|
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
In a rapidly changing environment, Intelligence Surveillance
developed through different types of technologies, software,
strategies and drones operations in Europe and the United Kingdom.
There are various forms of surveillance mechanisms, including Human
Agents, Computer Programs, and Global Positioning Satellite
Devices. These surveillance devices are now even encroaching into
the personal domain of the individuals without the knowledge of the
individual being watched. In a surveillance state, people live in
consternation, fear, and struggling to protect their privacy,
family life, business secrets, and data. In a short period of time,
it has amassed a rather sordid history of citizen surveillance- and
it continues to be unlawful. These are some of the issues discussed
in the book which has varied articles from the experts on the
subject.
The imbalance of Pakistan's civil-military relations has caused
misperceptions about the changing role of intelligence in politics.
The country maintains 32 secret agencies working under different
democratic, political and military stakeholders who use them for
their own interests. Established in 1948, The ISI was tasked with
acquiring intelligence of strategic interests and assessing the
intensity of foreign threats, but political and military
stakeholders used the agency adversely and painted a consternating
picture of its working environment. The civilian intelligence
agency-Intelligence Bureau (IB) has been gradually neglected due to
the consecutive military rule and weak democratic governments. The
ISI today seems the most powerful agency and controls the policy
decisions. The working of various intelligence agencies,
militarisation of intelligence and ineffectiveness of the civilian
intelligence are some of the issues discussed in the book.
No external observer knows more about Myanmar's security and
intelligence apparatus than Andrew Selth. In this book he presents
an account of the structure and functions of Myanmar's deep state,
along with a tale of personal ambition, rivalry and ruthless power
politics worthy of John Le Carre. A thoroughly educative,
entertaining and intriguing read."" - Professor Michael Wesley,
Dean, College of Asia and the Pacific, The Australian National
University ""Andrew Selth has once again amply illustrated the
depth and penetration of his study of Myanmar/Burma and its
institutions. This work on the more recent aspects of the country's
intelligence apparatus goes beyond a masterful and comprehensive
analysis of the Burmese intelligence community, and probes the
social and institutional bases of the attitudes giving rise to that
critical aspect of power. We are once again in Dr Selth's debt.
This is required reading for serious observers of the Burmese
scene."" - David I. Steinberg, Distinguished Professor of Asian
Studies Emeritus, Georgetown University ""By lifting the lid on a
pervasive yet secretive intelligence apparatus, Andrew Selth makes
an outstanding contribution to Myanmar Studies. For scholars and
practitioners alike, this book provides an essential history of a
security state that remains powerful even during the transition
away from overt authoritarian rule."" - Professor Ian Holliday,
Vice-President (Teaching and Learning), The University of Hong Kong
Intelligence Operations: Understanding Data, Tools, People, and
Processes helps readers understand the various issues and
considerations an intelligence professional must tackle when
reviewing, planning, and managing intelligence operations,
regardless of level or environment. The book opens by introducing
the reader to the many defining concepts associated with
intelligence, as well as the main subject of intelligence: the
threat. Additional chapters examine the community of intelligence,
revealing where intelligence is actually practiced, as well as what
defines and characterizes intelligence operations. Readers learn
about the four critical components to every intelligence
operation-data, tools, people, and processes-and then explore the
various operational and analytic processes involved in greater
detail. Throughout, the text encourages discovery and discussion,
urging readers to first understand the material, then break it
down, adapt it, and apply it in a way that supports their
particular operations or requirements. Unique in approach and
designed to assist professionals at all levels, Intelligence
Operations is an excellent resource for both academic courses in
the subject and practical application by intelligence personnel.
Globalisation continues to challenge our world at unprecedented
speed. Technological innovations, changing geographical
developments, regional rivalries, and destruction of national
critical infrastructures in several Muslim states due to the US
so-called war on terrorism-all transformed the structures and
hierarchies of societies. The idea of the development of a nation
that sounds on tripods that are food, shelter, and security failed.
The Edward Snowden leaks challenged policymakers and the public
understanding and perspectives on the role of security intelligence
in liberal democratic states. The persisting imbalance of power in
the United States, its institutional turmoil, and intelligence war,
and the noticeably tilting power have made the country feel
vulnerable and prodded it into military ventures. The calibration
of Western allies around Whitehouse as the sole center of
globalization has only brought instability, destruction, and loss
of human lives.
The inside story of one of the most famous of all the 'back rooms'
of the Second World War - and of the men and women who worked for
it. Conceived by Winston Churchill to circumvent the delays,
frustrations and inefficiencies of the service ministries,
Department M.D.1. earned from its detractors the soubriquet
'Winston Churchill's Toyshop', yet from a tiny underground workshop
housed in the cellars of the London offices of Radio Normandie in
Portland Place, and subsequently from the 'stockbroker Tudor' of a
millionaire's country mansion in Buckinghamshire, came an
astonishing array of secret weapons ranging from the 'sticky bomb'
and 'limpet mine' to giant bridge-carrying assault tanks, as well
as the PIAT, a tank-destroying, hand-held mortar. Written by
Colonel Stuart Macrae, who helped found M.D.1. and was its
second-in-command throughout its life, the story is told of this
relatively unknown establishment and the weapons it developed which
helped destroy innumerable enemy tanks, aircraft and ships.
Most discussions on electronic media and intellectual forums about
the effects of globalization on national security focus on violent
threats. Notwithstanding the plethora of books, journals and
research papers on national and international security, there is an
iota research work on issue of interconnectedness. The
interconnectedness of violent threats and their mounting effect
pose grave dangers to the aptitude of a state to professionally
secure its territorial integrity. Technological evolution and
aggrandized interlinkage of our world in general, and specifically
information technology, has affected people and society in
different ways. Daily life of every man and woman has become
influenced by these challenges. The twenty first century appeared
with different class of National Security threats. After the first
decade, world leaders, research scholars, journalists, politicians,
and security experts grasped that the world has become the most
dangerous place. The avoidance of war was the primary objective of
superpowers, but with the end of the Cold War, emergence of Takfiri
Jihadism, extremism, and terrorism prompted many unmatched
challenges. Home-grown extremism and radicalization continues to
expose a significant threat to the National Security of the EU and
Britain. The risks from state-based threats have both grown and
diversified. The unmethodical and impulsive use of a military-grade
nerve agent on British soil is the worse unlawful act of
bioterrorists.
An ancient esoteric object, once used by Elizabethan Magician John
Dee in his infamous occult rituals, attracts a deadly interest from
the clandestine world of outsourced military operations and leads
Antiquarian and former Scottish Military hero, Tavish Stewart, to
uncover a global conspiracy to control world leaders and enslave
the whole of humanity. Stewart's discovery leads him, and his
friends, into a race across the globe to locate ancient maps,
mysterious lost cities, magical relics and a forgotten civilisation
so ancient and advanced that it would rewrite human history.
Stewart must use all his Military and Martial Arts expertise to
overcome the elite warriors, weapons and technologies that are set
against him before a final apocalyptic confrontation in the
desolate wastes of Asia, to preserve the greatest secret of all
time!
The debate over cyber technology has resulted in new considerations
for national security operations. States find themselves in an
increasingly interconnected world with a diverse threat spectrum
and little understanding of how decisions are made within this
amorphous domain. With The Decision to Attack, Aaron Franklin
Brantly investigates how states decide to employ cyber in military
and intelligence operations against other states and how rational
those decisions are. In his examination, Brantly contextualizes
broader cyber decision-making processes into a systematic expected
utility-rational choice approach to provide a mathematical
understanding of the use of cyber weapons at the state level.
Most discussions on electronic media and intellectual forums about
the effects of globalization on national security focus on violent
threats. Notwithstanding the plethora of books, journals and
research papers on national and international security, there is an
iota research work on issue of interconnectedness. The
interconnectedness of violent threats and their mounting effect
pose grave dangers to the aptitude of a state to professionally
secure its territorial integrity. Technological evolution and
aggrandized interlinkage of our world in general, and specifically
information technology, has affected people and society in
different ways. Daily life of every man and woman has become
influenced by these challenges. The twenty first century appeared
with different class of National Security threats. After the first
decade, world leaders, research scholars, journalists, politicians,
and security experts grasped that the world has become the most
dangerous place. The avoidance of war was the primary objective of
superpowers, but with the end of the Cold War, emergence of Takfiri
Jihadism, extremism, and terrorism prompted many unmatched
challenges. Home-grown extremism and radicalization continues to
expose a significant threat to the National Security of the EU and
Britain. The risks from state-based threats have both grown and
diversified. The unmethodical and impulsive use of a military-grade
nerve agent on British soil is the worse unlawful act of
bioterrorists.
The incredible true story of the librarian, the Nazi spy and
Ireland's secret role in turning the tide of World War II When
unassuming librarian Richard Hayes, a gifted polymath and
cryptographer, was drafted by Irish intelligence services to track
the movements of a prolific Nazi spy, Hermann Goertz, Dublin became
the unlikely venue for one of the most thrilling episodes in Irish
history. In a complex game of cat-and-mouse that would wind its way
through the city and its suburbs, Code Breaker reveals how Richard
Hayes cracked a code that helped turn the tide of World War II, and
uncovers a secret history of the capital that has remained hidden
in plain view for the past 70 years.
The highly eccentric Alfred Dillwyn Knox, known simply as 'Dilly',
was one of the leading figures in the British codebreaking
successes of the two world wars. During the first, he was the chief
codebreaker in the Admiralty, breaking the German Navy's main flag
code, before going on to crack the German Enigma ciphers during the
Second World War at Bletchley Park.Here, he enjoyed the triumphant
culmination of his life's work: a reconstruction of the Enigma
machine used by the Abwehr, the German Secret Service. This kept
the British fully aware of what the German commanders knew about
Allied plans, allowing MI5 and MI6 to use captured German spies to
feed false information back to the Nazi spymasters.Mavis Batey was
one of 'Dilly's girls', the young female codebreakers who helped
him to break the various Enigma ciphers. She was called upon to
advise Kate Winslet, star of the film Enigma, on what it was like
to be one of the few female codebreakers at Bletchley Park. This
gripping new edition of Batey's critically acclaimed book reveals
the vital part Dilly played in the deception operation that ensured
the success of the D-Day landings, altering the course of the
Second World War.
'This is what an SAS career is really like' AUSTRALIAN DEFENCE
MAGAZINE Elite SAS Patrol Commander Stuart 'Nev' Bonner takes us
inside the extraordinary and dangerous world of secret combat
operations in this explosive, behind-the-scenes look at life inside
the SAS. A world where capture means torture or death, and every
move is trained for with precision detail to bring elite soldiers
to the very peak of fighting ability. In a career spanning twenty
years, fourteen of them in the SAS, Bonner shares with us the
inside story of being out in front - and often behind enemy lines.
From patrolling the mountains of East Timor to covert operations in
Bougainville and the Solomon Islands, from sweeping into the Iraqi
desert ahead of invading US forces to cripple Saddam Hussein's
communications to patrolling in war-torn Baghdad and being in the
middle of the disastrous Operation Anaconda in Afghanistan - this
is a no-holds-barred account of what it's like to live, eat and
breathe SAS. Now part of the HACHETTE MILITARY COLLECTION.
This book covers a vast canvas historically as regards Indian
Intelligence, and gives an adequate insight into the functioning of
the important intelligence agencies of the world. The author has
analyzed the current functioning of Indian Intelligence agencies in
great detail, their drawbacks in the structure and coordination and
has come out with some useful suggestions.
Applicants to the Central Intelligence Agency often asked Edward
Mickolus what they might expect in a career there. Mickolus, who
was a CIA intelligence officer, whose duties also included
recruiting and public affairs, never had a simple answer. If
applicants were considering a life in the National Clandestine
Service, the answer was easy. Numerous memoirs show the lives of
operations officers collecting secret intelligence overseas,
conducting counterintelligence investigations, and running covert
action programs. But the CIA isn't only about case officers in
far-flung areas of the world, recruiting spies to steal secrets.
For an applicant considering a career as an analyst, a support
officer, a scientist, or even a secretary, few sources provide
reliable insight into what a more typical career at the CIA might
look like. This collection of the exploits and insights of
twenty-nine everyday agency employees is Mickolus's answer. From
individuals who have served at the highest levels of the agency to
young officers just beginning their careers, Stories from Langley
reveals the breadth of career opportunities available at the CIA
and offers advice from agency officers themselves. "Stories from
Langley provides an invaluable behind-the-scenes look at
professional life inside the CIA. While many have written about
great operational exploits, few have focused on the daily lives and
challenges of analysts, support officers, and engineers, members of
the organization whose work is as essential if not as glamorous in
the public eye. Young men and women wondering about what to expect
in these varied CIA careers will find the book fascinating,
revealing, and perhaps even enticing."-George Tenet, former
director of Central Intelligence for the CIA "One of the most
difficult aspects of intelligence is trying to convey to outsiders
what that life-especially as an analyst-is really like. Most
fiction is overblown and inevitably focuses on operations and
spying. Stories from Langley is a delightful foray into the actual
experiences of a broad range of intelligence officers and fills an
important gap in our intelligence literature. Anyone interested in
the nuts and bolts of an intelligence career will find this a
useful and worthwhile read."-Mark Lowenthal, former assistant
director of Central Intelligence for Analysis& Production for
the CIA and author of Intelligence: From Secrets to Policy
Strategy in the Missile Age first reviews the development of modern
military strategy to World War II, giving the reader a reference
point for the radical rethinking that follows, as Dr. Brodie
considers the problems of the Strategic Air Command, of civil
defense, of limited war, of counterforce or pre-emptive strategies,
of city-busting, of missile bases in Europe, and so on. The book,
unlike so many on modern military affairs, does not present a
program or defend a policy, nor is it a brief for any one of the
armed services. It is a balanced analysis of the requirements of
strength for the 1960's, including especially the military posture
necessary to prevent war. A unique feature is the discussion of the
problem of the cost of preparedness in relation to the requirements
of the national economy, so often neglected by other military
thinkers. Originally published in 1959. The Princeton Legacy
Library uses the latest print-on-demand technology to again make
available previously out-of-print books from the distinguished
backlist of Princeton University Press. These editions preserve the
original texts of these important books while presenting them in
durable paperback and hardcover editions. The goal of the Princeton
Legacy Library is to vastly increase access to the rich scholarly
heritage found in the thousands of books published by Princeton
University Press since its founding in 1905.
The book is relevant to all those who wish to know why and how
terrorism shifted from West Asia to South and Southeast Asia and
Africa. This significant shift needs to be studied in depth for
policy formulation and future strategy. The book will reveal that
the so called Islamic Terrorism is traceable to Pakistan from
concept to reality. Pakistan as a state has provided the platform
for outward and inward march of Jihadis. For this to happen, the
ISI has been playing the principal role. Thus, the focus in this
book is on ISI as an instrument of spreading jihadi culture in
Pakistan and elsewhere.
This book covers a vast canvas historically as regards Indian
Intelligence, and gives an adequate insight into the functioning of
the important intelligence agencies of the world. The author has
analysed the current functioning of Indian Intelligence agencies in
great detail, their drawbacks in the structure and coordination and
has come out with some useful suggestions.
Repeated intelligence failures in Iraq, Libya and across the Middle
East and North Africa have left many critics searching for a
smoking gun. Amidst questions of who misread - or manipulated - the
intel, a fundamental truth goes unaddressed: western intelligence
is not designed to understand the world. In fact, it cannot. In The
Covert Colour Line, Oliver Kearns shows how the catastrophic
mistakes made by British and US intelligence services since 9/11
are underpinned by orientalist worldviews and racist assumptions
forged in the crucible of Cold War-era colonial retreat.
Understanding this historical context is vital to explaining why
anglophone state intelligence is unable to grasp the motives and
international solidarities of 'adversaries'. Offering a new way of
seeing how intelligence contributes to world inequalities, and
drawing on a wealth of recently declassified materials, Kearns
argues that intelligence agencies’ imagination of 'non-Western'
states and geopolitics fundamentally shaped British intelligence
assessments which would underpin the 2003 invasion of Iraq and
subsequent interventions.
|
|