Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
A fascinating and unique history of the launch of Britain's Secret Intelligence Service through the unusual life of its founder, Mansfield Cumming. * Sir Mansfield Cumming, the founder of the British Secret Service and the original 'C', has until now been a shadowy figure. For this authorised biography, the Secret Intelligence Service has released to Alan Judd, Cumming's voluminous diaries, which have never been seen outside the Service and will be put back into storage in perpetuity when Judd has used them. * The result is likely to be the most sensational biography of the season, and the definitive account of how MI5 and MI6 -- the models for all subsequent secret services all over the world -- were set up. * Cumming signed himself 'C', was referred to as such in Whitehall and always used green ink, traditions maintained to this day. His life not only makes riveting reading but casts fascinating light on the development of the Secret Service and its influence on the twentieth century.
"Strategic Intelligence Management" introduces both academic researchers and law enforcement professionals to contemporary issues of national security and information management and analysis. This contributed volume draws on state-of-the-art expertise from academics and law enforcement practitioners across the globe. The chapter authors provide background, analysis, and insight on specific topics and case studies. "Strategic Intelligent Management "explores the technological and social aspects of managing information for contemporary national security imperatives. Academic researchers and graduate students in computer science,
information studies, social science, law, terrorism studies, and
politics, as well as professionals in the police, law enforcement,
security agencies, and government policy organizations will welcome
this authoritative and wide-ranging discussion of emerging
threats.
Routledge Handbook on Middle East Security provides the first comprehensive look at Middle East security issues that includes both traditional and emerging security threats. Taking a broad perspective on security, the volume offers both analysis grounded in the 'hard' military and state security discourse but also delves into the 'soft' aspects of security employing a human security perspective. As such the volume addresses imminent challenges to security, such as the ones relating directly to the war in Syria, but also the long-term challenges. The traditional security problems, which are deep-seated, are at risk of being exacerbated also by a lack of focus on emerging vulnerabilities in the region. While taking as a point of departure the prevalent security discourse, the volume also goes beyond the traditional focus on military or state security and consider non-traditional security challenges. This book provides a state-of-the-art review of research on the key challenges for security in the Middle East; it will be a key resource for students and scholars interested in Security Studies, International Relations, Political Science and Middle Eastern Studies.
Recently, there have been multiple high-profile incidents involving the release of classified government information. Perhaps most prominent was Wikileaks.org's unauthorised publication of more than 600,000 classified Department of Defense documents. Such incidents have further heightened congressional, media and public interest in classified information policy. This book provides information on classified information policy, also known as security classification policy and national security classification information policy. It discusses the history, costs and agencies assigned roles in classified information policy and focuses on Executive Order 13526, which establishes much of the current policy and possible oversight issues for Congress.
Irish neutrality during the Second World War presented Britain with
significant challenges to its security. Exploring how British
agencies identified and addressed these problems, this book reveals
how Britain simultaneously planned sabotage in and spied on
Ireland, and at times sought to damage the neutral state's
reputation internationally through black propaganda operations. It
analyses the extent of British knowledge of Axis and other
diplomatic missions in Ireland, and shows the crucial role of
diplomatic code-breaking in shaping British policy. The book also
underlines just how much Ireland both interested and irritated
Churchill throughout the war.
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
In 2013, Edward Snowden revealed that the NSA and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of security . In this compelling account, surveillance expert David Lyon guides the reader through Snowden s ongoing disclosures: the technological shifts involved, the steady rise of invisible monitoring of innocent citizens, the collusion of government agencies and for-profit companies and the implications for how we conceive of privacy in a democratic society infused by the lure of big data. Lyon discusses the distinct global reactions to Snowden and shows why some basic issues must be faced: how we frame surveillance, and the place of the human in a digital world. Surveillance after Snowden is crucial reading for anyone interested in politics, technology and society.
This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers.
Discover the brand new instalment in Lizzie Lane's bestselling Tobacco Girls series! War is fleeting, but true love last forever...May 1944 Hope and excitement is in the air when news breaks of the allied forces landing in Normandy. D Day has arrived. However, the day-to-day struggles for the Tobacco Girls continue. Carole Thomas wants her old life back. She is burdened with the guilt of being a young single mother and considers having baby Paula adopted, but Maisie Miles will do anything to stop her. Phyllis Mason having found the love of her life is getting married in Malta to Mick Fairbrother, but will the dangerous legacies of war plague her happy day? Bridget O'Neill finds herself posted to one of the hospitals receiving the injured from the D-Day landing beaches. Her most fervent hope is that her husband, Lyndon, does not become one of them. Peace is on the horizon, but will their wishes and dreams win through and bring them a happy ever after? Praise for Lizzie Lane: 'A gripping saga and a storyline that will keep you hooked' Rosie Goodwin 'The Tobacco Girls is another heartwarming tale of love and friendship and a must-read for all saga fans.' Jean Fullerton 'Lizzie Lane opens the door to a past of factory girls, redolent with life-affirming friendship, drama, and choices that are as relevant today as they were then.' Catrin Collier 'If you want an exciting, authentic historical saga then look no further than Lizzie Lane.' Fenella J Miller
Intelligence and Espionage: Secrets and Spies provides a global introduction to the role of intelligence - a key, but sometimes controversial, aspect of ensuring national security. Separating fact from fiction, the book draws on past examples to explore the use and misuse of intelligence, examine why failures take place and address important ethical issues over its use. Divided into two parts, the book adopts a thematic approach to the topic, guiding the reader through the collection and analysis of information and its use by policymakers, before looking at intelligence sharing. Lomas and Murphy also explore the important associated activities of counterintelligence and the use of covert action, to influence foreign countries and individuals. Topics covered include human and signals intelligence, the Cuban Missile Crisis, intelligence and Stalin, Trump and the US intelligence community, and the Soviet Bloc. This analysis is supplemented by a comprehensive documents section, containing newly released documents, including material from Edward Snowden's leaks of classified material. Supported by images, a comprehensive chronology, glossary, and 'who's who' of key figures, Intelligence and Espionage is an invaluable resource for anyone interested in the role of intelligence in policymaking, international relations and diplomacy, warfighting and politics to the present day.
On 27 May 1942, SS General Reinhard Heydrich was assassinated by British-trained Czech agents who had parachuted into Czechoslovakia. He died of his wounds on 4 June 1942. Two days later, Gestapo Captain Horst Kopkow's department at Reich National Security HQ was given fresh directions. From 6 June 1942 until the end of the war, Kopkow was responsible for coordinating the fight against Soviet and British parachute agents dropped anywhere in Germany or German-occupied territories. This new direction for Kopkow made his name. Within months the "Rote Kapelle" Soviet espionage ring was uncovered in Belgium, who could be traced directly to Berlin and Paris. A new counter-espionage fight had begun, and any agents caught would pay with their lives. In France and Holland the Gestapo caught many Special Operations Executive agents trained in Britain. By spring 1944 almost 150 British agents had been caught and deported to German concentration camps, and almost all had been murdered without trial by the December. Kopkow was directly involved in these murders. Arrested by British forces after the war, Kopkow was extensively interrogated due to his counter-espionage experience. For the next 20 years, Kopkow was a consultant for Britain's Secret Intelligence Service.
Familiar to anyone versed in the history of World War II or
interested in the study of modern intelligence work, Bletchley Park
was arguably the most successful intelligence operation in world
history, the top secret workplace of the remarkable people who
cracked Germany's vaunted Enigma Code. Almost to the end of the
war, the Germans had firm faith in the Enigma ciphering machine,
but in fact the codebreakers were deciphering nearly 4,000 German
transmissions daily by 1942, reaping a wealth of information on
such important matters as the effort to resupply Rommel's army in
North Africa and the effect of Allied attempts to mislead the
Germans about the location of D-Day landings. Indeed, Winston
Churchill hailed the work of Bletchley Park as the "secret weapon"
that won the war.
Aged nineteen, Alison McKelvie was a self-confessed romantic, immersed in books and poetry, and dreaming of beauty, truth and love. In 1940, whilst working as a secretary at MI6, Alison met Alexander Wilson. Thirty years her senior, Alexander was worldly and charismatic. An intense affair quickly led to marriage and two children. But the Wilsons' lives then spiralled into the depths of poverty. Alexander was sacked, imprisoned twice, and then declared bankrupt. His lack of reliability was a hefty emotional burden for Alison to bear. Nevertheless, she loved her husband unreservedly and stuck by him through thick and thin. In 1963, Alexander died suddenly of a heart attack. Alison's world imploded when she discovered that their life together had been built upon layer after layer of deception. Who was Alexander Wilson? How well had Alison really known him? Slowly the lies were unravelled: Alexander had been a novelist, spy and, devastatingly, a bigamist. Alison was the third of four wives, her children two of seven. The inspiration for critically-acclaimed drama Mrs Wilson, Before & After is the powerful and poignant memoir of Alison Wilson. 'Before' peels back the complex layers of a marriage steeped in lies, and the shattering heartbreak which followed. 'After' tells of an intensely-felt redemption through religion. Before & After is, first and foremost, a love story, but it is also an account of one extraordinarily strong woman's deep, unwavering faith.
Developing Intelligence Theory analyses the current state of intelligence theorisation, provides a guide to a range of approaches and perspectives, and points towards future research agendas in this field. Key questions discussed include the role of intelligence theory in organising the study of intelligence, how (and how far) explanations of intelligence have progressed in the last decade, and how intelligence theory should develop from here. Significant changes have occurred in the security intelligence environment in recent years-including transformative information technologies, the advent of 'new' terrorism, and the emergence of hybrid warfare-making this an opportune moment to take stock and consider how we explain what intelligence does and how. The material made available via the 2013 Edward Snowden leaks and subsequent national debates has contributed much to our understanding of contemporary intelligence processes and has significant implications for future theorisation, for example, in relation to the concept of 'surveillance'. The contributors are leading figures in Intelligence Studies who represent a range of different approaches to conceptual thinking about intelligence. As such, their contributions provide a clear statement of the current parameters of debates in intelligence theory, while also pointing to ways in which the study of intelligence continues to develop. This book was originally published as a special issue of Intelligence and National Security.
This book sheds new light on the origins and nature of modern military thinking. The ideas of Carl von Clausewitz (1780-1831) - which remain at the heart of strategic analysis today - have hitherto been examined largely in isolation from their cultural and philosophical roots in the eighteenth and early nineteenth centuries. Azar Gat now demonstrates the extent to which culture affects military theory. Dr Gat relates a series of military thinkers to their cultural background, demonstrating how the major currents of modern military thought have evolved from the world-view of the Enlightenment on the one hand and Romanticism on the other. Tracing the development of Clausewitz's ideas, he provides a provocative critique of Clausewitz's classic work, On War. In the process, he offers an illuminating insight into a great period of European culture and into warfare in the age of Napoleon.
The Routledge Handbook on Israeli Security provides an authoritative survey of both the historical roots of Israel's national security concerns and their principal contemporary expressions. Following an introduction setting out its central themes, the Handbook comprises 27 independent chapters, all written by experts in their fields, several of whom possess first-hand diplomatic and/or military experience at senior levels. An especially noteworthy feature of this volume is the space allotted to analyses of the impact of security challenges not just on Israel's diplomatic and military postures (nuclear as well as conventional) but also on its cultural life and societal behavior. Specifically, it aims to fulfill three principal needs. The first is to illustrate the dynamic nature of Israel's security concerns and the ways in which they have evolved in response to changes in the country's diplomatic and geo-strategic environment, changes that have been further fueled by technological, economic and demographic transformations; Second, the book aims to examine how the evolving character of Israel's security challenges has generated multiple - and sometimes conflicting - interpretations of the very concept of "security", resulting in a series of dialogues both within Israeli society and between Israelis and their friends and allies abroad; Finally, it also discusses how areas of private and public life elsewhere considered inherently "civilian" and unrelated to security, such as artistic and cultural institutions, nevertheless do mirror the broader legal, economic and cultural consequences of this Israeli preoccupation with national security. This comprehensive and up-to-date collection of studies provides an authoritative and interdisciplinary guide to both the dynamism of Israel's security dilemmas and to their multiple impacts on Israeli society. In addition to its insights and appeal for all people and countries forced to address the security issue in today's world, this Handbook is a valuable resource for upper-level undergraduates and researchers with an interest in the Middle East and Israeli politics, international relations and security studies.
Australia was born with its eyes wide open. Although politicians spoke publicly of loyalty to Britain and the empire, in secret they immediately set about protecting Australia's interests from the Germans, the Japanese - and from Britain itself. As an experienced intelligence officer, John Fahey knows how the security services disguise their activities within government files. He has combed the archives to compile the first account of Australia's intelligence operations in the years from Federation to World War II. He tells the stories of dedicated patriots who undertook dangerous operations to protect their new nation, despite a lack of training and support. He shows how the early adoption of advanced radio technology by Australia contributed to the war effort in Europe. He also exposes the bureaucratic mismanagement in World War II that cost many lives, and the leaks that compromised Australia's standing with its wartime allies so badly that Australia was nearly expelled from the Anglo-Saxon intelligence network. Australia's First Spies shows Australia always has been a far savvier operator in international affairs than much of the historical record suggests, and it offers a glimpse into the secret history of the nation.
This is a true account of secret operations carried out by the British Army's most clandestine unit- the Force Research Unit. Through the author's own experiences, the story of an essential instrument in the fight against terrorism, that of covert intelligence gathering, is told.
In 1933 the Admiralty banned 'Blinker' Hall from publishing his autobiography, but here, for the first time, those chapters that survived are presented in full. See what the renowned spymaster had to say about the British Naval Intelligence - the pinnacle of the world's secret intelligence services. He explores the function of secret intelligence in wartime, censorship, subterfuge, the significance of Churchill in the Dardanelles campaign, the Zimmermann Telegram, the USA's entry to the First World War and more. With supporting text and images by Philip Vickers and a foreword by expert author Nigel West, A Clear Case of Genius provides a unique insight into the thinking of one of Britain's pioneering intelligence leaders.
Traditionally the military community held the intelligence profession in low esteem, spying was seen as dirty work and information was all to often ignored if it conflicted with a commander's own view. Handel examines the ways in which this situation has improved and argues that co-operation between the intelligence adviser and the military decision maker is vital.
Signals Intelligence, or SIGINT, is the interception and evaluation of coded enemy messages. From Enigma to Ultra, Purple to Lorenz, Room 40 to Bletchley, SIGINT has been instrumental in both victory and defeat during the First and Second World War. In the First World War, a vast network of signals rapidly expanded across the globe, spawning a new breed of spies and intelligence operatives to code, de-code and analyse thousands of messages. As a result, signallers and cryptographers in the Admiralty's famous Room 40 paved the way for the code breakers of Bletchley Park in the Second World War. In the ensuing war years the world battled against a web of signals intelligence that gave birth to Enigma and Ultra, and saw agents from Britain, France, Germany, Russia, America and Japan race to outwit each other through infinitely complex codes. For the first time, Peter Matthews reveals the secret history of global signals intelligence during the world wars through original interviews with German interceptors, British code breakers, and US and Russian cryptographers. "SIGINT is a fascinating account of what Allied investigators learned postwar about the Nazi equivalent of Bletchley Park. Turns out, 60,000 crptographers, analysts and linguists achieved considerable success in solving intercepted traffic, and even broke the Swiss Enigma! Based on recently declassifed NSA document, this is a great contribution to the literature." - The St Ermin's Hotel Intelligence Book of the Year Award 2014
The author examines in detail the organization of the U.S. intelligence community, its attempts to monitor and predict the development of Soviet forces from the early days of the cold war, and how these attempts affected American policy and weapons production. Originally published in 1987. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These paperback editions preserve the original texts of these important books while presenting them in durable paperback editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
The history of Special Operations Executive (SOE) seems to spring a never-ending run of surprises, and here are some more. This book explores the mysterious world of the tools SOE used for their missions of subversion and sabotage. An often grim reality is confronted that is more akin with the world of James Bond and Q's workshop than previously believed. Written by two scientists, one of whom served in the SOE and one who was tasked with clearing up after it was disbanded; their insider knowledge presents a clear account of the way in which SOE's inventors worked. From high explosive technology to chemical and biological devices; from the techniques of air supply to incendiarism; from camouflage to underwater warfare; and from radio communications to weaponry. SOE: The Scientific Secrets is a revelation about the tools that allowed the murky world of spying and spies to operate during wartime. |
You may like...
Secrets in a Dead Fish - The Spying Game…
Melanie King
Hardcover
(1)
|