![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Australia was born with its eyes wide open. Although politicians spoke publicly of loyalty to Britain and the empire, in secret they immediately set about protecting Australia's interests from the Germans, the Japanese - and from Britain itself. As an experienced intelligence officer, John Fahey knows how the security services disguise their activities within government files. He has combed the archives to compile the first account of Australia's intelligence operations in the years from Federation to World War II. He tells the stories of dedicated patriots who undertook dangerous operations to protect their new nation, despite a lack of training and support. He shows how the early adoption of advanced radio technology by Australia contributed to the war effort in Europe. He also exposes the bureaucratic mismanagement in World War II that cost many lives, and the leaks that compromised Australia's standing with its wartime allies so badly that Australia was nearly expelled from the Anglo-Saxon intelligence network. Australia's First Spies shows Australia always has been a far savvier operator in international affairs than much of the historical record suggests, and it offers a glimpse into the secret history of the nation.
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures. Covering the apartheid period of 1948-90, the transition from apartheid to democracy of 1990-94, and the post-apartheid period of new intelligence dispensation from 1994-2005, this book examines not only the apartheid government's intelligence dispensation and operations, but also those of the African National Congress, and its partner, the South African Communist Party (ANC/SACP) - as well as those of other liberation movements and the 'independent homelands' under the apartheid system. Examining the civilian, military and police intelligence structures and operations in all periods, as well as the extraordinarily complicated apartheid government's security bureaucracy (or 'securocracy') and its structures and units, the book discusses how South Africa's Cold War 'position' influenced its relationships with various other world powers, especially where intelligence co-operation came to bear. It outlines South Africa's regional relationships and concerns - the foremost being its activities in South-West Africa (Namibia) and its relationship with Rhodesia through 1980. Finally, it examines the various legislative and other governance bases for the existence and operations of South Africa's intelligence structures - in all periods - and the influences that such activities as the Rivonia Trial (at one end of the history) or the Truth and Reconciliation Commission (at the other end) had on the evolution of these intelligence questions throughout South Africa's modern history. This book will be of great interest to all students of South African politics, intelligence studies and international politics in general.
Discover the stories of the brave men and women who worked, trained and fought across the UK, from Bletchley Park in southern England all the way to Arisaig in northern Scotland, in an unbelievable effort to defeat the Nazis and win the Second World War . From the outset of the war, most of Britain felt like a mystery even to those who lived there. All road and railway signs were removed up and down the country to thwart potential enemy spies. An invisible web of cunning spread across the United Kingdom; secret laboratories were hidden in marshes, underground bases were built to conceal key strategic plans and grand country houses became secret and silent locations for eccentric boffins to do their confidential cryptography work. In Secret Britain, Sinclair McKay maps out the UK through the hidden bases and battlegrounds of WWII. These locations are full of history and intrigue, but if you don't know where to look, you might just miss them. Journeying through secret wildernesses, suburbs, underground tunnels and manor houses, Sinclair gives a glimpse into the stories of the incredible people behind the war effort, and shows how you might be able to visit these mysterious and evocative locations yourself. With his trademark warmth and compassion, Sinclair unearths the truths of the war that have remained under layers of secrecy since the war was won in 1945.
When British troops first deployed to Northern Ireland in 1969 to keep apart rioting factions of loyalists and nationalists, they could not have known that they were being drawn into the longest campaign in the British Army's history, a battle against the threat of a new rising force - the Provisional Irish Republican Army. While patrols, vehicle bombs and incendiary speeches are the defining memories of the Troubles, the real war was fought out of sight and out of mind. For thirty years, Britain's Special Forces waged a ferocious, secretive struggle against a ruthless and implacable enemy. Harry McCallion's deep experience across the theatre of Northern Ireland offers a unique insight into nearly every major military action and operation in the Province. Having served seven tours with the Parachute Regiment, undergone selection for 14 Intelligence Company, completed six years with the SAS - including two tours with their anti-terrorism team - and received two commendations for bravery during service with the Royal Ulster Constabulary, there are few more qualified to tell this astonishing story. This book is his blistering account of the history of Britain's war against the IRA between 1970 and 1998. From new insights into high-profile killings and riveting accounts of enemy contact, to revelations about clandestine missions and the strategies used in combating a merciless enemy, Undercover War is the definitive inside story of the battle against the IRA, one of the most dangerous and effective terrorist organisations in recent history.
In 1942, Lieutenant-Commander Ian Fleming was personal assistant to the Director of Naval Intelligence - the dynamic figure behind James Bond's fictional chief, 'M'. Here, Fleming had a brilliant idea: why not set up a unit of authorised looters, men who would go in hard with the front-line troops and steal enemy intelligence? Known as '30 Assault Unit', they took part in the major campaigns of the Second World War, landing on the Normandy beaches and helping to liberate Paris. 30AU's final amazing coup was to seize the entire archives of the German Navy - thirty tons of documents. Ian Fleming flew out in person to get the loot back to Britain, where it was combed for evidence to use in the Nuremburg trials. In this gripping and highly enjoyable book, Nicholas Rankin, author of the best-selling Churchill's Wizards, puts 30 Assault Unit's fascinating story in a strategic and intelligence context. He also argues that Ian Fleming's Second World War service was one of the most significant periods of his life - without this, the most popular spy fiction of the twentieth century would not have been written.
Words of Intelligence: An Intelligence Professional's Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels. The intelligence community has undergone massive changes since it developed after World War II. Intelligence work now involves several different processes, including the planning, collection, analysis, and production of information. It also requires extensive expertise in its terminology. And in the post-9/11 era, the intelligence community has expanded, requiring the transmission of information to state and local public administrators, health officials, and transportation planners in times of a possible domestic attack. The number of people who need to know the specialized terminology of the intelligence community continues to grow. This dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues from both a foreign intelligence perspective and a local perspective for law enforcement officials. The number of terms, abbreviations, and acronyms has more than doubled for this new edition, and it includes a topical index and extensively cross-referenced entries. This book explains terms that relate to intelligence operations, intelligence strategies, security classifications, obscure names of intelligence boards and organizations, and methodologies used to produce intelligence analysis. Both entry-level and experienced intelligence professionals in the domestic and foreign intelligence communities find this book useful. This book is more than just a reference book; it is a book to read and enjoy, and from which to learn the art and science of intelligence analysis.
Alongside the open conflict of World War II there were other, hidden wars - the wars of communication, in which success depended on a flow of concealed and closely-guarded information. Smuggled written messages, secretly transmitted wireless signals, or months of eavesdropping on radio traffic meant operatives could discover in advance what the enemy intended to do. This information was passed on to those who commanded the armies, the fleets and the bomber formations, as well as to the other secret agents throughout the world who were desperately trying to infiltrate enemy lines. Vital information that turned the tide of battle in North African desert and on the Pacific Ocean proved to have been obtained by the time-consuming and unglamorous work of cryptanalysts who deciphered the enemy's coded messages, and coded those for the Allies. From the stuffy huts of Bletchley Park to the battles in the Mediterranean, the French and Dutch Resistance movements and the unkempt radio operatives in Burma, the rarely-seen, outstanding stories collected here reveal the true extent of the 'secret war'. The ongoing need for secrecy for decades after the war meant that the outstanding achievements of wartime cryptanalysts could not be properly recognised. With vivid first-hand accounts and illuminating historical research, VOICES OF THE CODEBREAKERS reveals and finally celebrates the extraordinary accomplishments of these ordinary men and women.
The magnificent, unrivaled history of codes and ciphers -- how they're made, how they're broken, and the many and fascinating roles they've played since the dawn of civilization in war, business, diplomacy, and espionage -- updated with a new chapter on computer cryptography and the Ultra secret. Man has created codes to keep secrets and has broken codes to learn those secrets since the time of the Pharaohs. For 4,000 years, fierce battles have been waged between codemakers and codebreakers, and the story of these battles is civilization's secret history, the hidden account of how wars were won and lost, diplomatic intrigues foiled, business secrets stolen, governments ruined, computers hacked. From the XYZ Affair to the Dreyfus Affair, from the Gallic War to the Persian Gulf, from Druidic runes and the kaballah to outer space, from the Zimmermann telegram to Enigma to the Manhattan Project, codebreaking has shaped the course of human events to an extent beyond any easy reckoning. Once a government monopoly, cryptology today touches everybody. It secures the Internet, keeps e-mail private, maintains the integrity of cash machine transactions, and scrambles TV signals on unpaid-for channels. David Kahn's The Codebreakers takes the measure of what codes and codebreaking have meant in human history in a single comprehensive account, astonishing in its scope and enthralling in its execution. Hailed upon first publication as a book likely to become the definitive work of its kind, The Codebreakers has more than lived up to that prediction: it remains unsurpassed. With a brilliant new chapter that makes use of previously classified documents to bring the book thoroughly up to date, and to explore the myriad ways computer codes and their hackers are changing all of our lives, The Codebreakers is the skeleton key to a thousand thrilling true stories of intrigue, mystery, and adventure. It is a masterpiece of the historian's art.
An examination of the military doctrine that animated the French defense against the German invasion in 1940.- Argues that the French learned the wrong lessons from World War I and were ill prepared for World War II- Lessons for modern armies about how to learn from past wars and prepare for future wars- Winner of the Paul Birdsall Prize of the American Historical Association
During World War Two the Special Operation Executive's French Section sent more than 400 agents into Occupied France -- at least 100 never returned and were reported 'Missing Believed Dead' after the war. Twelve of these were women who died in German concentration camps -- some were tortured, some were shot, and some died in the gas chambers. Vera Atkins had helped prepare these women for their missions, and when the war was over she went out to Germany to find out what happened to them and the other agents lost behind enemy lines. But while the woman who carried out this extraordinary mission appeared quintessentially English, she was nothing of the sort. Vera Atkins, who never married, covered her life in mystery so that even her closest family knew almost nothing of her past. In A LIFE IN SECRETS Sarah Helm has stripped away Vera's many veils and -- with unprecedented access to official and private papers, and the cooperation of Vera's relatives -- vividly reconstructed an extraordinary life.
Master of Deception is a biography of Peter Fleming, elder brother of Ian Fleming, creator of James Bond. Peter Fleming worked as a travel writer and journalist, serving with distinction throughout World War II and played a crucial role in British intelligence operations in the Far East. This biography ranges from the personal life of Fleming such as his marriage to Celia Johnson, a famous actor of the time, to his extensive military intelligence career which took him from Norway and Greece to the Far East. Framed through the life of Peter Fleming this book offers an in-depth study of British intelligence operations in the Far East during World War II.
Sometime in the late fall/early winter of 1962, a document began circulating among members of the Communist Party USA based in the Chicago area, titled "Whither the Party of Lenin." It was signed "The Ad Hoc Committee for Scientific Socialist Line." This was not the work of factionally inclined CP comrades, but rather something springing from the counter-intelligence imagination of the FBI. A Threat of the First Magnitude tells the story of the FBI's fake Maoist organization and the informants they used to penetrate the highest levels of the Communist Party USA, the Black Panther Party, the Revolutionary Union and other groups labelled threats to the internal security of the United States in the 1960s and 1970s. As once again the FBI is thrust into the spotlight of US politics, A Threat of a First Magnitude offers a view of the historic inner-workings of the Bureau's counterintelligence operations - from generating "fake news" and the utilization of "sensitive intelligence methods" to the handling of "reliable sources" - that matches or exceeds the sophistication of any contenders.
The Cambridge Spies continue to fascinate - but one of them, John Cairncross, has always been more of an enigma than the others. He worked alone and was driven by his hostility to Fascism rather than to the promotion of Communism. During his war-time work at Bletchley Park, he passed documents to the Soviets which went on to influence the Battle of Kursk. Now, Geoff Andrews has access to the Cairncross papers and secrets, and has spoken to friends, relatives and former colleagues. A complex individual emerges - a scholar as well as a spy - whose motivations have often been misunderstood. After his resignation from the Civil Service, Cairncross moved to Italy and here he rebuilt his life as a foreign correspondent, editor and university professor. This gave him new circles and friendships - which included the writer Graham Greene - while he always lived with the fear that his earlier espionage would come to light. The full account of Cairncross's spying, his confession and his dramatic public exposure as the 'fifth man' will be told here for the first time, while also unveiling the story of his post-espionage life.
The role of intelligence in US government operations has changed dramatically and is now more critical than ever to domestic security and foreign policy. This authoritative and highly researched book written by Jeffrey T. Richelson provides a detailed overview of America's vast intelligence empire, from its organizations and operations to its management structure. Drawing from a multitude of sources, including hundreds of official documents, The US Intelligence Community allows students to understand the full scope of intelligence organizations and activities, and gives valuable support to policymakers and military operations. The seventh edition has been fully revised to include a new chapter on the major issues confronting the intelligence community, including secrecy and leaks, domestic spying, and congressional oversight, as well as revamped chapters on signals intelligence and cyber collection, geospatial intelligence, and open sources. The inclusion of more maps, tables and photos, as well as electronic briefing books on the book's Web site, makes The US Intelligence Community an even more valuable and engaging resource for students.
The World War II codebreaking station at Bletchley is well-known and its activities documented in detail. Its decryption capabilities were vital to the war effort, significantly aiding Allied victory. But where did the messages being deciphered come from in the first place? This is the extraordinary untold story of the Y-Service, a secret even more closely guarded than Bletchley Park. The Y-Service was the code for the chain of wireless intercept stations around Britain and all over the world. A few hundreds of wireless operators, many of them who were civilians, listened to German, Italian and Japanese radio networks and meticulously logged everything they heard. Some messages were then used tactically but most were sent on to Station X - Bletchley Park - where they were deciphered, translated and consolidated to build a comprehensive overview of the enemy's movements and intentions. Peter Hore delves into the fascinating history of the Y-service, with particular reference to the girls of the Women's Royal Naval Service: Wrens who escaped from Singapore to Colombo as the war raged, only to be torpedoed in the Atlantic on their way back to Britain; the woman who had a devastatingly true premonition that disaster would strike on her way to Gibraltar; the Australian who went from being captain of the English Women's Cricket team to a WWII Wren to the head of Abbotleigh girls school in Sydney; how the Y-service helped to hunt the German battleship Bismarck in the North Atlantic, and how it helped to torpedo a Japanese cruiser in the Indian Ocean. Together, these incredible stories build a picture of World War II as it has never been viewed before.
The conflict in Iraq is characterized by three faces of war: interstate conflict, civil war, and insurgency. The Coalition’s invasion of Iraq in March 2003 began as an interstate war. No sooner had Saddam Hussein been successfully deposed, however, than U.S.-led forces faced a lethal insurgency. After Sunni al Qaeda in Iraq bombed the Shia al-Askari Shrine in 2006, the burgeoning conflict took on the additional element of civil war with sectarian violence between the Sunni and the Shia. The most effective strategies in a war as complicated as the three-level conflict in Iraq are intertwined and complementary, according to the editors of this volume. For example, the “surge” in U.S. troops in 2007 went beyond an increase in manpower; the mission had changed, giving priority to public security. This new direction also simultaneously addressed the insurgency as well as the civil war by forging new, trusting relationships between Americans and Iraqis and between Sunni and Shia. This book has broad implications for future decisions about war and peace in the twenty-first century.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners.
The harrowing, and inspiring, story of the capture of one of Britain's top SOE agents in World War Two, his refusal to crack under the most horrific torture, and his final imprisonment in a concentration camp. 'The White Rabbit' was the code name of Wing Commander F.F.E. Yeo-Thomas when he parachuted into France in 1942 as a member of the Special Operations Executive with the Resistance. For the next eighteen months he was responsible for organising all the separate factions of the French Resistance into one combined 'secret army'. On three separate missions into occupied France he met with the heads of Resistance movements all over the country, and he spoke personally with Winston Churchill in order to ensure they were properly supplied. His capture by the Gestapo in March 1944 was therefore a terrible blow for the Resistance movement. For months he was submitted to the most horrific torture in an attempt to get him to spill his unparalleled knowledge of the Resistance, but he refused to crack. Finally he was sentenced to death, and sent to Buchenwald, one of the most infamous German concentration camps. The story of his endurance, and survival, is an inspiring study in the triumph of the human spirit over the most terrible adversity.
Routledge Handbook on Middle East Security provides the first comprehensive look at Middle East security issues that includes both traditional and emerging security threats. Taking a broad perspective on security, the volume offers both analysis grounded in the 'hard' military and state security discourse but also delves into the 'soft' aspects of security employing a human security perspective. As such the volume addresses imminent challenges to security, such as the ones relating directly to the war in Syria, but also the long-term challenges. The traditional security problems, which are deep-seated, are at risk of being exacerbated also by a lack of focus on emerging vulnerabilities in the region. While taking as a point of departure the prevalent security discourse, the volume also goes beyond the traditional focus on military or state security and consider non-traditional security challenges. This book provides a state-of-the-art review of research on the key challenges for security in the Middle East; it will be a key resource for students and scholars interested in Security Studies, International Relations, Political Science and Middle Eastern Studies.
Irish neutrality during the Second World War presented Britain with
significant challenges to its security. Exploring how British
agencies identified and addressed these problems, this book reveals
how Britain simultaneously planned sabotage in and spied on
Ireland, and at times sought to damage the neutral state's
reputation internationally through black propaganda operations. It
analyses the extent of British knowledge of Axis and other
diplomatic missions in Ireland, and shows the crucial role of
diplomatic code-breaking in shaping British policy. The book also
underlines just how much Ireland both interested and irritated
Churchill throughout the war.
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
In 1974, the British government admitted that its WWII secret intelligence organization had read Germany's ciphers on a massive scale. The intelligence from these decrypts influenced the Atlantic, the Eastern Front and Normandy. Why did the Germans never realize the Allies had so thoroughly penetrated their communications? As German intelligence experts conducted numerous internal investigations that all certified their ciphers' security, the Allies continued to break more ciphers and plugged their own communication leaks. How were the Allies able to so thoroughly exploit Germany's secret messages? How did they keep their tremendous success a secret? What flaws in Germany's organization allowed this counterintelligence failure and how can today's organizations learn to avoid similar disasters? This book, the first comparative study of WWII SIGINT (Signals Intelligence), analyzes the characteristics that allowed the Allies SIGINT success and that fostered the German blindness to Enigma's compromise.
Tony Brooks was unique. He was barely out of school when recruited in 1941 by the Special Operations Executive (SOE), the wartime secret service established by Churchill to 'set Europe ablaze'. After extensive training he was parachuted into France in July 1942 - being among the first (and youngest) British agents sent to support the nascent French Resistance. Brook's success was primarily due to his exceptional qualities as a secret agent, although he was aided by large and frequent slices of luck. Among much else, he survived brushes with a British traitor and a notorious double agent; the Gestapo's capture of his wireless operator and subsequent attempts to trap Brooks; brief incarceration in a Spanish concentration camp; injuries resulting from a parachute jump into France; and even capture and interrogation by the Gestapo - although his cover story held and he was released. In an age when we so often take our heroes from the worlds of sport, film, television, music, fashion, or just 'celebrity', it is perhaps salutary to be reminded of a young man who ended the war in command of a disparate force of some 10,000 armed resistance fighters, and decorated with two of this country's highest awards for gallantry, the DSO and MC. At the time, he was just twenty-three years old. This remarkable, detailed and intimate account of a clandestine agent's dangerous wartime career combines the historian's expert eye with the narrative colour of remembered events. As a study in courage, it has few, if any, equals.
This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers. |
![]() ![]() You may like...
Caraval: 4-Book Collection - Caraval…
Stephanie Garber
Hardcover
Physiology, Psychoacoustics and…
Pim van Dijk, Deniz Baskent, …
Hardcover
R1,577
Discovery Miles 15 770
Hygienic Design of Food Factories
John Holah, Huub Lelieveld, …
Paperback
R7,505
Discovery Miles 75 050
|