|
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The imbalance of Pakistan's civil-military relations has caused
misperceptions about the changing role of intelligence in politics.
The country maintains 32 secret agencies working under different
democratic, political and military stakeholders who use them for
their own interests. Established in 1948, The ISI was tasked with
acquiring intelligence of strategic interests and assessing the
intensity of foreign threats, but political and military
stakeholders used the agency adversely and painted a consternating
picture of its working environment. The civilian intelligence
agency-Intelligence Bureau (IB) has been gradually neglected due to
the consecutive military rule and weak democratic governments. The
ISI today seems the most powerful agency and controls the policy
decisions. The working of various intelligence agencies,
militarisation of intelligence and ineffectiveness of the civilian
intelligence are some of the issues discussed in the book.
No external observer knows more about Myanmar's security and
intelligence apparatus than Andrew Selth. In this book he presents
an account of the structure and functions of Myanmar's deep state,
along with a tale of personal ambition, rivalry and ruthless power
politics worthy of John Le Carre. A thoroughly educative,
entertaining and intriguing read."" - Professor Michael Wesley,
Dean, College of Asia and the Pacific, The Australian National
University ""Andrew Selth has once again amply illustrated the
depth and penetration of his study of Myanmar/Burma and its
institutions. This work on the more recent aspects of the country's
intelligence apparatus goes beyond a masterful and comprehensive
analysis of the Burmese intelligence community, and probes the
social and institutional bases of the attitudes giving rise to that
critical aspect of power. We are once again in Dr Selth's debt.
This is required reading for serious observers of the Burmese
scene."" - David I. Steinberg, Distinguished Professor of Asian
Studies Emeritus, Georgetown University ""By lifting the lid on a
pervasive yet secretive intelligence apparatus, Andrew Selth makes
an outstanding contribution to Myanmar Studies. For scholars and
practitioners alike, this book provides an essential history of a
security state that remains powerful even during the transition
away from overt authoritarian rule."" - Professor Ian Holliday,
Vice-President (Teaching and Learning), The University of Hong Kong
Intelligence Operations: Understanding Data, Tools, People, and
Processes helps readers understand the various issues and
considerations an intelligence professional must tackle when
reviewing, planning, and managing intelligence operations,
regardless of level or environment. The book opens by introducing
the reader to the many defining concepts associated with
intelligence, as well as the main subject of intelligence: the
threat. Additional chapters examine the community of intelligence,
revealing where intelligence is actually practiced, as well as what
defines and characterizes intelligence operations. Readers learn
about the four critical components to every intelligence
operation-data, tools, people, and processes-and then explore the
various operational and analytic processes involved in greater
detail. Throughout, the text encourages discovery and discussion,
urging readers to first understand the material, then break it
down, adapt it, and apply it in a way that supports their
particular operations or requirements. Unique in approach and
designed to assist professionals at all levels, Intelligence
Operations is an excellent resource for both academic courses in
the subject and practical application by intelligence personnel.
Globalisation continues to challenge our world at unprecedented
speed. Technological innovations, changing geographical
developments, regional rivalries, and destruction of national
critical infrastructures in several Muslim states due to the US
so-called war on terrorism-all transformed the structures and
hierarchies of societies. The idea of the development of a nation
that sounds on tripods that are food, shelter, and security failed.
The Edward Snowden leaks challenged policymakers and the public
understanding and perspectives on the role of security intelligence
in liberal democratic states. The persisting imbalance of power in
the United States, its institutional turmoil, and intelligence war,
and the noticeably tilting power have made the country feel
vulnerable and prodded it into military ventures. The calibration
of Western allies around Whitehouse as the sole center of
globalization has only brought instability, destruction, and loss
of human lives.
The inside story of one of the most famous of all the 'back rooms'
of the Second World War - and of the men and women who worked for
it. Conceived by Winston Churchill to circumvent the delays,
frustrations and inefficiencies of the service ministries,
Department M.D.1. earned from its detractors the soubriquet
'Winston Churchill's Toyshop', yet from a tiny underground workshop
housed in the cellars of the London offices of Radio Normandie in
Portland Place, and subsequently from the 'stockbroker Tudor' of a
millionaire's country mansion in Buckinghamshire, came an
astonishing array of secret weapons ranging from the 'sticky bomb'
and 'limpet mine' to giant bridge-carrying assault tanks, as well
as the PIAT, a tank-destroying, hand-held mortar. Written by
Colonel Stuart Macrae, who helped found M.D.1. and was its
second-in-command throughout its life, the story is told of this
relatively unknown establishment and the weapons it developed which
helped destroy innumerable enemy tanks, aircraft and ships.
Most discussions on electronic media and intellectual forums about
the effects of globalization on national security focus on violent
threats. Notwithstanding the plethora of books, journals and
research papers on national and international security, there is an
iota research work on issue of interconnectedness. The
interconnectedness of violent threats and their mounting effect
pose grave dangers to the aptitude of a state to professionally
secure its territorial integrity. Technological evolution and
aggrandized interlinkage of our world in general, and specifically
information technology, has affected people and society in
different ways. Daily life of every man and woman has become
influenced by these challenges. The twenty first century appeared
with different class of National Security threats. After the first
decade, world leaders, research scholars, journalists, politicians,
and security experts grasped that the world has become the most
dangerous place. The avoidance of war was the primary objective of
superpowers, but with the end of the Cold War, emergence of Takfiri
Jihadism, extremism, and terrorism prompted many unmatched
challenges. Home-grown extremism and radicalization continues to
expose a significant threat to the National Security of the EU and
Britain. The risks from state-based threats have both grown and
diversified. The unmethodical and impulsive use of a military-grade
nerve agent on British soil is the worse unlawful act of
bioterrorists.
An ancient esoteric object, once used by Elizabethan Magician John
Dee in his infamous occult rituals, attracts a deadly interest from
the clandestine world of outsourced military operations and leads
Antiquarian and former Scottish Military hero, Tavish Stewart, to
uncover a global conspiracy to control world leaders and enslave
the whole of humanity. Stewart's discovery leads him, and his
friends, into a race across the globe to locate ancient maps,
mysterious lost cities, magical relics and a forgotten civilisation
so ancient and advanced that it would rewrite human history.
Stewart must use all his Military and Martial Arts expertise to
overcome the elite warriors, weapons and technologies that are set
against him before a final apocalyptic confrontation in the
desolate wastes of Asia, to preserve the greatest secret of all
time!
The debate over cyber technology has resulted in new considerations
for national security operations. States find themselves in an
increasingly interconnected world with a diverse threat spectrum
and little understanding of how decisions are made within this
amorphous domain. With The Decision to Attack, Aaron Franklin
Brantly investigates how states decide to employ cyber in military
and intelligence operations against other states and how rational
those decisions are. In his examination, Brantly contextualizes
broader cyber decision-making processes into a systematic expected
utility-rational choice approach to provide a mathematical
understanding of the use of cyber weapons at the state level.
Most discussions on electronic media and intellectual forums about
the effects of globalization on national security focus on violent
threats. Notwithstanding the plethora of books, journals and
research papers on national and international security, there is an
iota research work on issue of interconnectedness. The
interconnectedness of violent threats and their mounting effect
pose grave dangers to the aptitude of a state to professionally
secure its territorial integrity. Technological evolution and
aggrandized interlinkage of our world in general, and specifically
information technology, has affected people and society in
different ways. Daily life of every man and woman has become
influenced by these challenges. The twenty first century appeared
with different class of National Security threats. After the first
decade, world leaders, research scholars, journalists, politicians,
and security experts grasped that the world has become the most
dangerous place. The avoidance of war was the primary objective of
superpowers, but with the end of the Cold War, emergence of Takfiri
Jihadism, extremism, and terrorism prompted many unmatched
challenges. Home-grown extremism and radicalization continues to
expose a significant threat to the National Security of the EU and
Britain. The risks from state-based threats have both grown and
diversified. The unmethodical and impulsive use of a military-grade
nerve agent on British soil is the worse unlawful act of
bioterrorists.
The highly eccentric Alfred Dillwyn Knox, known simply as 'Dilly',
was one of the leading figures in the British codebreaking
successes of the two world wars. During the first, he was the chief
codebreaker in the Admiralty, breaking the German Navy's main flag
code, before going on to crack the German Enigma ciphers during the
Second World War at Bletchley Park.Here, he enjoyed the triumphant
culmination of his life's work: a reconstruction of the Enigma
machine used by the Abwehr, the German Secret Service. This kept
the British fully aware of what the German commanders knew about
Allied plans, allowing MI5 and MI6 to use captured German spies to
feed false information back to the Nazi spymasters.Mavis Batey was
one of 'Dilly's girls', the young female codebreakers who helped
him to break the various Enigma ciphers. She was called upon to
advise Kate Winslet, star of the film Enigma, on what it was like
to be one of the few female codebreakers at Bletchley Park. This
gripping new edition of Batey's critically acclaimed book reveals
the vital part Dilly played in the deception operation that ensured
the success of the D-Day landings, altering the course of the
Second World War.
This book covers a vast canvas historically as regards Indian
Intelligence, and gives an adequate insight into the functioning of
the important intelligence agencies of the world. The author has
analyzed the current functioning of Indian Intelligence agencies in
great detail, their drawbacks in the structure and coordination and
has come out with some useful suggestions.
Applicants to the Central Intelligence Agency often asked Edward
Mickolus what they might expect in a career there. Mickolus, who
was a CIA intelligence officer, whose duties also included
recruiting and public affairs, never had a simple answer. If
applicants were considering a life in the National Clandestine
Service, the answer was easy. Numerous memoirs show the lives of
operations officers collecting secret intelligence overseas,
conducting counterintelligence investigations, and running covert
action programs. But the CIA isn't only about case officers in
far-flung areas of the world, recruiting spies to steal secrets.
For an applicant considering a career as an analyst, a support
officer, a scientist, or even a secretary, few sources provide
reliable insight into what a more typical career at the CIA might
look like. This collection of the exploits and insights of
twenty-nine everyday agency employees is Mickolus's answer. From
individuals who have served at the highest levels of the agency to
young officers just beginning their careers, Stories from Langley
reveals the breadth of career opportunities available at the CIA
and offers advice from agency officers themselves. "Stories from
Langley provides an invaluable behind-the-scenes look at
professional life inside the CIA. While many have written about
great operational exploits, few have focused on the daily lives and
challenges of analysts, support officers, and engineers, members of
the organization whose work is as essential if not as glamorous in
the public eye. Young men and women wondering about what to expect
in these varied CIA careers will find the book fascinating,
revealing, and perhaps even enticing."-George Tenet, former
director of Central Intelligence for the CIA "One of the most
difficult aspects of intelligence is trying to convey to outsiders
what that life-especially as an analyst-is really like. Most
fiction is overblown and inevitably focuses on operations and
spying. Stories from Langley is a delightful foray into the actual
experiences of a broad range of intelligence officers and fills an
important gap in our intelligence literature. Anyone interested in
the nuts and bolts of an intelligence career will find this a
useful and worthwhile read."-Mark Lowenthal, former assistant
director of Central Intelligence for Analysis& Production for
the CIA and author of Intelligence: From Secrets to Policy
Strategy in the Missile Age first reviews the development of modern
military strategy to World War II, giving the reader a reference
point for the radical rethinking that follows, as Dr. Brodie
considers the problems of the Strategic Air Command, of civil
defense, of limited war, of counterforce or pre-emptive strategies,
of city-busting, of missile bases in Europe, and so on. The book,
unlike so many on modern military affairs, does not present a
program or defend a policy, nor is it a brief for any one of the
armed services. It is a balanced analysis of the requirements of
strength for the 1960's, including especially the military posture
necessary to prevent war. A unique feature is the discussion of the
problem of the cost of preparedness in relation to the requirements
of the national economy, so often neglected by other military
thinkers. Originally published in 1959. The Princeton Legacy
Library uses the latest print-on-demand technology to again make
available previously out-of-print books from the distinguished
backlist of Princeton University Press. These editions preserve the
original texts of these important books while presenting them in
durable paperback and hardcover editions. The goal of the Princeton
Legacy Library is to vastly increase access to the rich scholarly
heritage found in the thousands of books published by Princeton
University Press since its founding in 1905.
The book is relevant to all those who wish to know why and how
terrorism shifted from West Asia to South and Southeast Asia and
Africa. This significant shift needs to be studied in depth for
policy formulation and future strategy. The book will reveal that
the so called Islamic Terrorism is traceable to Pakistan from
concept to reality. Pakistan as a state has provided the platform
for outward and inward march of Jihadis. For this to happen, the
ISI has been playing the principal role. Thus, the focus in this
book is on ISI as an instrument of spreading jihadi culture in
Pakistan and elsewhere.
This book covers a vast canvas historically as regards Indian
Intelligence, and gives an adequate insight into the functioning of
the important intelligence agencies of the world. The author has
analysed the current functioning of Indian Intelligence agencies in
great detail, their drawbacks in the structure and coordination and
has come out with some useful suggestions.
Repeated intelligence failures in Iraq, Libya and across the Middle
East and North Africa have left many critics searching for a
smoking gun. Amidst questions of who misread - or manipulated - the
intel, a fundamental truth goes unaddressed: western intelligence
is not designed to understand the world. In fact, it cannot. In The
Covert Colour Line, Oliver Kearns shows how the catastrophic
mistakes made by British and US intelligence services since 9/11
are underpinned by orientalist worldviews and racist assumptions
forged in the crucible of Cold War-era colonial retreat.
Understanding this historical context is vital to explaining why
anglophone state intelligence is unable to grasp the motives and
international solidarities of 'adversaries'. Offering a new way of
seeing how intelligence contributes to world inequalities, and
drawing on a wealth of recently declassified materials, Kearns
argues that intelligence agencies’ imagination of 'non-Western'
states and geopolitics fundamentally shaped British intelligence
assessments which would underpin the 2003 invasion of Iraq and
subsequent interventions.
Over Iran an RAF Canberra flies a feint towards the Soviet border,
to provoke Soviet air defence radar operators to reveal their
location. He will not deliberately enter Soviet airspace, but the
possibilities for miscalculation, or misunderstanding leading to
tragedy are always there. These flights cost the lives of over 150
US airmen by the end of the Cold War. Also cruising nearby in
Iranian airspace, is a heavily modified US Air Force C-130
transport aircraft. Onboard 10 Special Equipment Operators are
listening through their headphones for Soviet radio and radar
activity. Hearing Soviet ground controllers scramble fighters to
intercept the Canberra. The US operators alert the British aircraft
to the closing MiG's and it quickly alters course away from the
border. This was the life of crews involved in Cold War
intelligence collection flights. Enormous resources were committed
to these operations and they shaped the structure of much modern
military intelligence collection, analysis and sharing. This book
explores their scope, conduct, plus the politics and new
technologies behind these operations that started in the dying
embers of World War Two. It examines how these often complex
missions were planned, coordinated and flown and is supported by
first-hand accounts from pilots, aircrews and intelligence
analysts. It utilises recently declassified British and US archive
material and is illustrated with a wide range of images. The author
examines European and Far East operations and a number of topics
not previously covered in depth elsewhere. These include
authorisation and coordination arrangements for conduct of
overflight and peripheral missions; plus the part played by key
third party states in operations in Scandinavia, Turkey and others.
He looks at why Tyuratam complex was of such major intelligence
interest and details the many resources targeted against it. He
looks at some of the less explored elements of U-2 operations,
including British involvement, plus the development of powerful
lenses intended to enable very long range peripheral photography
and why the long mythologised `Kapustin Yar' overflight probably
never took place with new details and analysis. This comprehensive
book links together the realities of flying, advanced technology
and politics to provide a detailed and illustrated examination of
Cold War aerial intelligence collection.
Recent disclosures concerning the size and scope of the National
Security Agency's (NSA's) surveillance activities both in the
United States and abroad have prompted a flurry of congressional
activity aimed at reforming the foreign intelligence gathering
process. While some measures would overhaul the substantive legal
rules of the USA PATRIOT Act or other provisions of the Foreign
Intelligence Surveillance Act (FISA), there are a host of bills
designed to make procedural and operational changes to the Foreign
Intelligence Surveillance Court (FISC), a specialised Article III
court that hears applications and grants orders approving of
certain foreign intelligence gathering activities, and the Foreign
Intelligence Surveillance Court of Review, a court that reviews
rulings of the FISC. This book will explore a selection of these
proposals and address potential legal questions such proposals may
raise.
A highly valuable resource for students of intelligence studies,
strategy and security, and foreign policy, this volume provides
readers with an accessible and comprehensive exploration of U.S.
espionage activities that addresses both the practical and ethical
implications that attend the art and science of spying. Essentials
of Strategic Intelligence investigates a subject unknown to or
misunderstood by most American citizens: how U.S. foreign and
security policy is derived from the information collection
operations and data analysis by the sixteen major U.S. intelligence
agencies. The essays in this work draw back the curtain on the
hidden side of America's government, explaining the roles of
various intelligence missions, justifying the existence of U.S.
intelligence agencies, and addressing the complex moral questions
that arise in the conduct of secret operations. After an
introductory overview, the book presents accessibly written essays
on the key topics: intelligence collection-and-analysis,
counterintelligence, covert action, and intelligence
accountability. Readers will understand how intelligence directly
informs policymakers and why democracies need secret agencies;
learn how the CIA has become deeply involved in the war-like
assassination operations that target suspected foreign terrorists,
even some individuals who are American citizens; and appreciate how
the existence of-and our reliance on-these intelligence agencies
poses challenges for democratic governance. Provides a
comprehensive, up-to-date examination of all aspects of
intelligence by experts in the field, from collection-and-analysis
and counterintelligence to covert action and accountability Probes
into how the United States' intelligence agencies attempt to
protect the nation from cyberattacks by foreign nations and
terrorist groups-and documents the successes and failures Documents
the involvement of the National Security Agency (NSA) in bulk
"metadata" collection of information on the telephone records and
social media communications of American citizens Examines the
effects that have resulted from major leaks in the U.S. government,
from Wikileaks to the NSA Snowden leaks
This book presents the final report of the review group on
intelligence and communications technologies. Recommendations are
provided that are designed to protect national security and
maintain intelligence capabilities while also respecting our
longstanding commitment to privacy, civil liberties, and the trust
of allies abroad, with due consideration of reducing the risk of
unauthorised disclosures.
Command, Control, Communications and Intelligence form the backbone
of the Army's operating system. But while much attention has been
given in the literature to the other three elements, Communications
in the British Army during World War II have been widely ignored.
This book rectifies the omission. It shows that failures in front
line communications contributed to several of the set backs
suffered by the Army but also that ultimate victory was only
achieved after a successful communications system was in place. It
explains how the outcome of the main campaigns in Europe and North
Africa depended on communications, how the system operated and how
it evolved from a relatively primitive and inadequately supplied
state at Dunkirk to a generally effective system at the time of the
Rhine crossings. Problems still occurred however, for example at
infantry platoon level and famously with paratrooper communications
at Arnhem, often simply due to the shortcomings of existing
technology. The book concludes that it is only very recently that
advances in technology have allowed those problems to be solved.
|
You may like...
Saul Kripke
Arif Ahmed
Hardcover
R4,618
Discovery Miles 46 180
Miss Behave
Malebo Sephodi
Paperback
(12)
R302
Discovery Miles 3 020
|