![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
This powerful study makes a compelling case about the key U.S. role in state terrorism in Latin America during the Cold War. Long hidden from public view, Operation Condor was a military network created in the 1970s to eliminate political opponents of Latin American regimes. Its key members were the anticommunist dictatorships of Chile, Argentina, Uruguay, Bolivia, Paraguay, and Brazil, later joined by Peru and Ecuador, with covert support from the U.S. government. Drawing on a wealth of testimonies, declassified files, and Latin American primary sources, J. Patrice McSherry examines Operation Condor from numerous vantage points: its secret structures, intelligence networks, covert operations against dissidents, political assassinations worldwide, commanders and operatives, links to the Pentagon and the CIA, and extension to Central America in the 1980s. The author convincingly shows how, using extralegal and terrorist methods, Operation Condor hunted down, seized, and executed political opponents across borders. McSherry argues that Condor functioned within, or parallel to, the structures of the larger inter-American military system led by the United States, and that declassified U.S. documents make clear that U.S. security officers saw Condor as a legitimate and useful 'counterterror' organization. Revealing new details of Condor operations and fresh evidence of links to the U.S. security establishment, this controversial work offers an original analysis of the use of secret, parallel armies in Western counterinsurgency strategies. It will be a clarion call to all readers to consider the long-term consequences of clandestine operations in the name of 'democracy.'
State sponsorship of terrorism is a complex and important topic in today's international affairs - and especially pertinent in the regional politics of the Middle East and South Asia, where Pakistan has long been a flashpoint of Islamist politics and terrorism. In Islamism and Intelligence in South Asia, Prem Mahadevan demonstrates how over several decades, radical Islamists, sometimes with the tacit support of parts of the military establishment, have weakened democratic governance in Pakistan and acquired progressively larger influence over policy-making. Mahadevan traces this history back to the anti-colonial Deobandi movement, which was born out of the post-partition political atmosphere and a rediscovery of the thinking of Ibn Taymiyyah, and partially ennobled the idea of `jihad' in South Asia as a righteous war against foreign oppression. Using Pakistani media and academic sources for the bulk of its raw data, and reinforcing this with scholarly analysis from Western commentators, the book tracks Pakistan's trajectory towards a `soft' Islamic revolution. Envisioned by the country's intelligence community as a solution to chronic governance failures, these narratives called for a re-orientation away from South Asia and towards the Middle East. In the process, Pakistan has become a sanctuary for Arab jihadist groups, such as Al-Qaeda, who had no previous ethnic or linguistic connection with South Asia. Most alarmingly, official discourse on terrorism has been partly silenced by the military-intelligence complex. The result is a slow drift towards extremism and possible legitimation of internationally proscribed terrorist organizations in Pakistan's electoral politics.
The intelligence community's flawed assessment of Iraq's weapons systems -- and the Bush administration's decision to go to war in part based on those assessments -- illustrates the political and policy challenges of combating the proliferation of weapons of mass destruction. In this comprehensive assessment, defense policy specialists Jason Ellis and Geoffrey Kiefer find disturbing trends in both the collection and analysis of intelligence and in its use in the development and implementation of security policy. Analyzing a broad range of recent case studies -- Pakistan's development of nuclear weapons, North Korea's defiance of U.N. watchdogs, Russia's transfer of nuclear and missile technology to Iran and China's to Pakistan, the Soviet biological warfare program, weapons inspections in Iraq, and others -- the authors find that intelligence collection and analysis relating to WMD proliferation are becoming more difficult, that policy toward rogue states and regional allies requires difficult tradeoffs, and that using military action to fight nuclear proliferation presents intractable operational challenges. Ellis and Kiefer reveal that decisions to use -- or overlook -- intelligence are often made for starkly political reasons. They document the Bush administration's policy shift from nonproliferation, which emphasizes diplomatic tools such as sanctions and demarches, to counterproliferation, which at times employs interventionist and preemptive actions. They conclude with cogent recommendations for intelligence services and policy makers.
Ben Morgan is back, and the stakes have never been higher.In Iraq, a surprise attack decimates the IS leadership. Revenge is sworn. A terrorist mastermind conceives a double-strike against America and Britain. Ten years later, cyberattacks hit both sides of the Atlantic. SAS soldiers are stricken by a silent chemical killer as London faces a devastating bombing attack. But the bigger and most dangerous threat is to Washington D.C., an attack that could cripple the West. In Washington, with the terrorist deadline looming, Ben Morgan puts the pieces together and finally glimpses the full extent of the plot. But stopping it will take everything he's got. And more. A scintillating technothriller from a bestselling author and a cybersecurity expert, Cyberstrike DC is perfect for fans of Tom Clancy and James Swallow.
All democracies have had to contend with the challenge of tolerating hidden spy services within otherwise relatively transparent governments. Democracies pride themselves on privacy and liberty, but intelligence organizations have secret budgets, gather information surreptitiously around the world, and plan covert action against foreign regimes. Sometimes, they have even targeted the very citizens they were established to protect, as with the COINTELPRO operations in the 1960s and 1970s, carried out by the Federal Bureau of Investigation (FBI) against civil rights and antiwar activists. In this sense, democracy and intelligence have always been a poor match. Yet Americans live in an uncertain and threatening world filled with nuclear warheads, chemical and biological weapons, and terrorists intent on destruction. Without an intelligence apparatus scanning the globe to alert the United States to these threats, the planet would be an even more perilous place. In Spy Watching, Loch K. Johnson explores the United States' travails in its efforts to maintain effective accountability over its spy services. Johnson explores the work of the famous Church Committee, a Senate panel that investigated America's espionage organizations in 1975 and established new protocol for supervising the Central Intelligence Agency (CIA) and the nation's other sixteen secret services. Johnson explores why partisanship has crept into once-neutral intelligence operations, the effect of the 9/11 attacks on the expansion of spying, and the controversies related to CIA rendition and torture programs. He also discusses both the Edward Snowden case and the ongoing investigations into the Russian hack of the 2016 US election. Above all, Spy Watching seeks to find a sensible balance between the twin imperatives in a democracy of liberty and security. Johnson draws on scores of interviews with Directors of Central Intelligence and others in America's secret agencies, making this a uniquely authoritative account.
While much has been disclosed about the CIA's cloak-and-dagger activities during the Cold War, relatively little is known about the origins of this secret organization. David Rudgers, a twenty-two-year CIA veteran, has written the first complete account of its creation, revealing how the idea of a centralized intelligence developed within the government and debunking the myth that former OSS chief William J. Donovan was the prime mover behind the agency's founding. "Creating the Secret State" locates the CIA's origins in government-wide efforts to reorganize national security during the transition from World War II to the Cold War. Rudgers maintains that the creation of the CIA was not merely the brainchild of "Wild Bill" Donovan. Rather, it was the culmination of years of negotiation among numerous policy makers such as James Forrestal and Dean Acheson, each with strong opinions regarding the agency's mission and methods. He shows that Congress, the Departments of State and Justice, the Joint Chiefs, and even the Budget Bureau all had a hand in the establishment of this "secret state" that operates nearly invisibly outside the American political process. Based almost entirely on archival and other primary sources, Rudgers's book describes in detail how the CIA evolved from its original purpose-as a watchdog to guard against a "nuclear Pearl Harbor"-to the role of clandestine warriors countering Soviet subversion, eventually engaging in more forms of intelligence gathering and covert operations than any of its counterparts. It suggests how the agency became a different organization than it might have been without the Communist threat and also shows how it both overexaggerated the dangers of the Cold War and failed to predict its ending. Rudgers has written an accurate and balanced account that brings America's undercover army in from the cold and out from under the cult of personality. An indispensable resource for future studies of the CIA, Creating the Secret State tells the inside story of why and how the agency was called into existence as it stimulates thinking about the future relevance of the CIA in a rapidly changing world.
In 2013, Edward Snowden revealed that the NSA and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of security . In this compelling account, surveillance expert David Lyon guides the reader through Snowden s ongoing disclosures: the technological shifts involved, the steady rise of invisible monitoring of innocent citizens, the collusion of government agencies and for-profit companies and the implications for how we conceive of privacy in a democratic society infused by the lure of big data. Lyon discusses the distinct global reactions to Snowden and shows why some basic issues must be faced: how we frame surveillance, and the place of the human in a digital world. Surveillance after Snowden is crucial reading for anyone interested in politics, technology and society.
This is the last untold story of Bletchley Park. Using recently declassified information, Paul Gannon has written a gripping account of the invention of the world's first true computer, Colossus. Uncover the secrets of Bletchley Park's code-breaking computers. In 1940, almost a year after the outbreak of the Second World War, Allied radio operators at an interception station in South London began picking up messages in a strange new code. Using science, maths, innovation and improvisation BletchleyPark codebreakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these codebreakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and hidden away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of BletchleyPark. 'Gannon's book contains a mass of utterly fascinating and largely unknown material about an immensely important wartime project, and is very welcome indeed.' - Brian Randell, TES
Discover the brand new instalment in Lizzie Lane's bestselling Tobacco Girls series! War is fleeting, but true love last forever...May 1944 Hope and excitement is in the air when news breaks of the allied forces landing in Normandy. D Day has arrived. However, the day-to-day struggles for the Tobacco Girls continue. Carole Thomas wants her old life back. She is burdened with the guilt of being a young single mother and considers having baby Paula adopted, but Maisie Miles will do anything to stop her. Phyllis Mason having found the love of her life is getting married in Malta to Mick Fairbrother, but will the dangerous legacies of war plague her happy day? Bridget O'Neill finds herself posted to one of the hospitals receiving the injured from the D-Day landing beaches. Her most fervent hope is that her husband, Lyndon, does not become one of them. Peace is on the horizon, but will their wishes and dreams win through and bring them a happy ever after? Praise for Lizzie Lane: 'A gripping saga and a storyline that will keep you hooked' Rosie Goodwin 'The Tobacco Girls is another heartwarming tale of love and friendship and a must-read for all saga fans.' Jean Fullerton 'Lizzie Lane opens the door to a past of factory girls, redolent with life-affirming friendship, drama, and choices that are as relevant today as they were then.' Catrin Collier 'If you want an exciting, authentic historical saga then look no further than Lizzie Lane.' Fenella J Miller
Discover the brand new instalment in Lizzie Lane's bestselling Tobacco Girls series! War is fleeting, but true love last forever...May 1944 Hope and excitement is in the air when news breaks of the allied forces landing in Normandy. D Day has arrived. However, the day-to-day struggles for the Tobacco Girls continue. Carole Thomas wants her old life back. She is burdened with the guilt of being a young single mother and considers having baby Paula adopted, but Maisie Miles will do anything to stop her. Phyllis Mason having found the love of her life is getting married in Malta to Mick Fairbrother, but will the dangerous legacies of war plague her happy day? Bridget O'Neill finds herself posted to one of the hospitals receiving the injured from the D-Day landing beaches. Her most fervent hope is that her husband, Lyndon, does not become one of them. Peace is on the horizon, but will their wishes and dreams win through and bring them a happy ever after? Praise for Lizzie Lane: 'A gripping saga and a storyline that will keep you hooked' Rosie Goodwin 'The Tobacco Girls is another heartwarming tale of love and friendship and a must-read for all saga fans.' Jean Fullerton 'Lizzie Lane opens the door to a past of factory girls, redolent with life-affirming friendship, drama, and choices that are as relevant today as they were then.' Catrin Collier 'If you want an exciting, authentic historical saga then look no further than Lizzie Lane.' Fenella J Miller
An attack by a British destroyer on a German U-boat in the Eastern Mediterranean in October 1942 altered the course of the entire war. The capture of secret coding material from U-559, at the cost of two of HMS Petard's crew, enabled Bletchley Park's codebreakers to successfully crack the U-boat cypher. It was the crucial factor in defeating Hitler's Atlantic U-boat wolf packs before they succeeded in starving Britain into defeat in the winter of 1942-1943. Here is the true story of how HMS Petard attacked and captured U-559 in the darkness of a Mediterranean night. It describes how members of her crew swam across to the slowly sinking U-boat and captured vital German Enigma codebooks. But the damage sustained by U-559 in the earlier attack proved fatal and without warning she sank before Petard could take her in tow. Two of the destroyer's crew were trapped in the conning tower and went to the bottom with her. Both men were later recommended for posthumous awards of the Victoria Cross but the Admiralty, concerned this might draw unwanted attention from German Intelligence, instead ordered posthumous awards of the George Cross, the highest civilian award for bravery.
The imbalance of Pakistan's civil-military relations has caused misperceptions about the changing role of intelligence in politics. The country maintains 32 secret agencies working under different democratic, political and military stakeholders who use them for their own interests. Established in 1948, The ISI was tasked with acquiring intelligence of strategic interests and assessing the intensity of foreign threats, but political and military stakeholders used the agency adversely and painted a consternating picture of its working environment. The civilian intelligence agency-Intelligence Bureau (IB) has been gradually neglected due to the consecutive military rule and weak democratic governments. The ISI today seems the most powerful agency and controls the policy decisions. The working of various intelligence agencies, the militarisation of intelligence, and ineffectiveness of the civilian intelligence are some of the issues discussed in the book.
An Intelligence Studies Anthology: Foundational Concepts and Case Studies for the 21st Century is designed to provide undergraduate students with an introduction to the U.S. government's collection and use of intelligence. Through a carefully curated selection of readings, students gain an understanding of the history of the intelligence process and the agencies involved in it. They also learn about the intelligence cycle, types of intelligence products, best practices for writing and briefing intelligence, covert operations, counterintelligence, technical tools and legal concepts, and the ways in which law enforcement collects and uses intelligence. The anthology provides students with a novel collection of information discussing the ways the intelligence process can be used to stop health crises, including pandemics, and includes the editor's original article discussing the creation of a new department in the U.S. government devoted to fighting future pandemics. Illuminating and insightful, An Intelligence Studies Anthology is an exemplary resource for introductory courses in intelligence, criminal justice, criminology, government, and health/public health.
"Bruce Pease has written a much needed book on a long ignored topic: how does one lead analysts? Most analysis is at some level a group activity, whether in government or the private sector. Much has been written about good versus bad analysis and how to train analysts, but Pease, himself a veteran senior CIA analyst and manager, focuses on what the leaders of these analysts need to know and should be thinking about. Leadership matters in analysis as in all other endeavors, and Pease offers invaluable guidance on how to lead effectively. This book is a must for anyone in a leadership role in an analytic enterprise." -Mark M. Lowenthal, PhD, Intelligence & Security Academy, LLC Written by an experienced professional who has led Navy Intelligence and CIA analysts in high-stakes situations, Leading Intelligence Analysis introduces the fundamental managerial skills and practical tools needed to lead analysis projects conducted by individuals and teams. Author Bruce Pease provides insights into key questions such as What kind of environment draws out a team's best work? What brings out their creativity? When does pressure bring out their best insights? When does pressure sap their intellectual energy? and What kind of team builds new knowledge rather than engaging in group-think? This book draws on the author's perspective from decades of leading intelligence analysts on critical issues, including war in the Middle East, terrorism after 9/11, and nuclear threats. Key Features Practical advice helps leaders of analytic units nurture insight with the understanding that it can be enabled but not manufactured. Discussion of a range of different types of analysis serves leaders conducting research in areas including data analysis, security analysis, geopolitical analysis, threat warning, counterterrorism, and business climate analysis. Practical advice on judging IT tools guides leaders to the correct data science approach for various situations.
Vienna, located at the heart of Europe was the city of choice for American, British, German and Russian spymasters in their merciless trade, to plot against one another and steal secrets. For the first time a book is dedicated to the secret stories of spymasters, their tradecraft and secret sources from the end of the World War I, the Interwar with the rise of Nazis to the Second World War and the Cold War. The rich of culture and music Vienna hid a labyrinth of spies and dissidents in the interwar period, and a powerful Gestapo presence during the war meant that the Office of Strategic Services and British intelligence could not deploy operatives in Austria in general. In post war, a few young American and British intelligence officers pitted their wits against hundreds of seasoned Russian operatives of the NKVD and their thousands of informers. and the secret truth was that both Russian and Allied intelligence services employed members of the Nazi intelligence services just upon the defeat of Germany in 1945 and the occupation of Austria.
Through its professionalism, daring, and creativity, the Israeli Intelligence community has made important contributions to intelligence services around the world in the struggle against global terrorism. But how much is known about it? How does it work, and how was it built? Who were the lea ders and driving forces of the community? What were the defining events in its history? What are its areas of activity what are the secrets of its success? Israel's Silent Defender is the first book of its kind an inside look at the Israeli intelligence community over the last sixty years. It is a compilation of the writings of those officers who served and some who still do in the highest positions of the Israeli intelligence community. In Israel's Silent Defender, Brigadier Generals (Res.) Amos Gilboa and Ephraim Lapid have compliled thirty seven essays written by experts and leaders of Israeli intelligence, among them high-ranking analysts and J2s, commanders of human intelligence (HUMINT), signal intelligence (SIGINT), visual intelligence (VISINT) and open source intelligence (OSINT) units, and heads of the Israel Defense Intelligence (IDI), the Mossad and the Shabak.
The General Staff Division of Fremde Heere Ost (Military Intelligence Service, Eastern Section) which from 1942 was led by Reinhard Gehlen, was the nerve-centre of Hitler's military reconnaissance on the Eastern Front. This department worked professionally and was operationally and tactically reliable. However, at a strategic level there were clear deficits: the industrial capacity of the Soviet arms industry, the politico-military intentions and the details of the Red Army's plans for their offensive remained for the most part hidden from the department. When the Second World War ended, Gehlen put the documents and personnel of Fremde Heere Ost at the disposal of the Americans. With their support he was able to build a new foreign secret service which later evolved into the Federal Intelligence Service. In this book, military historian Magnus Pahl presents a complete overview of the structure, personnel and working methods of Fremde Heere Ost based on a tremendous array of archival sources. This work includes an extensive case study of the East Pomeranian Operation 1945. Pahl's study is a significant contribution to our understanding of German strategic, operational and tactical thinking on the Eastern Front 1941-45.
In a rapidly changing environment, Intelligence Surveillance developed through different types of technologies, software, strategies and drones operations in Europe and the United Kingdom. There are various forms of surveillance mechanisms, including Human Agents, Computer Programs, and Global Positioning Satellite Devices. These surveillance devices are now even encroaching into the personal domain of the individuals without the knowledge of the individual being watched. In a surveillance state, people live in consternation, fear, and struggling to protect their privacy, family life, business secrets, and data. In a short period of time, it has amassed a rather sordid history of citizen surveillance- and it continues to be unlawful. These are some of the issues discussed in the book which has varied articles from the experts on the subject. |
You may like...
No Greater Love - Experiencing the Heart…
A.W. Tozer, James L. Snyder
Paperback
Bulletin of the British Ornithologists…
British Ornithologists' Club
Hardcover
R803
Discovery Miles 8 030
Disease Ecology - Galapagos Birds and…
Patricia G. Parker
Hardcover
Birds Of Southern Africa - The Complete…
Burger Cillie, Niel Cillie, …
Paperback
(13)
The History of British Birds
Derek Yalden, Umberto Albarella
Hardcover
R1,787
Discovery Miles 17 870
|