![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
ACCLAIM FOR ENIGMA "CRACKING STUFF...VIVID AND HITHERTO UNKNOWN DETAILS." -Sunday Times (London) "IN A CROWD OF BOOKS DEALING WITH THE ALLIED BREAKING OF THE WORLD WAR II CIPHER MACHINE ENIGMA, HUGH SEBAG-MONTEFIORE HAS SCORED A SCOOP." -Washington Post Winston Churchill called the cracking of the German Enigma Code "the secret weapon that won the war." Now, for the first time, noted British journalist Hugh-Sebag-Montefiore reveals the c"omplete" story of the breaking of the code by the Allies--the breaking that played a crucial role in the outcome of World War II. This fascinating account relates the never-before-told, hair-raising stories of the heroic British and American sailors, spies, and secret agents who faced death in order to capture vital codebooks from sinking ships and snatch them from under the noses of Nazi officials. Sebag-Montefiore also relates new details about the genesis of the code, little-known facts about how the Poles first cracked the Luftwaffe's version of the code (and then passed it along to the British), and the feverish activities at Bletchley Park, Based in part on documents recently unearthed from American and British archives--including previously confidential government files--and in part on unforgettable, firsthand accounts of surviving witnesses, "Enigma" unearths the stunning truth about the brilliant piece of decryption that changed history.
What makes a good missionary makes a good American spy, or so thought Office of Special Services (OSS) founder "Wild" Bill Donovan when he recruited religious activists into the first ranks of American espionage. Called upon to serve Uncle Sam, Donovan's recruits saw the war as a means of expanding their godly mission, believing an American victory would guarantee the safety of their fellow missionaries and their coreligionists abroad. Drawing on never-before-seen archival materials, acclaimed historian Matthew Sutton shows how religious activists proved to be true believers in Franklin Roosevelt's crusade for global freedom of religion. Sutton focuses on William Eddy, a warrior for Protestantism who was fluent in Arabic; Stewart Herman, a young Lutheran minister rounded up by the Nazis while pastoring in Berlin; Stephen B. L. Penrose, Jr., who left his directorship over missionary schools in the Middle East to join the military rank and file; and John Birch, a fundamentalist missionary in China. Donovan chose these men because they already had the requisite skills for good intelligence analysis, espionage, and covert operations, skills that allowed them to seamlessly blend into different environments. Working for eternal rewards rather than temporal spoils, they proved willing to sacrifice and even to die for their country during the conflict, becoming some of the United States' most loyal secret soldiers. Acutely aware of how their actions conflicted with their spiritual calling, these spies nevertheless ran covert operations in the centers of global religious power, including Mecca, the Vatican, and Palestine. In the end, they played an outsized role in leading the US to victory in WWII: Eddy laid the groundwork for the Allied invasion of North Africa, while Birch led guerilla attacks against the Japanese and, eventually, Chinese Communists. After the war, some of them -- those who survived -- helped launch the Central Intelligence Agency, so that their nation, and American Christianity, could maintain a strong presence throughout the rest of the world. Surprising and absorbing at every turn, Double Crossedis an untold story of World War II spycraft and a profound account of the compromises and doubts that war forces on those who wage it.
It is not hyperbole to suggest that the foundations of post-cold war security in Europe have been badly damaged by the conflict in Ukraine since 2014. Russia's annexation of Crimea and intervention in eastern Ukraine appear to have created a 'simmering' conflict, which may take years to resolve and have profound consequences for the European security environment. This volume explores the various political, economic and social aspects of these profound changes and their wider significance for Europe, bringing together contributions by scholars from across the continent and in various disciplinary fields to offer an authoritative, in-depth examination of the complex causes of the Ukraine crisis and the consequences for Ukrainian statehood, Ukraine's relations with Russia, Russia's own domestic governance and Russia's relations with Europe. This book was originally published as a special issue of Europe-Asia Studies.
State sponsorship of terrorism is a complex and important topic in today's international affairs - and especially pertinent in the regional politics of the Middle East and South Asia, where Pakistan has long been a flashpoint of Islamist politics and terrorism. In Islamism and Intelligence in South Asia, Prem Mahadevan demonstrates how over several decades, radical Islamists, sometimes with the tacit support of parts of the military establishment, have weakened democratic governance in Pakistan and acquired progressively larger influence over policy-making. Mahadevan traces this history back to the anti-colonial Deobandi movement, which was born out of the post-partition political atmosphere and a rediscovery of the thinking of Ibn Taymiyyah, and partially ennobled the idea of `jihad' in South Asia as a righteous war against foreign oppression. Using Pakistani media and academic sources for the bulk of its raw data, and reinforcing this with scholarly analysis from Western commentators, the book tracks Pakistan's trajectory towards a `soft' Islamic revolution. Envisioned by the country's intelligence community as a solution to chronic governance failures, these narratives called for a re-orientation away from South Asia and towards the Middle East. In the process, Pakistan has become a sanctuary for Arab jihadist groups, such as Al-Qaeda, who had no previous ethnic or linguistic connection with South Asia. Most alarmingly, official discourse on terrorism has been partly silenced by the military-intelligence complex. The result is a slow drift towards extremism and possible legitimation of internationally proscribed terrorist organizations in Pakistan's electoral politics.
This groundbreaking story is told through Bernardo Benes—a lawyer who joined the refugee exodus from Castro's Cuba in 1960. Benes quickly became one of the leading voices advocating the integration of Cubans into the city's Anglo, old-boy power structure. In 1978, Cuban Intelligence recruited him as an emissary between the Carter administration and Cuba. He did the same for the CIA under Reagan in the early 1980s. In all, Benes made seventy-five secret trips to meet with high-ranking Cuban officials, spending about 150 hours face-to-face with Fidel Castro. The 1978 dialogue resulted in the release of 3,600 Cuban political prisoners and the right for Cuban exiles to visit family members on the island.
Among the most crucial roles of the United States military in the
global War on Terror is the collection of human intelligence from
prisoners of war, unlawful combatants, and others. On the heels of
controversy over some of the techniques used to extract
information--such as waterboarding--the Department of the Army
completely revised its interrogation guidelines. The result is this
book, the United States Army's human intelligence collection
playbook, which gives instructions on the structure, planning and
management of human intelligence operations, the debriefing of
soldiers, and the analysis of known relationships and map data. The
largest and most newsworthy section of the book details procedures
for screening and interrogation, which permits a specific number of
interrogation techniques, described in Chapter 8 as "approach
techniques." These techniques, described in great detail, carry
such names as "Emotional Love, ""Mutt and Jeff," "False Flag," and
even "Separation." A must-read for today's military buffs, U.S.
Army Human Intelligence Collector Field Manual is also a valuable
resource for anyone seeking strategies to employ in the gathering
of information.
The British codebreakers at Bletchley Park are now believed to have shortened the duration of the Second World War by up to two years. During the dark days of 1941, as Britain stood almost alone against the the Nazis, this remarkable achievement seemed impossible. This extraordinary book, originally published as Action This Day, includes descriptions by some of Britain's foremost historians of the work of Bletchley Park, from the breaking ofEnigma and other wartime codes to the invention of modern computing, and its influence on Cold War codebreaking. Crucially, it features personal reminiscences and very human stories of wartime codebreaking from former Bletchley Park codebreakers themselves. This edition includes new material from one of those who was there, making The Bletchley Park Codebreakers compulsive reading. The best collection of military, espionage, and adventure stories ever told. The Dialogue Espionage Classics series began in 2010 with the purpose of bringing back classic out-of-print spying and espionage tales. From WWI and WWII to the Cold War, D-Day to the SOE, Bletchley Park to the Comet Line this fascinating spy history series brings you the best stories that should never be forgotten.
Words of Intelligence: A Dictionary is intended for the intelligence and national security men and women who are fighting the Global War on Terrorism at all levels: local, state, and federal. The intelligence community has undergone massive changes since the Central Intelligence Agency, National Security Agency, and the Department of Defense were created, and recently, with the establishment of Homeland Security and a Director of National Intelligence, it has taken on even more duties and responsibilities. Intelligence now must be transmitted to state and local public administrators, health officials, and transportation planners (to name just a few) in times of a possible domestic attack. Containing over 600 terms related to theoretical aspects of intelligence, intelligence operations, intelligence strategies, security classification of information, obscure names of intelligence boards and organizations, and homeland security, this dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues. A topical index is also included.
Critical Acclaim for TOP SECRET TALES of World War II "A book for rainy days and long solitary nights by the fire. If there were a genre for cozy nonfiction, this would be the template."–Publishers Weekly "Perfect for the curious and adventure readers and those who love exotic tales and especially history buffs who will be surprised at what they didn’t know. Recommended for nearly everyone."–Kirkus Reviews This war was fought by soldiers out of uniform. Stealth and ingenuity were their weapons. Victory was their only code of conduct. In Top Secret Tales of World War II, noted military historian William Breuer documents espionage–in all its forms–as it evolved in the hands of both Allied and Axis agents of intelligence and counterintelligence. Here you’ll find riveting tales of patriotism and treachery, subversion and sabotage, kidnappings and assassinations, and bribes and blackmailing–with frequently startling revelations about the secret wars behind both the battlefields and the headlines.
"An eye-opening account of our intelligence establishment." "An outstanding book, clearly the best recent, up-to-date survey
of the American intelligence community, ranking with the top
half-dozen ever." Recent years have seen numerous books about the looming threat posed to Western society by biological and chemical terrorism, by narcoterrorists, and by the unpredictable leaders of rogue nations. Some of these works have been alarmist. Some have been sensible and measured. But none has been by Loch Johnson. Johnson, author of the acclaimed "Secret Agencies "and "an experienced overseer of intelligence" ("Foreign Affairs"), here examines the present state and future challenges of American strategic intelligence. Written in his trademark style--dubbed "highly readable" by "Publishers Weekly"--and drawing on dozens of personal interviews and contacts, Johnson takes advantage of his insider access to explore how America today aspires to achieve nothing less than "global transparency," ferreting out information on potential dangers in every corner of the world. And yet the American security establishment, for all its formidable resources, technology, and networks, currently remains a loose federation of individual fortresses, rather than a well integrated "community" of agencies working together to provide the President with accurate information on foreign threats and opportunities. Intelligence failure, like the misidentified Chinese embassy in Belgrade accidentally bombed by a NATO pilot, is the inevitable outcome when the nation's thirteen secret agencies steadfastly resist the need for centralcoordination. Ranging widely and boldly over such controversial topics as the intelligence role of the United Nations (which Johnson believes should be expanded) and whether assassination should be a part of America's foreign policy (an option he rejects for fear that the U.S. would then be cast not only as global policeman but also as global godfather), Loch K. Johnson here maps out a critical "and" prescriptive vision of the future of American intelligence.
Winston Churchill once remarked that the secret warfare waged in World War II equaled "the most fantastic inventions of romance and melodrama." William Breuer vividly confirms that assessment with these compelling accounts of Allied and Axis intelligence throughout World War II. Here are riveting tales of patriotism and treachery, saboteurs, sleepers, and moles, giving fresh perspectives on the best-known interceptions and deceptions of the war—the breaking of the German code Enigma and the Japanese code Purple, Operation Overlord’s successful disguise of the D-Day invasion— as well as little-known feats of civilian bravado in the face of danger. Meet Sidney Cotton, a British businessman and aviator who took the Luftwaffe’s General Albrecht Kesselring aloft for a test flight at a German air show and then coolly snapped valuable reconnaissance photographs after handing the controls over to the Nazi officer. Shadow the covert armada that shipped the foundation of Great Britain’s financial security—including $2.5 billion in gold—from London to the Bank of Canada in Ottawa, without suffering a single loss from U-boats at the height of the Battle for the Atlantic. Discover how U.S. taxpayers footed the bill for a successful Nazi propaganda effort that was documented in the Congressional Record, published by the Government Printing Office, and mailed on a congressman’s postal privileges. Witness a German military spy so inept he carried his World War I medals on his mission, and another so bold that he advertised for industry secrets in the pages of Popular Aviation magazine. He paid twenty dollars each for the numerous—and significant—replies that poured in. Drawn extensively from personal interviews, private correspondence, trial records, and declassified documents from official archives, this engrossing volume provides detailed, frequently startling revelations about the secret wars fought behind the battlefields—and the headlines—of World War II. This war was fought by soldiers out of uniform. Stealth and ingenuity were their weapons. Victory was their only code of conduct."Gentlemen do not read each other’s mail."—Henry L. Stimson Henry L. Stimson, the U.S. Secretary of War under President Franklin Roosevelt, was in for a rude shock as the military forces of Germany and Japan armed themselves for their assault on the world. Men at war not only read each other’s mail; they forged it whenever possible. In Top Secret Tales of World War II, noted military historian William Breuer documents espionage—in all its forms—as it evolved in the hands of both Allied and Axis agents of intelligence and counter-intelligence. He reveals the acts of subversion and sabotage, the bribes, blackmailings, kidnappings, assassinations, grand deceptions, and bizarre assaults that were conducted in the name of victory at all costs. Focusing on the fascinating characters that played key roles in these pivotal incidents, Breuer brings a fresh dimension to the war’s most notorious acts and provides new insights into missions conducted in such deep shadow they nearly eluded the history books as well as they did the enemy’s detection.
Intelligence was a central element of the Cold War and the need for
it was expected to diminish after the USSR's collapse, yet in
recent years it has been in greater demand than ever. The
atrocities of 11 September and the subsequent "war on terrorism"
now call for an even more intensive effort. Important questions
arise on how intelligence fits into the world of increased threats,
globalization and expanded international action. This volume
contains the recent work on this subject by Michael Herman, British
intelligence professional for 35 years and Oxford University
academic. It compares intelligence with other government
information services, and discusses the British intelligence system
and the case for its reform. It also addresses the ethical issues
raised by intelligence's methods and results: "do they on balance
make for a better world or a worse one?." Other chapters explore a
wide range of intelligence topics past and present, including the
transatlantic relationship, the alliance strategies of Norway and
New Zealand, Mrs Thatcher's "de-unionization" of British Sigint,
and personal memories of the British Cabinet Office in the
1970s.
This is a first-hand report by a top German intelligence agent sent to the still-neutral United States in World War I. Official German records, captured by British and American forces at the end of World War II, show the memoirs of the German naval officer to be accurate. Rintelen's orders in Berlin had called for measures to prevent the shipment of American war material to Germany's enemies. In the US, this meant buying arms to keep them from being purchased by the Allies, but it could also mean placing bombs in the hulls of ships sailing for Eurpoe and fomenting strikes among the labour force of American ammunition manufacturers.
Even paranoids have enemies. Hitler's most powerful foes were the Allied powers, but he also feared internal conspiracies bent on overthrowing his malevolent regime. In fact, there was a small but significant internal resistance to the Nazi regime, and it did receive help from the outside world. Through recently declassified intelligence documents, this book reveals for the first time the complete story of America's wartime knowledge about, encouragement of, and secret collaboration with the German resistance to Hitler?including the famous July 20th plot to assassinate the Fuehrer.The U.S. government's secret contacts with the anti-Nazi resistance were conducted by the OSS, the World War II predecessor to the CIA. Highly sensitive intelligence reports recently released by the CIA make it evident that the U.S. government had vast knowledge of what was going on inside the Third Reich. For example, a capitulation offer to the western Allies under consideration by Count von Moltke in 1943 was thoroughly discussed within the U.S. government. And Allen Dulles, who was later to become head of the CIA, was well informed about the legendary plot of July 20th. In fact, these secret reports from inside Germany provide a well-rounded picture of German society, revealing the pro- or anti-Nazi attitudes of different social groups (workers, churches, the military, etc.). The newly released documents also show that scholars in the OSS, many of them recruited from ivy-league universities, looked for anti-Nazi movements and leaders to help create a democratic Germany after the war.Such intelligence gathering was a major task of the OSS. However, OSS director ?Wild Bill? Donovan and others favored subversive operations, spreading disinformation, and issuing propaganda. Unorthodox and often dangerous schemes were developed, including bogus ?resistance newspapers,? anti-Nazi letters and postcards distributed through the German postal service, sabotage, and fake radio broadcasts from ?German generals? calling for uprisings against the regime.This is much more than a documentary collection. Explanatory footnotes supply a wealth of background information for the reader, and a comprehensive introduction puts the documents into their wider historical perspective. Arranged in chronological order, these intelligence reports provide a fascinating new perspective on the story of the German resistance to Hitler and reveal an intriguing and previously unexplored aspect of America's war with Hitler.
Foreword by Rabbi Abraham Cooper, Associate Dean, Simon Wiesenthal Center A real-life adventure story told by a New York Times bestselling author and war correspondent who reveals how he became a hostage, an arms dealer, and an Israeli spy. And the Rest Is History takes readers on a traveling circus from Paris to Beirut, Baghdad, and beyond, introducing them to spies and terrorists, arms dealers and crooks, and along the way reveals a few surprises about the secret underbelly of recent history you won't find in WikiLeaks. This book pinpoints precisely when the era of "fake news" actually began in America, and will change the way you think about journalism and journalists. It includes: * riveting testimony of the author's torture and born-again experience as a hostage in a Beirut cellar; * unusual insight into the beginnings of the Iran-Contra scandal; * eyewitness reporting from the battlefields of the Middle East; * the inside scoop on Saddam Hussein's WMD programs; * astonishing stories of French government dirty tricks, the intelligence underworld, Israeli hostage negotiations, and the real-life escapades of a Soviet sleeper agent. And the Rest Is History is a reporter's journey from Left-Bank leftist to born-again Christian conservative. But most of all it's a rollicking good read full of unusual characters, places, and events you will never hear about on the evening news. "Ken Timmerman is a superb investigative reporter-and old school-which means he does his research. His behind-the-scenes adventures in Iraq, Syria, Egypt, Israel, and even France are a terrific read for those of us who share his passion for tracking down the facts, not molding the facts to a 'narrative.'" -Peter Schweizer, president of the Government Accountability Institute and NY Times bestselling author of Clinton Cash and Profiles in Corruption "I have followed for some time your excellent reporting on the Mid-East. You consistently provide insights and facts nowhere else available to the public. Your professionalism and persistence make a great contribution to our understanding, to the public debate, and ultimately to our national security." -R. James Woolsey, former director, Central Intelligence Agency "I have spent my life tracking the murderers of yesterday. Mr. Timmerman is tracking the murderers of tomorrow." -Nazi hunter Simon Wiesenthal, introducing the author to an audience in Paris, France, in 2002
The breaking of the Enigma machine is one of the most heroic stories of the Second World War. But there was another German cipher machine, used by Hitler himself to convey messages to his top generals in the field. A machine more complex and secure than Enigma. A machine that could never be broken. For sixty years, no one knew about about Lorenz or 'Tunny', or the determined group of men who finally broke the code and thus changed the course of the war. Many of them went to their deaths without anyone knowing of their achievements. Here, for the first time, codebreaker. Captain Jerry Roberts tells the complete story of this extraordinary feat of intellect and of his struggle to get his wartime colleagues the recognition they deserve. The work they carried out at Bletchley Park was groundbreaking and is recognised as having kick-started the modern computer age.
Intelligence and Espionage: Secrets and Spies provides a global introduction to the role of intelligence - a key, but sometimes controversial, aspect of ensuring national security. Separating fact from fiction, the book draws on past examples to explore the use and misuse of intelligence, examine why failures take place and address important ethical issues over its use. Divided into two parts, the book adopts a thematic approach to the topic, guiding the reader through the collection and analysis of information and its use by policymakers, before looking at intelligence sharing. Lomas and Murphy also explore the important associated activities of counterintelligence and the use of covert action, to influence foreign countries and individuals. Topics covered include human and signals intelligence, the Cuban Missile Crisis, intelligence and Stalin, Trump and the US intelligence community, and the Soviet Bloc. This analysis is supplemented by a comprehensive documents section, containing newly released documents, including material from Edward Snowden's leaks of classified material. Supported by images, a comprehensive chronology, glossary, and 'who's who' of key figures, Intelligence and Espionage is an invaluable resource for anyone interested in the role of intelligence in policymaking, international relations and diplomacy, warfighting and politics to the present day.
The magnificent, unrivaled history of codes and ciphers -- how they're made, how they're broken, and the many and fascinating roles they've played since the dawn of civilization in war, business, diplomacy, and espionage -- updated with a new chapter on computer cryptography and the Ultra secret. Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the Pharaohs. For 4,000 years, fierce battles have been waged between codemakers and codebreakers, and the story of these battles is civilization's secret history, the hidden account of how wars were won and lost, diplomatic intrigues foiled, business secrets stolen, governments ruined, computers hacked. From the XYZ Affair to the Dreyfus Affair, from the Gallic War to the Persian Gulf, from Druidic runes and the kaballah to outer space, from the Zimmermann telegram to Enigma to the Manhattan Project, codebreaking has shaped the course of human events to an extent beyond any easy reckoning. Once a government monopoly, cryptology today touches everybody. It secures the Internet, keeps e-mail private, maintains the integrity of cash machine transactions, and scrambles TV signals on unpaid-for channels. David Kahn's The Codebreakers takes the measure of what codes and codebreaking have meant in human history in a single comprehensive account, astonishing in its scope and enthralling in its execution. Hailed upon first publication as a book likely to become the definitive work of its kind, The Codebreakers has more than lived up to that prediction: it remains unsurpassed. With a brilliant new chapter that makes use of previously classified documents to bring the book thoroughly up to date, and to explore the myriad ways computer codes and their hackers are changing all of our lives, The Codebreakers is the skeleton key to a thousand thrilling true stories of intrigue, mystery, and adventure. It is a masterpiece of the historian's art.
At the beginning of the Second World War the Nazi hierarchy had, at an early stage, fully recognised the importance of controlling the depiction of military conflict in order to ensure the continued morale of their combat troops by providing a bridge between the soldiers and their families. Promoting the use of photographic record also allowed the Nazis to exercise control over negative depictions of the war. In contrast, the British military and political decision makers were reluctant to embrace any potential propaganda benefits of film and photographic material in the build up to and the early months of the Second World War. However, pressure was to come from across the Atlantic where the refusal to allow reporting of the war was harming Britain's cause in the United States. British diplomats overseas reported that the Germans were winning the propaganda war throughout the unoccupied countries of Europe. This belated acceptance of the need for open reporting of the conflict meant that when it was finally accepted as useful the P.R.2 Section (Public Relations) at the War Office and the British Military found itself in a 'catch up' situation. Despite the disadvantages of such a slow start, the British combat cameramen grew in strength throughout the conflict, producing films such as Desert Victory, Tunisian Victory, Burma Victory, The True Glory and a huge stock of both cine and still material. The British Army Film and Photographic Unit's material represents some of the most frequently used records of historical events and key figures of the period. Based on memoirs, personal letters and interviews with the AFPU cameramen, this book reveals the development of the unit and tells the human story of men who used cameras as weapons of war.
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
Building on Goldman's Words of Intelligence and Maret's On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms pertain to federal procedures, policies, and practices involving the information life cycle, national security controls over information, and collection and analysis of intelligence information. This work is intended for intelligence students and professionals at all levels, as well as information science students dealing with such issues as the Freedom of Information Act.
Why Spy? is the result of Brian Stewart's seventy years of working in, and studying the uses and abuses of, intelligence in the real world. Few books currently available to those involved either as professionals or students in this area have been written by someone like the present author, who has practical experience both of field work and of the intelligence bureaucracy at home and abroad. It relates successes and failures via case studies, and draws conclusions that should be pondered by all those concerned with the limitations and usefulness of the intelligence product, as well as with how to avoid the tendency to abuse or ignore it when its conclusions do not fit with preconceived ideas. It reminds the reader of the multiplicity of methods and organisations and the wide range of talents making up the intelligence world.The co-author, scholar Samantha Newbery, examines such current issues as the growth of intelligence studies in universities, and the general emphasis throughout the volume is on the necessity of embracing a range of sources, including police, political, military and overt, to ensure that secret intelligence is placed in as wide a context as possible when decisions are made.
'One of the biggest intelligence coups in recent years' The Times For years KGB operative Vasili Mitrokhin risked his life hiding top-secret material from Russian secret service archives beneath his family dacha. When he was exfiltrated to the West he took with him what the FBI called 'the most complete and extensive intelligence ever received from any source'. This extraordinary bestselling book is the result. 'Co-authored in a brilliant partnership by Christopher Andrew and the renegade Soviet archivist himself ... This is a truly global expose of major KGB penetrations throughout the Western world' The Times 'This tale of malevolent spymasters, intricate tradecraft and cold-eyed betrayal reads like a cold war novel' Time 'Sensational ... the most informed and detailed study of Soviet subversive intrigues worldwide' Spectator 'The most comprehensive addition to the subject ever published' Sunday Telegraph
The incredible true story of the only woman to have worked during the Second World War as a codebreaker at both Bletchley Park and the Pentagon   Betty Webb is the only surviving codebreaker to have worked on both Nazi and Japanese codes at Bletchley Park during the Second World War. This is the tale of her extraordinary life. Betty has had a ringside seat to history. Born one hundred years ago, she spent her childhood in the Shropshire countryside during the 1920s – without heating, electricity or running water. As a schoolgirl, thanks to her mother’s desire for her to learn to speak German proficiently, she took part in an exchange programme and spent time in Nazi Germany. It was 1937 and Germany was on the cusp of war. As a small act of rebellion, she refused to give the Nazi salute alongside her classmates. Back in England, after graduating from school, Betty faced the usual limited opportunities for employment on offer to women at the time. However, with the war in full swing, fate intervened and in 1941, wanting to play her part in the war effort, Betty joined the Auxiliary Territorial Service (Women’s Army). After being interviewed by an intelligence officer, she found herself at Euston station with her kit-bag, a travel warrant in her pocket and instructions to get off the train at Bletchley Park. There, having signed the Official Secrets Act with a gun laid next to her on the table highlighting the enormous importance of the work she was about to do, she joined the ranks of the other men and women ‘codebreakers’. Between 1941 and 1945 Betty Webb played a vital role in the top-secret efforts being made to decipher the secret communications of the Germans and later the Japanese. In 1945, as other members of the forces returned home from the war in Europe, she was sent to the Pentagon and was in Washington DC when the atomic bombs fell and when Eisenhower announced the end of the war. Betty was unable to reveal the true nature of her work, even to her parents, until years later. In this fascinating book, she revisits the key moments of her life and recounts the incredible stories from her time at Bletchley Park.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners. |
![]() ![]() You may like...
Handbook of Industrial Cell Culture…
Victor A. Vinci, Sarad R. Parekh
Hardcover
R8,122
Discovery Miles 81 220
Wave Dynamics of Generalized Continua
Alexander G. Bagdoev, Vladimir I. Erofeyev, …
Hardcover
Bayesian Statistics in Action - BAYSM…
Raffaele Argiento, Ettore Lanzarone, …
Hardcover
R5,042
Discovery Miles 50 420
Discovering Computers 2018 - Digital…
Misty Vermaat, Steven Freund, …
Paperback
|