![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
An ancient esoteric object, once used by Elizabethan Magician John Dee in his infamous occult rituals, attracts a deadly interest from the clandestine world of outsourced military operations and leads Antiquarian and former Scottish Military hero, Tavish Stewart, to uncover a global conspiracy to control world leaders and enslave the whole of humanity. Stewart's discovery leads him, and his friends, into a race across the globe to locate ancient maps, mysterious lost cities, magical relics and a forgotten civilisation so ancient and advanced that it would rewrite human history. Stewart must use all his Military and Martial Arts expertise to overcome the elite warriors, weapons and technologies that are set against him before a final apocalyptic confrontation in the desolate wastes of Asia, to preserve the greatest secret of all time!
Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.
Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.
The secret history of MI6 - from the Cold War to the present day. The British Secret Service has been cloaked in secrecy and shrouded in myth since it was created a hundred years ago. Our understanding of what it is to be a spy has been largely defined by the fictional worlds of James Bond and John le Carre. THE ART OF BETRAYAL provides a unique and unprecedented insight into this secret world and the reality that lies behind the fiction. It tells the story of how the secret service has changed since the end of World War II and by focusing on the people and the relationships that lie at the heart of espionage, revealing the danger, the drama, the intrigue, the moral ambiguities and the occasional comedy that comes with working for British intelligence. From the defining period of the early Cold War through to the modern day, MI6 has undergone a dramatic transformation from a gung-ho, amateurish organisation to its modern, no less controversial, incarnation. Gordon Corera reveals the triumphs and disasters along the way. The grand dramas of the Cold War and after - the rise and fall of the Berlin Wall, the Cuban Missile Crisis, the 11 September 2001 attacks and the Iraq war - are the backdrop for the human stories of the individual spies whose stories form the centrepiece of the narrative. But some of the individuals featured here, in turn, helped shape the course of those events. Corera draws on the first-hand accounts of those who have spied, lied and in some cases nearly died in service of the state. They range from the spymasters to the agents they ran to their sworn enemies. Many of these accounts are based on exclusive interviews and access. From Afghanistan to the Congo, from Moscow to the back streets of London, these are the voices of those who have worked on the front line of Britain's secret wars. And the truth is often more remarkable than the fiction.
The inside story of one of the most famous of all the 'back rooms' of the Second World War - and of the men and women who worked for it. Conceived by Winston Churchill to circumvent the delays, frustrations and inefficiencies of the service ministries, Department M.D.1. earned from its detractors the soubriquet 'Winston Churchill's Toyshop', yet from a tiny underground workshop housed in the cellars of the London offices of Radio Normandie in Portland Place, and subsequently from the 'stockbroker Tudor' of a millionaire's country mansion in Buckinghamshire, came an astonishing array of secret weapons ranging from the 'sticky bomb' and 'limpet mine' to giant bridge-carrying assault tanks, as well as the PIAT, a tank-destroying, hand-held mortar. Written by Colonel Stuart Macrae, who helped found M.D.1. and was its second-in-command throughout its life, the story is told of this relatively unknown establishment and the weapons it developed which helped destroy innumerable enemy tanks, aircraft and ships.
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
'This is what an SAS career is really like' AUSTRALIAN DEFENCE MAGAZINE Elite SAS Patrol Commander Stuart 'Nev' Bonner takes us inside the extraordinary and dangerous world of secret combat operations in this explosive, behind-the-scenes look at life inside the SAS. A world where capture means torture or death, and every move is trained for with precision detail to bring elite soldiers to the very peak of fighting ability. In a career spanning twenty years, fourteen of them in the SAS, Bonner shares with us the inside story of being out in front - and often behind enemy lines. From patrolling the mountains of East Timor to covert operations in Bougainville and the Solomon Islands, from sweeping into the Iraqi desert ahead of invading US forces to cripple Saddam Hussein's communications to patrolling in war-torn Baghdad and being in the middle of the disastrous Operation Anaconda in Afghanistan - this is a no-holds-barred account of what it's like to live, eat and breathe SAS. Now part of the HACHETTE MILITARY COLLECTION.
Strategy in the Missile Age first reviews the development of modern military strategy to World War II, giving the reader a reference point for the radical rethinking that follows, as Dr. Brodie considers the problems of the Strategic Air Command, of civil defense, of limited war, of counterforce or pre-emptive strategies, of city-busting, of missile bases in Europe, and so on. The book, unlike so many on modern military affairs, does not present a program or defend a policy, nor is it a brief for any one of the armed services. It is a balanced analysis of the requirements of strength for the 1960's, including especially the military posture necessary to prevent war. A unique feature is the discussion of the problem of the cost of preparedness in relation to the requirements of the national economy, so often neglected by other military thinkers. Originally published in 1959. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
The book is relevant to all those who wish to know why and how terrorism shifted from West Asia to South and Southeast Asia and Africa. This significant shift needs to be studied in depth for policy formulation and future strategy. The book will reveal that the so called Islamic Terrorism is traceable to Pakistan from concept to reality. Pakistan as a state has provided the platform for outward and inward march of Jihadis. For this to happen, the ISI has been playing the principal role. Thus, the focus in this book is on ISI as an instrument of spreading jihadi culture in Pakistan and elsewhere.
Command, Control, Communications and Intelligence form the backbone of the Army's operating system. But while much attention has been given in the literature to the other three elements, Communications in the British Army during World War II have been widely ignored. This book rectifies the omission. It shows that failures in front line communications contributed to several of the set backs suffered by the Army but also that ultimate victory was only achieved after a successful communications system was in place. It explains how the outcome of the main campaigns in Europe and North Africa depended on communications, how the system operated and how it evolved from a relatively primitive and inadequately supplied state at Dunkirk to a generally effective system at the time of the Rhine crossings. Problems still occurred however, for example at infantry platoon level and famously with paratrooper communications at Arnhem, often simply due to the shortcomings of existing technology. The book concludes that it is only very recently that advances in technology have allowed those problems to be solved.
Written by the renowned expert Nigel West, this book exposes the operations of Britain's overseas intelligence-gathering organisation, the famed Secret Intelligence Service, MI6, and traces its origins back to its inception in 1909. In this meticulously researched account, its activities and structure are described in detail, using original secret service documents. The main body of the book concerns MI6's operations during the Second World War, and includes some remarkable successes and failures, including how MI6 financed a glamorous confidant of the German secret service; how a suspected French traitor was murdered by mistake; how Franco's military advisors were bribed to keep Spain out of the war; how members of the Swedish secret police were blackmailed into helping the British war effort; how a sabotage operation in neutral Tangiers enabled the Allied landings in North Africa to proceed undetected; and how Britain's generals ignored the first ULTRA decrypts because MI6 said that the information had come from a well-placed source called BONIFACE'. In this new edition, operations undertaken by almost all of MI6's overseas stations are recounted in extraordinary detail. They will fascinate both the professional intelligence officer and the general reader. The book includes organisational charts to illustrate MI6's internal structure and its wartime network of overseas stations. Backed by numerous interviews with intelligence officers and their agents, this engaging inside story throws light on many wartime incidents that had previously remained unexplained.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analyzed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Applicants to the Central Intelligence Agency often asked Edward Mickolus what they might expect in a career there. Mickolus, who was a CIA intelligence officer, whose duties also included recruiting and public affairs, never had a simple answer. If applicants were considering a life in the National Clandestine Service, the answer was easy. Numerous memoirs show the lives of operations officers collecting secret intelligence overseas, conducting counterintelligence investigations, and running covert action programs. But the CIA isn't only about case officers in far-flung areas of the world, recruiting spies to steal secrets. For an applicant considering a career as an analyst, a support officer, a scientist, or even a secretary, few sources provide reliable insight into what a more typical career at the CIA might look like. This collection of the exploits and insights of twenty-nine everyday agency employees is Mickolus's answer. From individuals who have served at the highest levels of the agency to young officers just beginning their careers, Stories from Langley reveals the breadth of career opportunities available at the CIA and offers advice from agency officers themselves. "Stories from Langley provides an invaluable behind-the-scenes look at professional life inside the CIA. While many have written about great operational exploits, few have focused on the daily lives and challenges of analysts, support officers, and engineers, members of the organization whose work is as essential if not as glamorous in the public eye. Young men and women wondering about what to expect in these varied CIA careers will find the book fascinating, revealing, and perhaps even enticing."-George Tenet, former director of Central Intelligence for the CIA "One of the most difficult aspects of intelligence is trying to convey to outsiders what that life-especially as an analyst-is really like. Most fiction is overblown and inevitably focuses on operations and spying. Stories from Langley is a delightful foray into the actual experiences of a broad range of intelligence officers and fills an important gap in our intelligence literature. Anyone interested in the nuts and bolts of an intelligence career will find this a useful and worthwhile read."-Mark Lowenthal, former assistant director of Central Intelligence for Analysis& Production for the CIA and author of Intelligence: From Secrets to Policy
The intelligence community (IC) uses core contract personnel to augment its workforce. These contractors typically work alongside government personnel and perform staff-like work. Some core contract personnel require enhanced oversight because they perform services that could inappropriately influence the government's decision making. This book examines the extent to which the eight civilian IC elements use core contract personnel; the functions performed by these personnel and the reasons for their use; and whether the elements developed policies and strategically planned for their use. GAO reviewed and assessed the reliability of the eight civilian IC elements' core contract personnel inventory data for fiscal years 2010 and 2011, including reviewing a sample of 287 contract records.
Recent disclosures concerning the size and scope of the National Security Agency's (NSA's) surveillance activities both in the United States and abroad have prompted a flurry of congressional activity aimed at reforming the foreign intelligence gathering process. While some measures would overhaul the substantive legal rules of the USA PATRIOT Act or other provisions of the Foreign Intelligence Surveillance Act (FISA), there are a host of bills designed to make procedural and operational changes to the Foreign Intelligence Surveillance Court (FISC), a specialised Article III court that hears applications and grants orders approving of certain foreign intelligence gathering activities, and the Foreign Intelligence Surveillance Court of Review, a court that reviews rulings of the FISC. This book will explore a selection of these proposals and address potential legal questions such proposals may raise.
This book presents the final report of the review group on intelligence and communications technologies. Recommendations are provided that are designed to protect national security and maintain intelligence capabilities while also respecting our longstanding commitment to privacy, civil liberties, and the trust of allies abroad, with due consideration of reducing the risk of unauthorised disclosures.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analysed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Most books about espionage in the American Revolutionary War tend to focus solely on General George Washington, but as noted historian Donald E. Markle explores in this fascinating account, there was an entire system of intelligence communication autonomous from his direction. General Washington and General Charles Cornwallis were engaged in a constant battle to outmaneuver each other, and Cornwallis seemed to always be one step behind Washington and his intelligence departments. As the war progressed, the Americans and British slowly learned one another's tactics, allowing the hunt between the fox (Washington) and the hound (Cornwallis). THE FOX AND THE HOUND walks readers through the early stages of the war, when gathering and distributing intelligence was a challenge without a centralized government to organize a network. Markle tells us how and why Washington created multiple intelligence-gathering departments within the colonies, which included most of the East Coast from Georgia to New Hampshire and even parts of Canada--all operating under a command structure unique to their surrounding geography. This book explores the many depths of the intelligence networks from civilian men and women who dedicated their lives to the American cause, to the introduction of code ciphers and the first spy equipment such as David Bushnell's turtle submarine and Benjamin Franklin's jet boat. Without the dedication of Washington and his innovative loyal supporters, it's quite possible that the outcome of the war may have been different. Military and American history enthusiasts will find this a valuable resource for their collections.
Israel's flawed intelligence assessment in October 1973 has been studied intensively and been the subject of much public and professional debate. This book adds a unique dimension to previously disclosed material, as its author served as head of the Research Branch of Israeli Military Intelligence on the eve of and during the Yom Kippur War and as such was responsible for the national intelligence assessment at the time. Drawing on his personal records, and on interviews and extensive research conducted in the intervening decades, Aryeh Shalev examines the preconceptions and common beliefs that prevailed among Israeli intelligence officials and ultimately contributed to their flawed assessment: the excessive self-confidence in Israel's prowess, particularly in the aftermath of the Six Day War; the confidence that any surprise attack could be repelled with the regular army until the reserves were mobilised; the accepted profile of Sadat as a weak leader with limited powers and initiative; and the belief in Israel's correct understanding of Egyptian and Syrian operational plans . . . Beyond explaining where Israeli intelligence erred, the book probes expectations of military intelligence in general and the relationship between military and political assessments. It considers what kind of assessment an intelligence branch is capable of producing with a great degree of certainty, and conversely, what kind of assessment it should not be asked to produce. Based on the intelligence failure of the Yom Kippur War, this book also reviews possible organisational changes and methodological improvements to guard as much as possible against surprise attacks in the future, relevant not only to Israel's circumstances but to all countries with enemies capable of launching an attack. Published in association with the Institute for National Strategic Studies.
In the Allies' post-war analyses of the Nazis' defeat, the "weakness and incompetence" of the German intelligence services figured prominently. And how could it have been otherwise, when they worked at the whim of a regime in the grip of "ignorant maniacs"? But what if, Robert Hutchinson asks, the worldviews of the intelligence services and the "ignorant maniacs" aligned more closely than these analyses-and subsequent studies-assumed? What if the reports of the German foreign intelligence services, rather than being dismissed by ideologues who "knew better," instead served to reinforce the National Socialist worldview? Returning to these reports, examining the information on enemy nations that was gathered, processed, and presented to leaders in the Nazi state, Hutchinson's study reveals the consequences of the politicization of German intelligence during the war-as well as the persistence of ingrained prejudices among the intelligence services' Cold War successors Closer scrutiny of underutilized and unpublished reports shows how during the World War II the German intelligence services supported widely-held assumptions among the Nazi elite that Britain was politically and morally bankrupt, that the Soviet Union was tottering militarily and racially inferior, and that the United States' vast economic potential was undermined by political, cultural, and racial degeneration. Furthermore, Hutchinson argues, these distortions continued as German intelligence veterans parlayed their supposed expertise on the Soviet Union into positions of prominence in Western intelligence in the early years of the Cold War. With its unique insights into the impact of ideology on wartime and post-war intelligence, his book raises important questions not only about how intelligence reports can influence policy decisions, but also about the subjective nature of intelligence gathering itself.
Today's intelligence community faces challenges that would have been inconceivable only a dozen years ago. Just as al-Qaeda's destruction of the Twin Towers heralded a revolution in global diplomacy, the events of 9/11 also threw two centuries of spy-craft into turmoil - because this new enemy could not be bought. Gone were the sleepers and moles whose trade in secrets had sustained intelligence agencies in both peacetime and war. A new method of intelligence had been born. The award-winning former Financial Times security correspondent Mark Huband here takes us deep inside this new unseen world of spies and intelligence. With privileged access to intelligence officers from Rome to Kabul and from Khartoum to Guantanamo Bay, he reveals how spies created secret channels to the IRA, deceived Iran's terrorist allies, frequently attempted to infiltrate al-Qaeda, and forced Libya to abandon its nuclear weapons. Using accounts from ex-KGB officers, Huband vividly describes the devastation caused by the West's misreading of Soviet intentions in Africa, and explains how ill-prepared western intelligence agencies were when the Cold War was replaced by the perception of a new terrorist threat. Benefiting from privileged access to intelligence sources across the world, Trading Secrets provides a unique and controversial assessment of the catastrophic failure of spies to grasp the realities of the Taliban's grip on Afghanistan, and draws upon exclusive interviews with serving officers in assessing the ability of the major intelligence agencies to combat the threat of twenty-first century terrorism.
The amount of publicly and often freely available information is
staggering. Yet, the intelligence community still continues to
collect and use information in the same manner as during WWII, when
the OSS set out to learn as much as possible about Nazi Germany and
Imperial Japan by scrutinizing encyclopedias, guide books, and
short-wave radio. Today, the supply of information is greater than
any possible demand, and anyone can provide information. In effect,
intelligence analysts are drowning in information.
On January 26, 1993, a young Palestinian man named Abdel Nasser Zaben was arrested and incarcerated in New York City for kidnapping and robbery. Just thirty days later, while he remained locked up, radical Islamic fundamentalists detonated a bomb in the World Trade Center. These two events, connected by common threads, signaled the coming of jihad to America. From the seemingly insulated environment of prison, this same young man, thought to have been merely a common criminal, swore allegiance to Osama bin Laden and began to convert other young minds to the cause. A dangerous terrorist recruitment cell had been born. How did it happen?Through the story of Abdel Nasser Zaben s recruitment efforts in prison, "The Fertile Soil of Jihad" explores in vivid detail how the American prison subculture fosters terrorism. Dunleavy shows how Zaben carefully and knowingly selected the most likely candidates for conversion to his cause. He reveals how Zaben used his apprentice role in the prison chaplain s office as a cover for his work and how prison resources were used in the service of terrorism. This book yields invaluable insights for intelligence and corrections professionals as well as informed citizens eager to learn what progress the U.S. government is making in countering terrorism.
The post-9/11 world has witnessed a rebirth of irregular and asymmetrical warfare, which, in turn, has led to an increase in conflicts between conventional armies and non-state armed groups. In their haste to respond to the threat from insurgencies, nations often fail to plan effectively not only for combat operations but also for withdrawal, which is inevitable, win or lose. In order to answer the question of how to withdraw from engagement with an insurgency, Gleis examines how insurgencies are conducted and what, if anything, is unique about an Islamist insurgency. He then proposes ways to combat these groups successfully and to disentangle one’s military forces from the war once strategic objectives have been met—or once it is clear that they cannot be. Because this type of warfare is dynamic and ever-changing, this book is not meant to suggest a set of cookie-cutter solutions for how to withdraw from insurgencies. Rather, the author analyzes six counterinsurgency operations that have taken place in the past, with the intention of gleaning from them as many lessons as possible to better prepare for future withdrawals.The literature on how wars end has failed to explore irregular warfare.This much needed reexamination serves as an indispensable starting point. |
![]() ![]() You may like...
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R6,029
Discovery Miles 60 290
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
|