Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Ben Morgan is back, and the stakes have never been higher.In Iraq, a surprise attack decimates the IS leadership. Revenge is sworn. A terrorist mastermind conceives a double-strike against America and Britain. Ten years later, cyberattacks hit both sides of the Atlantic. SAS soldiers are stricken by a silent chemical killer as London faces a devastating bombing attack. But the bigger and most dangerous threat is to Washington D.C., an attack that could cripple the West. In Washington, with the terrorist deadline looming, Ben Morgan puts the pieces together and finally glimpses the full extent of the plot. But stopping it will take everything he's got. And more. A scintillating technothriller from a bestselling author and a cybersecurity expert, Cyberstrike DC is perfect for fans of Tom Clancy and James Swallow.
In the winter of 1875, a young British officer set out across central Asia on a strictly unofficial mission to investigate the latest secret Russian moves in the Great Game. His goal was the mysterious caravan city of Khiva, his aim to discover whether this remote and dangerous oasis was about to be used as a springboard for an invasion of India. He rode for over a thousand miles across steppe and desert, struggling through blizzards and snowdrifts, to reach forbidden Khiva. Ordered home by an alarmed government, Burnaby immediately sat down and wrote this best-selling account of his adventures, which has become a Great Game classic.
An analysis of the insider information and insights that over eighty Soviet intelligence officer defectors revealed during the first half of the Soviet period Identifies 88 Soviet intelligence officer defectors for the period 1917 to 1954, representing a variety of specializations; the most comprehensive list of Soviet intelligence officer defectors compiled to date. Shows the evolution of Soviet threat perceptions and the development of the "main enemy" concept in the Soviet national security system. Shows fluctuations in the Soviet recruitment and vetting of personnel for sensitive national security positions, corresponding with fluctuations in the stability of the Soviet government. Compiles for the first time corroborative primary sources in English, Russian, French, German, Finnish, Japanese, Latvian, Norwegian, Portuguese, Spanish, and Swedish. When intelligence officers defect, they take with them privileged information and often communicate it to the receiving state. This book identifies a group of those defectors from the Soviet elite - intelligence officers - and provides an aggregate analysis of their information to uncover Stalin's strategic priorities and concerns, thus to open a window into Stalin's impenetrable national security decision making. This book uses their information to define Soviet threat perceptions and national security anxieties during Stalin's time as Soviet leader.
How was Bletchley Park made as an organization? How was signals intelligence constructed as a field? What was Bletchley Park's culture and how was its work co-ordinated? Bletchley Park was not just the home of geniuses such as Alan Turing, it was also the workplace of thousands of other people, mostly women, and their organization was a key component in the cracking of Enigma. Challenging many popular perceptions, this book examines the hitherto unexamined complexities of how 10,000 people were brought together in complete secrecy during World War II to work on ciphers. Unlike most organizational studies, this book decodes, rather than encodes, the processes of organization and examines the structures, cultures and the work itself of Bletchley Park using archive and oral history sources. Organization theorists, intelligence historians and general readers alike will find in this book a challenge to their preconceptions of both Bletchley Park and organizational analysis.
"Bruce Pease has written a much needed book on a long ignored topic: how does one lead analysts? Most analysis is at some level a group activity, whether in government or the private sector. Much has been written about good versus bad analysis and how to train analysts, but Pease, himself a veteran senior CIA analyst and manager, focuses on what the leaders of these analysts need to know and should be thinking about. Leadership matters in analysis as in all other endeavors, and Pease offers invaluable guidance on how to lead effectively. This book is a must for anyone in a leadership role in an analytic enterprise." -Mark M. Lowenthal, PhD, Intelligence & Security Academy, LLC Written by an experienced professional who has led Navy Intelligence and CIA analysts in high-stakes situations, Leading Intelligence Analysis introduces the fundamental managerial skills and practical tools needed to lead analysis projects conducted by individuals and teams. Author Bruce Pease provides insights into key questions such as What kind of environment draws out a team's best work? What brings out their creativity? When does pressure bring out their best insights? When does pressure sap their intellectual energy? and What kind of team builds new knowledge rather than engaging in group-think? This book draws on the author's perspective from decades of leading intelligence analysts on critical issues, including war in the Middle East, terrorism after 9/11, and nuclear threats. Key Features Practical advice helps leaders of analytic units nurture insight with the understanding that it can be enabled but not manufactured. Discussion of a range of different types of analysis serves leaders conducting research in areas including data analysis, security analysis, geopolitical analysis, threat warning, counterterrorism, and business climate analysis. Practical advice on judging IT tools guides leaders to the correct data science approach for various situations.
State sponsorship of terrorism is a complex and important topic in today's international affairs - and especially pertinent in the regional politics of the Middle East and South Asia, where Pakistan has long been a flashpoint of Islamist politics and terrorism. In Islamism and Intelligence in South Asia, Prem Mahadevan demonstrates how over several decades, radical Islamists, sometimes with the tacit support of parts of the military establishment, have weakened democratic governance in Pakistan and acquired progressively larger influence over policy-making. Mahadevan traces this history back to the anti-colonial Deobandi movement, which was born out of the post-partition political atmosphere and a rediscovery of the thinking of Ibn Taymiyyah, and partially ennobled the idea of `jihad' in South Asia as a righteous war against foreign oppression. Using Pakistani media and academic sources for the bulk of its raw data, and reinforcing this with scholarly analysis from Western commentators, the book tracks Pakistan's trajectory towards a `soft' Islamic revolution. Envisioned by the country's intelligence community as a solution to chronic governance failures, these narratives called for a re-orientation away from South Asia and towards the Middle East. In the process, Pakistan has become a sanctuary for Arab jihadist groups, such as Al-Qaeda, who had no previous ethnic or linguistic connection with South Asia. Most alarmingly, official discourse on terrorism has been partly silenced by the military-intelligence complex. The result is a slow drift towards extremism and possible legitimation of internationally proscribed terrorist organizations in Pakistan's electoral politics.
In a bold and penetrating study, Gregory Treverton, former Vice Chair of the National Intelligence Council and Senate investigator, offers his insider's views on how intelligence gathering and analysis must change. Treverton suggests why intelligence needs to be contrarian and attentive to the longer term. Believing that it is important to tap expertise outside government to solve intelligence problems, he argues that involving colleagues in the academy, think tanks, and Wall Street befits the changed role of government from doer to convener, mediator, and coalition-builder. Hb ISBN (2001): 0-521-58096-X
The secret history of MI6 - from the Cold War to the present day. The British Secret Service has been cloaked in secrecy and shrouded in myth since it was created a hundred years ago. Our understanding of what it is to be a spy has been largely defined by the fictional worlds of James Bond and John le Carre. THE ART OF BETRAYAL provides a unique and unprecedented insight into this secret world and the reality that lies behind the fiction. It tells the story of how the secret service has changed since the end of World War II and by focusing on the people and the relationships that lie at the heart of espionage, revealing the danger, the drama, the intrigue, the moral ambiguities and the occasional comedy that comes with working for British intelligence. From the defining period of the early Cold War through to the modern day, MI6 has undergone a dramatic transformation from a gung-ho, amateurish organisation to its modern, no less controversial, incarnation. Gordon Corera reveals the triumphs and disasters along the way. The grand dramas of the Cold War and after - the rise and fall of the Berlin Wall, the Cuban Missile Crisis, the 11 September 2001 attacks and the Iraq war - are the backdrop for the human stories of the individual spies whose stories form the centrepiece of the narrative. But some of the individuals featured here, in turn, helped shape the course of those events. Corera draws on the first-hand accounts of those who have spied, lied and in some cases nearly died in service of the state. They range from the spymasters to the agents they ran to their sworn enemies. Many of these accounts are based on exclusive interviews and access. From Afghanistan to the Congo, from Moscow to the back streets of London, these are the voices of those who have worked on the front line of Britain's secret wars. And the truth is often more remarkable than the fiction.
Strategy in the Missile Age first reviews the development of modern military strategy to World War II, giving the reader a reference point for the radical rethinking that follows, as Dr. Brodie considers the problems of the Strategic Air Command, of civil defense, of limited war, of counterforce or pre-emptive strategies, of city-busting, of missile bases in Europe, and so on. The book, unlike so many on modern military affairs, does not present a program or defend a policy, nor is it a brief for any one of the armed services. It is a balanced analysis of the requirements of strength for the 1960's, including especially the military posture necessary to prevent war. A unique feature is the discussion of the problem of the cost of preparedness in relation to the requirements of the national economy, so often neglected by other military thinkers. Originally published in 1959. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Builds a revisionary theoretical framework for researching intelligence knowledge and applies it to the Swedish Military and Security Directorate Gunilla Eriksson revises our perception of intelligence as carefully collected data and objective truth, arguing that there are hidden aspects to intelligence analysis that need to be uncovered and critically examined. This twofold study investigates the character of intelligence knowledge and the social context in which it is produced, using the Swedish Military and Security Directorate (MUST) as a case study. Eriksson argues that there is an implicit framework that continuously influences knowledge production: what kind of data is considered relevant, how this data is interpreted and the specific social and linguistic context of the organisation, surrounded by unarticulated norms and specific procedures. She asks whether these conventions hamper or obstruct intelligence assessments; an essential analysis, given that history has shown us the grave consequences basing policy on intelligence's wrong conclusions. Sources include: The annual Swedish Armed Forces Strategic Intelligence Estimates from 1998-2010 Lengthy and highly valuable interviews with the analysts, including managers, working at MUST, giving insights into everyday life at the institution and leading to many important results Participant observation carried out by the author at MUST working meetings and seminars during the production process of the 2010 estimate, and drawing on her experience from her years working as an active analyst
This is the first study to investigate the interlinked problems of domestic security and national defence in Ireland, from independence to the present day. Using a wealth of newly released material from Irish and foreign archives, Professor O'Halpin describes the development of the army and police since 1922, and examines how the emerging Irish state tried to balance an absolute commitment to military neutrality and independent defence with the need for close co-operation with Britain in dealing with perceived republican and communist threats.
This text draws together the various strands of Irish national security policy and practice in a single chronological study, from independence in 1922, analyzing the rapid emergence of a complex external security policy combining an absolute commitment to military neutrality and independent defence. The author traces the development of the army and police force in the new Irish state and the close co-operation with Britain over issues of joint concern such as security and immigration. He also examines the state's reaction to the enduring republican threat, casting fresh light on how far the state was willing to put key constitutional protections into abeyance in its conflict with the republican movement. The book also examines the clandestine intelligence activities of belligerent powers during the World War II, documenting the growth of the state's close wartime security understandings with the Allied powers, and the evolution of Cold War links with MI5 and the CIA. This book is intended for general readers of Irish history and scholars and students of 20th-century British and Irish history, and of politics and international relations.
Many Americans know something about the Navajo code talkers in World War II-but little else about the military service of Native Americans, who have served in our armed forces since the American Revolution, and still serve in larger numbers than any other ethnic group. But, as we learn in this splendid work of historical restitution, code talking originated in World War I among Native soldiers whose extraordinary service resulted, at long last, in U.S. citizenship for all Native Americans. The first full account of these forgotten soldiers in our nation's military history, The First Code Talkers covers all known Native American code talkers of World War I-members of the Choctaw, Oklahoma Cherokee, Comanche, Osage, and Sioux nations, as well as the Eastern Band of Cherokee and Ho-Chunk, whose veterans have yet to receive congressional recognition. William C. Meadows, the foremost expert on the subject, describes how Native languages, which were essentially unknown outside tribal contexts and thus could be as effective as formal encrypted codes, came to be used for wartime communication. While more than thirty tribal groups were eventually involved in World Wars I and II, this volume focuses on Native Americans in the American Expeditionary Forces during the First World War. Drawing on nearly thirty years of research-in U.S. military and Native American archives, surviving accounts from code talkers and their commanding officers, family records, newspaper accounts, and fieldwork in descendant communities-the author explores the origins, use, and legacy of the code talkers. In the process, he highlights such noted decorated veterans as Otis Leader, Joseph Oklahombi, and Calvin Atchavit and scrutinizes numerous misconceptions and popular myths about code talking and the secrecy surrounding the practice. With appendixes that include a timeline of pertinent events, biographies of known code talkers, and related World War I data, this book is the first comprehensive work ever published on Native American code talkers in the Great War and their critical place in American military history.
Discover the brand new instalment in Lizzie Lane's bestselling Tobacco Girls series! War is fleeting, but true love last forever...May 1944 Hope and excitement is in the air when news breaks of the allied forces landing in Normandy. D Day has arrived. However, the day-to-day struggles for the Tobacco Girls continue. Carole Thomas wants her old life back. She is burdened with the guilt of being a young single mother and considers having baby Paula adopted, but Maisie Miles will do anything to stop her. Phyllis Mason having found the love of her life is getting married in Malta to Mick Fairbrother, but will the dangerous legacies of war plague her happy day? Bridget O'Neill finds herself posted to one of the hospitals receiving the injured from the D-Day landing beaches. Her most fervent hope is that her husband, Lyndon, does not become one of them. Peace is on the horizon, but will their wishes and dreams win through and bring them a happy ever after? Praise for Lizzie Lane: 'A gripping saga and a storyline that will keep you hooked' Rosie Goodwin 'The Tobacco Girls is another heartwarming tale of love and friendship and a must-read for all saga fans.' Jean Fullerton 'Lizzie Lane opens the door to a past of factory girls, redolent with life-affirming friendship, drama, and choices that are as relevant today as they were then.' Catrin Collier 'If you want an exciting, authentic historical saga then look no further than Lizzie Lane.' Fenella J Miller
All democracies have had to contend with the challenge of tolerating hidden spy services within otherwise relatively transparent governments. Democracies pride themselves on privacy and liberty, but intelligence organizations have secret budgets, gather information surreptitiously around the world, and plan covert action against foreign regimes. Sometimes, they have even targeted the very citizens they were established to protect, as with the COINTELPRO operations in the 1960s and 1970s, carried out by the Federal Bureau of Investigation (FBI) against civil rights and antiwar activists. In this sense, democracy and intelligence have always been a poor match. Yet Americans live in an uncertain and threatening world filled with nuclear warheads, chemical and biological weapons, and terrorists intent on destruction. Without an intelligence apparatus scanning the globe to alert the United States to these threats, the planet would be an even more perilous place. In Spy Watching, Loch K. Johnson explores the United States' travails in its efforts to maintain effective accountability over its spy services. Johnson explores the work of the famous Church Committee, a Senate panel that investigated America's espionage organizations in 1975 and established new protocol for supervising the Central Intelligence Agency (CIA) and the nation's other sixteen secret services. Johnson explores why partisanship has crept into once-neutral intelligence operations, the effect of the 9/11 attacks on the expansion of spying, and the controversies related to CIA rendition and torture programs. He also discusses both the Edward Snowden case and the ongoing investigations into the Russian hack of the 2016 US election. Above all, Spy Watching seeks to find a sensible balance between the twin imperatives in a democracy of liberty and security. Johnson draws on scores of interviews with Directors of Central Intelligence and others in America's secret agencies, making this a uniquely authoritative account.
As of early 2010, more than two million U.S. troops have served in Iraq and Afghanistan. Yet the American public is neither much engaged in the issues of these two wars nor particularly knowledgeable about the troops experiences, which have ranged from positive and energizing to searing and debilitating. Based on scores of interview--some culled from the Library of Congress Veterans History Project and others conducted by the author himself--"Through Veterans Eyes" presents a composite narrative of the experiences of U.S. service personnel in Iraq and Afghanistan. Minear quotes more than 175 veterans by name and includes a dozen of their own photos from the conflict theaters. Thematic chapters cover duty and service, politics, cultural and ethical challenges, relationships to local populations, and reentry into American society. Neither pro-war nor anti-war, Minear s approach encourages veterans to express their views on issues critical to the nation. What has motivated U.S. military personnel to enlist? What specific challenges have they faced in Iraq and Afghanistan? What have been the impacts of deployment on their families and communities? Is their experience changing their views of their country and the world? What lessons may be learned from their stories? Veterans candid responses to these and other probing questions deserve pondering.
In 2013, Edward Snowden revealed that the NSA and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of security . In this compelling account, surveillance expert David Lyon guides the reader through Snowden s ongoing disclosures: the technological shifts involved, the steady rise of invisible monitoring of innocent citizens, the collusion of government agencies and for-profit companies and the implications for how we conceive of privacy in a democratic society infused by the lure of big data. Lyon discusses the distinct global reactions to Snowden and shows why some basic issues must be faced: how we frame surveillance, and the place of the human in a digital world. Surveillance after Snowden is crucial reading for anyone interested in politics, technology and society.
Reginald Jones was nothing less than a genius. And his appointment to the Intelligence Section of Britain's Air Ministry in 1939 led to some of the most astonishing scientific and technological breakthroughs of the Second World War. In Most Secret War he details how Britain stealthily stole the war from under the Germans' noses by outsmarting their intelligence at every turn. He tells of the 'battle of the beams'; detecting and defeating flying bombs; using chaff to confuse radar; and many other ingenious ideas and devices. Jones was the man with the plan to save Britain and his story makes for riveting reading.
While much has been disclosed about the CIA's cloak-and-dagger activities during the Cold War, relatively little is known about the origins of this secret organization. David Rudgers, a twenty-two-year CIA veteran, has written the first complete account of its creation, revealing how the idea of a centralized intelligence developed within the government and debunking the myth that former OSS chief William J. Donovan was the prime mover behind the agency's founding. "Creating the Secret State" locates the CIA's origins in government-wide efforts to reorganize national security during the transition from World War II to the Cold War. Rudgers maintains that the creation of the CIA was not merely the brainchild of "Wild Bill" Donovan. Rather, it was the culmination of years of negotiation among numerous policy makers such as James Forrestal and Dean Acheson, each with strong opinions regarding the agency's mission and methods. He shows that Congress, the Departments of State and Justice, the Joint Chiefs, and even the Budget Bureau all had a hand in the establishment of this "secret state" that operates nearly invisibly outside the American political process. Based almost entirely on archival and other primary sources, Rudgers's book describes in detail how the CIA evolved from its original purpose-as a watchdog to guard against a "nuclear Pearl Harbor"-to the role of clandestine warriors countering Soviet subversion, eventually engaging in more forms of intelligence gathering and covert operations than any of its counterparts. It suggests how the agency became a different organization than it might have been without the Communist threat and also shows how it both overexaggerated the dangers of the Cold War and failed to predict its ending. Rudgers has written an accurate and balanced account that brings America's undercover army in from the cold and out from under the cult of personality. An indispensable resource for future studies of the CIA, Creating the Secret State tells the inside story of why and how the agency was called into existence as it stimulates thinking about the future relevance of the CIA in a rapidly changing world.
Vienna, located at the heart of Europe was the city of choice for American, British, German and Russian spymasters in their merciless trade, to plot against one another and steal secrets. For the first time a book is dedicated to the secret stories of spymasters, their tradecraft and secret sources from the end of the World War I, the Interwar with the rise of Nazis to the Second World War and the Cold War. The rich of culture and music Vienna hid a labyrinth of spies and dissidents in the interwar period, and a powerful Gestapo presence during the war meant that the Office of Strategic Services and British intelligence could not deploy operatives in Austria in general. In post war, a few young American and British intelligence officers pitted their wits against hundreds of seasoned Russian operatives of the NKVD and their thousands of informers. and the secret truth was that both Russian and Allied intelligence services employed members of the Nazi intelligence services just upon the defeat of Germany in 1945 and the occupation of Austria.
The emergence of COVID-19 has raised urgent and important questions about the role of Canadian intelligence and national security within a global health crisis. Some argue that the effects of COVID-19 on Canada represent an intelligence failure, or a failure of early warning. Others argue that the role of intelligence and national security in matters of health is-and should-remain limited. At the same time, traditional security threats have rapidly evolved, themselves impacted and influenced by the global pandemic.Stress Tested brings together leading experts to examine the role of Canada's national security and intelligence community in anticipating, responding to, and managing a global public welfare emergency. This interdisciplinary collection offers a clear-eyed view of successes, failures, and lessons learned in Canada's pandemic response. Addressing topics including supply chain disruptions, infrastructure security, the ethics of surveillance within the context of pandemic response, the threats and potential threats of digital misinformation and fringe beliefs, and the challenges of maintaining security and intelligence operations during an ongoing pandemic, Stress Tested is essential reading for anyone interested in the lasting impacts of the COVID-19 pandemic.
An Intelligence Studies Anthology: Foundational Concepts and Case Studies for the 21st Century is designed to provide undergraduate students with an introduction to the U.S. government's collection and use of intelligence. Through a carefully curated selection of readings, students gain an understanding of the history of the intelligence process and the agencies involved in it. They also learn about the intelligence cycle, types of intelligence products, best practices for writing and briefing intelligence, covert operations, counterintelligence, technical tools and legal concepts, and the ways in which law enforcement collects and uses intelligence. The anthology provides students with a novel collection of information discussing the ways the intelligence process can be used to stop health crises, including pandemics, and includes the editor's original article discussing the creation of a new department in the U.S. government devoted to fighting future pandemics. Illuminating and insightful, An Intelligence Studies Anthology is an exemplary resource for introductory courses in intelligence, criminal justice, criminology, government, and health/public health.
|
You may like...
Secrets in a Dead Fish - The Spying Game…
Melanie King
Hardcover
(1)
|