![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Low Intensity Operations is an important, controversial and prophetic book that has had a major influence on the conduct of modern warfare. First published in 1971, it was the result of an academic year Frank Kitson spent at University College, Oxford, under the auspices of the Ministry of Defence, to write a paper on the way in which the army should be prepared to deal with future insurgency and peacekeeping operations. In his foreword, General Sir Michael Carver wrote with percipience 'The necessity for the integration of intelligence and operations is his most important lesson and the one least appreciated by the conventional soldier. Frank Kitson's great virtue is that his above all a realist, in spite of being both an idealist and enthusiast. The reader will not finding these pages a purely academic theoretical exercise. He will, however, find something stimulating and original suggestions about the tasks which confront the Army in the field of ''low intensity operations'' and about the methods which should be used both to prepare for and execute them.' For too long unavailable in the U. K. this ground-breaking work is as pertinent now as it was when first published; one only has to think of Afghanistan and Iraq to appreciate the sad truth of that. 'To understand the nature of revolutionary warfare, one cannot do better than read "Low Intensity Operations" . . . The author has had unrivalled experience of such operations in many parts of the world.' "Daily Telegraph" 'A highly practical analysis of subversion, insurgency and peacekeeping operations . . . Frank Kitson's book is not merely timely but important.' "The Economist"
The part played by code-cracking in World War II has been revealed in popular film and has also inspired several accounts by code-crackers. Much less well-known is how code-cracking was used in operational situations. In this account the "Silent Service" speaks through the voice of a young and inexperienced naval officer whose rites of passage to manhood required him to act as a seagoing eavesdropper, a role calling not only for quick intelligence but also for facing up to excitement and danger. Sir Alan Peacock's story is interlaced with graphic accounts of life on the lower deck, being torpedoed in a Channel action, and how to contribute to intelligence information that was required to foil enemy attacks on Russian convoys whilst facing atrocious weather conditions. The influence this intense experience exerted on Peacock's subsequent career in economics is also discussed.
The World War II codebreaking station at Bletchley is well-known and its activities documented in detail. Its decryption capabilities were vital to the war effort, significantly aiding Allied victory. But where did the messages being deciphered come from in the first place? This is the extraordinary untold story of the Y-Service, a secret even more closely guarded than Bletchley Park. The Y-Service was the code for the chain of wireless intercept stations around Britain and all over the world. A few hundreds of wireless operators, many of them who were civilians, listened to German, Italian and Japanese radio networks and meticulously logged everything they heard. Some messages were then used tactically but most were sent on to Station X - Bletchley Park - where they were deciphered, translated and consolidated to build a comprehensive overview of the enemy's movements and intentions. Peter Hore delves into the fascinating history of the Y-service, with particular reference to the girls of the Women's Royal Naval Service: Wrens who escaped from Singapore to Colombo as the war raged, only to be torpedoed in the Atlantic on their way back to Britain; the woman who had a devastatingly true premonition that disaster would strike on her way to Gibraltar; the Australian who went from being captain of the English Women's Cricket team to a WWII Wren to the head of Abbotleigh girls school in Sydney; how the Y-service helped to hunt the German battleship Bismarck in the North Atlantic, and how it helped to torpedo a Japanese cruiser in the Indian Ocean. Together, these incredible stories build a picture of World War II as it has never been viewed before.
The Cambridge Spies continue to fascinate - but one of them, John Cairncross, has always been more of an enigma than the others. He worked alone and was driven by his hostility to Fascism rather than to the promotion of Communism. During his war-time work at Bletchley Park, he passed documents to the Soviets which went on to influence the Battle of Kursk. Now, Geoff Andrews has access to the Cairncross papers and secrets, and has spoken to friends, relatives and former colleagues. A complex individual emerges - a scholar as well as a spy - whose motivations have often been misunderstood. After his resignation from the Civil Service, Cairncross moved to Italy and here he rebuilt his life as a foreign correspondent, editor and university professor. This gave him new circles and friendships - which included the writer Graham Greene - while he always lived with the fear that his earlier espionage would come to light. The full account of Cairncross's spying, his confession and his dramatic public exposure as the 'fifth man' will be told here for the first time, while also unveiling the story of his post-espionage life.
The role of intelligence in US government operations has changed dramatically and is now more critical than ever to domestic security and foreign policy. This authoritative and highly researched book written by Jeffrey T. Richelson provides a detailed overview of America's vast intelligence empire, from its organizations and operations to its management structure. Drawing from a multitude of sources, including hundreds of official documents, The US Intelligence Community allows students to understand the full scope of intelligence organizations and activities, and gives valuable support to policymakers and military operations. The seventh edition has been fully revised to include a new chapter on the major issues confronting the intelligence community, including secrecy and leaks, domestic spying, and congressional oversight, as well as revamped chapters on signals intelligence and cyber collection, geospatial intelligence, and open sources. The inclusion of more maps, tables and photos, as well as electronic briefing books on the book's Web site, makes The US Intelligence Community an even more valuable and engaging resource for students.
The intelligence community (IC) uses core contract personnel to augment its workforce. These contractors typically work alongside government personnel and perform staff-like work. Some core contract personnel require enhanced oversight because they perform services that could inappropriately influence the government's decision making. This book examines the extent to which the eight civilian IC elements use core contract personnel; the functions performed by these personnel and the reasons for their use; and whether the elements developed policies and strategically planned for their use. GAO reviewed and assessed the reliability of the eight civilian IC elements' core contract personnel inventory data for fiscal years 2010 and 2011, including reviewing a sample of 287 contract records.
Recent disclosures concerning the size and scope of the National Security Agency's (NSA's) surveillance activities both in the United States and abroad have prompted a flurry of congressional activity aimed at reforming the foreign intelligence gathering process. While some measures would overhaul the substantive legal rules of the USA PATRIOT Act or other provisions of the Foreign Intelligence Surveillance Act (FISA), there are a host of bills designed to make procedural and operational changes to the Foreign Intelligence Surveillance Court (FISC), a specialised Article III court that hears applications and grants orders approving of certain foreign intelligence gathering activities, and the Foreign Intelligence Surveillance Court of Review, a court that reviews rulings of the FISC. This book will explore a selection of these proposals and address potential legal questions such proposals may raise.
This book presents the final report of the review group on intelligence and communications technologies. Recommendations are provided that are designed to protect national security and maintain intelligence capabilities while also respecting our longstanding commitment to privacy, civil liberties, and the trust of allies abroad, with due consideration of reducing the risk of unauthorised disclosures.
The conflict in Iraq is characterized by three faces of war: interstate conflict, civil war, and insurgency. The Coalition’s invasion of Iraq in March 2003 began as an interstate war. No sooner had Saddam Hussein been successfully deposed, however, than U.S.-led forces faced a lethal insurgency. After Sunni al Qaeda in Iraq bombed the Shia al-Askari Shrine in 2006, the burgeoning conflict took on the additional element of civil war with sectarian violence between the Sunni and the Shia. The most effective strategies in a war as complicated as the three-level conflict in Iraq are intertwined and complementary, according to the editors of this volume. For example, the “surge” in U.S. troops in 2007 went beyond an increase in manpower; the mission had changed, giving priority to public security. This new direction also simultaneously addressed the insurgency as well as the civil war by forging new, trusting relationships between Americans and Iraqis and between Sunni and Shia. This book has broad implications for future decisions about war and peace in the twenty-first century.
Between 1942 and 1944 a very small, very secret, very successful clandestine unit of the Royal Navy, operated between Dartmouth in Devon, and the Brittany Coast in France. It was a crossing of about 100 miles, every yard of it dangerous. The unit was called the 15th Motor Gunboat Flotilla: crewed by 125 officers and men, it became the most highly decorated Royal Naval unit of the Second World War. The 15th MGBF was an extraordinary group of men thrown together in the most secret of adventures. Very few were regular Royal Naval officers: instead the unit was made up of mostly Royal Naval Volunteer Officers and 'duration only' sailors. Their home was a converted paddle steamer and luxury yacht, but their work could not have been more serious. Their mission was to ferry agents of SIS and SOE to pinpoint landing sites on the Brittany coast in Occupied France. Once they had landed their agents, together with stores for the Resistance, they picked up evaders, escaped POWs who had had the good fortune to be collected by escape lines run by M19, as well as returning SIS and SOE agents. It is a story that is inextricably entwined with that of the many agents they were responsible for - Pierre Hentic, Yves Le Tac, Virginia Hall, Albert Hue, Jeannie Rousseau, Suzanne Warengham, Francois Mitterrand and Mathilde Carre, as well as many others. Without the Flotilla, such intelligence gathering networks as Jade Fitzroy and Alliance would never have developed, and SOE's VAR Line and MI9's Shelburne Escape Line would never have been realised. Drawing on a huge amount of research on both sides of the Channel, including private archives of many of the families involved, A Dangerous Enterprise brings the story of this most clandestine of operations brilliantly to life.
Routledge Handbook on Middle East Security provides the first comprehensive look at Middle East security issues that includes both traditional and emerging security threats. Taking a broad perspective on security, the volume offers both analysis grounded in the 'hard' military and state security discourse but also delves into the 'soft' aspects of security employing a human security perspective. As such the volume addresses imminent challenges to security, such as the ones relating directly to the war in Syria, but also the long-term challenges. The traditional security problems, which are deep-seated, are at risk of being exacerbated also by a lack of focus on emerging vulnerabilities in the region. While taking as a point of departure the prevalent security discourse, the volume also goes beyond the traditional focus on military or state security and consider non-traditional security challenges. This book provides a state-of-the-art review of research on the key challenges for security in the Middle East; it will be a key resource for students and scholars interested in Security Studies, International Relations, Political Science and Middle Eastern Studies.
Recently, there have been multiple high-profile incidents involving the release of classified government information. Perhaps most prominent was Wikileaks.org's unauthorised publication of more than 600,000 classified Department of Defense documents. Such incidents have further heightened congressional, media and public interest in classified information policy. This book provides information on classified information policy, also known as security classification policy and national security classification information policy. It discusses the history, costs and agencies assigned roles in classified information policy and focuses on Executive Order 13526, which establishes much of the current policy and possible oversight issues for Congress.
Builds a revisionary theoretical framework for researching intelligence knowledge and applies it to the Swedish Military and Security DirectorateGunilla Eriksson revises our perception of intelligence as carefully collected data and objective truth, arguing that there are hidden aspects to intelligence analysis that need to be uncovered and critically examined. This twofold study investigates the character of intelligence knowledge and the social context in which it is produced, using the Swedish Military and Security Directorate (MUST) as a case study.Eriksson argues that there is an implicit framework that continuously influences knowledge production: what kind of data is considered relevant, how this data is interpreted and the specific social and linguistic context of the organisation, surrounded by unarticulated norms and specific procedures. She asks whether these conventions hamper or obstruct intelligence assessments; an essential analysis, given that history has shown us the grave consequences basing policy on intelligence's wrong conclusions.Sources includeThe annual Swedish Armed Forces Strategic Intelligence Estimates from 1998 2010Lengthy and highly valuable interviews with the analysts, including managers, working at MUST, giving insights into everyday life at the institution and leading to many important resultsParticipant observation carried out by the author at MUST working meetings and seminars during the production process of the 2010 estimate, and drawing on her experience from her years working as an active analyst
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
'David Omand is exactly the man you need in a crisis' Rory Stewart 'An extraordinary achievement. Probably the best book ever written on crisis management' Christopher Andrew, author of Defence of the Realm We never know when a crisis might explode. Some 'sudden impact' events, such as terrorist attacks or natural disasters, blow up out of a clear blue sky. Other 'slow burn' crises smoulder away for years, often with warning signs ignored along the way until, as if from nowhere, the troops storm the palace. In How to Survive a Crisis, Professor Sir David Omand draws on his experience in defence, security and intelligence, including as Director of GCHQ and UK Security and Intelligence Coordinator, to show how you can detect a looming crisis and extinguish it (or at least survive it with minimum loss). Using gripping real-world examples from Omand's storied career, and drawing lessons from historic catastrophes such as Chernobyl, 9/11, the Deepwater Horizon oil spill and the WannaCry ransomware cyberattack, this empowering book is filled with practical advice on how to survive the multiplying crises of the future. Not every crisis need tip into disaster - if we have invested in personal, business and national resilience. This is an essential toolkit for our turbulent twenty-first century, as well as an exhilarating read for anyone interested in the state of our world - and how we might improve it. 'Piercingly insightful, brilliantly lucid and illuminating, frightening and wise . . . From nuclear meltdown to apocalyptic cyber-attacks, from pandemics to the drums of war, here is a remarkable record of how the threads of society can be held firm in the darkest days' Sinclair McKay, author of Berlin 'An amazing book. Timely, essential and important. The brilliantly insightful David Omand draws on his unmatched experience to explore the complexities of crisis. He shows us how poor preparation leads to failure, but applied intelligence saves lives' Richard Aldrich, author of GCHQ 'This book is the instruction manual we all need' Sir Alex Younger, Chief of MI6
This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
This book analyses the implications of the technical, legal, ethical and privacy challenges as well as challenges for human rights and civil liberties regarding Artificial Intelligence (AI) and National Security. It also offers solutions that can be adopted to mitigate or eradicate these challenges wherever possible. As a general-purpose, dual-use technology, AI can be deployed for both good and evil. The use of AI is increasingly becoming of paramount importance to the government's mission to keep their nations safe. However, the design, development and use of AI for national security poses a wide range of legal, ethical, moral and privacy challenges. This book explores national security uses for Artificial Intelligence (AI) in Western Democracies and its malicious use. This book also investigates the legal, political, ethical, moral, privacy and human rights implications of the national security uses of AI in the aforementioned democracies. It illustrates how AI for national security purposes could threaten most individual fundamental rights, and how the use of AI in digital policing could undermine user human rights and privacy. In relation to its examination of the adversarial uses of AI, this book discusses how certain countries utilise AI to launch disinformation attacks by automating the creation of false or misleading information to subvert public discourse. With regards to the potential of AI for national security purposes, this book investigates how AI could be utilized in content moderation to counter violent extremism on social media platforms. It also discusses the current practices in using AI in managing Big Data Analytics demands. This book provides a reference point for researchers and advanced-level students studying or working in the fields of Cyber Security, Artificial Intelligence, Social Sciences, Network Security as well as Law and Criminology. Professionals working within these related fields and law enforcement employees will also find this book valuable as a reference.
War and Enlightenment in Russia explores how members of the military during the reign of Catherine II reconciled Enlightenment ideas about the equality and moral worth of all humans with the Russian reality based on serfdom, a world governed by autocracy, absolute respect for authority, and subordination to seniority. While there is a sizable literature about the impact of the Enlightenment on government, economy, manners, and literature in Russia, no analytical framework that outlines its impact on the military exists. Eugene Miakinkov's research addresses this gap and challenges the assumption that the military was an unadaptable and vertical institution. Using archival sources, military manuals, essays, memoirs, and letters, the author demonstrates how the Russian militaires philosophes operationalized the Enlightenment by turning thought into reality.
Head of the Abwehr (German military intelligence) during World War II, Admiral Wilhelm Canaris (1887-1945) has been both damned as Hitler's master spy and praised as the true hero of the German anti-Nazi resistance. What emerges in Heinz Hohne's definitive biography is a panoramic view of the rise and fall of Nazism as reflected in the destiny of one man who hoped, for patriotic purposes, to harness evil temporarily, only to be destroyed by it.
Discover the brand new instalment in Lizzie Lane's bestselling Tobacco Girls series! War is fleeting, but true love last forever...May 1944 Hope and excitement is in the air when news breaks of the allied forces landing in Normandy. D Day has arrived. However, the day-to-day struggles for the Tobacco Girls continue. Carole Thomas wants her old life back. She is burdened with the guilt of being a young single mother and considers having baby Paula adopted, but Maisie Miles will do anything to stop her. Phyllis Mason having found the love of her life is getting married in Malta to Mick Fairbrother, but will the dangerous legacies of war plague her happy day? Bridget O'Neill finds herself posted to one of the hospitals receiving the injured from the D-Day landing beaches. Her most fervent hope is that her husband, Lyndon, does not become one of them. Peace is on the horizon, but will their wishes and dreams win through and bring them a happy ever after? Praise for Lizzie Lane: 'A gripping saga and a storyline that will keep you hooked' Rosie Goodwin 'The Tobacco Girls is another heartwarming tale of love and friendship and a must-read for all saga fans.' Jean Fullerton 'Lizzie Lane opens the door to a past of factory girls, redolent with life-affirming friendship, drama, and choices that are as relevant today as they were then.' Catrin Collier 'If you want an exciting, authentic historical saga then look no further than Lizzie Lane.' Fenella J Miller
On 27 May 1942, SS General Reinhard Heydrich was assassinated by British-trained Czech agents who had parachuted into Czechoslovakia. He died of his wounds on 4 June 1942. Two days later, Gestapo Captain Horst Kopkow's department at Reich National Security HQ was given fresh directions. From 6 June 1942 until the end of the war, Kopkow was responsible for coordinating the fight against Soviet and British parachute agents dropped anywhere in Germany or German-occupied territories. This new direction for Kopkow made his name. Within months the "Rote Kapelle" Soviet espionage ring was uncovered in Belgium, who could be traced directly to Berlin and Paris. A new counter-espionage fight had begun, and any agents caught would pay with their lives. In France and Holland the Gestapo caught many Special Operations Executive agents trained in Britain. By spring 1944 almost 150 British agents had been caught and deported to German concentration camps, and almost all had been murdered without trial by the December. Kopkow was directly involved in these murders. Arrested by British forces after the war, Kopkow was extensively interrogated due to his counter-espionage experience. For the next 20 years, Kopkow was a consultant for Britain's Secret Intelligence Service.
He's out of options. Kill. Or be killed. A searing thriller that will leave you reelingDisgraced Navy SEAL Finn is on the run. A wanted man, he's sought for questioning in connection to war crimes committed in Yemen by a rogue element in his SEAL team. But he can remember nothing. Finn learns that three members of his team have been quietly redeployed to Iceland, which is a puzzle in itself; the island is famous for being one of the most peaceful places on the planet. His mission is simple: track down the three SEALs and find out what really happened in Yemen. But two problems stand in his way. On his first night in town a young woman mysteriously drowns-and a local detective suspects his involvement. Worse, a hardened SEAL-turned-contract-killer has been hired to stop him. And he's followed Finn all the way to the icy north. The riveting follow-up to Steel Fear, from the New York Times bestselling writing team, combat decorated Navy SEAL Brandon Webb and award-winning author John David Mann, comes a gripping thriller perfect for fans of Lee Child and Brad Thor.
The Soviet-German War of 1941-1945 was the most extensive intelligence/counterintelligence war in modern history, involving the capture, torture, deportation, execution, and "doubling" of tens of thousands of agents--most of them Soviet citizens. While Russian armies fought furiously to defeat the Wehrmacht, Stalin's security services waged an equally ruthless secret war against Hitler's spies, as well as against the Soviet population. For the first time, Robert Stephan now combines declassified U.S. intelligence documents, captured German records, and Russian sources, including a top-secret Soviet history of its intelligence and security services, to reveal the magnitude and scope of the brutal but sophisticated Soviet counterintelligence war against Nazi Germany. Employing as many as 150,000 trained agents across a 2,400-mile front, the Soviets neutralized the majority of the more than 40,000 German agents deployed against them. As Stephan shows, their combination of Soviet military deception operations and State Security's defeat of the Abwehr's human intelligence effort had devastating consequences for the German Army in every major battle against the Red army, including Moscow, Stalingrad, Kursk, the Belorussian offensive, and the Vistula-Oder operation. Simultaneously, Soviet State Security continued to penetrate the world's major intelligence services including those of its allies, terrorize its own citizens to prevent spying, desertion, and real or perceived opposition to the regime, and run millions of informants, making the USSR a vast prison covering one sixth of the world's surface. Stephan discusses all facets of the Soviet counterintelligence effort, including the major Soviet "radio games" used to mislead the Germans--operations Monastery, Berezino, and those that defeated Himmler's Operation Zeppelin. He also gives the most comprehensive account to date of the Abwehr's infamous agent "Max," whose organization allegedly ran an entire network of agents inside the USSR, and reveals the reasons for Germany's catastrophic under-estimation of Soviet forces by more than one million men during their 1944 summer offensive in Belorussia. Richly detailed and epic in scope, "Stalin's Secret War" opens up a previously hidden dimension of World War II.
Developing Intelligence Theory analyses the current state of intelligence theorisation, provides a guide to a range of approaches and perspectives, and points towards future research agendas in this field. Key questions discussed include the role of intelligence theory in organising the study of intelligence, how (and how far) explanations of intelligence have progressed in the last decade, and how intelligence theory should develop from here. Significant changes have occurred in the security intelligence environment in recent years-including transformative information technologies, the advent of 'new' terrorism, and the emergence of hybrid warfare-making this an opportune moment to take stock and consider how we explain what intelligence does and how. The material made available via the 2013 Edward Snowden leaks and subsequent national debates has contributed much to our understanding of contemporary intelligence processes and has significant implications for future theorisation, for example, in relation to the concept of 'surveillance'. The contributors are leading figures in Intelligence Studies who represent a range of different approaches to conceptual thinking about intelligence. As such, their contributions provide a clear statement of the current parameters of debates in intelligence theory, while also pointing to ways in which the study of intelligence continues to develop. This book was originally published as a special issue of Intelligence and National Security. |
![]() ![]() You may like...
House Officer's Guide to ICU Care…
John A. Elefteriades, Curtis Tribble, …
Paperback
R1,970
Discovery Miles 19 700
Recent Advances in Stroke Therapeutics
Manzoor Ahmad Mir, Raid Saleem Albaradie
Hardcover
LEGO (R) City. Police Patrol - A Push…
Ameet Studio, Macmillan Children's Books
Board book
|