|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The imbalance of Pakistan's civil-military relations has caused
misperceptions about the changing role of intelligence in politics.
The country maintains 32 secret agencies working under different
democratic, political and military stakeholders who use them for
their own interests. Established in 1948, The ISI was tasked with
acquiring intelligence of strategic interests and assessing the
intensity of foreign threats, but political and military
stakeholders used the agency adversely and painted a consternating
picture of its working environment. The civilian intelligence
agency-Intelligence Bureau (IB) has been gradually neglected due to
the consecutive military rule and weak democratic governments. The
ISI today seems the most powerful agency and controls the policy
decisions. The working of various intelligence agencies, the
militarisation of intelligence, and ineffectiveness of the civilian
intelligence are some of the issues discussed in the book.
Many Americans know something about the Navajo code talkers in
World War II - but little else about the military service of Native
Americans, who have served in our armed forces since the American
Revolution, and still serve in larger numbers than any other ethnic
group. But, as we learn in this splendid work of historical
restitution, code talking originated in World War I among Native
soldiers whose extraordinary service resulted, at long last, in
U.S. citizenship for all Native Americans. The first full account
of these forgotten soldiers in our nation's military history, The
First Code Talkers covers all known Native American code talkers of
World War I - members of the Choctaw, Oklahoma Cherokee, Comanche,
Osage, and Sioux nations, as well as the Eastern Band of Cherokee
and Ho-Chunk, whose veterans have yet to receive congressional
recognition. William C. Meadows, the foremost expert on the
subject, describes how Native languages, which were essentially
unknown outside tribal contexts and thus could be as effective as
formal encrypted codes, came to be used for wartime communication.
While more than thirty tribal groups were eventually involved in
World Wars I and II, this volume focuses on Native Americans in the
American Expeditionary Forces during the First World War. Drawing
on nearly thirty years of research - in U.S. military and Native
American archives, surviving accounts from code talkers and their
commanding officers, family records, newspaper accounts, and
fieldwork in descendant communities - the author explores the
origins, use, and legacy of the code talkers. In the process, he
highlights such noted decorated veterans as Otis Leader, Joseph
Oklahombi, and Calvin Atchavit and scrutinizes numerous
misconceptions and popular myths about code talking and the secrecy
surrounding the practice. With appendixes that include a timeline
of pertinent events, biographies of known code talkers, and related
World War I data, this book is the first comprehensive work ever
published on Native American code talkers in the Great War and
their critical place in American military history.
In a rapidly changing environment, Intelligence Surveillance
developed through different types of technologies, software,
strategies and drones operations in Europe and the United Kingdom.
There are various forms of surveillance mechanisms, including Human
Agents, Computer Programs, and Global Positioning Satellite
Devices. These surveillance devices are now even encroaching into
the personal domain of the individuals without the knowledge of the
individual being watched. In a surveillance state, people live in
consternation, fear, and struggling to protect their privacy,
family life, business secrets, and data. In a short period of time,
it has amassed a rather sordid history of citizen surveillance- and
it continues to be unlawful. These are some of the issues discussed
in the book which has varied articles from the experts on the
subject.
For most Arab regimes, intelligence, security apparatus and the
secret services, are central to their domestic politics. Yet
despite this, very little scholarly attention has been paid to the
relationship between intelligence and politics in any Arab state.
This book examines how security apparatus and intelligence
influenced the domestic politics of Tunisia, from the
implementation of French Protectorate in 1881 to the aftermath of
the independence up to 1965. Based on unprecedented access to the
sources of the Ministry of Interior and the First Ministry during
Bourguiba's regime, as well as the national, diplomatic and
military archives of France, Italy and the United Kingdom, the book
is the first to trace the evolution of the Tunisian security
community. Omar Safi argues that from an apparatus designed to
maintain colonial control, intelligence became an instrument to
drive the political agendas of the ruling elite. The book sheds new
light on the influence of intelligence, presenting it as the
fundamental, and generally ignored, 'missing dimension' of North
African domestic politics.
No external observer knows more about Myanmar's security and
intelligence apparatus than Andrew Selth. In this book he presents
an account of the structure and functions of Myanmar's deep state,
along with a tale of personal ambition, rivalry and ruthless power
politics worthy of John Le Carre. A thoroughly educative,
entertaining and intriguing read."" - Professor Michael Wesley,
Dean, College of Asia and the Pacific, The Australian National
University ""Andrew Selth has once again amply illustrated the
depth and penetration of his study of Myanmar/Burma and its
institutions. This work on the more recent aspects of the country's
intelligence apparatus goes beyond a masterful and comprehensive
analysis of the Burmese intelligence community, and probes the
social and institutional bases of the attitudes giving rise to that
critical aspect of power. We are once again in Dr Selth's debt.
This is required reading for serious observers of the Burmese
scene."" - David I. Steinberg, Distinguished Professor of Asian
Studies Emeritus, Georgetown University ""By lifting the lid on a
pervasive yet secretive intelligence apparatus, Andrew Selth makes
an outstanding contribution to Myanmar Studies. For scholars and
practitioners alike, this book provides an essential history of a
security state that remains powerful even during the transition
away from overt authoritarian rule."" - Professor Ian Holliday,
Vice-President (Teaching and Learning), The University of Hong Kong
Intelligence Operations: Understanding Data, Tools, People, and
Processes helps readers understand the various issues and
considerations an intelligence professional must tackle when
reviewing, planning, and managing intelligence operations,
regardless of level or environment. The book opens by introducing
the reader to the many defining concepts associated with
intelligence, as well as the main subject of intelligence: the
threat. Additional chapters examine the community of intelligence,
revealing where intelligence is actually practiced, as well as what
defines and characterizes intelligence operations. Readers learn
about the four critical components to every intelligence
operation-data, tools, people, and processes-and then explore the
various operational and analytic processes involved in greater
detail. Throughout, the text encourages discovery and discussion,
urging readers to first understand the material, then break it
down, adapt it, and apply it in a way that supports their
particular operations or requirements. Unique in approach and
designed to assist professionals at all levels, Intelligence
Operations is an excellent resource for both academic courses in
the subject and practical application by intelligence personnel.
Globalisation continues to challenge our world at unprecedented
speed. Technological innovations, changing geographical
developments, regional rivalries, and destruction of national
critical infrastructures in several Muslim states due to the US
so-called war on terrorism-all transformed the structures and
hierarchies of societies. The idea of the development of a nation
that sounds on tripods that are food, shelter, and security failed.
The Edward Snowden leaks challenged policymakers and the public
understanding and perspectives on the role of security intelligence
in liberal democratic states. The persisting imbalance of power in
the United States, its institutional turmoil, and intelligence war,
and the noticeably tilting power have made the country feel
vulnerable and prodded it into military ventures. The calibration
of Western allies around Whitehouse as the sole center of
globalization has only brought instability, destruction, and loss
of human lives.
An ancient esoteric object, once used by Elizabethan Magician John
Dee in his infamous occult rituals, attracts a deadly interest from
the clandestine world of outsourced military operations and leads
Antiquarian and former Scottish Military hero, Tavish Stewart, to
uncover a global conspiracy to control world leaders and enslave
the whole of humanity. Stewart's discovery leads him, and his
friends, into a race across the globe to locate ancient maps,
mysterious lost cities, magical relics and a forgotten civilisation
so ancient and advanced that it would rewrite human history.
Stewart must use all his Military and Martial Arts expertise to
overcome the elite warriors, weapons and technologies that are set
against him before a final apocalyptic confrontation in the
desolate wastes of Asia, to preserve the greatest secret of all
time!
Most discussions on electronic media and intellectual forums about
the effects of globalization on national security focus on violent
threats. Notwithstanding the plethora of books, journals and
research papers on national and international security, there is an
iota research work on issue of interconnectedness. The
interconnectedness of violent threats and their mounting effect
pose grave dangers to the aptitude of a state to professionally
secure its territorial integrity. Technological evolution and
aggrandized interlinkage of our world in general, and specifically
information technology, has affected people and society in
different ways. Daily life of every man and woman has become
influenced by these challenges. The twenty first century appeared
with different class of National Security threats. After the first
decade, world leaders, research scholars, journalists, politicians,
and security experts grasped that the world has become the most
dangerous place. The avoidance of war was the primary objective of
superpowers, but with the end of the Cold War, emergence of Takfiri
Jihadism, extremism, and terrorism prompted many unmatched
challenges. Home-grown extremism and radicalization continues to
expose a significant threat to the National Security of the EU and
Britain. The risks from state-based threats have both grown and
diversified. The unmethodical and impulsive use of a military-grade
nerve agent on British soil is the worse unlawful act of
bioterrorists.
Most discussions on electronic media and intellectual forums about
the effects of globalization on national security focus on violent
threats. Notwithstanding the plethora of books, journals and
research papers on national and international security, there is an
iota research work on issue of interconnectedness. The
interconnectedness of violent threats and their mounting effect
pose grave dangers to the aptitude of a state to professionally
secure its territorial integrity. Technological evolution and
aggrandized interlinkage of our world in general, and specifically
information technology, has affected people and society in
different ways. Daily life of every man and woman has become
influenced by these challenges. The twenty first century appeared
with different class of National Security threats. After the first
decade, world leaders, research scholars, journalists, politicians,
and security experts grasped that the world has become the most
dangerous place. The avoidance of war was the primary objective of
superpowers, but with the end of the Cold War, emergence of Takfiri
Jihadism, extremism, and terrorism prompted many unmatched
challenges. Home-grown extremism and radicalization continues to
expose a significant threat to the National Security of the EU and
Britain. The risks from state-based threats have both grown and
diversified. The unmethodical and impulsive use of a military-grade
nerve agent on British soil is the worse unlawful act of
bioterrorists.
The secret history of MI6 - from the Cold War to the present day.
The British Secret Service has been cloaked in secrecy and shrouded
in myth since it was created a hundred years ago. Our understanding
of what it is to be a spy has been largely defined by the fictional
worlds of James Bond and John le Carre. THE ART OF BETRAYAL
provides a unique and unprecedented insight into this secret world
and the reality that lies behind the fiction. It tells the story of
how the secret service has changed since the end of World War II
and by focusing on the people and the relationships that lie at the
heart of espionage, revealing the danger, the drama, the intrigue,
the moral ambiguities and the occasional comedy that comes with
working for British intelligence. From the defining period of the
early Cold War through to the modern day, MI6 has undergone a
dramatic transformation from a gung-ho, amateurish organisation to
its modern, no less controversial, incarnation. Gordon Corera
reveals the triumphs and disasters along the way. The grand dramas
of the Cold War and after - the rise and fall of the Berlin Wall,
the Cuban Missile Crisis, the 11 September 2001 attacks and the
Iraq war - are the backdrop for the human stories of the individual
spies whose stories form the centrepiece of the narrative. But some
of the individuals featured here, in turn, helped shape the course
of those events. Corera draws on the first-hand accounts of those
who have spied, lied and in some cases nearly died in service of
the state. They range from the spymasters to the agents they ran to
their sworn enemies. Many of these accounts are based on exclusive
interviews and access. From Afghanistan to the Congo, from Moscow
to the back streets of London, these are the voices of those who
have worked on the front line of Britain's secret wars. And the
truth is often more remarkable than the fiction.
The inside story of one of the most famous of all the 'back rooms'
of the Second World War - and of the men and women who worked for
it. Conceived by Winston Churchill to circumvent the delays,
frustrations and inefficiencies of the service ministries,
Department M.D.1. earned from its detractors the soubriquet
'Winston Churchill's Toyshop', yet from a tiny underground workshop
housed in the cellars of the London offices of Radio Normandie in
Portland Place, and subsequently from the 'stockbroker Tudor' of a
millionaire's country mansion in Buckinghamshire, came an
astonishing array of secret weapons ranging from the 'sticky bomb'
and 'limpet mine' to giant bridge-carrying assault tanks, as well
as the PIAT, a tank-destroying, hand-held mortar. Written by
Colonel Stuart Macrae, who helped found M.D.1. and was its
second-in-command throughout its life, the story is told of this
relatively unknown establishment and the weapons it developed which
helped destroy innumerable enemy tanks, aircraft and ships.
The incredible true story of the librarian, the Nazi spy and
Ireland's secret role in turning the tide of World War II When
unassuming librarian Richard Hayes, a gifted polymath and
cryptographer, was drafted by Irish intelligence services to track
the movements of a prolific Nazi spy, Hermann Goertz, Dublin became
the unlikely venue for one of the most thrilling episodes in Irish
history. In a complex game of cat-and-mouse that would wind its way
through the city and its suburbs, Code Breaker reveals how Richard
Hayes cracked a code that helped turn the tide of World War II, and
uncovers a secret history of the capital that has remained hidden
in plain view for the past 70 years.
The debate over cyber technology has resulted in new considerations
for national security operations. States find themselves in an
increasingly interconnected world with a diverse threat spectrum
and little understanding of how decisions are made within this
amorphous domain. With The Decision to Attack, Aaron Franklin
Brantly investigates how states decide to employ cyber in military
and intelligence operations against other states and how rational
those decisions are. In his examination, Brantly contextualizes
broader cyber decision-making processes into a systematic expected
utility-rational choice approach to provide a mathematical
understanding of the use of cyber weapons at the state level.
Over Iran an RAF Canberra flies a feint towards the Soviet border,
to provoke Soviet air defence radar operators to reveal their
location. He will not deliberately enter Soviet airspace, but the
possibilities for miscalculation, or misunderstanding leading to
tragedy are always there. These flights cost the lives of over 150
US airmen by the end of the Cold War. Also cruising nearby in
Iranian airspace, is a heavily modified US Air Force C-130
transport aircraft. Onboard 10 Special Equipment Operators are
listening through their headphones for Soviet radio and radar
activity. Hearing Soviet ground controllers scramble fighters to
intercept the Canberra. The US operators alert the British aircraft
to the closing MiG's and it quickly alters course away from the
border. This was the life of crews involved in Cold War
intelligence collection flights. Enormous resources were committed
to these operations and they shaped the structure of much modern
military intelligence collection, analysis and sharing. This book
explores their scope, conduct, plus the politics and new
technologies behind these operations that started in the dying
embers of World War Two. It examines how these often complex
missions were planned, coordinated and flown and is supported by
first-hand accounts from pilots, aircrews and intelligence
analysts. It utilises recently declassified British and US archive
material and is illustrated with a wide range of images. The author
examines European and Far East operations and a number of topics
not previously covered in depth elsewhere. These include
authorisation and coordination arrangements for conduct of
overflight and peripheral missions; plus the part played by key
third party states in operations in Scandinavia, Turkey and others.
He looks at why Tyuratam complex was of such major intelligence
interest and details the many resources targeted against it. He
looks at some of the less explored elements of U-2 operations,
including British involvement, plus the development of powerful
lenses intended to enable very long range peripheral photography
and why the long mythologised `Kapustin Yar' overflight probably
never took place with new details and analysis. This comprehensive
book links together the realities of flying, advanced technology
and politics to provide a detailed and illustrated examination of
Cold War aerial intelligence collection.
Strategy in the Missile Age first reviews the development of modern
military strategy to World War II, giving the reader a reference
point for the radical rethinking that follows, as Dr. Brodie
considers the problems of the Strategic Air Command, of civil
defense, of limited war, of counterforce or pre-emptive strategies,
of city-busting, of missile bases in Europe, and so on. The book,
unlike so many on modern military affairs, does not present a
program or defend a policy, nor is it a brief for any one of the
armed services. It is a balanced analysis of the requirements of
strength for the 1960's, including especially the military posture
necessary to prevent war. A unique feature is the discussion of the
problem of the cost of preparedness in relation to the requirements
of the national economy, so often neglected by other military
thinkers. Originally published in 1959. The Princeton Legacy
Library uses the latest print-on-demand technology to again make
available previously out-of-print books from the distinguished
backlist of Princeton University Press. These editions preserve the
original texts of these important books while presenting them in
durable paperback and hardcover editions. The goal of the Princeton
Legacy Library is to vastly increase access to the rich scholarly
heritage found in the thousands of books published by Princeton
University Press since its founding in 1905.
The book is relevant to all those who wish to know why and how
terrorism shifted from West Asia to South and Southeast Asia and
Africa. This significant shift needs to be studied in depth for
policy formulation and future strategy. The book will reveal that
the so called Islamic Terrorism is traceable to Pakistan from
concept to reality. Pakistan as a state has provided the platform
for outward and inward march of Jihadis. For this to happen, the
ISI has been playing the principal role. Thus, the focus in this
book is on ISI as an instrument of spreading jihadi culture in
Pakistan and elsewhere.
Written by the renowned expert Nigel West, this book exposes the
operations of Britain's overseas intelligence-gathering
organisation, the famed Secret Intelligence Service, MI6, and
traces its origins back to its inception in 1909. In this
meticulously researched account, its activities and structure are
described in detail, using original secret service documents. The
main body of the book concerns MI6's operations during the Second
World War, and includes some remarkable successes and failures,
including how MI6 financed a glamorous confidant of the German
secret service; how a suspected French traitor was murdered by
mistake; how Franco's military advisors were bribed to keep Spain
out of the war; how members of the Swedish secret police were
blackmailed into helping the British war effort; how a sabotage
operation in neutral Tangiers enabled the Allied landings in North
Africa to proceed undetected; and how Britain's generals ignored
the first ULTRA decrypts because MI6 said that the information had
come from a well-placed source called BONIFACE'. In this new
edition, operations undertaken by almost all of MI6's overseas
stations are recounted in extraordinary detail. They will fascinate
both the professional intelligence officer and the general reader.
The book includes organisational charts to illustrate MI6's
internal structure and its wartime network of overseas stations.
Backed by numerous interviews with intelligence officers and their
agents, this engaging inside story throws light on many wartime
incidents that had previously remained unexplained.
|
You may like...
Flex
Dizzee Rascal
CD
R44
Discovery Miles 440
Double Down
Chriss Cudney
Hardcover
R629
Discovery Miles 6 290
|