Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Even paranoids have enemies. Hitler's most powerful foes were the Allied powers, but he also feared internal conspiracies bent on overthrowing his malevolent regime. In fact, there was a small but significant internal resistance to the Nazi regime, and it did receive help from the outside world. Through recently declassified intelligence documents, this book reveals for the first time the complete story of America's wartime knowledge about, encouragement of, and secret collaboration with the German resistance to Hitler?including the famous July 20th plot to assassinate the Fuehrer.The U.S. government's secret contacts with the anti-Nazi resistance were conducted by the OSS, the World War II predecessor to the CIA. Highly sensitive intelligence reports recently released by the CIA make it evident that the U.S. government had vast knowledge of what was going on inside the Third Reich. For example, a capitulation offer to the western Allies under consideration by Count von Moltke in 1943 was thoroughly discussed within the U.S. government. And Allen Dulles, who was later to become head of the CIA, was well informed about the legendary plot of July 20th. In fact, these secret reports from inside Germany provide a well-rounded picture of German society, revealing the pro- or anti-Nazi attitudes of different social groups (workers, churches, the military, etc.). The newly released documents also show that scholars in the OSS, many of them recruited from ivy-league universities, looked for anti-Nazi movements and leaders to help create a democratic Germany after the war.Such intelligence gathering was a major task of the OSS. However, OSS director ?Wild Bill? Donovan and others favored subversive operations, spreading disinformation, and issuing propaganda. Unorthodox and often dangerous schemes were developed, including bogus ?resistance newspapers,? anti-Nazi letters and postcards distributed through the German postal service, sabotage, and fake radio broadcasts from ?German generals? calling for uprisings against the regime.This is much more than a documentary collection. Explanatory footnotes supply a wealth of background information for the reader, and a comprehensive introduction puts the documents into their wider historical perspective. Arranged in chronological order, these intelligence reports provide a fascinating new perspective on the story of the German resistance to Hitler and reveal an intriguing and previously unexplored aspect of America's war with Hitler.
Among the most crucial roles of the United States military in the
global War on Terror is the collection of human intelligence from
prisoners of war, unlawful combatants, and others. On the heels of
controversy over some of the techniques used to extract
information--such as waterboarding--the Department of the Army
completely revised its interrogation guidelines. The result is this
book, the United States Army's human intelligence collection
playbook, which gives instructions on the structure, planning and
management of human intelligence operations, the debriefing of
soldiers, and the analysis of known relationships and map data. The
largest and most newsworthy section of the book details procedures
for screening and interrogation, which permits a specific number of
interrogation techniques, described in Chapter 8 as "approach
techniques." These techniques, described in great detail, carry
such names as "Emotional Love, ""Mutt and Jeff," "False Flag," and
even "Separation." A must-read for today's military buffs, U.S.
Army Human Intelligence Collector Field Manual is also a valuable
resource for anyone seeking strategies to employ in the gathering
of information.
Intelligence and Espionage: Secrets and Spies provides a global introduction to the role of intelligence - a key, but sometimes controversial, aspect of ensuring national security. Separating fact from fiction, the book draws on past examples to explore the use and misuse of intelligence, examine why failures take place and address important ethical issues over its use. Divided into two parts, the book adopts a thematic approach to the topic, guiding the reader through the collection and analysis of information and its use by policymakers, before looking at intelligence sharing. Lomas and Murphy also explore the important associated activities of counterintelligence and the use of covert action, to influence foreign countries and individuals. Topics covered include human and signals intelligence, the Cuban Missile Crisis, intelligence and Stalin, Trump and the US intelligence community, and the Soviet Bloc. This analysis is supplemented by a comprehensive documents section, containing newly released documents, including material from Edward Snowden's leaks of classified material. Supported by images, a comprehensive chronology, glossary, and 'who's who' of key figures, Intelligence and Espionage is an invaluable resource for anyone interested in the role of intelligence in policymaking, international relations and diplomacy, warfighting and politics to the present day.
Startling new revelations about collaboration between the Allies and the German Secret Service. Based on extensive primary source research, John Bryden's Fighting to Lose presents compelling evidence that the German intelligence service - the Abwehr - undertook to rescue Britain from certain defeat in 1941. Recently opened secret intelligence files indicate that the famed British double-cross or double-agent system was in fact a German triple-cross system. These files also reveal that British intelligence secretly appealed to the Abwehr for help during the war, and that the Abwehr's chief, Admiral Canaris, responded by providing Churchill with the ammunition needed in order to persuade Roosevelt to lure the Japanese into attacking Pearl Harbor. These findings and others like them make John Bryden's Fighting to Lose one of the most fascinating books about World War II to be published for many years.
Like No Other Soldier continues the true story told in Fishers of Men of Rob Lewis’s life after he leaves the Force Research Unit (FRU). Staying on in Northern Ireland as a civilian after years of working on undercover missions against terrorists, Rob eventually gains employment in Bristol, undertaking security work, but things don’t work out and Rob ends up living in a squat. After a job offer from an old colleague, Rob heads to London to work in close-protection security for some of Hollywood’s royalty - Tom Cruise, Liam Neeson, Nicole Kidman and Mel Gibson among them - and later becomes involved in the rescue of some very well-connected people from a dangerous religious cult. Rob’s life seems to be getting back on track. But Rob’s work soon becomes more covert, and he ends up being on the wrong side of a police armed response unit whilst undertaking surveillance tasks, and is later arrested as a suspect when the ‘Stevens Enquiry’ building in Belfast - where detectives investigating the alleged collusion between his old unit and Loyalist paramilitaries are based - is set on fire. As Rob becomes involved in ever more shadowy surveillance and private security operations, he attracts further unwanted police attention, this time from the Serious Organised Crime Agency, and he is charged with fraud, found guilty and sentenced to prison at HMP Wandsworth. Can Rob prove his innocence and reclaim his life?
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
Special Operations Executive was one of the most secretive organizations of the Second World War, its activities cloaked in mystery and intrigue. The fate, therefore, of many of its agents was not revealed to the general public other than the bare details carved with pride upon the headstones and memorials of those courageous individuals. Then in 2003, the first batch of SOE personal files was released by The National Archives. Over the course of the following years more and more files were made available. Now, at last, it is possible to tell the stories of all those agents that died in action. These are stories of bravery and betrayal, incompetence and misfortune, of brutal torture and ultimately death. Some died when their parachutes failed to open, others swallowed their cyanide capsules rather than fall into the hands of the Gestapo, many died in combat with the enemy, most though were executed, by hanging, by shooting and even by lethal injection. The bodies of many of the lost agents were never found, destroyed in the crematoria of such places as Buckenwald, Mauthausen and Natzweiler, others were buried where they fell. All of them should be remembered as having undertaken missions behind enemy lines in the knowledge that they might never return.
Why Spy? is the result of Brian Stewart's seventy years of working in, and studying the uses and abuses of, intelligence in the real world. Few books currently available to those involved either as professionals or students in this area have been written by someone like the present author, who has practical experience both of field work and of the intelligence bureaucracy at home and abroad. It relates successes and failures via case studies, and draws conclusions that should be pondered by all those concerned with the limitations and usefulness of the intelligence product, as well as with how to avoid the tendency to abuse or ignore it when its conclusions do not fit with preconceived ideas. It reminds the reader of the multiplicity of methods and organisations and the wide range of talents making up the intelligence world.The co-author, scholar Samantha Newbery, examines such current issues as the growth of intelligence studies in universities, and the general emphasis throughout the volume is on the necessity of embracing a range of sources, including police, political, military and overt, to ensure that secret intelligence is placed in as wide a context as possible when decisions are made.
Beating the Invader is a revealing and disturbing exploration of the darker history of Nazis, spies and 'Fifth Columnist' saboteurs in Britain and the extensive top secret counter-measures taken before and during the real threat of invasion in 1940. The author's research describes the Nazi Party organisation in Britain and reveals the existence of the Gestapo headquarters in central London. The reader gains vivid insights into Nazi agents and terrorist cells, the Special Branch and MI5 teams who hunted them and investigated murders believed to have been committed by Third Reich agents on British soil. Accessing a host of recently de-classified files the book explores the highly classified measures taken for the protection of the Royal Family, national treasures and gold reserves. The British government made extensive plans for the continuation of government in the event of invasion including the creation of all-powerful Regional Commissioners, 'Black Lists' of suspected collaborators and a British resistance organisation. We also learn of the Nazis' own occupation measures for suborning the population and the infamous Sonderfahndungsliste G.B, the Nazi 'Special Wanted List'. The result is a fascinating insight into the measures and actions taken to ensure that Great Britain did not succumb to the gravest threat of enemy invasion and occupation for centuries.
What makes a good missionary makes a good American spy, or so thought Office of Special Services (OSS) founder "Wild" Bill Donovan when he recruited religious activists into the first ranks of American espionage. Called upon to serve Uncle Sam, Donovan's recruits saw the war as a means of expanding their godly mission, believing an American victory would guarantee the safety of their fellow missionaries and their coreligionists abroad. Drawing on never-before-seen archival materials, acclaimed historian Matthew Sutton shows how religious activists proved to be true believers in Franklin Roosevelt's crusade for global freedom of religion. Sutton focuses on William Eddy, a warrior for Protestantism who was fluent in Arabic; Stewart Herman, a young Lutheran minister rounded up by the Nazis while pastoring in Berlin; Stephen B. L. Penrose, Jr., who left his directorship over missionary schools in the Middle East to join the military rank and file; and John Birch, a fundamentalist missionary in China. Donovan chose these men because they already had the requisite skills for good intelligence analysis, espionage, and covert operations, skills that allowed them to seamlessly blend into different environments. Working for eternal rewards rather than temporal spoils, they proved willing to sacrifice and even to die for their country during the conflict, becoming some of the United States' most loyal secret soldiers. Acutely aware of how their actions conflicted with their spiritual calling, these spies nevertheless ran covert operations in the centers of global religious power, including Mecca, the Vatican, and Palestine. In the end, they played an outsized role in leading the US to victory in WWII: Eddy laid the groundwork for the Allied invasion of North Africa, while Birch led guerilla attacks against the Japanese and, eventually, Chinese Communists. After the war, some of them -- those who survived -- helped launch the Central Intelligence Agency, so that their nation, and American Christianity, could maintain a strong presence throughout the rest of the world. Surprising and absorbing at every turn, Double Crossedis an untold story of World War II spycraft and a profound account of the compromises and doubts that war forces on those who wage it.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners.
Top analyst Leslie Gruis's timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept. All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them.
THE USA TODAY BESTSELLER 'As fast paced as a thriller' Fred Burton, Stratfor Talks' Pen and Sword Podcast 'Jacobsen here presents a tour de force exploring the CIA's paramilitary activities...this excellent work feels like uncovering the tip of the iceberg ...Highly recommended for those seeking a better understanding of American foreign policy in action' Jacob Sherman, Library Journal 'A behind-the-scenes look at the most shadowy corners of the American intelligence community...Well-sourced and well-paced, this book is full of surprises' Kirkus 'Annie Jacobsen takes us inside the darkest and most morally ambiguous corner of our government, where politicians ask brave men and women to kill-up close and personal-on America's behalf' Garrett M. Graff, author of Raven Rock: The Story of the U.S. Government's Secret Plan to Save Itself - While the Rest of us Die 'This is a first rate book on the CIA, its paramilitary armies, operators, and assassins' New York Journal of Books 'Having already demonstrated her remarkable aptitude for unearthing government secrets in books like Area 51 (2011) and The Pentagon's Brain (2015), Jacobsen pulls back the curtain on the history of covert warfare and state sanctioned assassinations from WWII to the present...Jacobsen's work revealing a poorly understood but essential slice of warfare history belongs in every library collection' Booklist The definitive, character-driven history of CIA covert operations and U.S. government-sponsored assassinations, from the author of the Pulizter Prize finalist The Pentagon's Brain Since 1947, domestic and foreign assassinations have been executed under the C IA-led covert action operations team. Before that time, responsibility for taking out America's enemies abroad was even more shrouded in mystery. Despite Hollywood notions of last-minute rogue-operations and external secret hires, covert action is actually a cog in a colossal foreign policy machine, moving through, among others, the Bureau of Intelligence and Research, the House and Senate Select Committees. At the end of the day, it is the President, not the C IA, who is singularly in charge. For the first time, Pulitzer Prize finalist and New York Times bestselling author Annie Jacobsen takes us deep inside this top-secret history. With unparalleled access to former operatives, ambassadors, and even past directors of the Secret Service and CIA operations, Jacobsen reveals the inner workings of these teams, and just how far a U.S. president may go, covertly but lawfully, to pursue the nation's interests.
The official book behind the Academy Award-winning film The Imitation Game, starring Benedict Cumberbatch and Keira Knightley Alan Turing was the mathematician whose cipher-cracking transformed the Second World War. Taken on by British Intelligence in 1938, as a shy young Cambridge don, he combined brilliant logic with a flair for engineering. In 1940 his machines were breaking the Enigma-enciphered messages of Nazi Germany's air force. He then headed the penetration of the super-secure U-boat communications. But his vision went far beyond this achievement. Before the war he had invented the concept of the universal machine, and in 1945 he turned this into the first design for a digital computer. Turing's far-sighted plans for the digital era forged ahead into a vision for Artificial Intelligence. However, in 1952 his homosexuality rendered him a criminal and he was subjected to humiliating treatment. In 1954, aged 41, Alan Turing took his own life.
Low Intensity Operations is an important, controversial and prophetic book that has had a major influence on the conduct of modern warfare. First published in 1971, it was the result of an academic year Frank Kitson spent at University College, Oxford, under the auspices of the Ministry of Defence, to write a paper on the way in which the army should be prepared to deal with future insurgency and peacekeeping operations. In his foreword, General Sir Michael Carver wrote with percipience 'The necessity for the integration of intelligence and operations is his most important lesson and the one least appreciated by the conventional soldier. Frank Kitson's great virtue is that his above all a realist, in spite of being both an idealist and enthusiast. The reader will not finding these pages a purely academic theoretical exercise. He will, however, find something stimulating and original suggestions about the tasks which confront the Army in the field of ''low intensity operations'' and about the methods which should be used both to prepare for and execute them.' For too long unavailable in the U. K. this ground-breaking work is as pertinent now as it was when first published; one only has to think of Afghanistan and Iraq to appreciate the sad truth of that. 'To understand the nature of revolutionary warfare, one cannot do better than read "Low Intensity Operations" . . . The author has had unrivalled experience of such operations in many parts of the world.' "Daily Telegraph" 'A highly practical analysis of subversion, insurgency and peacekeeping operations . . . Frank Kitson's book is not merely timely but important.' "The Economist"
The part played by code-cracking in World War II has been revealed in popular film and has also inspired several accounts by code-crackers. Much less well-known is how code-cracking was used in operational situations. In this account the "Silent Service" speaks through the voice of a young and inexperienced naval officer whose rites of passage to manhood required him to act as a seagoing eavesdropper, a role calling not only for quick intelligence but also for facing up to excitement and danger. Sir Alan Peacock's story is interlaced with graphic accounts of life on the lower deck, being torpedoed in a Channel action, and how to contribute to intelligence information that was required to foil enemy attacks on Russian convoys whilst facing atrocious weather conditions. The influence this intense experience exerted on Peacock's subsequent career in economics is also discussed.
Discover the stories of the brave men and women who worked, trained and fought across the UK, from Bletchley Park in southern England all the way to Arisaig in northern Scotland, in an unbelievable effort to defeat the Nazis and win the Second World War . From the outset of the war, most of Britain felt like a mystery even to those who lived there. All road and railway signs were removed up and down the country to thwart potential enemy spies. An invisible web of cunning spread across the United Kingdom; secret laboratories were hidden in marshes, underground bases were built to conceal key strategic plans and grand country houses became secret and silent locations for eccentric boffins to do their confidential cryptography work. In Secret Britain, Sinclair McKay maps out the UK through the hidden bases and battlegrounds of WWII. These locations are full of history and intrigue, but if you don't know where to look, you might just miss them. Journeying through secret wildernesses, suburbs, underground tunnels and manor houses, Sinclair gives a glimpse into the stories of the incredible people behind the war effort, and shows how you might be able to visit these mysterious and evocative locations yourself. With his trademark warmth and compassion, Sinclair unearths the truths of the war that have remained under layers of secrecy since the war was won in 1945.
'David Omand is exactly the man you need in a crisis' Rory Stewart 'An extraordinary achievement. Probably the best book ever written on crisis management' Christopher Andrew, author of Defence of the Realm We never know when a crisis might explode. Some 'sudden impact' events, such as terrorist attacks or natural disasters, blow up out of a clear blue sky. Other 'slow burn' crises smoulder away for years, often with warning signs ignored along the way until, as if from nowhere, the troops storm the palace. In How to Survive a Crisis, Professor Sir David Omand draws on his experience in defence, security and intelligence, including as Director of GCHQ and UK Security and Intelligence Coordinator, to show how you can detect a looming crisis and extinguish it (or at least survive it with minimum loss). Using gripping real-world examples from Omand's storied career, and drawing lessons from historic catastrophes such as Chernobyl, 9/11, the Deepwater Horizon oil spill and the WannaCry ransomware cyberattack, this empowering book is filled with practical advice on how to survive the multiplying crises of the future. Not every crisis need tip into disaster - if we have invested in personal, business and national resilience. This is an essential toolkit for our turbulent twenty-first century, as well as an exhilarating read for anyone interested in the state of our world - and how we might improve it. 'Piercingly insightful, brilliantly lucid and illuminating, frightening and wise . . . From nuclear meltdown to apocalyptic cyber-attacks, from pandemics to the drums of war, here is a remarkable record of how the threads of society can be held firm in the darkest days' Sinclair McKay, author of Berlin 'An amazing book. Timely, essential and important. The brilliantly insightful David Omand draws on his unmatched experience to explore the complexities of crisis. He shows us how poor preparation leads to failure, but applied intelligence saves lives' Richard Aldrich, author of GCHQ 'This book is the instruction manual we all need' Sir Alex Younger, Chief of MI6
This is both a history of the service attache, beginning with the Napoleonic era, and a discussion of his changing role, past and present. Professor Vagts shows the military adviser temporarily joined to the diplomatic corps as a person often divided in his loyalties to diplomatic officials and to military leaders. Affected by increasing bureaucratic specialization, he sometimes became a "twilight" figure engaged in political activity and even espionage. Professor Vagts' numerous works on the history of militarism and the military, in both German and English, and his research in the chancelleries of Europe have given him perspective for this book. Originally published in 1967. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
The World War II codebreaking station at Bletchley is well-known and its activities documented in detail. Its decryption capabilities were vital to the war effort, significantly aiding Allied victory. But where did the messages being deciphered come from in the first place? This is the extraordinary untold story of the Y-Service, a secret even more closely guarded than Bletchley Park. The Y-Service was the code for the chain of wireless intercept stations around Britain and all over the world. A few hundreds of wireless operators, many of them who were civilians, listened to German, Italian and Japanese radio networks and meticulously logged everything they heard. Some messages were then used tactically but most were sent on to Station X - Bletchley Park - where they were deciphered, translated and consolidated to build a comprehensive overview of the enemy's movements and intentions. Peter Hore delves into the fascinating history of the Y-service, with particular reference to the girls of the Women's Royal Naval Service: Wrens who escaped from Singapore to Colombo as the war raged, only to be torpedoed in the Atlantic on their way back to Britain; the woman who had a devastatingly true premonition that disaster would strike on her way to Gibraltar; the Australian who went from being captain of the English Women's Cricket team to a WWII Wren to the head of Abbotleigh girls school in Sydney; how the Y-service helped to hunt the German battleship Bismarck in the North Atlantic, and how it helped to torpedo a Japanese cruiser in the Indian Ocean. Together, these incredible stories build a picture of World War II as it has never been viewed before.
The intelligence community (IC) uses core contract personnel to augment its workforce. These contractors typically work alongside government personnel and perform staff-like work. Some core contract personnel require enhanced oversight because they perform services that could inappropriately influence the government's decision making. This book examines the extent to which the eight civilian IC elements use core contract personnel; the functions performed by these personnel and the reasons for their use; and whether the elements developed policies and strategically planned for their use. GAO reviewed and assessed the reliability of the eight civilian IC elements' core contract personnel inventory data for fiscal years 2010 and 2011, including reviewing a sample of 287 contract records.
Recent disclosures concerning the size and scope of the National Security Agency's (NSA's) surveillance activities both in the United States and abroad have prompted a flurry of congressional activity aimed at reforming the foreign intelligence gathering process. While some measures would overhaul the substantive legal rules of the USA PATRIOT Act or other provisions of the Foreign Intelligence Surveillance Act (FISA), there are a host of bills designed to make procedural and operational changes to the Foreign Intelligence Surveillance Court (FISC), a specialised Article III court that hears applications and grants orders approving of certain foreign intelligence gathering activities, and the Foreign Intelligence Surveillance Court of Review, a court that reviews rulings of the FISC. This book will explore a selection of these proposals and address potential legal questions such proposals may raise.
This book presents the final report of the review group on intelligence and communications technologies. Recommendations are provided that are designed to protect national security and maintain intelligence capabilities while also respecting our longstanding commitment to privacy, civil liberties, and the trust of allies abroad, with due consideration of reducing the risk of unauthorised disclosures.
Only in 1995 did the United States government officially reveal the existence of the super-secret Venona Project. For nearly fifty years American intelligence agents had been decoding thousands of Soviet messages, uncovering an enormous range of espionage activities carried out against the United States during World War II by its own allies. So sensitive was the project in its early years that even President Truman was not informed of its existence. This extraordinary book is the first to examine the Venona messages-documents of unparalleled importance for our understanding of the history and politics of the Stalin era and the early Cold War years. Hidden away in a former girls' school in the late 1940s, Venona Project cryptanalysts, linguists, and mathematicians attempted to decode more than twenty-five thousand intercepted Soviet intelligence telegrams. When they cracked the unbreakable Soviet code, a breakthrough leading eventually to the decryption of nearly three thousand of the messages, analysts uncovered information of powerful significance: the first indication of Julius Rosenberg's espionage efforts; references to the espionage activities of Alger Hiss; startling proof of Soviet infiltration of the Manhattan Project to build the atomic bomb; evidence that spies had reached the highest levels of the U.S. State and Treasury Departments; indications that more than three hundred Americans had assisted in the Soviet theft of American industrial, scientific, military, and diplomatic secrets; and confirmation that the Communist party of the United States was consciously and willingly involved in Soviet espionage against America. Drawing not only on the Venona papers but also on newly opened Russian and U. S. archives, John Earl Haynes and Harvey Klehr provide in this book the clearest, most rigorously documented analysis ever written on Soviet espionage and the Americans who abetted it in the early Cold War years.
The conflict in Iraq is characterized by three faces of war: interstate conflict, civil war, and insurgency. The Coalition’s invasion of Iraq in March 2003 began as an interstate war. No sooner had Saddam Hussein been successfully deposed, however, than U.S.-led forces faced a lethal insurgency. After Sunni al Qaeda in Iraq bombed the Shia al-Askari Shrine in 2006, the burgeoning conflict took on the additional element of civil war with sectarian violence between the Sunni and the Shia. The most effective strategies in a war as complicated as the three-level conflict in Iraq are intertwined and complementary, according to the editors of this volume. For example, the “surge” in U.S. troops in 2007 went beyond an increase in manpower; the mission had changed, giving priority to public security. This new direction also simultaneously addressed the insurgency as well as the civil war by forging new, trusting relationships between Americans and Iraqis and between Sunni and Shia. This book has broad implications for future decisions about war and peace in the twenty-first century. |
You may like...
The Billion Dollar Spy - A True Story of…
David E. Hoffman
Paperback
(1)
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,578
Discovery Miles 55 780
|