![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Intelligence on the Frontier Between State and Civil Society shows how today's intelligence practices constantly contest the frontiers between normal politics and security politics, and between civil society and the state. Today's intelligence services face the difficult task of having to manage the uncertainties associated with new threats by inviting civil actors in to help, while also upholding their own institutional authority and responsibility to act in the interest of the nation. This volume examines three different perspectives: Managerial practices of intelligence collection and communication; the increased use of new forms of data (i.e. of social media information); and the expansion of intelligence practices into new areas of concern, for example cybersecurity and the policing of (mis-)information. This book accurately addresses these three topics, and all chapters shine more light on the inclusion, and exclusion, of civil society in the secret world of intelligence. By scrutinizing how intelligence services balance the inclusion of civil society in security tasks with the need to uphold their institutional authority, Intelligence on the Frontier Between State and Civil Society will be of great interest to scholars of Security Studies and Intelligence Studies. The chapters were originally published as a special issue of Intelligence and National Security.
Building on Goldman's Words of Intelligence and Maret's On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms pertain to federal procedures, policies, and practices involving the information life cycle, national security controls over information, and collection and analysis of intelligence information. This work is intended for intelligence students and professionals at all levels, as well as information science students dealing with such issues as the Freedom of Information Act.
'So much of what I know about trust I learned from Rich Diviney'- Simon Sinek 'Incredible... explains why some people thrive - even when things get hard' - Charles Duhigg 'If you care about getting better, you need to buy this book' Daniel Coyle Learn the secret to being your best During his twenty years as a Navy officer and SEAL, Rich Diviney was intimately involved in specialized SEAL selection, whittling hundreds of extraordinary candidates down to a handful of elite performers. But Diviney was often surprised by who succeeded. Those with the right skills sometimes failed, while others he had initially dismissed became top performers. Why weren't the most skillful candidates the ones who would succeed best in some of the world's toughest military assignments? Through years of observation, Diviney cracked the code: beneath obvious skills are a successful recruit's core attributes, the innate traits for a person's performance as an individual and in a team. This book defines these key attributes - including cunning, adaptability, even narcissism - so you can identify and understand your own and those of people around you, helping you perform optimally in all areas of your life.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners.
This text draws together the various strands of Irish national security policy and practice in a single chronological study, from independence in 1922, analyzing the rapid emergence of a complex external security policy combining an absolute commitment to military neutrality and independent defence. The author traces the development of the army and police force in the new Irish state and the close co-operation with Britain over issues of joint concern such as security and immigration. He also examines the state's reaction to the enduring republican threat, casting fresh light on how far the state was willing to put key constitutional protections into abeyance in its conflict with the republican movement. The book also examines the clandestine intelligence activities of belligerent powers during the World War II, documenting the growth of the state's close wartime security understandings with the Allied powers, and the evolution of Cold War links with MI5 and the CIA. This book is intended for general readers of Irish history and scholars and students of 20th-century British and Irish history, and of politics and international relations.
Top analyst Leslie Gruis's timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept. All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them.
"Remember, you are not going out there to start a war," Rear Admiral Frank Johnson reminded Commander Pete Bucher just prior to the maiden voyage of the U.S.S. Pueblo. And yet a war--one that might have gone nuclear--was what nearly happened when the Pueblo was attacked and captured by North Korean gunships in January 1968. Diplomacy prevailed in the end, but not without great cost to the lives of the imprisoned crew and to a nation already mired in an unwinnable war in Vietnam. The Pueblo was an aging cargo ship poorly refurbished as a signals intelligence collector for the top-secret Operation Clickbeetle. It was sent off with a first-time captain, an inexperienced crew, and no back-up, and was captured well before the completion of its first mission. Ignored for a quarter of a century, the Pueblo incident has been the subject of much polemic but no scholarly scrutiny. Mitchell Lerner now examines for the first time the details of this crisis and uses the incident as a window through which to better understand the limitations of American foreign policy during the Cold War. Drawing on thousands of pages of recently declassified documents from President Lyndon Johnson's administration, along with dozens of interviews with those involved, Lerner provides the most complete and accurate account of the Pueblo incident. He weaves on a grand scale a dramatic story of international relations, presidential politics, covert intelligence, capture on the high seas, and secret negotiations. At the same time, he highlights the very intimate struggles of the Pueblo's crew-through capture, imprisonment, indoctrination, torture, and release-and the still smoldering controversy over Commander Bucher's actions. In fact, Bucher emerges here for the first time as the truly steadfast hero his men have always considered him. More than an account of misadventure, The Pueblo Incident is an indictment of Cold War mentality that shows how the premises underlying the Pueblo's risky mission and the ensuing efforts to win the release of her crew were seriously flawed. Lerner argues that had U.S. policymakers regarded the North Koreans as people with a national agenda rather than one serving a global Communist conspiracy, they might have avoided the crisis or resolved it more effectively. He also addresses such unanswered questions as what the Pueblo's mission exactly was, why the ship had no military support, and how damaging the intelligence loss was to national security. With North Korea still seen as a rogue state by some policymakers, "The Pueblo Incident" provides key insights into the domestic imperatives behind that country's foreign relations. It astutely assesses the place of gunboat diplomacy in the modern world and is vital for understanding American foreign policy failures in the Cold War.
Words of Intelligence: An Intelligence Professional's Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels. The intelligence community has undergone massive changes since it developed after World War II. Intelligence work now involves several different processes, including the planning, collection, analysis, and production of information. It also requires extensive expertise in its terminology. And in the post-9/11 era, the intelligence community has expanded, requiring the transmission of information to state and local public administrators, health officials, and transportation planners in times of a possible domestic attack. The number of people who need to know the specialized terminology of the intelligence community continues to grow. This dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues from both a foreign intelligence perspective and a local perspective for law enforcement officials. The number of terms, abbreviations, and acronyms has more than doubled for this new edition, and it includes a topical index and extensively cross-referenced entries. This book explains terms that relate to intelligence operations, intelligence strategies, security classifications, obscure names of intelligence boards and organizations, and methodologies used to produce intelligence analysis. Both entry-level and experienced intelligence professionals in the domestic and foreign intelligence communities find this book useful. This book is more than just a reference book; it is a book to read and enjoy, and from which to learn the art and science of intelligence analysis.
Alongside the open conflict of World War II there were other, hidden wars - the wars of communication, in which success depended on a flow of concealed and closely-guarded information. Smuggled written messages, secretly transmitted wireless signals, or months of eavesdropping on radio traffic meant operatives could discover in advance what the enemy intended to do. This information was passed on to those who commanded the armies, the fleets and the bomber formations, as well as to the other secret agents throughout the world who were desperately trying to infiltrate enemy lines. Vital information that turned the tide of battle in North African desert and on the Pacific Ocean proved to have been obtained by the time-consuming and unglamorous work of cryptanalysts who deciphered the enemy's coded messages, and coded those for the Allies. From the stuffy huts of Bletchley Park to the battles in the Mediterranean, the French and Dutch Resistance movements and the unkempt radio operatives in Burma, the rarely-seen, outstanding stories collected here reveal the true extent of the 'secret war'. The ongoing need for secrecy for decades after the war meant that the outstanding achievements of wartime cryptanalysts could not be properly recognised. With vivid first-hand accounts and illuminating historical research, VOICES OF THE CODEBREAKERS reveals and finally celebrates the extraordinary accomplishments of these ordinary men and women.
An examination of the military doctrine that animated the French defense against the German invasion in 1940.- Argues that the French learned the wrong lessons from World War I and were ill prepared for World War II- Lessons for modern armies about how to learn from past wars and prepare for future wars- Winner of the Paul Birdsall Prize of the American Historical Association
A fascinating anthology which sheds new light on the Bletchley Park story and shows that there is still more to tell.' - Tony Comer OBE, formerly Departmental Historian at GCHQ This important volume tells the story of Bletchley Park through countless letters written by key players to former colleagues and loved ones as the war unfolded. Having intercepted millions of German communications, the codebreakers had felt bound by the Official Secrets Act and said little about their wartime activities. Some who had stayed on at GCHQ after the war, were concerned that speaking out could jeopardise their pensions.Over one hundred letters have been included in this volume and have either been recovered from family members or declassified by GCHQ. They reveal fresh information about the clandestine operation and disclose the true feelings of the participants at Bletchley.Park. In contrast to early accounts, which lacked detail and were occasionally inaccurate, this book thoroughly lays bare the day-to-day experiences at Bletchley Park and uncovers the operational and technical reasons behind the organisation's successes and failures. Simultaneously intimate and comprehensive, it will interest historians, World War II researchers, and anyone who wants to learn the secrets of Britain's signal intelligence effort.
Low Intensity Operations is an important, controversial and prophetic book that has had a major influence on the conduct of modern warfare. First published in 1971, it was the result of an academic year Frank Kitson spent at University College, Oxford, under the auspices of the Ministry of Defence, to write a paper on the way in which the army should be prepared to deal with future insurgency and peacekeeping operations. In his foreword, General Sir Michael Carver wrote with percipience 'The necessity for the integration of intelligence and operations is his most important lesson and the one least appreciated by the conventional soldier. Frank Kitson's great virtue is that his above all a realist, in spite of being both an idealist and enthusiast. The reader will not finding these pages a purely academic theoretical exercise. He will, however, find something stimulating and original suggestions about the tasks which confront the Army in the field of ''low intensity operations'' and about the methods which should be used both to prepare for and execute them.' For too long unavailable in the U. K. this ground-breaking work is as pertinent now as it was when first published; one only has to think of Afghanistan and Iraq to appreciate the sad truth of that. 'To understand the nature of revolutionary warfare, one cannot do better than read "Low Intensity Operations" . . . The author has had unrivalled experience of such operations in many parts of the world.' "Daily Telegraph" 'A highly practical analysis of subversion, insurgency and peacekeeping operations . . . Frank Kitson's book is not merely timely but important.' "The Economist"
The part played by code-cracking in World War II has been revealed in popular film and has also inspired several accounts by code-crackers. Much less well-known is how code-cracking was used in operational situations. In this account the "Silent Service" speaks through the voice of a young and inexperienced naval officer whose rites of passage to manhood required him to act as a seagoing eavesdropper, a role calling not only for quick intelligence but also for facing up to excitement and danger. Sir Alan Peacock's story is interlaced with graphic accounts of life on the lower deck, being torpedoed in a Channel action, and how to contribute to intelligence information that was required to foil enemy attacks on Russian convoys whilst facing atrocious weather conditions. The influence this intense experience exerted on Peacock's subsequent career in economics is also discussed.
The harrowing, and inspiring, story of the capture of one of Britain's top SOE agents in World War Two, his refusal to crack under the most horrific torture, and his final imprisonment in a concentration camp. 'The White Rabbit' was the code name of Wing Commander F.F.E. Yeo-Thomas when he parachuted into France in 1942 as a member of the Special Operations Executive with the Resistance. For the next eighteen months he was responsible for organising all the separate factions of the French Resistance into one combined 'secret army'. On three separate missions into occupied France he met with the heads of Resistance movements all over the country, and he spoke personally with Winston Churchill in order to ensure they were properly supplied. His capture by the Gestapo in March 1944 was therefore a terrible blow for the Resistance movement. For months he was submitted to the most horrific torture in an attempt to get him to spill his unparalleled knowledge of the Resistance, but he refused to crack. Finally he was sentenced to death, and sent to Buchenwald, one of the most infamous German concentration camps. The story of his endurance, and survival, is an inspiring study in the triumph of the human spirit over the most terrible adversity.
It is, of course, no secret that undercover Special Forces and intelligence agencies operated in Northern Ireland and the Republic throughout the 'troubles', from 1969 to 2001 and beyond. What is less well known is how these units were recruited, how they operated, what their mandate was and what they actually did. This is the first account to reveal much of this hitherto unpublished information, providing a truly unique record of surveillance, reconnaissance, intelligence gathering, collusion and undercover combat. An astonishing number of agencies were active to combat the IRA murder squads ('the Provos'), among others the Military Reaction Force (MRF) and the Special Reconnaissance Unit, also known as the 14 Field Security and Intelligence Company ('The Det'), as well as MI5, Special Branch, the RUC, the UDR and the Force Research Unit (FRU), later the Joint Support Group (JSG)). It deals with still contentious and challenging issues as shoot-to-kill, murder squads, the Disappeared, and collusion with loyalists. It examines the findings of the Stevens, Cassel and De Silva reports and looks at operations Loughgall, Andersonstown, Gibraltar and others.
The Cambridge Spies continue to fascinate - but one of them, John Cairncross, has always been more of an enigma than the others. He worked alone and was driven by his hostility to Fascism rather than to the promotion of Communism. During his war-time work at Bletchley Park, he passed documents to the Soviets which went on to influence the Battle of Kursk. Now, Geoff Andrews has access to the Cairncross papers and secrets, and has spoken to friends, relatives and former colleagues. A complex individual emerges - a scholar as well as a spy - whose motivations have often been misunderstood. After his resignation from the Civil Service, Cairncross moved to Italy and here he rebuilt his life as a foreign correspondent, editor and university professor. This gave him new circles and friendships - which included the writer Graham Greene - while he always lived with the fear that his earlier espionage would come to light. The full account of Cairncross's spying, his confession and his dramatic public exposure as the 'fifth man' will be told here for the first time, while also unveiling the story of his post-espionage life.
The role of intelligence in US government operations has changed dramatically and is now more critical than ever to domestic security and foreign policy. This authoritative and highly researched book written by Jeffrey T. Richelson provides a detailed overview of America's vast intelligence empire, from its organizations and operations to its management structure. Drawing from a multitude of sources, including hundreds of official documents, The US Intelligence Community allows students to understand the full scope of intelligence organizations and activities, and gives valuable support to policymakers and military operations. The seventh edition has been fully revised to include a new chapter on the major issues confronting the intelligence community, including secrecy and leaks, domestic spying, and congressional oversight, as well as revamped chapters on signals intelligence and cyber collection, geospatial intelligence, and open sources. The inclusion of more maps, tables and photos, as well as electronic briefing books on the book's Web site, makes The US Intelligence Community an even more valuable and engaging resource for students.
The World War II codebreaking station at Bletchley is well-known and its activities documented in detail. Its decryption capabilities were vital to the war effort, significantly aiding Allied victory. But where did the messages being deciphered come from in the first place? This is the extraordinary untold story of the Y-Service, a secret even more closely guarded than Bletchley Park. The Y-Service was the code for the chain of wireless intercept stations around Britain and all over the world. A few hundreds of wireless operators, many of them who were civilians, listened to German, Italian and Japanese radio networks and meticulously logged everything they heard. Some messages were then used tactically but most were sent on to Station X - Bletchley Park - where they were deciphered, translated and consolidated to build a comprehensive overview of the enemy's movements and intentions. Peter Hore delves into the fascinating history of the Y-service, with particular reference to the girls of the Women's Royal Naval Service: Wrens who escaped from Singapore to Colombo as the war raged, only to be torpedoed in the Atlantic on their way back to Britain; the woman who had a devastatingly true premonition that disaster would strike on her way to Gibraltar; the Australian who went from being captain of the English Women's Cricket team to a WWII Wren to the head of Abbotleigh girls school in Sydney; how the Y-service helped to hunt the German battleship Bismarck in the North Atlantic, and how it helped to torpedo a Japanese cruiser in the Indian Ocean. Together, these incredible stories build a picture of World War II as it has never been viewed before.
THE USA TODAY BESTSELLER 'As fast paced as a thriller' Fred Burton, Stratfor Talks' Pen and Sword Podcast 'Jacobsen here presents a tour de force exploring the CIA's paramilitary activities...this excellent work feels like uncovering the tip of the iceberg ...Highly recommended for those seeking a better understanding of American foreign policy in action' Jacob Sherman, Library Journal 'A behind-the-scenes look at the most shadowy corners of the American intelligence community...Well-sourced and well-paced, this book is full of surprises' Kirkus 'Annie Jacobsen takes us inside the darkest and most morally ambiguous corner of our government, where politicians ask brave men and women to kill-up close and personal-on America's behalf' Garrett M. Graff, author of Raven Rock: The Story of the U.S. Government's Secret Plan to Save Itself - While the Rest of us Die 'This is a first rate book on the CIA, its paramilitary armies, operators, and assassins' New York Journal of Books 'Having already demonstrated her remarkable aptitude for unearthing government secrets in books like Area 51 (2011) and The Pentagon's Brain (2015), Jacobsen pulls back the curtain on the history of covert warfare and state sanctioned assassinations from WWII to the present...Jacobsen's work revealing a poorly understood but essential slice of warfare history belongs in every library collection' Booklist The definitive, character-driven history of CIA covert operations and U.S. government-sponsored assassinations, from the author of the Pulizter Prize finalist The Pentagon's Brain Since 1947, domestic and foreign assassinations have been executed under the C IA-led covert action operations team. Before that time, responsibility for taking out America's enemies abroad was even more shrouded in mystery. Despite Hollywood notions of last-minute rogue-operations and external secret hires, covert action is actually a cog in a colossal foreign policy machine, moving through, among others, the Bureau of Intelligence and Research, the House and Senate Select Committees. At the end of the day, it is the President, not the C IA, who is singularly in charge. For the first time, Pulitzer Prize finalist and New York Times bestselling author Annie Jacobsen takes us deep inside this top-secret history. With unparalleled access to former operatives, ambassadors, and even past directors of the Secret Service and CIA operations, Jacobsen reveals the inner workings of these teams, and just how far a U.S. president may go, covertly but lawfully, to pursue the nation's interests.
The conflict in Iraq is characterized by three faces of war: interstate conflict, civil war, and insurgency. The Coalition’s invasion of Iraq in March 2003 began as an interstate war. No sooner had Saddam Hussein been successfully deposed, however, than U.S.-led forces faced a lethal insurgency. After Sunni al Qaeda in Iraq bombed the Shia al-Askari Shrine in 2006, the burgeoning conflict took on the additional element of civil war with sectarian violence between the Sunni and the Shia. The most effective strategies in a war as complicated as the three-level conflict in Iraq are intertwined and complementary, according to the editors of this volume. For example, the “surge” in U.S. troops in 2007 went beyond an increase in manpower; the mission had changed, giving priority to public security. This new direction also simultaneously addressed the insurgency as well as the civil war by forging new, trusting relationships between Americans and Iraqis and between Sunni and Shia. This book has broad implications for future decisions about war and peace in the twenty-first century.
Routledge Handbook on Middle East Security provides the first comprehensive look at Middle East security issues that includes both traditional and emerging security threats. Taking a broad perspective on security, the volume offers both analysis grounded in the 'hard' military and state security discourse but also delves into the 'soft' aspects of security employing a human security perspective. As such the volume addresses imminent challenges to security, such as the ones relating directly to the war in Syria, but also the long-term challenges. The traditional security problems, which are deep-seated, are at risk of being exacerbated also by a lack of focus on emerging vulnerabilities in the region. While taking as a point of departure the prevalent security discourse, the volume also goes beyond the traditional focus on military or state security and consider non-traditional security challenges. This book provides a state-of-the-art review of research on the key challenges for security in the Middle East; it will be a key resource for students and scholars interested in Security Studies, International Relations, Political Science and Middle Eastern Studies.
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
Carve Her Name With Pride is the inspiring story of the half-French Violette Szabo who was born in Paris Iin 1921 to an English motor-car dealer, and a French Mother. She met and married Etienne Szabo, a Captain in the French Foreign Legion in 1940. Shortly after the birth of her daughter, Tania, her husband died at El Alamein. She became a FANY (First Aid Nursing Yeomanry) and was recruited into the SOE and underwent secret agent training. Her first trip to France was completed successfully even though she was arrested and then released by the French Police. On June 7th, 1944, Szabo was parachuted into Limoges. Her task was to co-ordinate the work of the French Resistance in the area in the first days after D-Day. She was captured by the SS 'Das Reich' Panzer Division and handed over to the Gestapo in Paris for interrogation. From Paris, Violette Szabo was sent to Ravensbruck concentration camp where she was executed in January 1945. She was only 23 and for her courage was posthumously awarded The George Cross and the Croix de Guerre.
The codebreaking efforts at Bletchley Park have obtained greater recognition since the release of the film The Imitation Game in 2014. |
![]() ![]() You may like...
Spies in Uniform - British Military and…
Matthew S. Seligmann
Hardcover
R5,934
Discovery Miles 59 340
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
The Central Intelligence Agency…
Athan G. Theoharis, Richard H. Immerman, …
Hardcover
R3,052
Discovery Miles 30 520
|