that victory.' -William Friedman, The doyen of American cryptography One of the reasons for the success of Bletchley Park, and something that I and Alastair Denniston's other successors have striven to maintain in GCHQ, is the organisation's ability to make space to allow individuals to flourish, both in isolation, and within teams. He had already worked out that the forthcoming war and the profusion of mechanical encryption devices needed a new sort of cryptanalyst to complement the existing staff.' -Sir Ian Lobban, Director of GCHQ 2008 to 2014
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures. Covering the apartheid period of 1948-90, the transition from apartheid to democracy of 1990-94, and the post-apartheid period of new intelligence dispensation from 1994-2005, this book examines not only the apartheid government's intelligence dispensation and operations, but also those of the African National Congress, and its partner, the South African Communist Party (ANC/SACP) - as well as those of other liberation movements and the 'independent homelands' under the apartheid system. Examining the civilian, military and police intelligence structures and operations in all periods, as well as the extraordinarily complicated apartheid government's security bureaucracy (or 'securocracy') and its structures and units, the book discusses how South Africa's Cold War 'position' influenced its relationships with various other world powers, especially where intelligence co-operation came to bear. It outlines South Africa's regional relationships and concerns - the foremost being its activities in South-West Africa (Namibia) and its relationship with Rhodesia through 1980. Finally, it examines the various legislative and other governance bases for the existence and operations of South Africa's intelligence structures - in all periods - and the influences that such activities as the Rivonia Trial (at one end of the history) or the Truth and Reconciliation Commission (at the other end) had on the evolution of these intelligence questions throughout South Africa's modern history. This book will be of great interest to all students of South African politics, intelligence studies and international politics in general.
This title takes you inside the eye-opening life and work of the US military's former top paranormal spy. As the operations and training officer for the Defense Intelligence Agency's Psychic Intelligence Unit, Dames and his team used the practice of remote viewing to uncover accurate military intelligence without putting personnel at risk in hostile countries. In "Tell Me What You See", Dames takes you behind the scenes of some of his most fascinating, mind-bending cases, revealing how he and his cohorts solved some of the world's greatest mysteries and uncovered some of the world's most deeply buried secrets. This is a memoir that takes you inside the secret history of the US military's Psychic Intelligence Unit. It reveals true stories and fascinating secrets uncovered by the military's remote viewing teams - from intelligence on Soviet missile sites to the whereabouts of missing POWs in Vietnam to the location of the Ark of the Covenant * Maj. Dames is the most popular guest on George Noory's exceedingly popular radio show "Coast to Coast AM". For anyone fascinated by the intersection of the military and the mysterious, "Tell Me What You See" is an amazing and completely absorbing must-read.
Through dramatic incidents tells for the first time the full story of the development of Cold War naval intelligence from the end of WWII to the breakup the Soviet Union in 1991, from both sides, East and West. Unlike other accounts, which focus on submarine confrontations and accidents, the authors cover all types of naval intelligence, human collection (racing with the Soviets to capture Nazi subs, successful and losing spies and defectors), signal intelligence (surface, air, satellite and navy commando teams in balaclavas launched by speed boats from subs), acoustic (passive underwater arrays and tapping phone lines), and the aerial and space reconnaissance. The authors give details of operations in all these areas, some of which were witnessed first hand. ""A new light is shed on the spy ships incidents of the 1960s and on submarine intrusions in Swedish waters. Excerpts of the Soviet Navy instructions on UFOs and accounts of Soviet naval encounters with unexplained objects are also published for the first time outside of Russia; and much more.""
Anticipating Surprise, originally written as a manual for training intelligence analysts during the Cold War, has been declassified and condensed to provide wider audiences with an inside look at intelligence gathering and analysis for strategic warning. Cynthia Grabo defines the essential steps in the warning process, examines distinctive ingredients of the analytic method of intelligence gathering, and discusses the guidelines for assessing the meaning of gathered information. Since the September 11, 2001 terrorist attacks on America, intelligence collection and analysis has been hotly debated. In this book, Grabo suggests ways of improving warning assessments that better convey warnings to policymakers and military commanders who are responsible for taking appropriate action to avert disaster. |
![]() ![]() You may like...
Emerging Trends in Terahertz Engineering…
Arindam Biswas, Amit Banerjee, …
Hardcover
R3,625
Discovery Miles 36 250
Optical Holography - Materials, Theory…
Pierre-Alexandre Blanche
Paperback
R4,012
Discovery Miles 40 120
Fundamentals of Toxicologic Pathology
Matthew A. Wallig, Wanda M. M Haschek, …
Hardcover
R4,611
Discovery Miles 46 110
Transactions on Intelligent Welding…
Shan-Ben Chen, YuMing Zhang, …
Hardcover
R4,348
Discovery Miles 43 480
A Clinical Introduction to Psychosis…
Johanna Badcock, Georgie Paulik-White
Paperback
R2,259
Discovery Miles 22 590
|