![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Intelligence and Espionage: Secrets and Spies provides a global introduction to the role of intelligence - a key, but sometimes controversial, aspect of ensuring national security. Separating fact from fiction, the book draws on past examples to explore the use and misuse of intelligence, examine why failures take place and address important ethical issues over its use. Divided into two parts, the book adopts a thematic approach to the topic, guiding the reader through the collection and analysis of information and its use by policymakers, before looking at intelligence sharing. Lomas and Murphy also explore the important associated activities of counterintelligence and the use of covert action, to influence foreign countries and individuals. Topics covered include human and signals intelligence, the Cuban Missile Crisis, intelligence and Stalin, Trump and the US intelligence community, and the Soviet Bloc. This analysis is supplemented by a comprehensive documents section, containing newly released documents, including material from Edward Snowden's leaks of classified material. Supported by images, a comprehensive chronology, glossary, and 'who's who' of key figures, Intelligence and Espionage is an invaluable resource for anyone interested in the role of intelligence in policymaking, international relations and diplomacy, warfighting and politics to the present day.
Operation Fortitude was the ingenious web of deception spun by the Allies to mislead the Nazis as to how and where the D-Day landings were to be mounted. 'One of the most creative intelligence operations of all time' - Kim Philby The story of how this web was woven is one of intrigue, personal drama, ground-breaking techniques, internal resistance, and good fortune. It is a tale of double agents, black radio broadcasts, phantom armies, 'Ultra' decrypts, and dummy parachute drops. These diverse tactics were intended to come together to create a single narrative so compelling that it would convince Adolf Hitler of its authenticity. Operation Fortitude was intended to create the false impression that the Normandy landings were merely a feint to disguise a massive forthcoming invasion by this American force in the Pas de Calais. In other words, the success of D-Day - the beginning of the end of the Second World War - was made possible by the efforts of men and women who were not present on the Normandy beaches. Men such as Juan Pujol, a Spanish double-agent (code-name GARBO) who sent hundreds of wireless messages from London to Madrid in the build-up to D-Day relaying supposed intelligence from his fictitious spy network. This allowed the enemy to conclude that the number of Allied divisions preparing to invade was twice the actual number. Men such as R.V Jones, the head of British Scientific Intelligence, who masterminded the dropping of tinfoil confetti from the bomb-bay doors of Lancaster bombers, creating a false impression that a flotilla of Allied ships was heading in the opposite direction to the genuine invasion fleet. Using first hand sources from a wide range of archives, government documents, letters and memos Operation Fortitude builds a picture of what wartime Britain was like, as well as the immense pressure these men and women were working under and insure D-Day succeeded.
Top analyst Leslie Gruis's timely new book argues that privacy is an individual right and democratic value worth preserving, even in a cyberized world. Since the time of the printing press, technology has played a key role in the evolution of individual rights and helped privacy emerge as a formal legal concept. All governments exercise extraordinary powers during national security crises. In the United States, many imminent threats during the twentieth century induced heightened government intrusion into the privacy of Americans. The Privacy Act of 1974 and the Foreign Intelligence Surveillance Act (FISA, 1978) reversed that trend. Other laws protect the private information of individuals held in specific sectors of the commercial world. Risk management practices were extended to computer networks, and standards for information system security began to emerge. The National Institute of Standards and Technology (NIST) incorporated many such standards into its Cybersecurity Framework, and is currently developing a Privacy Framework. These standards all contribute to a patchwork of privacy protection which, so far, falls far short of what the U.S. constitutional promise offers and what our public badly needs. Greater privacy protections for U.S. citizens will come as long as Americans remember how democracy and privacy sustain one another, and demonstrate their commitment to them.
As of early 2010, more than two million U.S. troops have served in Iraq and Afghanistan. Yet the American public is neither much engaged in the issues of these two wars nor particularly knowledgeable about the troops experiences, which have ranged from positive and energizing to searing and debilitating. Based on scores of interview--some culled from the Library of Congress Veterans History Project and others conducted by the author himself--"Through Veterans Eyes" presents a composite narrative of the experiences of U.S. service personnel in Iraq and Afghanistan. Minear quotes more than 175 veterans by name and includes a dozen of their own photos from the conflict theaters. Thematic chapters cover duty and service, politics, cultural and ethical challenges, relationships to local populations, and reentry into American society. Neither pro-war nor anti-war, Minear s approach encourages veterans to express their views on issues critical to the nation. What has motivated U.S. military personnel to enlist? What specific challenges have they faced in Iraq and Afghanistan? What have been the impacts of deployment on their families and communities? Is their experience changing their views of their country and the world? What lessons may be learned from their stories? Veterans candid responses to these and other probing questions deserve pondering.
Security intelligence continues to be of central importance to the contemporary world: individuals, organizations and states all seek timely and actionable intelligence in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and to what ends? How can we ensure that intelligence is not abused? In this third edition of their classic text, Peter Gill and Mark Phythian set out a comprehensive framework for the study of intelligence, discussing how states organize the collection and analysis of information in order to produce intelligence, how it is acted upon, why it may fail and how the process should be governed in order to uphold democratic rights. Fully revised and updated throughout, the book covers recent developments, including the impact of the Snowden leaks on the role of intelligence agencies in Internet and social media surveillance and in defensive and offensive cyber operations, and the legal and political arrangements for democratic control. The role of intelligence as part of 'hybrid' warfare in the case of Russia and Ukraine is also explored, and the problems facing intelligence in the realm of counterterrorism is considered in the context of the recent wave of attacks in Western Europe. Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of inquiry - one that everyone has an interest in understanding.
Startling new revelations about collaboration between the Allies and the German Secret Service. Based on extensive primary source research, John Bryden's Fighting to Lose presents compelling evidence that the German intelligence service - the Abwehr - undertook to rescue Britain from certain defeat in 1941. Recently opened secret intelligence files indicate that the famed British double-cross or double-agent system was in fact a German triple-cross system. These files also reveal that British intelligence secretly appealed to the Abwehr for help during the war, and that the Abwehr's chief, Admiral Canaris, responded by providing Churchill with the ammunition needed in order to persuade Roosevelt to lure the Japanese into attacking Pearl Harbor. These findings and others like them make John Bryden's Fighting to Lose one of the most fascinating books about World War II to be published for many years.
Codebreakers and Spies tells the astonishing story of how Britain's intelligence operatives, experts and special operations teams contributed to the Allies' victory in the Second World War. The work of the Bletchley Park codebreakers in breaking the German Enigma cipher is estimated to have cut the length of the war by around two years, saving countless lives, while the Double Cross system, in which German secret agents were 'turned' by the British to feed their Nazi agent-runners with false information, ensured the success of the D-Day landings. Codebreakers and Spies not only reveals new details about these remarkable operations but also tells the compelling story of how MI6 turned the disaster of lost networks across Europe into triumph. The stories range from extraordinarily courageous to bizarre, with desperation driving the intelligence services to recruit astrologers and even a stage magician to help retrieve intelligence and allied aircrew from of Nazi-occupied Europe. Intelligence historian Michael Smith thrillingly recounts the daring and often moving lives of the heroes and heroines who risked their lives for victory.
Builds a revisionary theoretical framework for researching intelligence knowledge and applies it to the Swedish Military and Security DirectorateGunilla Eriksson revises our perception of intelligence as carefully collected data and objective truth, arguing that there are hidden aspects to intelligence analysis that need to be uncovered and critically examined. This twofold study investigates the character of intelligence knowledge and the social context in which it is produced, using the Swedish Military and Security Directorate (MUST) as a case study.Eriksson argues that there is an implicit framework that continuously influences knowledge production: what kind of data is considered relevant, how this data is interpreted and the specific social and linguistic context of the organisation, surrounded by unarticulated norms and specific procedures. She asks whether these conventions hamper or obstruct intelligence assessments; an essential analysis, given that history has shown us the grave consequences basing policy on intelligence's wrong conclusions.Sources includeThe annual Swedish Armed Forces Strategic Intelligence Estimates from 1998 2010Lengthy and highly valuable interviews with the analysts, including managers, working at MUST, giving insights into everyday life at the institution and leading to many important resultsParticipant observation carried out by the author at MUST working meetings and seminars during the production process of the 2010 estimate, and drawing on her experience from her years working as an active analyst
'One of the biggest intelligence coups in recent years' The Times For years KGB operative Vasili Mitrokhin risked his life hiding top-secret material from Russian secret service archives beneath his family dacha. When he was exfiltrated to the West he took with him what the FBI called 'the most complete and extensive intelligence ever received from any source'. This extraordinary bestselling book is the result. 'Co-authored in a brilliant partnership by Christopher Andrew and the renegade Soviet archivist himself ... This is a truly global expose of major KGB penetrations throughout the Western world' The Times 'This tale of malevolent spymasters, intricate tradecraft and cold-eyed betrayal reads like a cold war novel' Time 'Sensational ... the most informed and detailed study of Soviet subversive intrigues worldwide' Spectator 'The most comprehensive addition to the subject ever published' Sunday Telegraph
Britain's war in the shadows of male spies and subterfuge in the heart of occupied France is a story well known, but what of the women who also risked their lives for Britain and the liberation of France? In 1942 a desperate need for new recruits, saw SOE turn to a previously overlooked group - women. These extraordinary women came from different backgrounds, but were joined in their idealistic love of France and a desire to play a part in its liberation. They formed SOE's F Section. From the famous White Mouse, Nancy Wake, to the courageous, Noor Inayat Khan, they all risked their lives for King, Country and the Resistance. Many of them died bravely and painfully, and often those who survived, like Eileen Nearne, never told their stories, yet their secret missions of intelligence-gathering and sabotage undoubtedly helped the Resistance to drive out their occupiers and free France. Here, for the first time is the extraordinary account of all forty SOE F women agents. It is a story that deserves to be read by everyone. 'They were the war's bravest women, devoted to defeating the Nazis yet reluctant ever to reveal their heroic pasts. Now a new book tells their intrepid tales.' Daily Express Squadron Leader BERYL E. ESCOTT served in the RAF and is one of the foremost experts on the women of SOE.
The history of Special Operations Executive (SOE) seems to spring a never-ending run of surprises, and here are some more. This book explores the mysterious world of the tools SOE used for their missions of subversion and sabotage. An often grim reality is confronted that is more akin with the world of James Bond and Q's workshop than previously believed. Written by two scientists, one of whom served in the SOE and one who was tasked with clearing up after it was disbanded; their insider knowledge presents a clear account of the way in which SOE's inventors worked. From high explosive technology to chemical and biological devices; from the techniques of air supply to incendiarism; from camouflage to underwater warfare; and from radio communications to weaponry. SOE: The Scientific Secrets is a revelation about the tools that allowed the murky world of spying and spies to operate during wartime.
Australia was born with its eyes wide open. Although politicians spoke publicly of loyalty to Britain and the empire, in secret they immediately set about protecting Australia's interests from the Germans, the Japanese - and from Britain itself. As an experienced intelligence officer, John Fahey knows how the security services disguise their activities within government files. He has combed the archives to compile the first account of Australia's intelligence operations in the years from Federation to World War II. He tells the stories of dedicated patriots who undertook dangerous operations to protect their new nation, despite a lack of training and support. He shows how the early adoption of advanced radio technology by Australia contributed to the war effort in Europe. He also exposes the bureaucratic mismanagement in World War II that cost many lives, and the leaks that compromised Australia's standing with its wartime allies so badly that Australia was nearly expelled from the Anglo-Saxon intelligence network. Australia's First Spies shows Australia always has been a far savvier operator in international affairs than much of the historical record suggests, and it offers a glimpse into the secret history of the nation.
GRIPPING, MOVING AND INSPIRING: the remarkable life of a world-leading expert in chemical weapons defence. "Unlike any account of warfare I've read" - Billy Billingham For thirty years, Hamish has served and volunteered in conflict zones around the world. As the army's foremost chemical weapons expert, he built a unique first-hand understanding of how to prevent attacks and train doctors on the frontline - saving countless lives in the process. After suffering near-death experiences time and again, Hamish discovered he had a ticking time bomb in his own chest: a heart condition called Sudden Death Syndrome that could kill him at any time. But with a new awareness for the fragility of life, he fought harder to make his count. Despite facing extraordinary personal danger, Hamish has unearthed evidence of multiple chemical attacks in Syria and continues to advise the government at the highest level, including after the 2018 Novichok poisoning in Salisbury. Lifting the lid on Hamish's unique world of battlefield expertise and humanitarian work, Chemical Warrior is a thrilling story of bravery and compassion.
Exactly a century ago, intelligence agencies across Europe first became aware of a fanatical German nationalist whose political party was rapidly gathering momentum. His name was Adolf Hitler. From 1933, these spy services watched with growing alarm as they tried to determine what sort of threat Hitler's regime would now pose to the rest of Europe. Would Germany rearm, either covertly or in open defiance of the outside world? Would Hitler turn his attention eastwards - or did he also pose a threat to the west? What were the feelings and attitudes of ordinary Germans, towards their own regime as well as the outside world? Despite intense rivalry and mistrust between them, these spy chiefs began to liaise and close ranks against Nazi Germany. At the heart of this loose, informal network were the British and French intelligence services, alongside the Poles and Czechs. Some other countries - Holland, Belgium, and the United States - stood at the periphery. Drawing on a wide range of previously unpublished British, French, German, Danish, and Czech archival sources, Spying on the Reich tells the story of Germany and its rearmament in the 1920s and 1930s; its relations with foreign governments and their intelligence services; and the relations and rivalries between Western governments, seen through the prism of the cooperation, or lack of it, between their spy agencies. Along the way, it addresses some of the most intriguing questions that still perplex historians of the period, such as how and why Britain defended Poland in September 1939, and what alternative policies could have been pursued?
'The best book on codebreaking I have read', SIR DERMOT TURING 'Brings back the joy I felt when I first read about these things as a kid', PHIL ZIMMERMANN 'This is at last the single book on codebreaking that you must have. If you are not yet addicted to cryptography, this book will get you addicted. Read, enjoy, and test yourself on history's great still-unbroken messages!' JARED DIAMOND is the Pulitzer Prize-winning author of Guns, Germs, and Steel; Collapse; and other international bestsellers 'This is THE book about codebreaking. Very concise, very inclusive and easy to read', ED SCHEIDT 'Riveting', MIKE GODWIN 'Approachable and compelling', GLEN MIRANKER This practical guide to breaking codes and solving cryptograms by two world experts, Elonka Dunin and Klaus Schmeh, describes the most common encryption techniques along with methods to detect and break them. It fills a gap left by outdated or very basic-level books. This guide also covers many unsolved messages. The Zodiac Killer sent four encrypted messages to the police. One was solved; the other three were not. Beatrix Potter's diary and the Voynich Manuscript were both encrypted - to date, only one of the two has been deciphered. The breaking of the so-called Zimmerman Telegram during the First World War changed the course of history. Several encrypted wartime military messages remain unsolved to this day. Tens of thousands of other encrypted messages, ranging from simple notes created by children to encrypted postcards and diaries in people's attics, are known to exist. Breaking these cryptograms fascinates people all over the world, and often gives people insight into the lives of their ancestors. Geocachers, computer gamers and puzzle fans also require codebreaking skills. This is a book both for the growing number of enthusiasts obsessed with real-world mysteries, and also fans of more challenging puzzle books. Many people are obsessed with trying to solve famous crypto mysteries, including members of the Kryptos community (led by Elonka Dunin) trying to solve a decades-old cryptogram on a sculpture at the centre of CIA Headquarters; readers of the novels of Dan Brown as well as Elonka Dunin's The Mammoth Book of Secret Code Puzzles (UK)/The Mammoth Book of Secret Codes and Cryptograms (US); historians who regularly encounter encrypted documents; perplexed family members who discover an encrypted postcard or diary in an ancestor's effects; law-enforcement agents who are confronted by encrypted messages, which also happens more often than might be supposed; members of the American Cryptogram Association (ACA); geocachers (many caches involve a crypto puzzle); puzzle fans; and computer gamers (many games feature encryption puzzles). The book's focus is very much on breaking pencil-and-paper, or manual, encryption methods. Its focus is also largely on historical encryption. Although manual encryption has lost much of its importance due to computer technology, many people are still interested in deciphering messages of this kind.
The success of the Allied codebreakers at Bletchley Park was one of the iconic intelligence achievements of World War II, immortalised in films such as The Imitation Game and Enigma. But cracking Enigma was only half of the story. Across the Channel, German intelligence agencies were hard at work breaking British and Allied codes. Now updated in paperback, The Third Reich is Listening is a gripping blend of modern history and science, and describes the successes and failures of Germany's codebreaking and signals intelligence operations from 1935 to 1945. The first mainstream book to take an in-depth look at German cryptanalysis in World War II, it tells how the Third Reich broke the ciphers of Allied and neutral countries, including Great Britain, France, Russia and Switzerland. This book offers a dramatic new perspective on one of the biggest stories of World War II, using declassified archive material and colourful personal accounts from the Germans at the heart of the story, including a former astronomer who worked out the British order of battle in 1940, a U-Boat commander on the front line of the Battle of the Atlantic, and the German cryptanalyst who broke into and read crucial codes of the British Royal Navy.
The World War II codebreaking station at Bletchley is well-known and its activities documented in detail. Its decryption capabilities were vital to the war effort, significantly aiding Allied victory. But where did the messages being deciphered come from in the first place? This is the extraordinary untold story of the Y-Service, a secret even more closely guarded than Bletchley Park. The Y-Service was the code for the chain of wireless intercept stations around Britain and all over the world. A few hundreds of wireless operators, many of them who were civilians, listened to German, Italian and Japanese radio networks and meticulously logged everything they heard. Some messages were then used tactically but most were sent on to Station X - Bletchley Park - where they were deciphered, translated and consolidated to build a comprehensive overview of the enemy's movements and intentions. Peter Hore delves into the fascinating history of the Y-service, with particular reference to the girls of the Women's Royal Naval Service: Wrens who escaped from Singapore to Colombo as the war raged, only to be torpedoed in the Atlantic on their way back to Britain; the woman who had a devastatingly true premonition that disaster would strike on her way to Gibraltar; the Australian who went from being captain of the English Women's Cricket team to a WWII Wren to the head of Abbotleigh girls school in Sydney; how the Y-service helped to hunt the German battleship Bismarck in the North Atlantic, and how it helped to torpedo a Japanese cruiser in the Indian Ocean. Together, these incredible stories build a picture of World War II as it has never been viewed before.
Aged nineteen, Alison McKelvie was a self-confessed romantic, immersed in books and poetry, and dreaming of beauty, truth and love. In 1940, whilst working as a secretary at MI6, Alison met Alexander Wilson. Thirty years her senior, Alexander was worldly and charismatic. An intense affair quickly led to marriage and two children. But the Wilsons' lives then spiralled into the depths of poverty. Alexander was sacked, imprisoned twice, and then declared bankrupt. His lack of reliability was a hefty emotional burden for Alison to bear. Nevertheless, she loved her husband unreservedly and stuck by him through thick and thin. In 1963, Alexander died suddenly of a heart attack. Alison's world imploded when she discovered that their life together had been built upon layer after layer of deception. Who was Alexander Wilson? How well had Alison really known him? Slowly the lies were unravelled: Alexander had been a novelist, spy and, devastatingly, a bigamist. Alison was the third of four wives, her children two of seven. The inspiration for critically-acclaimed drama Mrs Wilson, Before & After is the powerful and poignant memoir of Alison Wilson. 'Before' peels back the complex layers of a marriage steeped in lies, and the shattering heartbreak which followed. 'After' tells of an intensely-felt redemption through religion. Before & After is, first and foremost, a love story, but it is also an account of one extraordinarily strong woman's deep, unwavering faith.
Alongside the open conflict of World War II there were other, hidden wars - the wars of communication, in which success depended on a flow of concealed and closely-guarded information. Smuggled written messages, secretly transmitted wireless signals, or months of eavesdropping on radio traffic meant operatives could discover in advance what the enemy intended to do. This information was passed on to those who commanded the armies, the fleets and the bomber formations, as well as to the other secret agents throughout the world who were desperately trying to infiltrate enemy lines. Vital information that turned the tide of battle in North African desert and on the Pacific Ocean proved to have been obtained by the time-consuming and unglamorous work of cryptanalysts who deciphered the enemy's coded messages, and coded those for the Allies. From the stuffy huts of Bletchley Park to the battles in the Mediterranean, the French and Dutch Resistance movements and the unkempt radio operatives in Burma, the rarely-seen, outstanding stories collected here reveal the true extent of the 'secret war'. The ongoing need for secrecy for decades after the war meant that the outstanding achievements of wartime cryptanalysts could not be properly recognised. With vivid first-hand accounts and illuminating historical research, VOICES OF THE CODEBREAKERS reveals and finally celebrates the extraordinary accomplishments of these ordinary men and women.
Sometime in the late fall/early winter of 1962, a document began circulating among members of the Communist Party USA based in the Chicago area, titled "Whither the Party of Lenin." It was signed "The Ad Hoc Committee for Scientific Socialist Line." This was not the work of factionally inclined CP comrades, but rather something springing from the counter-intelligence imagination of the FBI. A Threat of the First Magnitude tells the story of the FBI's fake Maoist organization and the informants they used to penetrate the highest levels of the Communist Party USA, the Black Panther Party, the Revolutionary Union and other groups labelled threats to the internal security of the United States in the 1960s and 1970s. As once again the FBI is thrust into the spotlight of US politics, A Threat of a First Magnitude offers a view of the historic inner-workings of the Bureau's counterintelligence operations - from generating "fake news" and the utilization of "sensitive intelligence methods" to the handling of "reliable sources" - that matches or exceeds the sophistication of any contenders.
The role of intelligence in US government operations has changed dramatically and is now more critical than ever to domestic security and foreign policy. This authoritative and highly researched book written by Jeffrey T. Richelson provides a detailed overview of America's vast intelligence empire, from its organizations and operations to its management structure. Drawing from a multitude of sources, including hundreds of official documents, The US Intelligence Community allows students to understand the full scope of intelligence organizations and activities, and gives valuable support to policymakers and military operations. The seventh edition has been fully revised to include a new chapter on the major issues confronting the intelligence community, including secrecy and leaks, domestic spying, and congressional oversight, as well as revamped chapters on signals intelligence and cyber collection, geospatial intelligence, and open sources. The inclusion of more maps, tables and photos, as well as electronic briefing books on the book's Web site, makes The US Intelligence Community an even more valuable and engaging resource for students.
This volume discusses the challenges the future holds for different aspects of the intelligence process and for organisations working in the field. The main focus of Western intelligence services is no longer on the intentions and capabilities of the Soviet Union and its allies. Instead, at present, there is a plethora of threats and problems that deserve attention. Some of these problems are short-term and potentially acute, such as terrorism. Others, such as the exhaustion of natural resources, are longer-term and by nature often more difficult to foresee in their implications. This book analyses the different activities that make up the intelligence process, or the 'intelligence cycle', with a focus on changes brought about by external developments in the international arena, such as technology and security threats. Drawing together a range of key thinkers in the field, The Future of Intelligence examines possible scenarios for future developments, including estimations about their plausibility, and the possible consequences for the functioning of intelligence and security services. This book will be of much interest to students of intelligence studies, strategic studies, foreign policy, security studies and IR in general.
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process. The concept of the intelligence cycle has been central to the study of intelligence. As Intelligence Studies has established itself as a distinctive branch of Political Science, it has generated its own foundational literature, within which the intelligence cycle has constituted a vital thread - one running through all social-science approaches to the study of intelligence and constituting a staple of professional training courses. However, there is a growing acceptance that the concept neither accurately reflects the intelligence process nor accommodates important elements of it, such as covert action, counter-intelligence and oversight. Bringing together key authors in the field, the book considers these questions across a number of contexts: in relation to intelligence as a general concept, military intelligence, corporate/private sector intelligence and policing and criminal intelligence. A number of the contributions also go beyond discussion of the limitations of the cycle concept to propose alternative conceptualisations of the intelligence process. What emerges is a plurality of approaches that seek to advance the debate and, as a consequence, Intelligence Studies itself. This book will be of great interest to students of intelligence studies, strategic studies, criminology and policing, security studies and IR in general, as well as to practitioners in the field.
The conflict in Iraq is characterized by three faces of war: interstate conflict, civil war, and insurgency. The Coalition’s invasion of Iraq in March 2003 began as an interstate war. No sooner had Saddam Hussein been successfully deposed, however, than U.S.-led forces faced a lethal insurgency. After Sunni al Qaeda in Iraq bombed the Shia al-Askari Shrine in 2006, the burgeoning conflict took on the additional element of civil war with sectarian violence between the Sunni and the Shia. The most effective strategies in a war as complicated as the three-level conflict in Iraq are intertwined and complementary, according to the editors of this volume. For example, the “surge” in U.S. troops in 2007 went beyond an increase in manpower; the mission had changed, giving priority to public security. This new direction also simultaneously addressed the insurgency as well as the civil war by forging new, trusting relationships between Americans and Iraqis and between Sunni and Shia. This book has broad implications for future decisions about war and peace in the twenty-first century.
This book discusses the application of hypothesis testing to the practice of intelligence analysis. By drawing on longstanding procedures of scientific method, particularly hypothesis testing, this book strongly critiques standard intelligence analytic practices. It shows these practices to be inadequate, as they are illogical in terms of what formal philosophy says any intelligence analysts can realistically be expected to know, and for the future when analysts will face pressures to adapt to digital age modeling techniques. The methodology focuses on identifying and remedying analytic errors caused by analyst cognitive biases and by foreign denial and deception. To demonstrate that it is a practical tool, it walks analysts through a case study, step by step, to show how its hypothesis testing can be implemented. It also invites a comparative test in the real world with any other intelligence methodologies to assess its strengths and weaknesses in predicting the outcome of an actual "live" intelligence issue. This book will be of much interest to students of intelligence studies, public policy and national security, as well as practitioners. |
You may like...
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,286
Discovery Miles 52 860
|