![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The secret world of military intelligence - written by a senior intelligence officer John Hughes-Wilson is a former intelligence officer and is ideally placed to reveal the secret history of military intelligence. He takes us 'behind the scenes' of military and political events from Elizabeth I to Osama bin Laden and the crisis in the Middle East. The book is divided into three parts. The first investigates some famous disasters when lack of intelligence was the decisive factor, e.g. Gallipoli and Dieppe. The second examines some equally famous examples of good intelligence being overlooked or ignored, e.g. the 'bridge too far' battle of Arnhem. The last part goes behind the scenes of some famous successes, from the capture of Slobodan Milosevic to the defeat of IRA bombing campaigns and the arrest of a spy ring at the heart of NATO.
Developing Intelligence Theory analyses the current state of intelligence theorisation, provides a guide to a range of approaches and perspectives, and points towards future research agendas in this field. Key questions discussed include the role of intelligence theory in organising the study of intelligence, how (and how far) explanations of intelligence have progressed in the last decade, and how intelligence theory should develop from here. Significant changes have occurred in the security intelligence environment in recent years-including transformative information technologies, the advent of 'new' terrorism, and the emergence of hybrid warfare-making this an opportune moment to take stock and consider how we explain what intelligence does and how. The material made available via the 2013 Edward Snowden leaks and subsequent national debates has contributed much to our understanding of contemporary intelligence processes and has significant implications for future theorisation, for example, in relation to the concept of 'surveillance'. The contributors are leading figures in Intelligence Studies who represent a range of different approaches to conceptual thinking about intelligence. As such, their contributions provide a clear statement of the current parameters of debates in intelligence theory, while also pointing to ways in which the study of intelligence continues to develop. This book was originally published as a special issue of Intelligence and National Security.
The Routledge Handbook on Israeli Security provides an authoritative survey of both the historical roots of Israel's national security concerns and their principal contemporary expressions. Following an introduction setting out its central themes, the Handbook comprises 27 independent chapters, all written by experts in their fields, several of whom possess first-hand diplomatic and/or military experience at senior levels. An especially noteworthy feature of this volume is the space allotted to analyses of the impact of security challenges not just on Israel's diplomatic and military postures (nuclear as well as conventional) but also on its cultural life and societal behavior. Specifically, it aims to fulfill three principal needs. The first is to illustrate the dynamic nature of Israel's security concerns and the ways in which they have evolved in response to changes in the country's diplomatic and geo-strategic environment, changes that have been further fueled by technological, economic and demographic transformations; Second, the book aims to examine how the evolving character of Israel's security challenges has generated multiple - and sometimes conflicting - interpretations of the very concept of "security", resulting in a series of dialogues both within Israeli society and between Israelis and their friends and allies abroad; Finally, it also discusses how areas of private and public life elsewhere considered inherently "civilian" and unrelated to security, such as artistic and cultural institutions, nevertheless do mirror the broader legal, economic and cultural consequences of this Israeli preoccupation with national security. This comprehensive and up-to-date collection of studies provides an authoritative and interdisciplinary guide to both the dynamism of Israel's security dilemmas and to their multiple impacts on Israeli society. In addition to its insights and appeal for all people and countries forced to address the security issue in today's world, this Handbook is a valuable resource for upper-level undergraduates and researchers with an interest in the Middle East and Israeli politics, international relations and security studies.
Civil Air Transport (CAT), founded in China after World War II by Claire Chennault and Whiting Willauer, was initially a commercial carrier specializing in air freight. Its role quickly changed as CAT became first a paramilitary adjunct of the Nationalist Chinese Air Force, then the CIA's secret "air force" in Korea, then "the most shot-at airline in the world" in French Indochina, and eventually becoming reorganized as Air America at the height of the Vietnam War. William M. Leary's detailed operational history of CAT sets the story in the perspective of Asian and Cold War geopolitics and shows how CAT allowed the CIA to operate with a level of flexibility and secrecy that it would not have attained through normal military or commercial air transportation.
This book examines the intersection between national and international counter-terrorism policies and civil society in numerous national and regional contexts. The 9/11 terrorist attacks against the United States in 2001 led to new waves of scholarship on the proliferation of terrorism and efforts to combat international terrorist groups, organizations, and networks. Civil society organisations have been accused of serving as ideological grounds for the recruitment of potential terrorists and a channel for terrorist financing. Consequently, states around the world have established new ranges of counter-terrorism measures that target the operations of civil society organisations exclusively. Security practices by states have become a common trend and have assisted in the establishment of 'best practices' among non-liberal democratic or authoritarian states, and are deeply entrenched in their security infrastructures. In developing or newly democratized states - those deemed democratically weak or fragile - these exceptional securities measures are used as a cover for repressing opposition groups, considered by these states as threats to their national security and political power apparatuses. This timely volume provides a detailed examination of the interplay of counter-terrorism and civil society, offering a critical discussion of the enforcement of global security measures by governments around the world. -- .
This book is the first full history of South African intelligence and provides a detailed examination of the various stages in the evolution of South Africa's intelligence organizations and structures. Covering the apartheid period of 1948-90, the transition from apartheid to democracy of 1990-94, and the post-apartheid period of new intelligence dispensation from 1994-2005, this book examines not only the apartheid government's intelligence dispensation and operations, but also those of the African National Congress, and its partner, the South African Communist Party (ANC/SACP) - as well as those of other liberation movements and the 'independent homelands' under the apartheid system. Examining the civilian, military and police intelligence structures and operations in all periods, as well as the extraordinarily complicated apartheid government's security bureaucracy (or 'securocracy') and its structures and units, the book discusses how South Africa's Cold War 'position' influenced its relationships with various other world powers, especially where intelligence co-operation came to bear. It outlines South Africa's regional relationships and concerns - the foremost being its activities in South-West Africa (Namibia) and its relationship with Rhodesia through 1980. Finally, it examines the various legislative and other governance bases for the existence and operations of South Africa's intelligence structures - in all periods - and the influences that such activities as the Rivonia Trial (at one end of the history) or the Truth and Reconciliation Commission (at the other end) had on the evolution of these intelligence questions throughout South Africa's modern history. This book will be of great interest to all students of South African politics, intelligence studies and international politics in general.
Beating the Invader is a revealing and disturbing exploration of the darker history of Nazis, spies and 'Fifth Columnist' saboteurs in Britain and the extensive top secret counter-measures taken before and during the real threat of invasion in 1940. The author's research describes the Nazi Party organisation in Britain and reveals the existence of the Gestapo headquarters in central London. The reader gains vivid insights into Nazi agents and terrorist cells, the Special Branch and MI5 teams who hunted them and investigated murders believed to have been committed by Third Reich agents on British soil. Accessing a host of recently de-classified files the book explores the highly classified measures taken for the protection of the Royal Family, national treasures and gold reserves. The British government made extensive plans for the continuation of government in the event of invasion including the creation of all-powerful Regional Commissioners, 'Black Lists' of suspected collaborators and a British resistance organisation. We also learn of the Nazis' own occupation measures for suborning the population and the infamous Sonderfahndungsliste G.B, the Nazi 'Special Wanted List'. The result is a fascinating insight into the measures and actions taken to ensure that Great Britain did not succumb to the gravest threat of enemy invasion and occupation for centuries.
'Damning' - Mail on Sunday 'Utterly horrific and compelling' - The Guardian 'This investigation rings true' - Publishers Weekly On 1 August, 1990, British Airways Flight 149 departed from Heathrow airport, destined for Kuala Lumpur. It never made it there, and neither did its nearly 400 passengers and crew. Instead, Flight 149 stopped in Kuwait, as Iraqi troops invaded - delivering the passengers and crew into the hands of Saddam Hussein. Why did BA Flight 149 land, even as all other flights were rerouted - and even though British and American governments had clear intelligence that Saddam was about to invade? The answer lies in a secret, unaccountable organization - authorised by Margaret Thatcher - carrying out a 'deniable' intelligence operation. The plane was the 'Trojan Horse', and the plan - as well as the horrific consequences for the civilian passengers - has been lied about, denied and covered up by successive governments ever since. Soon to be a major TV drama, this explosive book is written with the full cooperation of the survivors, as well as astonishing and conclusive input from a senior intelligence source. It is a story of scandal, betrayal and misuse of intelligence at the highest levels of UK and US governments - which has had direct impact on terror attacks in the West and the shape of the Middle East today. It is high time the truth is told.
Builds a revisionary theoretical framework for researching intelligence knowledge and applies it to the Swedish Military and Security Directorate Gunilla Eriksson revises our perception of intelligence as carefully collected data and objective truth, arguing that there are hidden aspects to intelligence analysis that need to be uncovered and critically examined. This twofold study investigates the character of intelligence knowledge and the social context in which it is produced, using the Swedish Military and Security Directorate (MUST) as a case study. Eriksson argues that there is an implicit framework that continuously influences knowledge production: what kind of data is considered relevant, how this data is interpreted and the specific social and linguistic context of the organisation, surrounded by unarticulated norms and specific procedures. She asks whether these conventions hamper or obstruct intelligence assessments; an essential analysis, given that history has shown us the grave consequences basing policy on intelligence's wrong conclusions. Sources include: The annual Swedish Armed Forces Strategic Intelligence Estimates from 1998-2010 Lengthy and highly valuable interviews with the analysts, including managers, working at MUST, giving insights into everyday life at the institution and leading to many important results Participant observation carried out by the author at MUST working meetings and seminars during the production process of the 2010 estimate, and drawing on her experience from her years working as an active analyst
He's out of options. Kill. Or be killed. A searing thriller that will leave you reelingDisgraced Navy SEAL Finn is on the run. A wanted man, he's sought for questioning in connection to war crimes committed in Yemen by a rogue element in his SEAL team. But he can remember nothing. Finn learns that three members of his team have been quietly redeployed to Iceland, which is a puzzle in itself; the island is famous for being one of the most peaceful places on the planet. His mission is simple: track down the three SEALs and find out what really happened in Yemen. But two problems stand in his way. On his first night in town a young woman mysteriously drowns-and a local detective suspects his involvement. Worse, a hardened SEAL-turned-contract-killer has been hired to stop him. And he's followed Finn all the way to the icy north. The riveting follow-up to Steel Fear, from the New York Times bestselling writing team, combat decorated Navy SEAL Brandon Webb and award-winning author John David Mann, comes a gripping thriller perfect for fans of Lee Child and Brad Thor.
The author examines in detail the organization of the U.S. intelligence community, its attempts to monitor and predict the development of Soviet forces from the early days of the cold war, and how these attempts affected American policy and weapons production. Originally published in 1987. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These paperback editions preserve the original texts of these important books while presenting them in durable paperback editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
At the beginning of the Second World War the Nazi hierarchy had, at an early stage, fully recognised the importance of controlling the depiction of military conflict in order to ensure the continued morale of their combat troops by providing a bridge between the soldiers and their families. Promoting the use of photographic record also allowed the Nazis to exercise control over negative depictions of the war. In contrast, the British military and political decision makers were reluctant to embrace any potential propaganda benefits of film and photographic material in the build up to and the early months of the Second World War. However, pressure was to come from across the Atlantic where the refusal to allow reporting of the war was harming Britain's cause in the United States. British diplomats overseas reported that the Germans were winning the propaganda war throughout the unoccupied countries of Europe. This belated acceptance of the need for open reporting of the conflict meant that when it was finally accepted as useful the P.R.2 Section (Public Relations) at the War Office and the British Military found itself in a 'catch up' situation. Despite the disadvantages of such a slow start, the British combat cameramen grew in strength throughout the conflict, producing films such as Desert Victory, Tunisian Victory, Burma Victory, The True Glory and a huge stock of both cine and still material. The British Army Film and Photographic Unit's material represents some of the most frequently used records of historical events and key figures of the period. Based on memoirs, personal letters and interviews with the AFPU cameramen, this book reveals the development of the unit and tells the human story of men who used cameras as weapons of war.
A riveting introduction to the complex and evolving field of geospatial intelligence. Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT. Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.
Why Spy? is the result of Brian Stewart's seventy years of working in, and studying the uses and abuses of, intelligence in the real world. Few books currently available to those involved either as professionals or students in this area have been written by someone like the present author, who has practical experience both of field work and of the intelligence bureaucracy at home and abroad. It relates successes and failures via case studies, and draws conclusions that should be pondered by all those concerned with the limitations and usefulness of the intelligence product, as well as with how to avoid the tendency to abuse or ignore it when its conclusions do not fit with preconceived ideas. It reminds the reader of the multiplicity of methods and organisations and the wide range of talents making up the intelligence world.The co-author, scholar Samantha Newbery, examines such current issues as the growth of intelligence studies in universities, and the general emphasis throughout the volume is on the necessity of embracing a range of sources, including police, political, military and overt, to ensure that secret intelligence is placed in as wide a context as possible when decisions are made.
The Soviet-German War of 1941-1945 was the most extensive intelligence/counterintelligence war in modern history, involving the capture, torture, deportation, execution, and "doubling" of tens of thousands of agents--most of them Soviet citizens. While Russian armies fought furiously to defeat the Wehrmacht, Stalin's security services waged an equally ruthless secret war against Hitler's spies, as well as against the Soviet population. For the first time, Robert Stephan now combines declassified U.S. intelligence documents, captured German records, and Russian sources, including a top-secret Soviet history of its intelligence and security services, to reveal the magnitude and scope of the brutal but sophisticated Soviet counterintelligence war against Nazi Germany. Employing as many as 150,000 trained agents across a 2,400-mile front, the Soviets neutralized the majority of the more than 40,000 German agents deployed against them. As Stephan shows, their combination of Soviet military deception operations and State Security's defeat of the Abwehr's human intelligence effort had devastating consequences for the German Army in every major battle against the Red army, including Moscow, Stalingrad, Kursk, the Belorussian offensive, and the Vistula-Oder operation. Simultaneously, Soviet State Security continued to penetrate the world's major intelligence services including those of its allies, terrorize its own citizens to prevent spying, desertion, and real or perceived opposition to the regime, and run millions of informants, making the USSR a vast prison covering one sixth of the world's surface. Stephan discusses all facets of the Soviet counterintelligence effort, including the major Soviet "radio games" used to mislead the Germans--operations Monastery, Berezino, and those that defeated Himmler's Operation Zeppelin. He also gives the most comprehensive account to date of the Abwehr's infamous agent "Max," whose organization allegedly ran an entire network of agents inside the USSR, and reveals the reasons for Germany's catastrophic under-estimation of Soviet forces by more than one million men during their 1944 summer offensive in Belorussia. Richly detailed and epic in scope, "Stalin's Secret War" opens up a previously hidden dimension of World War II.
In 1953, Ian Fleming's literary sensation James Bond emerged onto the world's stage. Nearly seven decades later, he has become a multi-billion-pound film franchise, now equipped with all the gizmos of the modern world. Yet Fleming's creation, who battled his way through the fourteen novels from 1953 to 1966, was a maverick - a man out of place. Bond even admits it, wishing he was back in the real war ... the Second World War. Indeed, the thread of the Second World War runs through the whole of the Bond series, and many were inspired by the real events and people Fleming came across during his time in Naval Intelligence. In Ian Fleming's War, Mark Simmons explores these remarkable similarities, from Fleming's scheme to capture a German naval codebook that appears in Thunderball as Plan Omega, to the exploits of 30 Assault Unit, the commando team he helped to create, which inspired Moonraker.
This is both a history of the service attache, beginning with the Napoleonic era, and a discussion of his changing role, past and present. Professor Vagts shows the military adviser temporarily joined to the diplomatic corps as a person often divided in his loyalties to diplomatic officials and to military leaders. Affected by increasing bureaucratic specialization, he sometimes became a "twilight" figure engaged in political activity and even espionage. Professor Vagts' numerous works on the history of militarism and the military, in both German and English, and his research in the chancelleries of Europe have given him perspective for this book. Originally published in 1967. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Routledge Handbook on Middle East Security provides the first comprehensive look at Middle East security issues that includes both traditional and emerging security threats. Taking a broad perspective on security, the volume offers both analysis grounded in the 'hard' military and state security discourse but also delves into the 'soft' aspects of security employing a human security perspective. As such the volume addresses imminent challenges to security, such as the ones relating directly to the war in Syria, but also the long-term challenges. The traditional security problems, which are deep-seated, are at risk of being exacerbated also by a lack of focus on emerging vulnerabilities in the region. While taking as a point of departure the prevalent security discourse, the volume also goes beyond the traditional focus on military or state security and consider non-traditional security challenges. This book provides a state-of-the-art review of research on the key challenges for security in the Middle East; it will be a key resource for students and scholars interested in Security Studies, International Relations, Political Science and Middle Eastern Studies.
The codebreaking efforts at Bletchley Park have obtained greater recognition since the release of the film The Imitation Game in 2014.
Startling new revelations about collaboration between the Allies and the German Secret Service. Based on extensive primary source research, John Bryden's Fighting to Lose presents compelling evidence that the German intelligence service - the Abwehr - undertook to rescue Britain from certain defeat in 1941. Recently opened secret intelligence files indicate that the famed British double-cross or double-agent system was in fact a German triple-cross system. These files also reveal that British intelligence secretly appealed to the Abwehr for help during the war, and that the Abwehr's chief, Admiral Canaris, responded by providing Churchill with the ammunition needed in order to persuade Roosevelt to lure the Japanese into attacking Pearl Harbor. These findings and others like them make John Bryden's Fighting to Lose one of the most fascinating books about World War II to be published for many years.
The official book behind the Academy Award-winning film The Imitation Game, starring Benedict Cumberbatch and Keira Knightley Alan Turing was the mathematician whose cipher-cracking transformed the Second World War. Taken on by British Intelligence in 1938, as a shy young Cambridge don, he combined brilliant logic with a flair for engineering. In 1940 his machines were breaking the Enigma-enciphered messages of Nazi Germany's air force. He then headed the penetration of the super-secure U-boat communications. But his vision went far beyond this achievement. Before the war he had invented the concept of the universal machine, and in 1945 he turned this into the first design for a digital computer. Turing's far-sighted plans for the digital era forged ahead into a vision for Artificial Intelligence. However, in 1952 his homosexuality rendered him a criminal and he was subjected to humiliating treatment. In 1954, aged 41, Alan Turing took his own life.
This book examines the circumstances surrounding SS-Obergruppenfuhrer Karl Wolff's escape from prosecution for war crimes in 1945. Wolff avoided prosecution because of his role in 'Operation Sunrise', negotiations conducted by high-ranking American, Swiss and British officials - in violation of the Casablanca agreements with the Soviet Union - for the surrender of German forces in Italy that enabled the Anglo-American forces to take Trieste. After 1945, Allied officials, amongst them Allen Dulles, in a move that later helped him ascend to the head of the CIA, shielded Wolff from prosecution to maintain secrecy about the negotiations. 'Operation Sunrise' thus relates to the early origins of the Cold War in Europe and had wide-ranging implications, even in the field of justice: new evidence suggests that the Western Allies not only failed to ensure cooperation between their respective national war crimes prosecution organizations, but in certain cases even obstructed justice by withholding evidence from the prosecution.
Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.
How was Bletchley Park made as an organization? How was signals intelligence constructed as a field? What was Bletchley Park's culture and how was its work co-ordinated? Bletchley Park was not just the home of geniuses such as Alan Turing, it was also the workplace of thousands of other people, mostly women, and their organization was a key component in the cracking of Enigma. Challenging many popular perceptions, this book examines the hitherto unexamined complexities of how 10,000 people were brought together in complete secrecy during World War II to work on ciphers. Unlike most organizational studies, this book decodes, rather than encodes, the processes of organization and examines the structures, cultures and the work itself of Bletchley Park using archive and oral history sources. Organization theorists, intelligence historians and general readers alike will find in this book a challenge to their preconceptions of both Bletchley Park and organizational analysis. |
You may like...
Strategic Intelligence Management…
Babak Akhgar, Simeon Yates
Paperback
R1,598
Discovery Miles 15 980
Spying Without Spies - Origins of…
David Jacobson, Charles A Ziegler
Hardcover
R3,041
Discovery Miles 30 410
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,286
Discovery Miles 52 860
|