Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process. The concept of the intelligence cycle has been central to the study of intelligence. As Intelligence Studies has established itself as a distinctive branch of Political Science, it has generated its own foundational literature, within which the intelligence cycle has constituted a vital thread - one running through all social-science approaches to the study of intelligence and constituting a staple of professional training courses. However, there is a growing acceptance that the concept neither accurately reflects the intelligence process nor accommodates important elements of it, such as covert action, counter-intelligence and oversight. Bringing together key authors in the field, the book considers these questions across a number of contexts: in relation to intelligence as a general concept, military intelligence, corporate/private sector intelligence and policing and criminal intelligence. A number of the contributions also go beyond discussion of the limitations of the cycle concept to propose alternative conceptualisations of the intelligence process. What emerges is a plurality of approaches that seek to advance the debate and, as a consequence, Intelligence Studies itself. This book will be of great interest to students of intelligence studies, strategic studies, criminology and policing, security studies and IR in general, as well as to practitioners in the field.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures. Covering the apartheid period of 1948-90, the transition from apartheid to democracy of 1990-94, and the post-apartheid period of new intelligence dispensation from 1994-2005, this book examines not only the apartheid government's intelligence dispensation and operations, but also those of the African National Congress, and its partner, the South African Communist Party (ANC/SACP) - as well as those of other liberation movements and the 'independent homelands' under the apartheid system. Examining the civilian, military and police intelligence structures and operations in all periods, as well as the extraordinarily complicated apartheid government's security bureaucracy (or 'securocracy') and its structures and units, the book discusses how South Africa's Cold War 'position' influenced its relationships with various other world powers, especially where intelligence co-operation came to bear. It outlines South Africa's regional relationships and concerns - the foremost being its activities in South-West Africa (Namibia) and its relationship with Rhodesia through 1980. Finally, it examines the various legislative and other governance bases for the existence and operations of South Africa's intelligence structures - in all periods - and the influences that such activities as the Rivonia Trial (at one end of the history) or the Truth and Reconciliation Commission (at the other end) had on the evolution of these intelligence questions throughout South Africa's modern history. This book will be of great interest to all students of South African politics, intelligence studies and international politics in general.
This title takes you inside the eye-opening life and work of the US military's former top paranormal spy. As the operations and training officer for the Defense Intelligence Agency's Psychic Intelligence Unit, Dames and his team used the practice of remote viewing to uncover accurate military intelligence without putting personnel at risk in hostile countries. In "Tell Me What You See", Dames takes you behind the scenes of some of his most fascinating, mind-bending cases, revealing how he and his cohorts solved some of the world's greatest mysteries and uncovered some of the world's most deeply buried secrets. This is a memoir that takes you inside the secret history of the US military's Psychic Intelligence Unit. It reveals true stories and fascinating secrets uncovered by the military's remote viewing teams - from intelligence on Soviet missile sites to the whereabouts of missing POWs in Vietnam to the location of the Ark of the Covenant * Maj. Dames is the most popular guest on George Noory's exceedingly popular radio show "Coast to Coast AM". For anyone fascinated by the intersection of the military and the mysterious, "Tell Me What You See" is an amazing and completely absorbing must-read.
Exactly a century ago, intelligence agencies across Europe first became aware of a fanatical German nationalist whose political party was rapidly gathering momentum. His name was Adolf Hitler. From 1933, these spy services watched with growing alarm as they tried to determine what sort of threat Hitler's regime would now pose to the rest of Europe. Would Germany rearm, either covertly or in open defiance of the outside world? Would Hitler turn his attention eastwards - or did he also pose a threat to the west? What were the feelings and attitudes of ordinary Germans, towards their own regime as well as the outside world? Despite intense rivalry and mistrust between them, these spy chiefs began to liaise and close ranks against Nazi Germany. At the heart of this loose, informal network were the British and French intelligence services, alongside the Poles and Czechs. Some other countries - Holland, Belgium, and the United States - stood at the periphery. Drawing on a wide range of previously unpublished British, French, German, Danish, and Czech archival sources, Spying on the Reich tells the story of Germany and its rearmament in the 1920s and 1930s; its relations with foreign governments and their intelligence services; and the relations and rivalries between Western governments, seen through the prism of the cooperation, or lack of it, between their spy agencies. Along the way, it addresses some of the most intriguing questions that still perplex historians of the period, such as how and why Britain defended Poland in September 1939, and what alternative policies could have been pursued?
Words of Intelligence: An Intelligence Professional's Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels. The intelligence community has undergone massive changes since it developed after World War II. Intelligence work now involves several different processes, including the planning, collection, analysis, and production of information. It also requires extensive expertise in its terminology. And in the post-9/11 era, the intelligence community has expanded, requiring the transmission of information to state and local public administrators, health officials, and transportation planners in times of a possible domestic attack. The number of people who need to know the specialized terminology of the intelligence community continues to grow. This dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues from both a foreign intelligence perspective and a local perspective for law enforcement officials. The number of terms, abbreviations, and acronyms has more than doubled for this new edition, and it includes a topical index and extensively cross-referenced entries. This book explains terms that relate to intelligence operations, intelligence strategies, security classifications, obscure names of intelligence boards and organizations, and methodologies used to produce intelligence analysis. Both entry-level and experienced intelligence professionals in the domestic and foreign intelligence communities find this book useful. This book is more than just a reference book; it is a book to read and enjoy, and from which to learn the art and science of intelligence analysis.
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures. Covering the apartheid period of 1948-90, the transition from apartheid to democracy of 1990-94, and the post-apartheid period of new intelligence dispensation from 1994-2005, this book examines not only the apartheid government's intelligence dispensation and operations, but also those of the African National Congress, and its partner, the South African Communist Party (ANC/SACP) - as well as those of other liberation movements and the 'independent homelands' under the apartheid system. Examining the civilian, military and police intelligence structures and operations in all periods, as well as the extraordinarily complicated apartheid government's security bureaucracy (or 'securocracy') and its structures and units, the book discusses how South Africa's Cold War 'position' influenced its relationships with various other world powers, especially where intelligence co-operation came to bear. It outlines South Africa's regional relationships and concerns - the foremost being its activities in South-West Africa (Namibia) and its relationship with Rhodesia through 1980. Finally, it examines the various legislative and other governance bases for the existence and operations of South Africa's intelligence structures - in all periods - and the influences that such activities as the Rivonia Trial (at one end of the history) or the Truth and Reconciliation Commission (at the other end) had on the evolution of these intelligence questions throughout South Africa's modern history. This book will be of great interest to all students of South African politics, intelligence studies and international politics in general.
"Preventing Catastrophe" is written by two authors who are
experienced "Washington hands" and who understand the interplay
between intelligence and policymaking. Both have been personally
involved, in the United States and overseas, in pursuing national
and international measures to stop the proliferation of weapons of
mass destruction. Their extensive experience is evident in this
book, which puts the Iraqi WMD issue in proper perspective,
explains the challenge of monitoring small clandestine programs,
and explains how the effort to prevent terrorist acquisition and
use of WMD differs from preventing their acquisition and use by
nation states. At the same time, the authors are able to make a
complex subject understandable to non-technical experts, making
this book a useful teaching tool, especially for those who have
little or no knowledge or experience in US national security
decision making.
Through dramatic incidents tells for the first time the full story of the development of Cold War naval intelligence from the end of WWII to the breakup the Soviet Union in 1991, from both sides, East and West. Unlike other accounts, which focus on submarine confrontations and accidents, the authors cover all types of naval intelligence, human collection (racing with the Soviets to capture Nazi subs, successful and losing spies and defectors), signal intelligence (surface, air, satellite and navy commando teams in balaclavas launched by speed boats from subs), acoustic (passive underwater arrays and tapping phone lines), and the aerial and space reconnaissance. The authors give details of operations in all these areas, some of which were witnessed first hand. ""A new light is shed on the spy ships incidents of the 1960s and on submarine intrusions in Swedish waters. Excerpts of the Soviet Navy instructions on UFOs and accounts of Soviet naval encounters with unexplained objects are also published for the first time outside of Russia; and much more.""
Decision makers matching wits with an adversary want intelligence -- good, relevant information to help them win. Intelligence can gain these advantages through directed research and analysis, agile collection, and the timely use of guile and theft. Counterintelligence is the art and practice of defeating these endeavors. Its purpose is the same as that of positive intelligence -- to gain advantage -- but it does so by exploiting, disrupting, denying, or manipulating the intelligence activities of others. The tools of counterintelligence include security systems, deception, and disguise: vaults, mirrors, and masks. In one indispensable volume, top practitioners and scholars in the field explain the importance of counterintelligence today and explore the causes of -- and practical solutions for -- U.S. counterintelligence weaknesses. These experts stress the importance of developing a sound strategic vision in order to improve U.S. counterintelligence and emphasize the challenges posed by technological change, confused purposes, political culture, and bureaucratic rigidity. "Vaults, Mirrors, and Masks" skillfully reveals that robust counterintelligence is vital to ensuring America's security. Published in cooperation with the Center for Peace and Security Studies and the George T. Kalaris Memorial Fund, Edmund A. Walsh School of Foreign Service, Georgetown University.
Military organizations around the world are normally huge producers and consumers of data. Accordingly, they stand to gain from the many benefits associated with data analytics. However, for leaders in defense organizations-either government or industry-accessible use cases are not always available. This book presents a diverse collection of cases that explore the realm of possibilities in military data analytics. These use cases explore such topics as: Context for maritime situation awareness Data analytics for electric power and energy applications Environmental data analytics in military operations Data analytics and training effectiveness evaluation Harnessing single board computers for military data analytics Analytics for military training in virtual reality environments A chapter on using single board computers explores their application in a variety of domains, including wireless sensor networks, unmanned vehicles, and cluster computing. The investigation into a process for extracting and codifying expert knowledge provides a practical and useful model for soldiers that can support diagnostics, decision making, analysis of alternatives, and myriad other analytical processes. Data analytics is seen as having a role in military learning, and a chapter in the book describes the ongoing work with the United States Army Research Laboratory to apply data analytics techniques to the design of courses, evaluation of individual and group performances, and the ability to tailor the learning experience to achieve optimal learning outcomes in a minimum amount of time. Another chapter discusses how virtual reality and analytics are transforming training of military personnel. Virtual reality and analytics are also transforming monitoring, decision making, readiness, and operations. Military Applications of Data Analytics brings together a collection of technical and application-oriented use cases. It enables decision makers and technologists to make connections between data analytics and such fields as virtual reality and cognitive science that are driving military organizations around the world forward.
The Cambridge Spies continue to fascinate - but one of them, John Cairncross, has always been more of an enigma than the others. He worked alone and was driven by his hostility to Fascism rather than to the promotion of Communism. During his war-time work at Bletchley Park, he passed documents to the Soviets which went on to influence the Battle of Kursk. Now, Geoff Andrews has access to the Cairncross papers and secrets, and has spoken to friends, relatives and former colleagues. A complex individual emerges - a scholar as well as a spy - whose motivations have often been misunderstood. After his resignation from the Civil Service, Cairncross moved to Italy and here he rebuilt his life as a foreign correspondent, editor and university professor. This gave him new circles and friendships - which included the writer Graham Greene - while he always lived with the fear that his earlier espionage would come to light. The full account of Cairncross's spying, his confession and his dramatic public exposure as the 'fifth man' will be told here for the first time, while also unveiling the story of his post-espionage life.
World War II found the country of Albania fighting a war within a war. In addition to the threat all of Europe faced from the Germans, Albania was engaged in a civil war between the Nazi-sponsored Ballists and the Communist Partisans led by Enver Hoxha. While America was reluctant to get involved in the civil conflict, the United States was naturally inclined to lend support to whoever fought the Nazis - even if that meant an alliance with the Communists. On a cold November night in 1943, Dale McAdoo (code named Tank) secretly landed on the Albanian coast with a team of OSS (Office of Strategic Services) agents, including Ismail Carapizzi, an Albanian guide and interpreter who would later be murdered. McAdoo's team, the first of many to follow, set up a base of operations in a deep water level cave on the rocky Albanian coast that served the OSS as it carried out its mission of gathering intelligence to support the Allied war effort and harass the Germans. McAdoo was joined by Captain Tom Stefan (code name Art), an Albanian-speaking OSS officer from Boston, whose assignment was to join Hoxha at his remote mountain headquarters and bond with the reclusive Communist leader to benefit the OSS. This volume describes how the OSS aided the Communist-led Partisans in an attempt to weaken the Nazi cause in Albania and neighboring Italy. The book presents an in-depth look at the small core of hardened men who comprised these highly specialized teams, including each member's background and his special fitness for his wartime role behind enemy lines. The American and British presence in Albania during World War II and the later deterioration of Hoxha's relations with Captain Tom Stefan and the OSS mission are discussed in detail. Firsthand interviews with still-living participants and extensive onsite research make this book a unique resource for a little-known dramatic piece of World War II history.
Words of Intelligence: A Dictionary is intended for the intelligence and national security men and women who are fighting the Global War on Terrorism at all levels: local, state, and federal. The intelligence community has undergone massive changes since the Central Intelligence Agency, National Security Agency, and the Department of Defense were created, and recently, with the establishment of Homeland Security and a Director of National Intelligence, it has taken on even more duties and responsibilities. Intelligence now must be transmitted to state and local public administrators, health officials, and transportation planners (to name just a few) in times of a possible domestic attack. Containing over 600 terms related to theoretical aspects of intelligence, intelligence operations, intelligence strategies, security classification of information, obscure names of intelligence boards and organizations, and homeland security, this dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues. A topical index is also included.
Since September 11, 2001, the CIA and DoD have operated together in Afghanistan, Iraq, and during counterterrorism operations. Although the global war on terrorism gave the CIA and DoD a common purpose, it was actions taken in the late eighties and early nineties that set the foundation for their current relationship. Driven by the post--Cold War environment and lessons learned during military operations, policy makers made intelligence support to the military the Intelligence Community's top priority. In response to this demand, the CIA/DoD instituted policy and organizational changes that altered the CIA/DoD relationship. While debates over the future of the Intelligence Community were occurring on Capitol Hill, the CIA and DoD were expanding their relationship in peacekeeping and nation-building operations in Somalia and the Balkans. By the late 1990s, some policy makers and national security professionals became concerned that intelligence support to military operations had gone too far, weakening the long-term analysis required for strategy and policy development. In Subordinating Intelligence: The DoD/CIA Post--Cold War Relationship, David P. Oakley reveals that, despite these concerns, no major changes to either national intelligence organization or its priorities were implemented. These concerns were forgotten after 9/11, as the United States fought two wars and policy makers increasingly focused on tactical and operational actions. As policy makers became fixated with terrorism and the United States fought in Iraq and Afghanistan, the CIA directed a significant amount of its resources toward global counterterrorism efforts and in support of military operations.
He's out of options. Kill. Or be killed. A searing thriller that will leave you reelingDisgraced Navy SEAL Finn is on the run. A wanted man, he's sought for questioning in connection to war crimes committed in Yemen by a rogue element in his SEAL team. But he can remember nothing. Finn learns that three members of his team have been quietly redeployed to Iceland, which is a puzzle in itself; the island is famous for being one of the most peaceful places on the planet. His mission is simple: track down the three SEALs and find out what really happened in Yemen. But two problems stand in his way. On his first night in town a young woman mysteriously drowns-and a local detective suspects his involvement. Worse, a hardened SEAL-turned-contract-killer has been hired to stop him. And he's followed Finn all the way to the icy north. The riveting follow-up to Steel Fear, from the New York Times bestselling writing team, combat decorated Navy SEAL Brandon Webb and award-winning author John David Mann, comes a gripping thriller perfect for fans of Lee Child and Brad Thor.
ACCLAIM FOR ENIGMA "CRACKING STUFF...VIVID AND HITHERTO UNKNOWN DETAILS." -Sunday Times (London) "IN A CROWD OF BOOKS DEALING WITH THE ALLIED BREAKING OF THE WORLD WAR II CIPHER MACHINE ENIGMA, HUGH SEBAG-MONTEFIORE HAS SCORED A SCOOP." -Washington Post Winston Churchill called the cracking of the German Enigma Code "the secret weapon that won the war." Now, for the first time, noted British journalist Hugh-Sebag-Montefiore reveals the c"omplete" story of the breaking of the code by the Allies--the breaking that played a crucial role in the outcome of World War II. This fascinating account relates the never-before-told, hair-raising stories of the heroic British and American sailors, spies, and secret agents who faced death in order to capture vital codebooks from sinking ships and snatch them from under the noses of Nazi officials. Sebag-Montefiore also relates new details about the genesis of the code, little-known facts about how the Poles first cracked the Luftwaffe's version of the code (and then passed it along to the British), and the feverish activities at Bletchley Park, Based in part on documents recently unearthed from American and British archives--including previously confidential government files--and in part on unforgettable, firsthand accounts of surviving witnesses, "Enigma" unearths the stunning truth about the brilliant piece of decryption that changed history.
It is not hyperbole to suggest that the foundations of post-cold war security in Europe have been badly damaged by the conflict in Ukraine since 2014. Russia's annexation of Crimea and intervention in eastern Ukraine appear to have created a 'simmering' conflict, which may take years to resolve and have profound consequences for the European security environment. This volume explores the various political, economic and social aspects of these profound changes and their wider significance for Europe, bringing together contributions by scholars from across the continent and in various disciplinary fields to offer an authoritative, in-depth examination of the complex causes of the Ukraine crisis and the consequences for Ukrainian statehood, Ukraine's relations with Russia, Russia's own domestic governance and Russia's relations with Europe. This book was originally published as a special issue of Europe-Asia Studies.
Anticipating Surprise, originally written as a manual for training intelligence analysts during the Cold War, has been declassified and condensed to provide wider audiences with an inside look at intelligence gathering and analysis for strategic warning. Cynthia Grabo defines the essential steps in the warning process, examines distinctive ingredients of the analytic method of intelligence gathering, and discusses the guidelines for assessing the meaning of gathered information. Since the September 11, 2001 terrorist attacks on America, intelligence collection and analysis has been hotly debated. In this book, Grabo suggests ways of improving warning assessments that better convey warnings to policymakers and military commanders who are responsible for taking appropriate action to avert disaster.
This groundbreaking story is told through Bernardo Benes—a lawyer who joined the refugee exodus from Castro's Cuba in 1960. Benes quickly became one of the leading voices advocating the integration of Cubans into the city's Anglo, old-boy power structure. In 1978, Cuban Intelligence recruited him as an emissary between the Carter administration and Cuba. He did the same for the CIA under Reagan in the early 1980s. In all, Benes made seventy-five secret trips to meet with high-ranking Cuban officials, spending about 150 hours face-to-face with Fidel Castro. The 1978 dialogue resulted in the release of 3,600 Cuban political prisoners and the right for Cuban exiles to visit family members on the island.
The British codebreakers at Bletchley Park are now believed to have shortened the duration of the Second World War by up to two years. During the dark days of 1941, as Britain stood almost alone against the the Nazis, this remarkable achievement seemed impossible. This extraordinary book, originally published as Action This Day, includes descriptions by some of Britain's foremost historians of the work of Bletchley Park, from the breaking ofEnigma and other wartime codes to the invention of modern computing, and its influence on Cold War codebreaking. Crucially, it features personal reminiscences and very human stories of wartime codebreaking from former Bletchley Park codebreakers themselves. This edition includes new material from one of those who was there, making The Bletchley Park Codebreakers compulsive reading. The best collection of military, espionage, and adventure stories ever told. The Dialogue Espionage Classics series began in 2010 with the purpose of bringing back classic out-of-print spying and espionage tales. From WWI and WWII to the Cold War, D-Day to the SOE, Bletchley Park to the Comet Line this fascinating spy history series brings you the best stories that should never be forgotten.
Critical Acclaim for TOP SECRET TALES of World War II "A book for rainy days and long solitary nights by the fire. If there were a genre for cozy nonfiction, this would be the template."–Publishers Weekly "Perfect for the curious and adventure readers and those who love exotic tales and especially history buffs who will be surprised at what they didn’t know. Recommended for nearly everyone."–Kirkus Reviews This war was fought by soldiers out of uniform. Stealth and ingenuity were their weapons. Victory was their only code of conduct. In Top Secret Tales of World War II, noted military historian William Breuer documents espionage–in all its forms–as it evolved in the hands of both Allied and Axis agents of intelligence and counterintelligence. Here you’ll find riveting tales of patriotism and treachery, subversion and sabotage, kidnappings and assassinations, and bribes and blackmailing–with frequently startling revelations about the secret wars behind both the battlefields and the headlines.
Intelligence was a central element of the Cold War and the need for
it was expected to diminish after the USSR's collapse, yet in
recent years it has been in greater demand than ever. The
atrocities of 11 September and the subsequent "war on terrorism"
now call for an even more intensive effort. Important questions
arise on how intelligence fits into the world of increased threats,
globalization and expanded international action. This volume
contains the recent work on this subject by Michael Herman, British
intelligence professional for 35 years and Oxford University
academic. It compares intelligence with other government
information services, and discusses the British intelligence system
and the case for its reform. It also addresses the ethical issues
raised by intelligence's methods and results: "do they on balance
make for a better world or a worse one?." Other chapters explore a
wide range of intelligence topics past and present, including the
transatlantic relationship, the alliance strategies of Norway and
New Zealand, Mrs Thatcher's "de-unionization" of British Sigint,
and personal memories of the British Cabinet Office in the
1970s.
Winston Churchill once remarked that the secret warfare waged in World War II equaled "the most fantastic inventions of romance and melodrama." William Breuer vividly confirms that assessment with these compelling accounts of Allied and Axis intelligence throughout World War II. Here are riveting tales of patriotism and treachery, saboteurs, sleepers, and moles, giving fresh perspectives on the best-known interceptions and deceptions of the war—the breaking of the German code Enigma and the Japanese code Purple, Operation Overlord’s successful disguise of the D-Day invasion— as well as little-known feats of civilian bravado in the face of danger. Meet Sidney Cotton, a British businessman and aviator who took the Luftwaffe’s General Albrecht Kesselring aloft for a test flight at a German air show and then coolly snapped valuable reconnaissance photographs after handing the controls over to the Nazi officer. Shadow the covert armada that shipped the foundation of Great Britain’s financial security—including $2.5 billion in gold—from London to the Bank of Canada in Ottawa, without suffering a single loss from U-boats at the height of the Battle for the Atlantic. Discover how U.S. taxpayers footed the bill for a successful Nazi propaganda effort that was documented in the Congressional Record, published by the Government Printing Office, and mailed on a congressman’s postal privileges. Witness a German military spy so inept he carried his World War I medals on his mission, and another so bold that he advertised for industry secrets in the pages of Popular Aviation magazine. He paid twenty dollars each for the numerous—and significant—replies that poured in. Drawn extensively from personal interviews, private correspondence, trial records, and declassified documents from official archives, this engrossing volume provides detailed, frequently startling revelations about the secret wars fought behind the battlefields—and the headlines—of World War II. This war was fought by soldiers out of uniform. Stealth and ingenuity were their weapons. Victory was their only code of conduct."Gentlemen do not read each other’s mail."—Henry L. Stimson Henry L. Stimson, the U.S. Secretary of War under President Franklin Roosevelt, was in for a rude shock as the military forces of Germany and Japan armed themselves for their assault on the world. Men at war not only read each other’s mail; they forged it whenever possible. In Top Secret Tales of World War II, noted military historian William Breuer documents espionage—in all its forms—as it evolved in the hands of both Allied and Axis agents of intelligence and counter-intelligence. He reveals the acts of subversion and sabotage, the bribes, blackmailings, kidnappings, assassinations, grand deceptions, and bizarre assaults that were conducted in the name of victory at all costs. Focusing on the fascinating characters that played key roles in these pivotal incidents, Breuer brings a fresh dimension to the war’s most notorious acts and provides new insights into missions conducted in such deep shadow they nearly eluded the history books as well as they did the enemy’s detection.
This is a first-hand report by a top German intelligence agent sent to the still-neutral United States in World War I. Official German records, captured by British and American forces at the end of World War II, show the memoirs of the German naval officer to be accurate. Rintelen's orders in Berlin had called for measures to prevent the shipment of American war material to Germany's enemies. In the US, this meant buying arms to keep them from being purchased by the Allies, but it could also mean placing bombs in the hulls of ships sailing for Eurpoe and fomenting strikes among the labour force of American ammunition manufacturers. |
You may like...
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,723
Discovery Miles 57 230
The Secret Life of Bletchley Park - The…
Sinclair McKay
Paperback
(1)
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
|