Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
During the Second World War German intelligence had deployed wireless teams throughout occupied Europe. Agents had even been deployed to mainland Britain to spy on British military activity. Monitoring and reporting of their wireless transmissions fell to a small, secretive and largely unknown unit manned almost exclusively by volunteers. The Voluntary Interceptors (VI) as they became known would spend hours every day at home monitoring the short wavelengths for often faint and difficult to copy signals transmitted by these German secret intelligence services. This unit was to become known as the Radio Security Service (RSS) and was at the core of the signals intelligence production effort at Bletchley and the insights into German military tactical and strategic planning. Without interceptors like the RSS, Bletchley would not have existed. Their story has never truly been written and RADIO WAR focuses on the secret world of wireless espionage and includes first-hand accounts from the surviving veterans of the unit. Its existence was only made public 35 years after WWII ended, shortly after Bletchley Park's secrets were exposed. Patrick Reilly, the Assistant to Head of MI6 Stewart Menzies, was to say of the RSS.... `a team of brilliance unparalleled anywhere in the intelligence machine.'
"The Lost Oasis" tells the true story behind "The English Patient," An extraordinary episode in World War II, it describes the Zerzura Club, a group of desert explorers and adventurers who indulged in desert travel by early-model-motor cars and airplanes, and who searched for lost desert oases and ancient cities of vanished civilizations. In reality, they were mapping the desert for military reasons and espionage. The club's members came from countries that soon would be enemies: England and the Allied Forces v. Italy and Germany. When war erupted in 1939, Ralph Bagnold founded the British Long Range Desert Group to spy on and disrupt Rommel's advance on Cairo, while a fellow club member, Hungarian Count Almasy, succeeded in placing German spies there. Ultimately, the British prevailed. Saul Kelly's riveting history draws on interviews with survivors and previously unknown documentary material in England, Italy, Germany, Hungary, and Egypt. His book reads like a thriller - with one key difference: it's all true.
"Spies of the Kaiser" examines the scope and objectives of German
covert operations in Great Britain before and during the First
World War. It assesses the effect of German espionage on
Anglo-German relations and discusses the extent to which the fear
of German espionage in the United Kingdom shaped the British
intelligence community in the early twentieth century. The study is
based on original archival material, including hitherto unexploited
German records and recently declassified British documents.
How can the United States guard against a clever unknown enemy while still preserving the freedoms it holds dear? Hulnick explains the need to revamp U.S. intelligence operations from a system focused on a single Cold War enemy to one offering more flexibility in combating non-state actors (including terrorists, spies, and criminals) like those responsible for the attacks of September 11, 2001. Offering possible solutions not to be found in the federal commission's official report, Hulnick's groundbreaking work examines what is really necessary to make intelligence and homeland security more efficient and competent, both at within the United States and abroad. The U.S. government's progress in establishing a system for homeland security is considerable, yet, besides shifts in alert status, most U.S. residents are unaware of the work being done to keep them safe. Describing the system already in place, Hulnick adds further ideas about what more is needed to protect Americans in the ever-changing world of intelligence. To create a truly valuable program, it is suggested the the United States consider not only new strategies and tactics, but also the need to break down the barriers between intelligence agencies and law enforcement.
This system-level resource specifically applies knowledge management principles, practices and technologies to the intelligence domain. Designed for those responsible for the management of an intelligence enterprise operation and its delivery of reliable intelligence to key decision-makers, the text describes the essential principles of intelligence, from collection, processing and analysis to dissemination, for both national intelligence and business applications. The author aims to provide a balanced treatment of the organizational and architectural components of knowledge management, offering an understanding of the system infrastructure, tools and technologies necessary to implement the intelligence enterprise. He explores real-world applications and presents a detailed example of competitive intelligence unit design. Including over 80 illustrations, the volume offers a practical description of enterprise architecture design methodology, and covers the full range of national, military, business and competitive intelligence.
ACCLAIM FOR ENIGMA "CRACKING STUFF...VIVID AND HITHERTO UNKNOWN DETAILS." -Sunday Times (London) "IN A CROWD OF BOOKS DEALING WITH THE ALLIED BREAKING OF THE WORLD WAR II CIPHER MACHINE ENIGMA, HUGH SEBAG-MONTEFIORE HAS SCORED A SCOOP." -Washington Post Winston Churchill called the cracking of the German Enigma Code "the secret weapon that won the war." Now, for the first time, noted British journalist Hugh-Sebag-Montefiore reveals the c"omplete" story of the breaking of the code by the Allies--the breaking that played a crucial role in the outcome of World War II. This fascinating account relates the never-before-told, hair-raising stories of the heroic British and American sailors, spies, and secret agents who faced death in order to capture vital codebooks from sinking ships and snatch them from under the noses of Nazi officials. Sebag-Montefiore also relates new details about the genesis of the code, little-known facts about how the Poles first cracked the Luftwaffe's version of the code (and then passed it along to the British), and the feverish activities at Bletchley Park, Based in part on documents recently unearthed from American and British archives--including previously confidential government files--and in part on unforgettable, firsthand accounts of surviving witnesses, "Enigma" unearths the stunning truth about the brilliant piece of decryption that changed history.
This groundbreaking story is told through Bernardo Benes—a lawyer who joined the refugee exodus from Castro's Cuba in 1960. Benes quickly became one of the leading voices advocating the integration of Cubans into the city's Anglo, old-boy power structure. In 1978, Cuban Intelligence recruited him as an emissary between the Carter administration and Cuba. He did the same for the CIA under Reagan in the early 1980s. In all, Benes made seventy-five secret trips to meet with high-ranking Cuban officials, spending about 150 hours face-to-face with Fidel Castro. The 1978 dialogue resulted in the release of 3,600 Cuban political prisoners and the right for Cuban exiles to visit family members on the island.
This book tells of intelligence successes never before reported, each involving the author during a most unusual career spanning three wars. It gives first-hand accounts which counter the recent bad press received by fine intelligence organizations.
This is the first full-length study of the role played by British Intelligence in influencing policy towards Japan from the decline of the Alliance to the outbreak of the Pacific War. Using many previously classified records it describes how the image of Japan generated by Intelligence during this period led Britain to underestimate Japanese military capabilities in 1941. The book shows how this image was derived from a lack of adequate intelligence resources and racially driven assumptions about Japanese national characteristics.
Khe Sanh remains to this day, an extremely controversial and emotional aspect of the war in Vietnam. The U.S. Armed Forces fought to defend Khe Sanh in early 1968 and then abandoned the base after a 77-day siege by the North Vietnamese. This book contains fromerly Top Secret messages to President Lyndon Johnson from National Security Advisor W.W. "Walt" Rostow, Gen. William Westmoreland and many others. The siege and loss of Khe Sanh is the tragedy of the war in Vietnam in microcosm.
During World War II, Britain enjoyed spectacular success in the secret war between hostile intelligence services, enabling a substantial and successful expansion of British counter-espionage. Hugh Trevor-Roper's experiences working for the Secret Intelligence Service (MI6) during the war had a profound impact on him and he later observed the world of intelligence with particular sharpness. To him, the subjects of wartime espionage and the complex espionage networks that developed in the Cold War period were as worthy of profound investigation and reflection as events from the more distant past. Expressing his observations through some of his most ironic and entertaining correspondence, articles and reviews, Trevor-Roper wrote vividly about some of the greatest intelligence characters of the age - from Kim Philby and Michael Straight to the Germans Admiral Canaris and Otto John. Including some previously unpublished material, this book is a sharp, revealing and personal first-hand account of the intelligence world in World War II and the Cold War.
Packed with the technological details and insights into military strategy that fans of Tom Clancy relish, The Silent War is a riveting look at the darkest days of the Cold War. It reveals, in gripping detail, the espionage, innovative high technology, and heroic seafaring the United States employed against the Soviet Union in the battle for nuclear and military supremacy. John Piña Craven, who shared management responsibility for the submarine-borne Polaris missile system, captures the excitement and the dangers of the times as he recounts the true stories behind some of the century's most shocking headlines and reveals harrowing episodes kept hidden from the public. Craven describes for the first time the structural problems that almost caused the destruction of the Nautilus, the world's first nuclear-powered submarine, and presents startling information about the race to recover a hydrogen bomb from the B-52 bomber that went down off the coast of Spain. In a report no fan of The Hunt for Red October will want to miss, he provides a fascinating, authoritative perspective on the Navy's reaction to the rogue Soviet submarine and its mission. A major contribution to Cold War history and literature, The Silent War will appeal to military buffs and fans of nonstop adventure thrillers alike.
Khe Sanh remains to this day, an extremely controversial and emotional aspect of the war in Vietnam. The U.S. Armed Forces fought to defend Khe Sanh in early 1968 and then abandoned the base after a 77-day siege by the North Vietnamese. This book contains fromerly Top Secret messages to President Lyndon Johnson from National Security Advisor W.W. "Walt" Rostow, Gen. William Westmoreland and many others. The siege and loss of Khe Sanh is the tragedy of the war in Vietnam in microcosm.
Critical Acclaim for TOP SECRET TALES of World War II "A book for rainy days and long solitary nights by the fire. If there were a genre for cozy nonfiction, this would be the template."–Publishers Weekly "Perfect for the curious and adventure readers and those who love exotic tales and especially history buffs who will be surprised at what they didn’t know. Recommended for nearly everyone."–Kirkus Reviews This war was fought by soldiers out of uniform. Stealth and ingenuity were their weapons. Victory was their only code of conduct. In Top Secret Tales of World War II, noted military historian William Breuer documents espionage–in all its forms–as it evolved in the hands of both Allied and Axis agents of intelligence and counterintelligence. Here you’ll find riveting tales of patriotism and treachery, subversion and sabotage, kidnappings and assassinations, and bribes and blackmailing–with frequently startling revelations about the secret wars behind both the battlefields and the headlines.
New threats require new thinking. State attacks involving long-range missiles or conventional military forces are not the only threat to the U.S. homeland. Covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals-and even by residents of the United States-are significant issues for future U.S. security. In this comprehensive work, Cordesman offers a range of recommendations, from reevaluating what constitutes a threat and bolstering homeland defense measures, to improving resource allocation and sharpening intelligence. There is a wide spectrum of potential threats to the U.S. homeland that do not involve overt attacks by states using long-range missiles or conventional military forces. Such threats include covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals, and independent terrorist and extremist attacks by residents of the United States. These threats are currently limited in scope and frequency, but are emerging as potentially significant issues for future U.S. security. In this comprehensive work, Cordesman argues that new threats require new thinking, and offers a range of recommendations, from expanding the understanding of what constitutes a threat and bolstering Homeland defense measures, to bettering resource allocation and improving intelligence gathering and analysis. No pattern of actual attacks on U.S. territory has yet emerged that provides a clear basis for predicting how serious any given form of attack might be in the future, what means of attack might be used, or how lethal new forms of attack might be. As a result, there is a major ongoing debate over the seriousness of the threat and how the U.S. government should react. This work is an invaluable contribution to that debate.
While much has been disclosed about the CIA's cloak-and-dagger activities during the Cold War, relatively little is known about the origins of this secret organization. David Rudgers, a twenty-two-year CIA veteran, has written the first complete account of its creation, revealing how the idea of a centralized intelligence developed within the government and debunking the myth that former OSS chief William J. Donovan was the prime mover behind the agency's founding. "Creating the Secret State" locates the CIA's origins in government-wide efforts to reorganize national security during the transition from World War II to the Cold War. Rudgers maintains that the creation of the CIA was not merely the brainchild of "Wild Bill" Donovan. Rather, it was the culmination of years of negotiation among numerous policy makers such as James Forrestal and Dean Acheson, each with strong opinions regarding the agency's mission and methods. He shows that Congress, the Departments of State and Justice, the Joint Chiefs, and even the Budget Bureau all had a hand in the establishment of this "secret state" that operates nearly invisibly outside the American political process. Based almost entirely on archival and other primary sources, Rudgers's book describes in detail how the CIA evolved from its original purpose-as a watchdog to guard against a "nuclear Pearl Harbor"-to the role of clandestine warriors countering Soviet subversion, eventually engaging in more forms of intelligence gathering and covert operations than any of its counterparts. It suggests how the agency became a different organization than it might have been without the Communist threat and also shows how it both overexaggerated the dangers of the Cold War and failed to predict its ending. Rudgers has written an accurate and balanced account that brings America's undercover army in from the cold and out from under the cult of personality. An indispensable resource for future studies of the CIA, Creating the Secret State tells the inside story of why and how the agency was called into existence as it stimulates thinking about the future relevance of the CIA in a rapidly changing world.
During the Second World War a major part of the strategy of the Grand Alliance was shipping. The Germans fully appreciated the vulnerability of this and their attack on it, largely by means of submarines, became known as the Battle of the Atlantic. The attack was overcome, with some difficulty, by a number of means. One, which remained generally unknown until the 1970s, was the decryption of German coded signals, now usually called Ultra. Subsequent histories often tended to attribute the outcome of the Battle largely to the operation of this factor almost by itself, sometimes because of a lack of rigorous analysis and also because of a failure to set this important subject into the full and complex contexts in which it operated. This study rectifies this deficiency, setting out the full story of the series of campaigns and carefully assessing the complicated pattern of factors, thus allowing a much more balanced understanding of code-breaking.
Winston Churchill once remarked that the secret warfare waged in World War II equaled "the most fantastic inventions of romance and melodrama." William Breuer vividly confirms that assessment with these compelling accounts of Allied and Axis intelligence throughout World War II. Here are riveting tales of patriotism and treachery, saboteurs, sleepers, and moles, giving fresh perspectives on the best-known interceptions and deceptions of the war—the breaking of the German code Enigma and the Japanese code Purple, Operation Overlord’s successful disguise of the D-Day invasion— as well as little-known feats of civilian bravado in the face of danger. Meet Sidney Cotton, a British businessman and aviator who took the Luftwaffe’s General Albrecht Kesselring aloft for a test flight at a German air show and then coolly snapped valuable reconnaissance photographs after handing the controls over to the Nazi officer. Shadow the covert armada that shipped the foundation of Great Britain’s financial security—including $2.5 billion in gold—from London to the Bank of Canada in Ottawa, without suffering a single loss from U-boats at the height of the Battle for the Atlantic. Discover how U.S. taxpayers footed the bill for a successful Nazi propaganda effort that was documented in the Congressional Record, published by the Government Printing Office, and mailed on a congressman’s postal privileges. Witness a German military spy so inept he carried his World War I medals on his mission, and another so bold that he advertised for industry secrets in the pages of Popular Aviation magazine. He paid twenty dollars each for the numerous—and significant—replies that poured in. Drawn extensively from personal interviews, private correspondence, trial records, and declassified documents from official archives, this engrossing volume provides detailed, frequently startling revelations about the secret wars fought behind the battlefields—and the headlines—of World War II. This war was fought by soldiers out of uniform. Stealth and ingenuity were their weapons. Victory was their only code of conduct."Gentlemen do not read each other’s mail."—Henry L. Stimson Henry L. Stimson, the U.S. Secretary of War under President Franklin Roosevelt, was in for a rude shock as the military forces of Germany and Japan armed themselves for their assault on the world. Men at war not only read each other’s mail; they forged it whenever possible. In Top Secret Tales of World War II, noted military historian William Breuer documents espionage—in all its forms—as it evolved in the hands of both Allied and Axis agents of intelligence and counter-intelligence. He reveals the acts of subversion and sabotage, the bribes, blackmailings, kidnappings, assassinations, grand deceptions, and bizarre assaults that were conducted in the name of victory at all costs. Focusing on the fascinating characters that played key roles in these pivotal incidents, Breuer brings a fresh dimension to the war’s most notorious acts and provides new insights into missions conducted in such deep shadow they nearly eluded the history books as well as they did the enemy’s detection.
In October 1962, the world went to the brink of Armageddon. This study provides an archive based account of the Cuban missile crisis, providing the first detailed and authoritative account from the British perspective. The book draws upon British and US archival material and scholarship in the west and the former USSR. The diplomatic, military and intelligence dimensions of British policy are scrutinized. Material is presented and existing interpretations of UK US relations at this crucial moment are reassessed. The book contributes a fresh aspect to the literature on the Cuban missile crisis, by exploring where the views of Washington and its closest ally converged and diverged.
It is, of course, no secret that undercover Special Forces and intelligence agencies operated in Northern Ireland and the Republic throughout the 'troubles', from 1969 to 2001 and beyond. What is less well known is how these units were recruited, how they operated, what their mandate was and what they actually did. This is the first account to reveal much of this hitherto unpublished information, providing a truly unique record of surveillance, reconnaissance, intelligence gathering, collusion and undercover combat. An astonishing number of agencies were active to combat the IRA murder squads ('the Provos'), among others the Military Reaction Force (MRF) and the Special Reconnaissance Unit, also known as the 14 Field Security and Intelligence Company ('The Det'), as well as MI5, Special Branch, the RUC, the UDR and the Force Research Unit (FRU), later the Joint Support Group (JSG)). It deals with still contentious and challenging issues as shoot-to-kill, murder squads, the Disappeared, and collusion with loyalists. It examines the findings of the Stevens, Cassel and De Silva reports and looks at operations Loughgall, Andersonstown, Gibraltar and others.
Spies and Saboteurs is the story of the origins of the Anglo-American 'Special Relationship' in human intelligence collection and special operations, which took place amidst the global conflagration that was the Second World War. It is the story of William 'Wild Bill' Donovan - the father of America's Central Intelligence Agency - and of his relationship with legendary British spymasters like William Stephenson, code named 'Intrepid', Stewart Menzies ('C'), chief of the Secret Intelligence Service, Admiral John Godfrey, the powerful and enigmatic director of Naval Intelligence, and General Colin Gubbins, Britain's master saboteur. Relying almost exclusively upon recently declassified OSS and British intelligence documents and survivor interviews, it examines the transatlantic association in espionage and sabotage, guerrilla warfare and disinformation. It explores the evolution of covert relations from a 'tutorial' arrangement with the U.S. as pupil, to an unequal then full partnership, and ultimately to competition and rivalry in the prosecution of the clandestine war.
First published in 1865, Belle Boyd's memoir of her experiences as a Confederate spy has stood the test of time and interest. Belle first gained notoriety when she killed a Union soldier in her home in 1861. During the Federal occupations of the Shenandoah Valley, she mingled with the servicemen and, using her feminine wiles, obtained useful information for the Rebel cause. In this new edition, Kennedy-Nolle and Faust consider the domestic side of the Civil War and also assess the value of Boyd's memoir for social and literary historians in its challenge to our understanding the most divisive years in American history.
In the years following World War I, America's armed services, industry, and government took lessons from that conflict to enhance the country's ability to mobilize for war. Paul Koistinen examines how today's military-industrial state emerged during that period-a time when the army and navy embraced their increasing reliance on industry, and business accelerated its efforts to prepare the country for future wars. Planning War, Pursuing Peace is the third of an extraordinary five-volume study on the political economy of American warfare. It differs from preceding volumes by examining the planning and investigation of war mobilization rather than the actual harnessing of the economy for hostilities; and it is also the first book to treat all phases of the political economy of wartime during those crucial interwar years. Koistinen first describes and analyzes the War and Navy Departments' procurement and economic mobilization planning-never before examined in its entirety-and conveys the enormity of the task faced by the military in establishing ties with many sectors of the economy. He tells how the War Department created commodity committees to carry on the work of World War I's War Industries Board, and how both military and industrial powers strove to protect their mutual interests against those seeking to avoid war and to reform society. Koistinen then describes the American public's struggle to come to terms with modern warfare through the in-depth explorations of the work of the House Select Committee on Expenditures in the War Department, the War Policies Commission, and the Senate Special Committee Investigating the Munitions Industry. He tells how these investigations alarmed pacifists, isolationists, and neo-Jeffersonians, and how they led Senator Gerald Nye and others to warn against the creation of ""unhealthy alliances"" between the armed services and industry. Planning War, Pursuing Peaceclearly shows how the U.S. economy was both directly and indirectly planned based on knowledge gained from World War I. By revealing vital and previously unexplored links between America's World Wars, it further illuminates the political economy of twentieth-century warfare as a complex and continually evolving process. |
You may like...
Radical War - Data, Attention and…
Matthew Ford, Andrew Hoskins
Paperback
R587
Discovery Miles 5 870
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
Health Security Intelligence
Michael S. Goodman, James M. Wilson, …
Hardcover
R3,832
Discovery Miles 38 320
|