Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The author examines in detail the organization of the U.S. intelligence community, its attempts to monitor and predict the development of Soviet forces from the early days of the cold war, and how these attempts affected American policy and weapons production. Originally published in 1987. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These paperback editions preserve the original texts of these important books while presenting them in durable paperback editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.
This edited book provides an insight into the new approaches, challenges and opportunities that characterise open source intelligence (OSINT) at the beginning of the twenty-first century. It does so by considering the impacts of OSINT on three important contemporary security issues: nuclear proliferation, humanitarian crises and terrorism.
The Lockwood Analytical Method for Prediction (LAMP) is a systematic technique for predicting short-term, unique behaviors. Using primarily qualitative empirical data, LAMP allows the analyst to predict the most likely outcomes for specific research questions across a wide range of intelligence problems, such as cyber threats in the U.S., the possibility of an Al Qaeda attack, the likelihood of Iran providing nuclear capability to terrorist groups, or the future actions of the Mexican drug cartel. LAMP offers an innovative and powerful method for organizing all available information based on the perceptions of the national actors, using it to make relevant predictions as to which alternate future is most likely to occur at a given moment in time. Its transparent structure enables anyone to see how an analyst gets from point A to point B to produce an intelligence estimate. LAMP differs from other analytical techniques in that it is based on determining the relative probability of a range of alternate futures, rather than attempting to determine the quantitative probability of their occurrence. After explaining its theoretical framework, the text leads the reader through the process of predictive analysis before providing practical case studies showing how LAMP is applied against real world problems, such as the possible responses of Israel, the U.S., and Lebanon to the behavior of Hezbollah or the competing visions of the future of Afghanistan. Evaluation of the method is provided with the case studies to show the effectiveness of the LAMP predictions over time. The book is complemented by a website with downloadable software for use by students of intelligence in conducting their own predictive analysis. It will be an essential tool for the analyst and the student, not only for national security issues but also for competitive intelligence.
This book examines how the war crime legacy resulting from the Yugoslav war of the 1990s on political and military transformation in Serbia was an impediment to security reform, democratization and the achievement of Western standards in the Belgrade armed forces.Using original empirical research, it traces the processes of restructuring, civilianisation, legal framework and democratic control and security policy communities, in relation to reforming the Serbian military. Crucially, the book focuses on the war crimes legacy from the 1990s, not as a matter of international conditionality, but as a key factor obstructing successful reform. This book, for the first time, examines the networks linked to security, intelligence and military agencies that protected war crimes suspects, such as General Ratko Mladic, delaying democratic control of the armed forces. Only when that network was broken, could the process of democratization begin to be complete.This unique book linking war crimes and security sector reform will appeal to scholars working on Serbia/former Yugoslavia, law and conflict, security and development, civil-military relations and Central and Eastern European politics.
For soldiers who want to increase their professional knowledge of the Army and prepare themselves for promotion boards, this revised and expanded edition of the Soldier's Study Guide contains more than 1,460 questions in 58 subject areas. The questions cover Army programs, basic combat skills, combat stress, leadership, maintenance of equipment, customs and courtesies, justice, physical training, NBC warfare, uniforms and insignia, weapons, and more . * For soldiers who want to increase their professional knowledge of the Army and prepare themselves for promotion boards * Covers army programs, basic combat skills, combat stress, leadership, maintenance of equipment, customs and courtesies, justice, physical training, NBC warfare, uniforms and insignia, weapons, and more * More than 100,000 sold
In this concise introduction to the complexities of contemporary western intelligence and its dynamics during an era of globalization, Adam Svendsen discusses intelligence cooperation in the early 21st century, with a sharp focus on counter-terrorism and WMD counter-proliferation during the 'War on Terror.'
Interdoc was established in 1963 by Western intelligence services as a multinational effort to coordinate an anti-communist offensive. Drawing on exclusive sources and the memories of its participants, this book charts Interdoc's campaign, the people and ideas that lay behind it and the rise and fall of this remarkable network during the Cold War.
'An intriguing page-turning and personal account of that most secretive of wartime institutions, Bletchley Park, and of the often eccentric people who helped to win the war' - Beryl Bainbridge Bletchley Park, or 'Station X', was home to the most famous codebreakers of the Second World War. The 19th-century mansion was the key centre for cracking German, Italian and Japanese codes, providing the allies with vital information. After the war, many intercepts, traffic-slips and paperwork were burned (allegedly at Churchill's behest). The truth about Bletchley was not revealed until F. Winterbotham's The Ultra Secret was published in 1974. However, nothing until now has been written on the German Air Section. In Cracking the Luftwaffe Codes, former WAAF (Women's Auxiliary Air Force) Gwen Watkins brings to life the reality of this crucial division. In a highly informative, lyrical account, she details her eventful interview, eventual appointment at the 'the biggest lunatic asylum in Britain', methods for cracking codes, the day-to-day routine and decommissioning of her section.
The enigmatic science of military intelligence is examined in this personal record, written by Brig.Gen. Oscar W. Koch, who served during World War II as chief of intelligence for General George S. Patton, Jr., one of the most colorful military leaders in American history. General Koch traces the growth and development of the infant science through detailed accounts of the intelligence role in some of the most celebrated battles of the war, and through his personal remembrances of Patton and his relationships with members of his intelligence staff. His story moves from the African campaign through Sicily, into France on D-Day and on to the Battle of the Bulge, pointing out how the work of the intelligence staff made the differences in the final reckoning. General Koch's book is more than a historical study, however. It is the exciting story of the operations behind the cloak and dagger illusions.
The amount of publicly and often freely available information is
staggering. Yet, the intelligence community still continues to
collect and use information in the same manner as during WWII, when
the OSS set out to learn as much as possible about Nazi Germany and
Imperial Japan by scrutinizing encyclopedias, guide books, and
short-wave radio. Today, the supply of information is greater than
any possible demand, and anyone can provide information. In effect,
intelligence analysts are drowning in information.
The amount of publicly and often freely available information is
staggering. Yet, the intelligence community still continues to
collect and use information in the same manner as during WWII, when
the OSS set out to learn as much as possible about Nazi Germany and
Imperial Japan by scrutinizing encyclopedias, guide books, and
short-wave radio. Today, the supply of information is greater than
any possible demand, and anyone can provide information. In effect,
intelligence analysts are drowning in information.
Recently, there have been multiple high-profile incidents involving the release of classified government information. Perhaps most prominent was Wikileaks.org's unauthorised publication of more than 600,000 classified Department of Defense documents. Such incidents have further heightened congressional, media and public interest in classified information policy. This book provides information on classified information policy, also known as security classification policy and national security classification information policy. It discusses the history, costs and agencies assigned roles in classified information policy and focuses on Executive Order 13526, which establishes much of the current policy and possible oversight issues for Congress.
During the Second World War daring and highly unusual missions were mounted by the Special Operations Executive (SOE) - formed on Churchill's orders 'to set Europe ablaze' - and its American counterpart, the Office of Strategic Services (OSS). In sixteen separate chapters the author describes how the fearless individuals in these clandestine organisations were recruited, trained and armed, and examines some of their guerrilla operations in Europe, Africa and the Far East, such as the raid on Fernando Po, the destruction of Gorgopotamos Bridge in Greece and the strike against Japanese shipping in Singapore harbour. Also covered are the means SOE and OSS used to subvert the enemy, by employing black propaganda, forgery, pornography and black market currency manipulation. It may well read like fiction but the stories are fact, and shows to what lengths the Allies were prepared to go to crush the Axis powers.
In the 2010 federal election, independent candidate Andrew Wilkie grabbed headlines after winning the seat of Denison, and with it a key role in deciding who would form the next government of Australia.Before he was a politician, however, Wilkie was Australia's most talked-about whistleblower. In March 2003, Wilkie resigned from Australia's peak intelligence agency in protest over the looming war in Iraq. He was the only serving intelligence officer from the 'coalition of the willing' - the US, the UK and Australia - to do so, and his dramatic move was reported throughout the world. Wilkie's act of conscience put him on a collision course with the Australian government. Why was he willing to risk his career and reputation to tell the truth? What happened when he decided to take a stand? In Axis of Deceit, Wilkie tells his story. He exposes how governments skewed, spun and fabricated intelligence advice. And he offers a rare glimpse into the world of international intelligence and life as a spook. With a brand-new preface, this is the fascinating inside story of a man now set to play a pivotal role in our public life.
By utilising the latest research, readers will be given a complete picture of the way Britain fought the Cold War, moving the focus away from the now familiar crises of Suez and Cuba and onto the themes that underpinned the British war strategy. Intelligence, civil defence and nuclear diplomacy are all examined within the context of modern British history at a time of national decline. There is a growing interest in the contexts of the Cold War and this collection will establish itself as the leading volume on the UK's wartime strategy.
Handbook of Warning Intelligence: Assessing the Threat to National Security was written during the cold war and was classified for 40 years. The majority of this manual, however, is now finally available to the general public. An abridged version, Anticipating Surprise: Analysis for Strategic Warning, was published, but this original document goes into much greater detail about the fundamentals of intelligence analysis and forecasting. It discusses military analysis, as well as the difficulties in understanding political, civil, and economic analysis and assessing what it means for analysts to have "warning judgment." Much of what Grabo writes in her book seems to appear in many of the numerous commission reports that emerged after the 9/11 attacks. However, this book was written in response to the "surprise attack" of the Soviet Union's invasion of Czechoslovakia in 1968. According to the author, that event was no surprise. And while analysts have to take some of the blame for their failure to strenuously present their case that the threat was real and imminent, what occurred was a failure by policymakers to listen to the warning intelligence reports that were written at the time.
Handbook of Warning Intelligence: Assessing the Threat to National Security was written during the cold war and was classified for 40 years. The majority of this manual, however, is now finally available to the general public. An abridged version, Anticipating Surprise: Analysis for Strategic Warning, was published, but this original document goes into much greater detail about the fundamentals of intelligence analysis and forecasting. It discusses military analysis, as well as the difficulties in understanding political, civil, and economic analysis and assessing what it means for analysts to have "warning judgment." Much of what Grabo writes in her book seems to appear in many of the numerous commission reports that emerged after the 9/11 attacks. However, this book was written in response to the "surprise attack" of the Soviet Union's invasion of Czechoslovakia in 1968. According to the author, that event was no surprise. And while analysts have to take some of the blame for their failure to strenuously present their case that the threat was real and imminent, what occurred was a failure by policymakers to listen to the warning intelligence reports that were written at the time.
Through dramatic incidents tells for the first time the full story of the development of Cold War naval intelligence from the end of WWII to the breakup the Soviet Union in 1991, from both sides, East and West. Unlike other accounts, which focus on submarine confrontations and accidents, the authors cover all types of naval intelligence, human collection (racing with the Soviets to capture Nazi subs, successful and losing spies and defectors), signal intelligence (surface, air, satellite and navy commando teams in balaclavas launched by speed boats from subs), acoustic (passive underwater arrays and tapping phone lines), and the aerial and space reconnaissance. The authors give details of operations in all these areas, some of which were witnessed first hand. ""A new light is shed on the spy ships incidents of the 1960s and on submarine intrusions in Swedish waters. Excerpts of the Soviet Navy instructions on UFOs and accounts of Soviet naval encounters with unexplained objects are also published for the first time outside of Russia; and much more.""
This book offers a wide array of legal approaches to regulating the private military corporation, including international, corporate, constitutional and administrative law. It covers a new important topic - private military corporations. It is the first examination focused on regulatory problems and potential of private military corporations. It places the private military corporation in a contemporary global context.Private military organizations are a new and important feature of the international landscape. They offer control of potential massive violence to the highest bidder with very limited accountability. This book offers critical insights into both the phenomenon and the challenges of and potential for regulation.
Among the greatest developments in conventional war since 1914 has been the rise of air/land power the interaction between air forces and armies in military operations. This book examines the forging of an air support system that was used with success for the remainder of the war, the principles of which have applied ever since.
"A Classic in Counterintelligence -- Now Back in Print" Originally published in 1987, "Thwarting Enemies at Home and Abroad" is a unique primer that teaches the principles, strategy, and tradecraft of counterintelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations. Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.
This is the last untold story of Bletchley Park. Using recently declassified information, Paul Gannon has written a gripping account of the invention of the world's first true computer, Colossus. Uncover the secrets of Bletchley Park's code-breaking computers. In 1940, almost a year after the outbreak of the Second World War, Allied radio operators at an interception station in South London began picking up messages in a strange new code. Using science, maths, innovation and improvisation BletchleyPark codebreakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these codebreakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and hidden away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of BletchleyPark. 'Gannon's book contains a mass of utterly fascinating and largely unknown material about an immensely important wartime project, and is very welcome indeed.' - Brian Randell, TES
While other books have speculated on the history and nature of Britain's intelligence services, this is the first to tell the story through the documents themselves. Only ten years ago access to these original sources would have been impossible, but now experts Twigge, Hampshire and Macklin draw on the spies' and spymasters' own words from the National Archives' unique intelligence files - including the very latest remarkable releases from MI5. Historical narrative is interwoven with colourful tales from the past that highlight some of the greatest successes - and failures - along the way, as well as the motives and machinations of those responsible for them. And readers who want to explore sources for themselves are given all the guidance they need. As the Iraq War and its aftermath bring the intelligence profession back into the spotlight, "British Intelligence" is compelling reading for anyone interested in the shadowy world of 20th-century espionage.
As the fifth full year of America's global war on terrorism continues, statistics concerning terrorist attacks show a disturbing trend: from a twenty-one-year high in 2003, attacks tripled in 2004 and then doubled in 2005. And as the incidence of terrorist attacks increased, so has the number of terrorists. While the primary leaders of the Taliban, al Qaeda, and al Qaeda in Iraq remain at large, a 2006 Department of Defense study reportedly identified thirty new al Qaeda-affiliated terrorist groups that have been created since September 11, 2001. We may not have metrics that measure our success in the war on terrorism, but these realities certainly illuminate our failures.In "Thinking Like a Terrorist," former FBI counterterrorism agent Mike German contends that the overarching problem is a fundamental failure to understand the terrorists-namely, what they want and how they intend to get it. When our counterterrorism policies are driven by misunderstanding and misperception, we shouldn't be surprised at the results. Today's terrorists have a real plan-a blueprint that has brought them victory in the past-that they are executing to perfection; moreover, their plan is published and available to anyone who bothers to read it. Once the terrorists' plan is understood, we can develop and implement more effective counterterrorism strategies.A former undercover agent who infiltrated neo-Nazi terrorist groups in the United States, German explains the terrorist's point of view and discusses ways to counter the terrorism threat. Based on his unusual experience in the field, "Thinking Like a Terrorist" provides unique insights into why terrorism is such a persistent and difficult problem and whythe U.S. approach to counterterrorism isn't working. |
You may like...
The Secret Life of Bletchley Park - The…
Sinclair McKay
Paperback
(1)
Radical War - Data, Attention and…
Matthew Ford, Andrew Hoskins
Paperback
R587
Discovery Miles 5 870
Secrets in a Dead Fish - The Spying Game…
Melanie King
Hardcover
(1)
Operation Mincemeat - The True Spy Story…
Ben MacIntyre
Paperback
(1)
The Evolution of Soviet Operational Art…
David M. Glantz, Harold S. Orenstein
Hardcover
R5,387
Discovery Miles 53 870
|