![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Master of Deception is a biography of Peter Fleming, elder brother of Ian Fleming, creator of James Bond. Peter Fleming worked as a travel writer and journalist, serving with distinction throughout World War II and played a crucial role in British intelligence operations in the Far East. This biography ranges from the personal life of Fleming such as his marriage to Celia Johnson, a famous actor of the time, to his extensive military intelligence career which took him from Norway and Greece to the Far East. Framed through the life of Peter Fleming this book offers an in-depth study of British intelligence operations in the Far East during World War II.
Codebreakers and Spies tells the astonishing story of how Britain's intelligence operatives, experts and special operations teams contributed to the Allies' victory in the Second World War. The work of the Bletchley Park codebreakers in breaking the German Enigma cipher is estimated to have cut the length of the war by around two years, saving countless lives, while the Double Cross system, in which German secret agents were 'turned' by the British to feed their Nazi agent-runners with false information, ensured the success of the D-Day landings. Codebreakers and Spies not only reveals new details about these remarkable operations but also tells the compelling story of how MI6 turned the disaster of lost networks across Europe into triumph. The stories range from extraordinarily courageous to bizarre, with desperation driving the intelligence services to recruit astrologers and even a stage magician to help retrieve intelligence and allied aircrew from of Nazi-occupied Europe. Intelligence historian Michael Smith thrillingly recounts the daring and often moving lives of the heroes and heroines who risked their lives for victory.
Intelligence and Espionage: Secrets and Spies provides a global introduction to the role of intelligence - a key, but sometimes controversial, aspect of ensuring national security. Separating fact from fiction, the book draws on past examples to explore the use and misuse of intelligence, examine why failures take place and address important ethical issues over its use. Divided into two parts, the book adopts a thematic approach to the topic, guiding the reader through the collection and analysis of information and its use by policymakers, before looking at intelligence sharing. Lomas and Murphy also explore the important associated activities of counterintelligence and the use of covert action, to influence foreign countries and individuals. Topics covered include human and signals intelligence, the Cuban Missile Crisis, intelligence and Stalin, Trump and the US intelligence community, and the Soviet Bloc. This analysis is supplemented by a comprehensive documents section, containing newly released documents, including material from Edward Snowden's leaks of classified material. Supported by images, a comprehensive chronology, glossary, and 'who's who' of key figures, Intelligence and Espionage is an invaluable resource for anyone interested in the role of intelligence in policymaking, international relations and diplomacy, warfighting and politics to the present day.
Builds a revisionary theoretical framework for researching intelligence knowledge and applies it to the Swedish Military and Security DirectorateGunilla Eriksson revises our perception of intelligence as carefully collected data and objective truth, arguing that there are hidden aspects to intelligence analysis that need to be uncovered and critically examined. This twofold study investigates the character of intelligence knowledge and the social context in which it is produced, using the Swedish Military and Security Directorate (MUST) as a case study.Eriksson argues that there is an implicit framework that continuously influences knowledge production: what kind of data is considered relevant, how this data is interpreted and the specific social and linguistic context of the organisation, surrounded by unarticulated norms and specific procedures. She asks whether these conventions hamper or obstruct intelligence assessments; an essential analysis, given that history has shown us the grave consequences basing policy on intelligence's wrong conclusions.Sources includeThe annual Swedish Armed Forces Strategic Intelligence Estimates from 1998 2010Lengthy and highly valuable interviews with the analysts, including managers, working at MUST, giving insights into everyday life at the institution and leading to many important resultsParticipant observation carried out by the author at MUST working meetings and seminars during the production process of the 2010 estimate, and drawing on her experience from her years working as an active analyst
Introduction to Intelligence Studies (third edition) provides an overview of the US intelligence community, to include its history, organization, and function. Since the attacks of 9/11, the United States Intelligence Community (IC) has undergone an extensive overhaul. This textbook provides a comprehensive overview of intelligence and security issues, defining critical terms and reviewing the history of intelligence as practiced in the United States. Designed in a practical sequence, the book begins with the basics of intelligence, progresses through its history, describes best practices, and explores the way the intelligence community looks and operates today. The authors examine the "pillars" of the American intelligence system―collection, analysis, counterintelligence, and covert operations―and demonstrate how these work together to provide "decision advantage." The book offers equal treatment to the functions of the intelligence world―balancing coverage on intelligence collection, counterintelligence, information management, critical thinking, and decision-making. It also covers such vital issues as laws and ethics, writing and briefing for the intelligence community, and the emerging threats and challenges that intelligence professionals will face in the future. This revised and updated third edition addresses issues such as the growing influence of Russia and China, the recent history of the Trump and Biden administrations and the IC, and the growing importance of the cyber world in the intelligence enterprise. This book will be essential reading for students of intelligence studies, US national security, foreign policy and International Relations in general.
GRIPPING, MOVING AND INSPIRING: the remarkable life of a world-leading expert in chemical weapons defence. "Unlike any account of warfare I've read" - Billy Billingham For thirty years, Hamish has served and volunteered in conflict zones around the world. As the army's foremost chemical weapons expert, he built a unique first-hand understanding of how to prevent attacks and train doctors on the frontline - saving countless lives in the process. After suffering near-death experiences time and again, Hamish discovered he had a ticking time bomb in his own chest: a heart condition called Sudden Death Syndrome that could kill him at any time. But with a new awareness for the fragility of life, he fought harder to make his count. Despite facing extraordinary personal danger, Hamish has unearthed evidence of multiple chemical attacks in Syria and continues to advise the government at the highest level, including after the 2018 Novichok poisoning in Salisbury. Lifting the lid on Hamish's unique world of battlefield expertise and humanitarian work, Chemical Warrior is a thrilling story of bravery and compassion.
Carve Her Name With Pride is the inspiring story of the half-French Violette Szabo who was born in Paris Iin 1921 to an English motor-car dealer, and a French Mother. She met and married Etienne Szabo, a Captain in the French Foreign Legion in 1940. Shortly after the birth of her daughter, Tania, her husband died at El Alamein. She became a FANY (First Aid Nursing Yeomanry) and was recruited into the SOE and underwent secret agent training. Her first trip to France was completed successfully even though she was arrested and then released by the French Police. On June 7th, 1944, Szabo was parachuted into Limoges. Her task was to co-ordinate the work of the French Resistance in the area in the first days after D-Day. She was captured by the SS 'Das Reich' Panzer Division and handed over to the Gestapo in Paris for interrogation. From Paris, Violette Szabo was sent to Ravensbruck concentration camp where she was executed in January 1945. She was only 23 and for her courage was posthumously awarded The George Cross and the Croix de Guerre.
The history of Special Operations Executive (SOE) seems to spring a never-ending run of surprises, and here are some more. This book explores the mysterious world of the tools SOE used for their missions of subversion and sabotage. An often grim reality is confronted that is more akin with the world of James Bond and Q's workshop than previously believed. Written by two scientists, one of whom served in the SOE and one who was tasked with clearing up after it was disbanded; their insider knowledge presents a clear account of the way in which SOE's inventors worked. From high explosive technology to chemical and biological devices; from the techniques of air supply to incendiarism; from camouflage to underwater warfare; and from radio communications to weaponry. SOE: The Scientific Secrets is a revelation about the tools that allowed the murky world of spying and spies to operate during wartime.
This is a true account of secret operations carried out by the British Army's most clandestine unit- the Force Research Unit. Through the author's own experiences, the story of an essential instrument in the fight against terrorism, that of covert intelligence gathering, is told.
Australia was born with its eyes wide open. Although politicians spoke publicly of loyalty to Britain and the empire, in secret they immediately set about protecting Australia's interests from the Germans, the Japanese - and from Britain itself. As an experienced intelligence officer, John Fahey knows how the security services disguise their activities within government files. He has combed the archives to compile the first account of Australia's intelligence operations in the years from Federation to World War II. He tells the stories of dedicated patriots who undertook dangerous operations to protect their new nation, despite a lack of training and support. He shows how the early adoption of advanced radio technology by Australia contributed to the war effort in Europe. He also exposes the bureaucratic mismanagement in World War II that cost many lives, and the leaks that compromised Australia's standing with its wartime allies so badly that Australia was nearly expelled from the Anglo-Saxon intelligence network. Australia's First Spies shows Australia always has been a far savvier operator in international affairs than much of the historical record suggests, and it offers a glimpse into the secret history of the nation.
Top analyst Leslie Gruis's timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept. All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them.
Exactly a century ago, intelligence agencies across Europe first became aware of a fanatical German nationalist whose political party was rapidly gathering momentum. His name was Adolf Hitler. From 1933, these spy services watched with growing alarm as they tried to determine what sort of threat Hitler's regime would now pose to the rest of Europe. Would Germany rearm, either covertly or in open defiance of the outside world? Would Hitler turn his attention eastwards - or did he also pose a threat to the west? What were the feelings and attitudes of ordinary Germans, towards their own regime as well as the outside world? Despite intense rivalry and mistrust between them, these spy chiefs began to liaise and close ranks against Nazi Germany. At the heart of this loose, informal network were the British and French intelligence services, alongside the Poles and Czechs. Some other countries - Holland, Belgium, and the United States - stood at the periphery. Drawing on a wide range of previously unpublished British, French, German, Danish, and Czech archival sources, Spying on the Reich tells the story of Germany and its rearmament in the 1920s and 1930s; its relations with foreign governments and their intelligence services; and the relations and rivalries between Western governments, seen through the prism of the cooperation, or lack of it, between their spy agencies. Along the way, it addresses some of the most intriguing questions that still perplex historians of the period, such as how and why Britain defended Poland in September 1939, and what alternative policies could have been pursued?
'One of the biggest intelligence coups in recent years' The Times For years KGB operative Vasili Mitrokhin risked his life hiding top-secret material from Russian secret service archives beneath his family dacha. When he was exfiltrated to the West he took with him what the FBI called 'the most complete and extensive intelligence ever received from any source'. This extraordinary bestselling book is the result. 'Co-authored in a brilliant partnership by Christopher Andrew and the renegade Soviet archivist himself ... This is a truly global expose of major KGB penetrations throughout the Western world' The Times 'This tale of malevolent spymasters, intricate tradecraft and cold-eyed betrayal reads like a cold war novel' Time 'Sensational ... the most informed and detailed study of Soviet subversive intrigues worldwide' Spectator 'The most comprehensive addition to the subject ever published' Sunday Telegraph
THE USA TODAY BESTSELLER 'As fast paced as a thriller' Fred Burton, Stratfor Talks' Pen and Sword Podcast 'Jacobsen here presents a tour de force exploring the CIA's paramilitary activities...this excellent work feels like uncovering the tip of the iceberg ...Highly recommended for those seeking a better understanding of American foreign policy in action' Jacob Sherman, Library Journal 'A behind-the-scenes look at the most shadowy corners of the American intelligence community...Well-sourced and well-paced, this book is full of surprises' Kirkus 'Annie Jacobsen takes us inside the darkest and most morally ambiguous corner of our government, where politicians ask brave men and women to kill-up close and personal-on America's behalf' Garrett M. Graff, author of Raven Rock: The Story of the U.S. Government's Secret Plan to Save Itself - While the Rest of us Die 'This is a first rate book on the CIA, its paramilitary armies, operators, and assassins' New York Journal of Books 'Having already demonstrated her remarkable aptitude for unearthing government secrets in books like Area 51 (2011) and The Pentagon's Brain (2015), Jacobsen pulls back the curtain on the history of covert warfare and state sanctioned assassinations from WWII to the present...Jacobsen's work revealing a poorly understood but essential slice of warfare history belongs in every library collection' Booklist The definitive, character-driven history of CIA covert operations and U.S. government-sponsored assassinations, from the author of the Pulizter Prize finalist The Pentagon's Brain Since 1947, domestic and foreign assassinations have been executed under the C IA-led covert action operations team. Before that time, responsibility for taking out America's enemies abroad was even more shrouded in mystery. Despite Hollywood notions of last-minute rogue-operations and external secret hires, covert action is actually a cog in a colossal foreign policy machine, moving through, among others, the Bureau of Intelligence and Research, the House and Senate Select Committees. At the end of the day, it is the President, not the C IA, who is singularly in charge. For the first time, Pulitzer Prize finalist and New York Times bestselling author Annie Jacobsen takes us deep inside this top-secret history. With unparalleled access to former operatives, ambassadors, and even past directors of the Secret Service and CIA operations, Jacobsen reveals the inner workings of these teams, and just how far a U.S. president may go, covertly but lawfully, to pursue the nation's interests.
Aged nineteen, Alison McKelvie was a self-confessed romantic, immersed in books and poetry, and dreaming of beauty, truth and love. In 1940, whilst working as a secretary at MI6, Alison met Alexander Wilson. Thirty years her senior, Alexander was worldly and charismatic. An intense affair quickly led to marriage and two children. But the Wilsons' lives then spiralled into the depths of poverty. Alexander was sacked, imprisoned twice, and then declared bankrupt. His lack of reliability was a hefty emotional burden for Alison to bear. Nevertheless, she loved her husband unreservedly and stuck by him through thick and thin. In 1963, Alexander died suddenly of a heart attack. Alison's world imploded when she discovered that their life together had been built upon layer after layer of deception. Who was Alexander Wilson? How well had Alison really known him? Slowly the lies were unravelled: Alexander had been a novelist, spy and, devastatingly, a bigamist. Alison was the third of four wives, her children two of seven. The inspiration for critically-acclaimed drama Mrs Wilson, Before & After is the powerful and poignant memoir of Alison Wilson. 'Before' peels back the complex layers of a marriage steeped in lies, and the shattering heartbreak which followed. 'After' tells of an intensely-felt redemption through religion. Before & After is, first and foremost, a love story, but it is also an account of one extraordinarily strong woman's deep, unwavering faith.
Alongside the open conflict of World War II there were other, hidden wars - the wars of communication, in which success depended on a flow of concealed and closely-guarded information. Smuggled written messages, secretly transmitted wireless signals, or months of eavesdropping on radio traffic meant operatives could discover in advance what the enemy intended to do. This information was passed on to those who commanded the armies, the fleets and the bomber formations, as well as to the other secret agents throughout the world who were desperately trying to infiltrate enemy lines. Vital information that turned the tide of battle in North African desert and on the Pacific Ocean proved to have been obtained by the time-consuming and unglamorous work of cryptanalysts who deciphered the enemy's coded messages, and coded those for the Allies. From the stuffy huts of Bletchley Park to the battles in the Mediterranean, the French and Dutch Resistance movements and the unkempt radio operatives in Burma, the rarely-seen, outstanding stories collected here reveal the true extent of the 'secret war'. The ongoing need for secrecy for decades after the war meant that the outstanding achievements of wartime cryptanalysts could not be properly recognised. With vivid first-hand accounts and illuminating historical research, VOICES OF THE CODEBREAKERS reveals and finally celebrates the extraordinary accomplishments of these ordinary men and women.
This is both a history of the service attache, beginning with the Napoleonic era, and a discussion of his changing role, past and present. Professor Vagts shows the military adviser temporarily joined to the diplomatic corps as a person often divided in his loyalties to diplomatic officials and to military leaders. Affected by increasing bureaucratic specialization, he sometimes became a "twilight" figure engaged in political activity and even espionage. Professor Vagts' numerous works on the history of militarism and the military, in both German and English, and his research in the chancelleries of Europe have given him perspective for this book. Originally published in 1967. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
This volume discusses the challenges the future holds for different aspects of the intelligence process and for organisations working in the field. The main focus of Western intelligence services is no longer on the intentions and capabilities of the Soviet Union and its allies. Instead, at present, there is a plethora of threats and problems that deserve attention. Some of these problems are short-term and potentially acute, such as terrorism. Others, such as the exhaustion of natural resources, are longer-term and by nature often more difficult to foresee in their implications. This book analyses the different activities that make up the intelligence process, or the 'intelligence cycle', with a focus on changes brought about by external developments in the international arena, such as technology and security threats. Drawing together a range of key thinkers in the field, The Future of Intelligence examines possible scenarios for future developments, including estimations about their plausibility, and the possible consequences for the functioning of intelligence and security services. This book will be of much interest to students of intelligence studies, strategic studies, foreign policy, security studies and IR in general.
'A magnificent biography which finally provides recognition to one of Bletchley's and Britain's lost heroes.' Michael Smith. The Official Secrets Act and the passing of time have prevented the Bletchley Park story from being told by many of its key participants. Here at last is a book which allows some of them to speak for the first time. Gordon Welchman was one of the Park's most important figures. Like Turing, his pioneering work was fundamental to the success of Bletchley Park and helped pave the way for the birth of the digital age. Yet, his story is largely unknown to many. His book, The Hut Six Story, was the first to reveal not only how they broke the codes, but how it was done on an industrial scale. Its publication created such a stir in GCHQ and the NSA that Welchman was forbidden to discuss the book or his wartime work with the media. In order to finally set the record straight, Bletchley Park historian Joel Greenberg has drawn on Welchman's personal papers and correspondence with wartime colleagues which lay undisturbed in his son's loft for many years.Packed with fascinating new insights, this is essential reading for anyone interested in the clandestine activities at Bletchley Park.
The author examines in detail the organization of the U.S. intelligence community, its attempts to monitor and predict the development of Soviet forces from the early days of the cold war, and how these attempts affected American policy and weapons production. Originally published in 1987. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These paperback editions preserve the original texts of these important books while presenting them in durable paperback editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process. The concept of the intelligence cycle has been central to the study of intelligence. As Intelligence Studies has established itself as a distinctive branch of Political Science, it has generated its own foundational literature, within which the intelligence cycle has constituted a vital thread - one running through all social-science approaches to the study of intelligence and constituting a staple of professional training courses. However, there is a growing acceptance that the concept neither accurately reflects the intelligence process nor accommodates important elements of it, such as covert action, counter-intelligence and oversight. Bringing together key authors in the field, the book considers these questions across a number of contexts: in relation to intelligence as a general concept, military intelligence, corporate/private sector intelligence and policing and criminal intelligence. A number of the contributions also go beyond discussion of the limitations of the cycle concept to propose alternative conceptualisations of the intelligence process. What emerges is a plurality of approaches that seek to advance the debate and, as a consequence, Intelligence Studies itself. This book will be of great interest to students of intelligence studies, strategic studies, criminology and policing, security studies and IR in general, as well as to practitioners in the field.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners.
'Damning' - Mail on Sunday 'Utterly horrific and compelling' - The Guardian 'This investigation rings true' - Publishers Weekly On 1 August, 1990, British Airways Flight 149 departed from Heathrow airport, destined for Kuala Lumpur. It never made it there, and neither did its nearly 400 passengers and crew. Instead, Flight 149 stopped in Kuwait, as Iraqi troops invaded - delivering the passengers and crew into the hands of Saddam Hussein. Why did BA Flight 149 land, even as all other flights were rerouted - and even though British and American governments had clear intelligence that Saddam was about to invade? The answer lies in a secret, unaccountable organization - authorised by Margaret Thatcher - carrying out a 'deniable' intelligence operation. The plane was the 'Trojan Horse', and the plan - as well as the horrific consequences for the civilian passengers - has been lied about, denied and covered up by successive governments ever since. Soon to be a major TV drama, this explosive book is written with the full cooperation of the survivors, as well as astonishing and conclusive input from a senior intelligence source. It is a story of scandal, betrayal and misuse of intelligence at the highest levels of UK and US governments - which has had direct impact on terror attacks in the West and the shape of the Middle East today. It is high time the truth is told. |
You may like...
Keeping Us Safe - Secret Intelligence…
Arthur S. Hulnick
Hardcover
Spies in Uniform - British Military and…
Matthew S. Seligmann
Hardcover
R5,475
Discovery Miles 54 750
Intelligence Operations - Understanding…
Erik Kleinsmith
Paperback
An Intelligence Studies Anthology…
Richard M. Denholm II
Paperback
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,286
Discovery Miles 52 860
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
The Art and Science of Military…
Hy Rothstein, Barton Whaley
Hardcover
R3,191
Discovery Miles 31 910
|