![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
An ancient esoteric object, once used by Elizabethan Magician John Dee in his infamous occult rituals, attracts a deadly interest from the clandestine world of outsourced military operations and leads Antiquarian and former Scottish Military hero, Tavish Stewart, to uncover a global conspiracy to control world leaders and enslave the whole of humanity. Stewart's discovery leads him, and his friends, into a race across the globe to locate ancient maps, mysterious lost cities, magical relics and a forgotten civilisation so ancient and advanced that it would rewrite human history. Stewart must use all his Military and Martial Arts expertise to overcome the elite warriors, weapons and technologies that are set against him before a final apocalyptic confrontation in the desolate wastes of Asia, to preserve the greatest secret of all time!
For almost sixty years after their deaths, three men, whose brave actions shortened the Second World War by as much as two years, remained virtually unknown and uncelebrated. Two lost their lives retrieving vital German codebooks from a sinking U-boat. The third survived the war, only to die in a house fire soon afterwards. But it was the precious documents they seized in October 1942 that enabled Bletchley Park's code-breakers to crack Enigma and so win the Battle of the Atlantic. Now recognised as a pivotal moment in world history, three British servicemen made it possible to finally beat the U-boats, but at the time not even their families could be told of the importance of their deeds. Shrouded in secrecy for decades, then recast as fictional Americans by the Hollywood film U-571, this book sets the record straight. It is written in celebration of Colin Grazier GC, Tony Fasson GC, and Tommy Brown GM - the REAL Enigma heroes.
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
Strategy in the Missile Age first reviews the development of modern military strategy to World War II, giving the reader a reference point for the radical rethinking that follows, as Dr. Brodie considers the problems of the Strategic Air Command, of civil defense, of limited war, of counterforce or pre-emptive strategies, of city-busting, of missile bases in Europe, and so on. The book, unlike so many on modern military affairs, does not present a program or defend a policy, nor is it a brief for any one of the armed services. It is a balanced analysis of the requirements of strength for the 1960's, including especially the military posture necessary to prevent war. A unique feature is the discussion of the problem of the cost of preparedness in relation to the requirements of the national economy, so often neglected by other military thinkers. Originally published in 1959. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analyzed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Applicants to the Central Intelligence Agency often asked Edward Mickolus what they might expect in a career there. Mickolus, who was a CIA intelligence officer, whose duties also included recruiting and public affairs, never had a simple answer. If applicants were considering a life in the National Clandestine Service, the answer was easy. Numerous memoirs show the lives of operations officers collecting secret intelligence overseas, conducting counterintelligence investigations, and running covert action programs. But the CIA isn't only about case officers in far-flung areas of the world, recruiting spies to steal secrets. For an applicant considering a career as an analyst, a support officer, a scientist, or even a secretary, few sources provide reliable insight into what a more typical career at the CIA might look like. This collection of the exploits and insights of twenty-nine everyday agency employees is Mickolus's answer. From individuals who have served at the highest levels of the agency to young officers just beginning their careers, Stories from Langley reveals the breadth of career opportunities available at the CIA and offers advice from agency officers themselves. "Stories from Langley provides an invaluable behind-the-scenes look at professional life inside the CIA. While many have written about great operational exploits, few have focused on the daily lives and challenges of analysts, support officers, and engineers, members of the organization whose work is as essential if not as glamorous in the public eye. Young men and women wondering about what to expect in these varied CIA careers will find the book fascinating, revealing, and perhaps even enticing."-George Tenet, former director of Central Intelligence for the CIA "One of the most difficult aspects of intelligence is trying to convey to outsiders what that life-especially as an analyst-is really like. Most fiction is overblown and inevitably focuses on operations and spying. Stories from Langley is a delightful foray into the actual experiences of a broad range of intelligence officers and fills an important gap in our intelligence literature. Anyone interested in the nuts and bolts of an intelligence career will find this a useful and worthwhile read."-Mark Lowenthal, former assistant director of Central Intelligence for Analysis& Production for the CIA and author of Intelligence: From Secrets to Policy
A highly valuable resource for students of intelligence studies, strategy and security, and foreign policy, this volume provides readers with an accessible and comprehensive exploration of U.S. espionage activities that addresses both the practical and ethical implications that attend the art and science of spying. Essentials of Strategic Intelligence investigates a subject unknown to or misunderstood by most American citizens: how U.S. foreign and security policy is derived from the information collection operations and data analysis by the sixteen major U.S. intelligence agencies. The essays in this work draw back the curtain on the hidden side of America's government, explaining the roles of various intelligence missions, justifying the existence of U.S. intelligence agencies, and addressing the complex moral questions that arise in the conduct of secret operations. After an introductory overview, the book presents accessibly written essays on the key topics: intelligence collection-and-analysis, counterintelligence, covert action, and intelligence accountability. Readers will understand how intelligence directly informs policymakers and why democracies need secret agencies; learn how the CIA has become deeply involved in the war-like assassination operations that target suspected foreign terrorists, even some individuals who are American citizens; and appreciate how the existence of-and our reliance on-these intelligence agencies poses challenges for democratic governance. Provides a comprehensive, up-to-date examination of all aspects of intelligence by experts in the field, from collection-and-analysis and counterintelligence to covert action and accountability Probes into how the United States' intelligence agencies attempt to protect the nation from cyberattacks by foreign nations and terrorist groups-and documents the successes and failures Documents the involvement of the National Security Agency (NSA) in bulk "metadata" collection of information on the telephone records and social media communications of American citizens Examines the effects that have resulted from major leaks in the U.S. government, from Wikileaks to the NSA Snowden leaks
Command, Control, Communications and Intelligence form the backbone of the Army's operating system. But while much attention has been given in the literature to the other three elements, Communications in the British Army during World War II have been widely ignored. This book rectifies the omission. It shows that failures in front line communications contributed to several of the set backs suffered by the Army but also that ultimate victory was only achieved after a successful communications system was in place. It explains how the outcome of the main campaigns in Europe and North Africa depended on communications, how the system operated and how it evolved from a relatively primitive and inadequately supplied state at Dunkirk to a generally effective system at the time of the Rhine crossings. Problems still occurred however, for example at infantry platoon level and famously with paratrooper communications at Arnhem, often simply due to the shortcomings of existing technology. The book concludes that it is only very recently that advances in technology have allowed those problems to be solved.
The book is relevant to all those who wish to know why and how terrorism shifted from West Asia to South and Southeast Asia and Africa. This significant shift needs to be studied in depth for policy formulation and future strategy. The book will reveal that the so called Islamic Terrorism is traceable to Pakistan from concept to reality. Pakistan as a state has provided the platform for outward and inward march of Jihadis. For this to happen, the ISI has been playing the principal role. Thus, the focus in this book is on ISI as an instrument of spreading jihadi culture in Pakistan and elsewhere.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analysed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Written by the renowned expert Nigel West, this book exposes the operations of Britain's overseas intelligence-gathering organisation, the famed Secret Intelligence Service, MI6, and traces its origins back to its inception in 1909. In this meticulously researched account, its activities and structure are described in detail, using original secret service documents. The main body of the book concerns MI6's operations during the Second World War, and includes some remarkable successes and failures, including how MI6 financed a glamorous confidant of the German secret service; how a suspected French traitor was murdered by mistake; how Franco's military advisors were bribed to keep Spain out of the war; how members of the Swedish secret police were blackmailed into helping the British war effort; how a sabotage operation in neutral Tangiers enabled the Allied landings in North Africa to proceed undetected; and how Britain's generals ignored the first ULTRA decrypts because MI6 said that the information had come from a well-placed source called BONIFACE'. In this new edition, operations undertaken by almost all of MI6's overseas stations are recounted in extraordinary detail. They will fascinate both the professional intelligence officer and the general reader. The book includes organisational charts to illustrate MI6's internal structure and its wartime network of overseas stations. Backed by numerous interviews with intelligence officers and their agents, this engaging inside story throws light on many wartime incidents that had previously remained unexplained.
Recent disclosures concerning the size and scope of the National Security Agency's (NSA's) surveillance activities both in the United States and abroad have prompted a flurry of congressional activity aimed at reforming the foreign intelligence gathering process. While some measures would overhaul the substantive legal rules of the USA PATRIOT Act or other provisions of the Foreign Intelligence Surveillance Act (FISA), there are a host of bills designed to make procedural and operational changes to the Foreign Intelligence Surveillance Court (FISC), a specialised Article III court that hears applications and grants orders approving of certain foreign intelligence gathering activities, and the Foreign Intelligence Surveillance Court of Review, a court that reviews rulings of the FISC. This book will explore a selection of these proposals and address potential legal questions such proposals may raise.
This book presents the final report of the review group on intelligence and communications technologies. Recommendations are provided that are designed to protect national security and maintain intelligence capabilities while also respecting our longstanding commitment to privacy, civil liberties, and the trust of allies abroad, with due consideration of reducing the risk of unauthorised disclosures.
Only in 1995 did the United States government officially reveal the existence of the super-secret Venona Project. For nearly fifty years American intelligence agents had been decoding thousands of Soviet messages, uncovering an enormous range of espionage activities carried out against the United States during World War II by its own allies. So sensitive was the project in its early years that even President Truman was not informed of its existence. This extraordinary book is the first to examine the Venona messages-documents of unparalleled importance for our understanding of the history and politics of the Stalin era and the early Cold War years. Hidden away in a former girls' school in the late 1940s, Venona Project cryptanalysts, linguists, and mathematicians attempted to decode more than twenty-five thousand intercepted Soviet intelligence telegrams. When they cracked the unbreakable Soviet code, a breakthrough leading eventually to the decryption of nearly three thousand of the messages, analysts uncovered information of powerful significance: the first indication of Julius Rosenberg's espionage efforts; references to the espionage activities of Alger Hiss; startling proof of Soviet infiltration of the Manhattan Project to build the atomic bomb; evidence that spies had reached the highest levels of the U.S. State and Treasury Departments; indications that more than three hundred Americans had assisted in the Soviet theft of American industrial, scientific, military, and diplomatic secrets; and confirmation that the Communist party of the United States was consciously and willingly involved in Soviet espionage against America. Drawing not only on the Venona papers but also on newly opened Russian and U. S. archives, John Earl Haynes and Harvey Klehr provide in this book the clearest, most rigorously documented analysis ever written on Soviet espionage and the Americans who abetted it in the early Cold War years.
For soldiers who want to increase their professional knowledge of the Army and prepare themselves for promotion boards, this revised and expanded edition of the Soldier's Study Guide contains more than 1,460 questions in 58 subject areas. The questions cover Army programs, basic combat skills, combat stress, leadership, maintenance of equipment, customs and courtesies, justice, physical training, NBC warfare, uniforms and insignia, weapons, and more . * For soldiers who want to increase their professional knowledge of the Army and prepare themselves for promotion boards * Covers army programs, basic combat skills, combat stress, leadership, maintenance of equipment, customs and courtesies, justice, physical training, NBC warfare, uniforms and insignia, weapons, and more * More than 100,000 sold
In the Allies' post-war analyses of the Nazis' defeat, the "weakness and incompetence" of the German intelligence services figured prominently. And how could it have been otherwise, when they worked at the whim of a regime in the grip of "ignorant maniacs"? But what if, Robert Hutchinson asks, the worldviews of the intelligence services and the "ignorant maniacs" aligned more closely than these analyses-and subsequent studies-assumed? What if the reports of the German foreign intelligence services, rather than being dismissed by ideologues who "knew better," instead served to reinforce the National Socialist worldview? Returning to these reports, examining the information on enemy nations that was gathered, processed, and presented to leaders in the Nazi state, Hutchinson's study reveals the consequences of the politicization of German intelligence during the war-as well as the persistence of ingrained prejudices among the intelligence services' Cold War successors Closer scrutiny of underutilized and unpublished reports shows how during the World War II the German intelligence services supported widely-held assumptions among the Nazi elite that Britain was politically and morally bankrupt, that the Soviet Union was tottering militarily and racially inferior, and that the United States' vast economic potential was undermined by political, cultural, and racial degeneration. Furthermore, Hutchinson argues, these distortions continued as German intelligence veterans parlayed their supposed expertise on the Soviet Union into positions of prominence in Western intelligence in the early years of the Cold War. With its unique insights into the impact of ideology on wartime and post-war intelligence, his book raises important questions not only about how intelligence reports can influence policy decisions, but also about the subjective nature of intelligence gathering itself.
The U.S. Marine Corps, which has long recognized the importance of influencing the civilian population in a counterinsurgency environment, requested an evaluation of the effectiveness of the psychological operations (PSYOP) element of U.S. military information operations in Afghanistan from 2001 to 2010 based on how well messages and themes were tailored to target audiences. This volume responds to that request. It summarizes the diverse PSYOP initiatives undertaken, evaluates their effectiveness, identifies strengths and weaknesses, and describes the way forward, including making certain specific recommendations for improvements. Special attention is paid to how well PSYOP initiatives were tailored to target audiences, primarily the Pashtuns who are the dominant population in the conflictive areas and the main support of the Taliban insurgency. It contains reports of specific operations that were successful in achieving objectives, as well as examples of operations that did not resonate with target audiences and even some that had counter-productive effects. The biggest PSYOP successes were in face-to-face communication and the emphasis on meetings with jirgas (local councils of elders), key-leader engagements, and establishing individual relationships with members of the Afghan media. In addition, the concept of every infantryman as a PSYOP officer proved very effective. The most notable shortcoming was the inability to sufficiently counter the Taliban propaganda campaign against U.S. and coalition forces on the theme of civilian casualties, both domestically and internationally.
The amount of publicly and often freely available information is
staggering. Yet, the intelligence community still continues to
collect and use information in the same manner as during WWII, when
the OSS set out to learn as much as possible about Nazi Germany and
Imperial Japan by scrutinizing encyclopedias, guide books, and
short-wave radio. Today, the supply of information is greater than
any possible demand, and anyone can provide information. In effect,
intelligence analysts are drowning in information.
'Pulse-pounding' Sinclair McKay | 'Truly masterful' Damien Lewis | 'Who needs spy fiction, when fact can provide as thrilling a story as this?' Lindsey Hilsum The Spymaster of Baghdad is the gripping story of the top-secret Iraqi intelligence unit that infiltrated the Islamic State. More so than that of any foreign power, the information they gathered turned the tide against the insurgency, paving the way to the killing of ISIS leader Abu Bakr al-Baghdadi in 2019. Against the backdrop of the most brutal conflict of recent decades, we chart the spymaster's struggle to develop the unit from scratch in challenging circumstances after the American invasion of Iraq in 2003, we follow the fraught relationship of two of his agents, the al-Sudani brothers - one undercover in ISIS for sixteen long months, the other his handler - and we track a disillusioned scientist as she turns bomb-maker, threatening the lives of thousands. With unprecedented access to characters on all sides, Pulitzer Prize-finalist Margaret Coker challenges the conventional view that Western coalition forces defeated ISIS and reveals a page-turning story of unlikely heroes, unbelievable courage and good old-fashioned spycraft. 'Moving, visceral, utterly revelatory. A stunning tour de force by an author who has lived every word of it on the ground' Damien Lewis, author of Zero Six Bravo 'This compelling account of how Iraqi agents infiltrated ISIS takes us deep beneath the lurid headlines and into a sharply focused world of courage, ingenuity, terror and love' Sinclair McKay, author of Dresden 'In Margaret Coker's deeply reported, unputdownable account, the previously unknown Iraqi heros of the war against the Islamic State turn out to be braver than Bond and as subtle as Smiley' Lindsey Hilsum, author of In Extremis 'We all owe a debt of gratitude to the Falcons Unit for their important role in the fight against the most lethal terrorist group of our time' Anne Speckhard, Director of the International Center for the Study of Violent Extremism
Recently, there have been multiple high-profile incidents involving the release of classified government information. Perhaps most prominent was Wikileaks.org's unauthorised publication of more than 600,000 classified Department of Defense documents. Such incidents have further heightened congressional, media and public interest in classified information policy. This book provides information on classified information policy, also known as security classification policy and national security classification information policy. It discusses the history, costs and agencies assigned roles in classified information policy and focuses on Executive Order 13526, which establishes much of the current policy and possible oversight issues for Congress.
On January 26, 1993, a young Palestinian man named Abdel Nasser Zaben was arrested and incarcerated in New York City for kidnapping and robbery. Just thirty days later, while he remained locked up, radical Islamic fundamentalists detonated a bomb in the World Trade Center. These two events, connected by common threads, signaled the coming of jihad to America. From the seemingly insulated environment of prison, this same young man, thought to have been merely a common criminal, swore allegiance to Osama bin Laden and began to convert other young minds to the cause. A dangerous terrorist recruitment cell had been born. How did it happen?Through the story of Abdel Nasser Zaben s recruitment efforts in prison, "The Fertile Soil of Jihad" explores in vivid detail how the American prison subculture fosters terrorism. Dunleavy shows how Zaben carefully and knowingly selected the most likely candidates for conversion to his cause. He reveals how Zaben used his apprentice role in the prison chaplain s office as a cover for his work and how prison resources were used in the service of terrorism. This book yields invaluable insights for intelligence and corrections professionals as well as informed citizens eager to learn what progress the U.S. government is making in countering terrorism.
The post-9/11 world has witnessed a rebirth of irregular and asymmetrical warfare, which, in turn, has led to an increase in conflicts between conventional armies and non-state armed groups. In their haste to respond to the threat from insurgencies, nations often fail to plan effectively not only for combat operations but also for withdrawal, which is inevitable, win or lose. In order to answer the question of how to withdraw from engagement with an insurgency, Gleis examines how insurgencies are conducted and what, if anything, is unique about an Islamist insurgency. He then proposes ways to combat these groups successfully and to disentangle one’s military forces from the war once strategic objectives have been met—or once it is clear that they cannot be. Because this type of warfare is dynamic and ever-changing, this book is not meant to suggest a set of cookie-cutter solutions for how to withdraw from insurgencies. Rather, the author analyzes six counterinsurgency operations that have taken place in the past, with the intention of gleaning from them as many lessons as possible to better prepare for future withdrawals.The literature on how wars end has failed to explore irregular warfare.This much needed reexamination serves as an indispensable starting point.
In the 2010 federal election, independent candidate Andrew Wilkie grabbed headlines after winning the seat of Denison, and with it a key role in deciding who would form the next government of Australia.Before he was a politician, however, Wilkie was Australia's most talked-about whistleblower. In March 2003, Wilkie resigned from Australia's peak intelligence agency in protest over the looming war in Iraq. He was the only serving intelligence officer from the 'coalition of the willing' - the US, the UK and Australia - to do so, and his dramatic move was reported throughout the world. Wilkie's act of conscience put him on a collision course with the Australian government. Why was he willing to risk his career and reputation to tell the truth? What happened when he decided to take a stand? In Axis of Deceit, Wilkie tells his story. He exposes how governments skewed, spun and fabricated intelligence advice. And he offers a rare glimpse into the world of international intelligence and life as a spook. With a brand-new preface, this is the fascinating inside story of a man now set to play a pivotal role in our public life.
The exposure of two senior republicans as informers for British intelligence in 2005 led to a popular perception that the IRA had 'lost' the intelligence war and was pressurised into peace. In this first in-depth study across the entire conflict, Thomas Leahy re-evaluates the successes and failures of Britain's intelligence activities against the IRA, from the use of agents and informers to special-forces, surveillance and electronic intelligence. Using new interview material alongside memoirs and Irish and UK archival materials, he suggests that the IRA was not forced into peace by British intelligence. His work sheds new light on key questions in intelligence and security studies. How does British intelligence operate against paramilitaries? Is it effective? When should governments 'talk to terrorists'? And does regional variation explain the outcome of intelligence conflicts? This is a major contribution to the history of the conflict and of why peace emerged in Northern Ireland.
As the fifth full year of America's global war on terrorism continues, statistics concerning terrorist attacks show a disturbing trend: from a twenty-one-year high in 2003, attacks tripled in 2004 and then doubled in 2005. And as the incidence of terrorist attacks increased, so has the number of terrorists. While the primary leaders of the Taliban, al Qaeda, and al Qaeda in Iraq remain at large, a 2006 Department of Defense study reportedly identified thirty new al Qaeda-affiliated terrorist groups that have been created since September 11, 2001. We may not have metrics that measure our success in the war on terrorism, but these realities certainly illuminate our failures.In "Thinking Like a Terrorist," former FBI counterterrorism agent Mike German contends that the overarching problem is a fundamental failure to understand the terrorists-namely, what they want and how they intend to get it. When our counterterrorism policies are driven by misunderstanding and misperception, we shouldn't be surprised at the results. Today's terrorists have a real plan-a blueprint that has brought them victory in the past-that they are executing to perfection; moreover, their plan is published and available to anyone who bothers to read it. Once the terrorists' plan is understood, we can develop and implement more effective counterterrorism strategies.A former undercover agent who infiltrated neo-Nazi terrorist groups in the United States, German explains the terrorist's point of view and discusses ways to counter the terrorism threat. Based on his unusual experience in the field, "Thinking Like a Terrorist" provides unique insights into why terrorism is such a persistent and difficult problem and whythe U.S. approach to counterterrorism isn't working. |
You may like...
Strategic Intelligence Management…
Babak Akhgar, Simeon Yates
Paperback
R1,598
Discovery Miles 15 980
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,286
Discovery Miles 52 860
|