|
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The emergence of COVID-19 has raised urgent and important questions
about the role of Canadian intelligence and national security
within a global health crisis. Some argue that the effects of
COVID-19 on Canada represent an intelligence failure, or a failure
of early warning. Others argue that the role of intelligence and
national security in matters of health is-and should-remain
limited. At the same time, traditional security threats have
rapidly evolved, themselves impacted and influenced by the global
pandemic.Stress Tested brings together leading experts to examine
the role of Canada's national security and intelligence community
in anticipating, responding to, and managing a global public
welfare emergency. This interdisciplinary collection offers a
clear-eyed view of successes, failures, and lessons learned in
Canada's pandemic response. Addressing topics including supply
chain disruptions, infrastructure security, the ethics of
surveillance within the context of pandemic response, the threats
and potential threats of digital misinformation and fringe beliefs,
and the challenges of maintaining security and intelligence
operations during an ongoing pandemic, Stress Tested is essential
reading for anyone interested in the lasting impacts of the
COVID-19 pandemic.
An Intelligence Studies Anthology: Foundational Concepts and Case
Studies for the 21st Century is designed to provide undergraduate
students with an introduction to the U.S. government's collection
and use of intelligence. Through a carefully curated selection of
readings, students gain an understanding of the history of the
intelligence process and the agencies involved in it. They also
learn about the intelligence cycle, types of intelligence products,
best practices for writing and briefing intelligence, covert
operations, counterintelligence, technical tools and legal
concepts, and the ways in which law enforcement collects and uses
intelligence. The anthology provides students with a novel
collection of information discussing the ways the intelligence
process can be used to stop health crises, including pandemics, and
includes the editor's original article discussing the creation of a
new department in the U.S. government devoted to fighting future
pandemics. Illuminating and insightful, An Intelligence Studies
Anthology is an exemplary resource for introductory courses in
intelligence, criminal justice, criminology, government, and
health/public health.
"Bruce Pease has written a much needed book on a long ignored
topic: how does one lead analysts? Most analysis is at some level a
group activity, whether in government or the private sector. Much
has been written about good versus bad analysis and how to train
analysts, but Pease, himself a veteran senior CIA analyst and
manager, focuses on what the leaders of these analysts need to know
and should be thinking about. Leadership matters in analysis as in
all other endeavors, and Pease offers invaluable guidance on how to
lead effectively. This book is a must for anyone in a leadership
role in an analytic enterprise." -Mark M. Lowenthal, PhD,
Intelligence & Security Academy, LLC Written by an experienced
professional who has led Navy Intelligence and CIA analysts in
high-stakes situations, Leading Intelligence Analysis introduces
the fundamental managerial skills and practical tools needed to
lead analysis projects conducted by individuals and teams. Author
Bruce Pease provides insights into key questions such as What kind
of environment draws out a team's best work? What brings out their
creativity? When does pressure bring out their best insights? When
does pressure sap their intellectual energy? and What kind of team
builds new knowledge rather than engaging in group-think? This book
draws on the author's perspective from decades of leading
intelligence analysts on critical issues, including war in the
Middle East, terrorism after 9/11, and nuclear threats. Key
Features Practical advice helps leaders of analytic units nurture
insight with the understanding that it can be enabled but not
manufactured. Discussion of a range of different types of analysis
serves leaders conducting research in areas including data
analysis, security analysis, geopolitical analysis, threat warning,
counterterrorism, and business climate analysis. Practical advice
on judging IT tools guides leaders to the correct data science
approach for various situations.
Vienna, located at the heart of Europe was the city of choice for
American, British, German and Russian spymasters in their merciless
trade, to plot against one another and steal secrets. For the first
time a book is dedicated to the secret stories of spymasters, their
tradecraft and secret sources from the end of the World War I, the
Interwar with the rise of Nazis to the Second World War and the
Cold War. The rich of culture and music Vienna hid a labyrinth of
spies and dissidents in the interwar period, and a powerful Gestapo
presence during the war meant that the Office of Strategic Services
and British intelligence could not deploy operatives in Austria in
general. In post war, a few young American and British intelligence
officers pitted their wits against hundreds of seasoned Russian
operatives of the NKVD and their thousands of informers. and the
secret truth was that both Russian and Allied intelligence services
employed members of the Nazi intelligence services just upon the
defeat of Germany in 1945 and the occupation of Austria.
The General Staff Division of Fremde Heere Ost (Military
Intelligence Service, Eastern Section) which from 1942 was led by
Reinhard Gehlen, was the nerve-centre of Hitler's military
reconnaissance on the Eastern Front. This department worked
professionally and was operationally and tactically reliable.
However, at a strategic level there were clear deficits: the
industrial capacity of the Soviet arms industry, the
politico-military intentions and the details of the Red Army's
plans for their offensive remained for the most part hidden from
the department. When the Second World War ended, Gehlen put the
documents and personnel of Fremde Heere Ost at the disposal of the
Americans. With their support he was able to build a new foreign
secret service which later evolved into the Federal Intelligence
Service. In this book, military historian Magnus Pahl presents a
complete overview of the structure, personnel and working methods
of Fremde Heere Ost based on a tremendous array of archival
sources. This work includes an extensive case study of the East
Pomeranian Operation 1945. Pahl's study is a significant
contribution to our understanding of German strategic, operational
and tactical thinking on the Eastern Front 1941-45.
In a rapidly changing environment, Intelligence Surveillance
developed through different types of technologies, software,
strategies and drones operations in Europe and the United Kingdom.
There are various forms of surveillance mechanisms, including Human
Agents, Computer Programs, and Global Positioning Satellite
Devices. These surveillance devices are now even encroaching into
the personal domain of the individuals without the knowledge of the
individual being watched. In a surveillance state, people live in
consternation, fear, and struggling to protect their privacy,
family life, business secrets, and data. In a short period of time,
it has amassed a rather sordid history of citizen surveillance- and
it continues to be unlawful. These are some of the issues discussed
in the book which has varied articles from the experts on the
subject.
The imbalance of Pakistan's civil-military relations has caused
misperceptions about the changing role of intelligence in politics.
The country maintains 32 secret agencies working under different
democratic, political and military stakeholders who use them for
their own interests. Established in 1948, The ISI was tasked with
acquiring intelligence of strategic interests and assessing the
intensity of foreign threats, but political and military
stakeholders used the agency adversely and painted a consternating
picture of its working environment. The civilian intelligence
agency-Intelligence Bureau (IB) has been gradually neglected due to
the consecutive military rule and weak democratic governments. The
ISI today seems the most powerful agency and controls the policy
decisions. The working of various intelligence agencies, the
militarisation of intelligence, and ineffectiveness of the civilian
intelligence are some of the issues discussed in the book.
The imbalance of Pakistan's civil-military relations has caused
misperceptions about the changing role of intelligence in politics.
The country maintains 32 secret agencies working under different
democratic, political and military stakeholders who use them for
their own interests. Established in 1948, The ISI was tasked with
acquiring intelligence of strategic interests and assessing the
intensity of foreign threats, but political and military
stakeholders used the agency adversely and painted a consternating
picture of its working environment. The civilian intelligence
agency-Intelligence Bureau (IB) has been gradually neglected due to
the consecutive military rule and weak democratic governments. The
ISI today seems the most powerful agency and controls the policy
decisions. The working of various intelligence agencies,
militarisation of intelligence and ineffectiveness of the civilian
intelligence are some of the issues discussed in the book.
No external observer knows more about Myanmar's security and
intelligence apparatus than Andrew Selth. In this book he presents
an account of the structure and functions of Myanmar's deep state,
along with a tale of personal ambition, rivalry and ruthless power
politics worthy of John Le Carre. A thoroughly educative,
entertaining and intriguing read."" - Professor Michael Wesley,
Dean, College of Asia and the Pacific, The Australian National
University ""Andrew Selth has once again amply illustrated the
depth and penetration of his study of Myanmar/Burma and its
institutions. This work on the more recent aspects of the country's
intelligence apparatus goes beyond a masterful and comprehensive
analysis of the Burmese intelligence community, and probes the
social and institutional bases of the attitudes giving rise to that
critical aspect of power. We are once again in Dr Selth's debt.
This is required reading for serious observers of the Burmese
scene."" - David I. Steinberg, Distinguished Professor of Asian
Studies Emeritus, Georgetown University ""By lifting the lid on a
pervasive yet secretive intelligence apparatus, Andrew Selth makes
an outstanding contribution to Myanmar Studies. For scholars and
practitioners alike, this book provides an essential history of a
security state that remains powerful even during the transition
away from overt authoritarian rule."" - Professor Ian Holliday,
Vice-President (Teaching and Learning), The University of Hong Kong
Globalisation continues to challenge our world at unprecedented
speed. Technological innovations, changing geographical
developments, regional rivalries, and destruction of national
critical infrastructures in several Muslim states due to the US
so-called war on terrorism-all transformed the structures and
hierarchies of societies. The idea of the development of a nation
that sounds on tripods that are food, shelter, and security failed.
The Edward Snowden leaks challenged policymakers and the public
understanding and perspectives on the role of security intelligence
in liberal democratic states. The persisting imbalance of power in
the United States, its institutional turmoil, and intelligence war,
and the noticeably tilting power have made the country feel
vulnerable and prodded it into military ventures. The calibration
of Western allies around Whitehouse as the sole center of
globalization has only brought instability, destruction, and loss
of human lives.
Intelligence Operations: Understanding Data, Tools, People, and
Processes helps readers understand the various issues and
considerations an intelligence professional must tackle when
reviewing, planning, and managing intelligence operations,
regardless of level or environment. The book opens by introducing
the reader to the many defining concepts associated with
intelligence, as well as the main subject of intelligence: the
threat. Additional chapters examine the community of intelligence,
revealing where intelligence is actually practiced, as well as what
defines and characterizes intelligence operations. Readers learn
about the four critical components to every intelligence
operation-data, tools, people, and processes-and then explore the
various operational and analytic processes involved in greater
detail. Throughout, the text encourages discovery and discussion,
urging readers to first understand the material, then break it
down, adapt it, and apply it in a way that supports their
particular operations or requirements. Unique in approach and
designed to assist professionals at all levels, Intelligence
Operations is an excellent resource for both academic courses in
the subject and practical application by intelligence personnel.
Most discussions on electronic media and intellectual forums about
the effects of globalization on national security focus on violent
threats. Notwithstanding the plethora of books, journals and
research papers on national and international security, there is an
iota research work on issue of interconnectedness. The
interconnectedness of violent threats and their mounting effect
pose grave dangers to the aptitude of a state to professionally
secure its territorial integrity. Technological evolution and
aggrandized interlinkage of our world in general, and specifically
information technology, has affected people and society in
different ways. Daily life of every man and woman has become
influenced by these challenges. The twenty first century appeared
with different class of National Security threats. After the first
decade, world leaders, research scholars, journalists, politicians,
and security experts grasped that the world has become the most
dangerous place. The avoidance of war was the primary objective of
superpowers, but with the end of the Cold War, emergence of Takfiri
Jihadism, extremism, and terrorism prompted many unmatched
challenges. Home-grown extremism and radicalization continues to
expose a significant threat to the National Security of the EU and
Britain. The risks from state-based threats have both grown and
diversified. The unmethodical and impulsive use of a military-grade
nerve agent on British soil is the worse unlawful act of
bioterrorists.
An ancient esoteric object, once used by Elizabethan Magician John
Dee in his infamous occult rituals, attracts a deadly interest from
the clandestine world of outsourced military operations and leads
Antiquarian and former Scottish Military hero, Tavish Stewart, to
uncover a global conspiracy to control world leaders and enslave
the whole of humanity. Stewart's discovery leads him, and his
friends, into a race across the globe to locate ancient maps,
mysterious lost cities, magical relics and a forgotten civilisation
so ancient and advanced that it would rewrite human history.
Stewart must use all his Military and Martial Arts expertise to
overcome the elite warriors, weapons and technologies that are set
against him before a final apocalyptic confrontation in the
desolate wastes of Asia, to preserve the greatest secret of all
time!
The debate over cyber technology has resulted in new considerations
for national security operations. States find themselves in an
increasingly interconnected world with a diverse threat spectrum
and little understanding of how decisions are made within this
amorphous domain. With The Decision to Attack, Aaron Franklin
Brantly investigates how states decide to employ cyber in military
and intelligence operations against other states and how rational
those decisions are. In his examination, Brantly contextualizes
broader cyber decision-making processes into a systematic expected
utility-rational choice approach to provide a mathematical
understanding of the use of cyber weapons at the state level.
|
You may like...
Ghost Soldier
Mike Maden
Paperback
R395
R353
Discovery Miles 3 530
The Spy Coast
Tess Gerritsen
Paperback
R395
R353
Discovery Miles 3 530
Exorcism
Jeremy Forgel and the Sherrifs, Jeremy Forgel, …
CD
R489
Discovery Miles 4 890
|