![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
In a rapidly changing environment, Intelligence Surveillance developed through different types of technologies, software, strategies and drones operations in Europe and the United Kingdom. There are various forms of surveillance mechanisms, including Human Agents, Computer Programs, and Global Positioning Satellite Devices. These surveillance devices are now even encroaching into the personal domain of the individuals without the knowledge of the individual being watched. In a surveillance state, people live in consternation, fear, and struggling to protect their privacy, family life, business secrets, and data. In a short period of time, it has amassed a rather sordid history of citizen surveillance- and it continues to be unlawful. These are some of the issues discussed in the book which has varied articles from the experts on the subject.
The imbalance of Pakistan's civil-military relations has caused misperceptions about the changing role of intelligence in politics. The country maintains 32 secret agencies working under different democratic, political and military stakeholders who use them for their own interests. Established in 1948, The ISI was tasked with acquiring intelligence of strategic interests and assessing the intensity of foreign threats, but political and military stakeholders used the agency adversely and painted a consternating picture of its working environment. The civilian intelligence agency-Intelligence Bureau (IB) has been gradually neglected due to the consecutive military rule and weak democratic governments. The ISI today seems the most powerful agency and controls the policy decisions. The working of various intelligence agencies, militarisation of intelligence and ineffectiveness of the civilian intelligence are some of the issues discussed in the book.
No external observer knows more about Myanmar's security and intelligence apparatus than Andrew Selth. In this book he presents an account of the structure and functions of Myanmar's deep state, along with a tale of personal ambition, rivalry and ruthless power politics worthy of John Le Carre. A thoroughly educative, entertaining and intriguing read."" - Professor Michael Wesley, Dean, College of Asia and the Pacific, The Australian National University ""Andrew Selth has once again amply illustrated the depth and penetration of his study of Myanmar/Burma and its institutions. This work on the more recent aspects of the country's intelligence apparatus goes beyond a masterful and comprehensive analysis of the Burmese intelligence community, and probes the social and institutional bases of the attitudes giving rise to that critical aspect of power. We are once again in Dr Selth's debt. This is required reading for serious observers of the Burmese scene."" - David I. Steinberg, Distinguished Professor of Asian Studies Emeritus, Georgetown University ""By lifting the lid on a pervasive yet secretive intelligence apparatus, Andrew Selth makes an outstanding contribution to Myanmar Studies. For scholars and practitioners alike, this book provides an essential history of a security state that remains powerful even during the transition away from overt authoritarian rule."" - Professor Ian Holliday, Vice-President (Teaching and Learning), The University of Hong Kong
Intelligence Operations: Understanding Data, Tools, People, and Processes helps readers understand the various issues and considerations an intelligence professional must tackle when reviewing, planning, and managing intelligence operations, regardless of level or environment. The book opens by introducing the reader to the many defining concepts associated with intelligence, as well as the main subject of intelligence: the threat. Additional chapters examine the community of intelligence, revealing where intelligence is actually practiced, as well as what defines and characterizes intelligence operations. Readers learn about the four critical components to every intelligence operation-data, tools, people, and processes-and then explore the various operational and analytic processes involved in greater detail. Throughout, the text encourages discovery and discussion, urging readers to first understand the material, then break it down, adapt it, and apply it in a way that supports their particular operations or requirements. Unique in approach and designed to assist professionals at all levels, Intelligence Operations is an excellent resource for both academic courses in the subject and practical application by intelligence personnel.
Globalisation continues to challenge our world at unprecedented speed. Technological innovations, changing geographical developments, regional rivalries, and destruction of national critical infrastructures in several Muslim states due to the US so-called war on terrorism-all transformed the structures and hierarchies of societies. The idea of the development of a nation that sounds on tripods that are food, shelter, and security failed. The Edward Snowden leaks challenged policymakers and the public understanding and perspectives on the role of security intelligence in liberal democratic states. The persisting imbalance of power in the United States, its institutional turmoil, and intelligence war, and the noticeably tilting power have made the country feel vulnerable and prodded it into military ventures. The calibration of Western allies around Whitehouse as the sole center of globalization has only brought instability, destruction, and loss of human lives.
The inside story of one of the most famous of all the 'back rooms' of the Second World War - and of the men and women who worked for it. Conceived by Winston Churchill to circumvent the delays, frustrations and inefficiencies of the service ministries, Department M.D.1. earned from its detractors the soubriquet 'Winston Churchill's Toyshop', yet from a tiny underground workshop housed in the cellars of the London offices of Radio Normandie in Portland Place, and subsequently from the 'stockbroker Tudor' of a millionaire's country mansion in Buckinghamshire, came an astonishing array of secret weapons ranging from the 'sticky bomb' and 'limpet mine' to giant bridge-carrying assault tanks, as well as the PIAT, a tank-destroying, hand-held mortar. Written by Colonel Stuart Macrae, who helped found M.D.1. and was its second-in-command throughout its life, the story is told of this relatively unknown establishment and the weapons it developed which helped destroy innumerable enemy tanks, aircraft and ships.
Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.
Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.
An ancient esoteric object, once used by Elizabethan Magician John Dee in his infamous occult rituals, attracts a deadly interest from the clandestine world of outsourced military operations and leads Antiquarian and former Scottish Military hero, Tavish Stewart, to uncover a global conspiracy to control world leaders and enslave the whole of humanity. Stewart's discovery leads him, and his friends, into a race across the globe to locate ancient maps, mysterious lost cities, magical relics and a forgotten civilisation so ancient and advanced that it would rewrite human history. Stewart must use all his Military and Martial Arts expertise to overcome the elite warriors, weapons and technologies that are set against him before a final apocalyptic confrontation in the desolate wastes of Asia, to preserve the greatest secret of all time!
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
The highly eccentric Alfred Dillwyn Knox, known simply as 'Dilly', was one of the leading figures in the British codebreaking successes of the two world wars. During the first, he was the chief codebreaker in the Admiralty, breaking the German Navy's main flag code, before going on to crack the German Enigma ciphers during the Second World War at Bletchley Park.Here, he enjoyed the triumphant culmination of his life's work: a reconstruction of the Enigma machine used by the Abwehr, the German Secret Service. This kept the British fully aware of what the German commanders knew about Allied plans, allowing MI5 and MI6 to use captured German spies to feed false information back to the Nazi spymasters.Mavis Batey was one of 'Dilly's girls', the young female codebreakers who helped him to break the various Enigma ciphers. She was called upon to advise Kate Winslet, star of the film Enigma, on what it was like to be one of the few female codebreakers at Bletchley Park. This gripping new edition of Batey's critically acclaimed book reveals the vital part Dilly played in the deception operation that ensured the success of the D-Day landings, altering the course of the Second World War.
'This is what an SAS career is really like' AUSTRALIAN DEFENCE MAGAZINE Elite SAS Patrol Commander Stuart 'Nev' Bonner takes us inside the extraordinary and dangerous world of secret combat operations in this explosive, behind-the-scenes look at life inside the SAS. A world where capture means torture or death, and every move is trained for with precision detail to bring elite soldiers to the very peak of fighting ability. In a career spanning twenty years, fourteen of them in the SAS, Bonner shares with us the inside story of being out in front - and often behind enemy lines. From patrolling the mountains of East Timor to covert operations in Bougainville and the Solomon Islands, from sweeping into the Iraqi desert ahead of invading US forces to cripple Saddam Hussein's communications to patrolling in war-torn Baghdad and being in the middle of the disastrous Operation Anaconda in Afghanistan - this is a no-holds-barred account of what it's like to live, eat and breathe SAS. Now part of the HACHETTE MILITARY COLLECTION.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analyzed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Applicants to the Central Intelligence Agency often asked Edward Mickolus what they might expect in a career there. Mickolus, who was a CIA intelligence officer, whose duties also included recruiting and public affairs, never had a simple answer. If applicants were considering a life in the National Clandestine Service, the answer was easy. Numerous memoirs show the lives of operations officers collecting secret intelligence overseas, conducting counterintelligence investigations, and running covert action programs. But the CIA isn't only about case officers in far-flung areas of the world, recruiting spies to steal secrets. For an applicant considering a career as an analyst, a support officer, a scientist, or even a secretary, few sources provide reliable insight into what a more typical career at the CIA might look like. This collection of the exploits and insights of twenty-nine everyday agency employees is Mickolus's answer. From individuals who have served at the highest levels of the agency to young officers just beginning their careers, Stories from Langley reveals the breadth of career opportunities available at the CIA and offers advice from agency officers themselves. "Stories from Langley provides an invaluable behind-the-scenes look at professional life inside the CIA. While many have written about great operational exploits, few have focused on the daily lives and challenges of analysts, support officers, and engineers, members of the organization whose work is as essential if not as glamorous in the public eye. Young men and women wondering about what to expect in these varied CIA careers will find the book fascinating, revealing, and perhaps even enticing."-George Tenet, former director of Central Intelligence for the CIA "One of the most difficult aspects of intelligence is trying to convey to outsiders what that life-especially as an analyst-is really like. Most fiction is overblown and inevitably focuses on operations and spying. Stories from Langley is a delightful foray into the actual experiences of a broad range of intelligence officers and fills an important gap in our intelligence literature. Anyone interested in the nuts and bolts of an intelligence career will find this a useful and worthwhile read."-Mark Lowenthal, former assistant director of Central Intelligence for Analysis& Production for the CIA and author of Intelligence: From Secrets to Policy
Strategy in the Missile Age first reviews the development of modern military strategy to World War II, giving the reader a reference point for the radical rethinking that follows, as Dr. Brodie considers the problems of the Strategic Air Command, of civil defense, of limited war, of counterforce or pre-emptive strategies, of city-busting, of missile bases in Europe, and so on. The book, unlike so many on modern military affairs, does not present a program or defend a policy, nor is it a brief for any one of the armed services. It is a balanced analysis of the requirements of strength for the 1960's, including especially the military posture necessary to prevent war. A unique feature is the discussion of the problem of the cost of preparedness in relation to the requirements of the national economy, so often neglected by other military thinkers. Originally published in 1959. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
The book is relevant to all those who wish to know why and how terrorism shifted from West Asia to South and Southeast Asia and Africa. This significant shift needs to be studied in depth for policy formulation and future strategy. The book will reveal that the so called Islamic Terrorism is traceable to Pakistan from concept to reality. Pakistan as a state has provided the platform for outward and inward march of Jihadis. For this to happen, the ISI has been playing the principal role. Thus, the focus in this book is on ISI as an instrument of spreading jihadi culture in Pakistan and elsewhere.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analysed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Over Iran an RAF Canberra flies a feint towards the Soviet border, to provoke Soviet air defence radar operators to reveal their location. He will not deliberately enter Soviet airspace, but the possibilities for miscalculation, or misunderstanding leading to tragedy are always there. These flights cost the lives of over 150 US airmen by the end of the Cold War. Also cruising nearby in Iranian airspace, is a heavily modified US Air Force C-130 transport aircraft. Onboard 10 Special Equipment Operators are listening through their headphones for Soviet radio and radar activity. Hearing Soviet ground controllers scramble fighters to intercept the Canberra. The US operators alert the British aircraft to the closing MiG's and it quickly alters course away from the border. This was the life of crews involved in Cold War intelligence collection flights. Enormous resources were committed to these operations and they shaped the structure of much modern military intelligence collection, analysis and sharing. This book explores their scope, conduct, plus the politics and new technologies behind these operations that started in the dying embers of World War Two. It examines how these often complex missions were planned, coordinated and flown and is supported by first-hand accounts from pilots, aircrews and intelligence analysts. It utilises recently declassified British and US archive material and is illustrated with a wide range of images. The author examines European and Far East operations and a number of topics not previously covered in depth elsewhere. These include authorisation and coordination arrangements for conduct of overflight and peripheral missions; plus the part played by key third party states in operations in Scandinavia, Turkey and others. He looks at why Tyuratam complex was of such major intelligence interest and details the many resources targeted against it. He looks at some of the less explored elements of U-2 operations, including British involvement, plus the development of powerful lenses intended to enable very long range peripheral photography and why the long mythologised `Kapustin Yar' overflight probably never took place with new details and analysis. This comprehensive book links together the realities of flying, advanced technology and politics to provide a detailed and illustrated examination of Cold War aerial intelligence collection.
Recent disclosures concerning the size and scope of the National Security Agency's (NSA's) surveillance activities both in the United States and abroad have prompted a flurry of congressional activity aimed at reforming the foreign intelligence gathering process. While some measures would overhaul the substantive legal rules of the USA PATRIOT Act or other provisions of the Foreign Intelligence Surveillance Act (FISA), there are a host of bills designed to make procedural and operational changes to the Foreign Intelligence Surveillance Court (FISC), a specialised Article III court that hears applications and grants orders approving of certain foreign intelligence gathering activities, and the Foreign Intelligence Surveillance Court of Review, a court that reviews rulings of the FISC. This book will explore a selection of these proposals and address potential legal questions such proposals may raise. |
You may like...
Sasol Voëls van Suider-Afrika (Met…
Ian Sinclair, Phil Hockey
Paperback
(2)
Seabird Islands - Ecology, Invasion, and…
Christa P H Mulder, Wendy B Anderson, …
Hardcover
R2,830
Discovery Miles 28 300
Manipulation of the Avian Genome
Ann M. Gibbins, Robert J. Etches
Hardcover
R8,747
Discovery Miles 87 470
Birds Of Southern Africa - The Complete…
Burger Cillie, Niel Cillie, …
Paperback
(13)
The History of British Birds
Derek Yalden, Umberto Albarella
Hardcover
R1,787
Discovery Miles 17 870
Australian Bird Guide - Concise Edition
Jeff Davies, Peter Menkhorst, …
Paperback
R624
Discovery Miles 6 240
|