![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The General Staff Division of Fremde Heere Ost (Military Intelligence Service, Eastern Section) which from 1942 was led by Reinhard Gehlen, was the nerve-centre of Hitler's military reconnaissance on the Eastern Front. This department worked professionally and was operationally and tactically reliable. However, at a strategic level there were clear deficits: the industrial capacity of the Soviet arms industry, the politico-military intentions and the details of the Red Army's plans for their offensive remained for the most part hidden from the department. When the Second World War ended, Gehlen put the documents and personnel of Fremde Heere Ost at the disposal of the Americans. With their support he was able to build a new foreign secret service which later evolved into the Federal Intelligence Service. In this book, military historian Magnus Pahl presents a complete overview of the structure, personnel and working methods of Fremde Heere Ost based on a tremendous array of archival sources. This work includes an extensive case study of the East Pomeranian Operation 1945. Pahl's study is a significant contribution to our understanding of German strategic, operational and tactical thinking on the Eastern Front 1941-45.
In a rapidly changing environment, Intelligence Surveillance developed through different types of technologies, software, strategies and drones operations in Europe and the United Kingdom. There are various forms of surveillance mechanisms, including Human Agents, Computer Programs, and Global Positioning Satellite Devices. These surveillance devices are now even encroaching into the personal domain of the individuals without the knowledge of the individual being watched. In a surveillance state, people live in consternation, fear, and struggling to protect their privacy, family life, business secrets, and data. In a short period of time, it has amassed a rather sordid history of citizen surveillance- and it continues to be unlawful. These are some of the issues discussed in the book which has varied articles from the experts on the subject.
Globalisation continues to challenge our world at unprecedented speed. Technological innovations, changing geographical developments, regional rivalries, and destruction of national critical infrastructures in several Muslim states due to the US so-called war on terrorism-all transformed the structures and hierarchies of societies. The idea of the development of a nation that sounds on tripods that are food, shelter, and security failed. The Edward Snowden leaks challenged policymakers and the public understanding and perspectives on the role of security intelligence in liberal democratic states. The persisting imbalance of power in the United States, its institutional turmoil, and intelligence war, and the noticeably tilting power have made the country feel vulnerable and prodded it into military ventures. The calibration of Western allies around Whitehouse as the sole center of globalization has only brought instability, destruction, and loss of human lives.
Intelligence Operations: Understanding Data, Tools, People, and Processes helps readers understand the various issues and considerations an intelligence professional must tackle when reviewing, planning, and managing intelligence operations, regardless of level or environment. The book opens by introducing the reader to the many defining concepts associated with intelligence, as well as the main subject of intelligence: the threat. Additional chapters examine the community of intelligence, revealing where intelligence is actually practiced, as well as what defines and characterizes intelligence operations. Readers learn about the four critical components to every intelligence operation-data, tools, people, and processes-and then explore the various operational and analytic processes involved in greater detail. Throughout, the text encourages discovery and discussion, urging readers to first understand the material, then break it down, adapt it, and apply it in a way that supports their particular operations or requirements. Unique in approach and designed to assist professionals at all levels, Intelligence Operations is an excellent resource for both academic courses in the subject and practical application by intelligence personnel.
No external observer knows more about Myanmar's security and intelligence apparatus than Andrew Selth. In this book he presents an account of the structure and functions of Myanmar's deep state, along with a tale of personal ambition, rivalry and ruthless power politics worthy of John Le Carre. A thoroughly educative, entertaining and intriguing read."" - Professor Michael Wesley, Dean, College of Asia and the Pacific, The Australian National University ""Andrew Selth has once again amply illustrated the depth and penetration of his study of Myanmar/Burma and its institutions. This work on the more recent aspects of the country's intelligence apparatus goes beyond a masterful and comprehensive analysis of the Burmese intelligence community, and probes the social and institutional bases of the attitudes giving rise to that critical aspect of power. We are once again in Dr Selth's debt. This is required reading for serious observers of the Burmese scene."" - David I. Steinberg, Distinguished Professor of Asian Studies Emeritus, Georgetown University ""By lifting the lid on a pervasive yet secretive intelligence apparatus, Andrew Selth makes an outstanding contribution to Myanmar Studies. For scholars and practitioners alike, this book provides an essential history of a security state that remains powerful even during the transition away from overt authoritarian rule."" - Professor Ian Holliday, Vice-President (Teaching and Learning), The University of Hong Kong
An ancient esoteric object, once used by Elizabethan Magician John Dee in his infamous occult rituals, attracts a deadly interest from the clandestine world of outsourced military operations and leads Antiquarian and former Scottish Military hero, Tavish Stewart, to uncover a global conspiracy to control world leaders and enslave the whole of humanity. Stewart's discovery leads him, and his friends, into a race across the globe to locate ancient maps, mysterious lost cities, magical relics and a forgotten civilisation so ancient and advanced that it would rewrite human history. Stewart must use all his Military and Martial Arts expertise to overcome the elite warriors, weapons and technologies that are set against him before a final apocalyptic confrontation in the desolate wastes of Asia, to preserve the greatest secret of all time!
Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.
Delving into an encyclopaedic array of little-known primary sources, William Beaver uncovers a vigorous intelligence function at the heart of Victoria's Empire. A cadre of exceptionally able and dedicated officers, they formed the War Office Intelligence Division, which gave Britain's foreign policy its backbone in the heyday of imperial acquisition. Under Every Leaf is the first major study to examine the seminal role of intelligence gathering and analysis in `England's era'. So well did Great Britain play her hand, it seemed to all the world that, as the Farsi expression goes, `Anywhere a leaf moves, underneath you will find an Englishman.' The historian William Beaver is also a soldier, corporate communicator, arts editor and Anglican priest.
Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.
The secret history of MI6 - from the Cold War to the present day. The British Secret Service has been cloaked in secrecy and shrouded in myth since it was created a hundred years ago. Our understanding of what it is to be a spy has been largely defined by the fictional worlds of James Bond and John le Carre. THE ART OF BETRAYAL provides a unique and unprecedented insight into this secret world and the reality that lies behind the fiction. It tells the story of how the secret service has changed since the end of World War II and by focusing on the people and the relationships that lie at the heart of espionage, revealing the danger, the drama, the intrigue, the moral ambiguities and the occasional comedy that comes with working for British intelligence. From the defining period of the early Cold War through to the modern day, MI6 has undergone a dramatic transformation from a gung-ho, amateurish organisation to its modern, no less controversial, incarnation. Gordon Corera reveals the triumphs and disasters along the way. The grand dramas of the Cold War and after - the rise and fall of the Berlin Wall, the Cuban Missile Crisis, the 11 September 2001 attacks and the Iraq war - are the backdrop for the human stories of the individual spies whose stories form the centrepiece of the narrative. But some of the individuals featured here, in turn, helped shape the course of those events. Corera draws on the first-hand accounts of those who have spied, lied and in some cases nearly died in service of the state. They range from the spymasters to the agents they ran to their sworn enemies. Many of these accounts are based on exclusive interviews and access. From Afghanistan to the Congo, from Moscow to the back streets of London, these are the voices of those who have worked on the front line of Britain's secret wars. And the truth is often more remarkable than the fiction.
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
For almost sixty years after their deaths, three men, whose brave actions shortened the Second World War by as much as two years, remained virtually unknown and uncelebrated. Two lost their lives retrieving vital German codebooks from a sinking U-boat. The third survived the war, only to die in a house fire soon afterwards. But it was the precious documents they seized in October 1942 that enabled Bletchley Park's code-breakers to crack Enigma and so win the Battle of the Atlantic. Now recognised as a pivotal moment in world history, three British servicemen made it possible to finally beat the U-boats, but at the time not even their families could be told of the importance of their deeds. Shrouded in secrecy for decades, then recast as fictional Americans by the Hollywood film U-571, this book sets the record straight. It is written in celebration of Colin Grazier GC, Tony Fasson GC, and Tommy Brown GM - the REAL Enigma heroes.
The real story of how Winston Churchill and the British mastered deception to defeat the Nazis - by conning the Kaiser, hoaxing Hitler and using brains to outwit brawn. By June 1940, most of Europe had fallen to the Nazis and Britain stood alone. So, with Winston Churchill in charge the British bluffed their way out of trouble, drawing on the trickery which had helped them win the First World War. They broadcast outrageous British propaganda on pretend German radio stations, broke German secret codes and eavesdropped on their messages. Every German spy in Britain was captured and many were used to send back false information to their controllers. Forged documents misled their intelligence. Bogus wireless traffic from entire phantom armies, dummy airfields with model planes, disguised ships and inflatable rubber tanks created a vital illusion of strength. Culminating in the spectacular misdirection that was so essential to the success of D-Day in 1944, Churchill's Wizards: The British Genius for Deception 1914-1945 is a thrilling work of popular military history filled with almost unbelievable stories of bravery, creativity and deception. Nicholas Rankin is the author of Dead Man's Chest, Telegram From Guernica and Ian Fleming's Commandos. 'This is a story clamouring to be told. We could not have imagined the scope of the inventiveness, the daring of these people's imaginations . . . I could not stop reading this book.' Doris Lessing
'This is what an SAS career is really like' AUSTRALIAN DEFENCE MAGAZINE Elite SAS Patrol Commander Stuart 'Nev' Bonner takes us inside the extraordinary and dangerous world of secret combat operations in this explosive, behind-the-scenes look at life inside the SAS. A world where capture means torture or death, and every move is trained for with precision detail to bring elite soldiers to the very peak of fighting ability. In a career spanning twenty years, fourteen of them in the SAS, Bonner shares with us the inside story of being out in front - and often behind enemy lines. From patrolling the mountains of East Timor to covert operations in Bougainville and the Solomon Islands, from sweeping into the Iraqi desert ahead of invading US forces to cripple Saddam Hussein's communications to patrolling in war-torn Baghdad and being in the middle of the disastrous Operation Anaconda in Afghanistan - this is a no-holds-barred account of what it's like to live, eat and breathe SAS. Now part of the HACHETTE MILITARY COLLECTION.
Strategy in the Missile Age first reviews the development of modern military strategy to World War II, giving the reader a reference point for the radical rethinking that follows, as Dr. Brodie considers the problems of the Strategic Air Command, of civil defense, of limited war, of counterforce or pre-emptive strategies, of city-busting, of missile bases in Europe, and so on. The book, unlike so many on modern military affairs, does not present a program or defend a policy, nor is it a brief for any one of the armed services. It is a balanced analysis of the requirements of strength for the 1960's, including especially the military posture necessary to prevent war. A unique feature is the discussion of the problem of the cost of preparedness in relation to the requirements of the national economy, so often neglected by other military thinkers. Originally published in 1959. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
The book is relevant to all those who wish to know why and how terrorism shifted from West Asia to South and Southeast Asia and Africa. This significant shift needs to be studied in depth for policy formulation and future strategy. The book will reveal that the so called Islamic Terrorism is traceable to Pakistan from concept to reality. Pakistan as a state has provided the platform for outward and inward march of Jihadis. For this to happen, the ISI has been playing the principal role. Thus, the focus in this book is on ISI as an instrument of spreading jihadi culture in Pakistan and elsewhere.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analyzed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Applicants to the Central Intelligence Agency often asked Edward Mickolus what they might expect in a career there. Mickolus, who was a CIA intelligence officer, whose duties also included recruiting and public affairs, never had a simple answer. If applicants were considering a life in the National Clandestine Service, the answer was easy. Numerous memoirs show the lives of operations officers collecting secret intelligence overseas, conducting counterintelligence investigations, and running covert action programs. But the CIA isn't only about case officers in far-flung areas of the world, recruiting spies to steal secrets. For an applicant considering a career as an analyst, a support officer, a scientist, or even a secretary, few sources provide reliable insight into what a more typical career at the CIA might look like. This collection of the exploits and insights of twenty-nine everyday agency employees is Mickolus's answer. From individuals who have served at the highest levels of the agency to young officers just beginning their careers, Stories from Langley reveals the breadth of career opportunities available at the CIA and offers advice from agency officers themselves. "Stories from Langley provides an invaluable behind-the-scenes look at professional life inside the CIA. While many have written about great operational exploits, few have focused on the daily lives and challenges of analysts, support officers, and engineers, members of the organization whose work is as essential if not as glamorous in the public eye. Young men and women wondering about what to expect in these varied CIA careers will find the book fascinating, revealing, and perhaps even enticing."-George Tenet, former director of Central Intelligence for the CIA "One of the most difficult aspects of intelligence is trying to convey to outsiders what that life-especially as an analyst-is really like. Most fiction is overblown and inevitably focuses on operations and spying. Stories from Langley is a delightful foray into the actual experiences of a broad range of intelligence officers and fills an important gap in our intelligence literature. Anyone interested in the nuts and bolts of an intelligence career will find this a useful and worthwhile read."-Mark Lowenthal, former assistant director of Central Intelligence for Analysis& Production for the CIA and author of Intelligence: From Secrets to Policy
A highly valuable resource for students of intelligence studies, strategy and security, and foreign policy, this volume provides readers with an accessible and comprehensive exploration of U.S. espionage activities that addresses both the practical and ethical implications that attend the art and science of spying. Essentials of Strategic Intelligence investigates a subject unknown to or misunderstood by most American citizens: how U.S. foreign and security policy is derived from the information collection operations and data analysis by the sixteen major U.S. intelligence agencies. The essays in this work draw back the curtain on the hidden side of America's government, explaining the roles of various intelligence missions, justifying the existence of U.S. intelligence agencies, and addressing the complex moral questions that arise in the conduct of secret operations. After an introductory overview, the book presents accessibly written essays on the key topics: intelligence collection-and-analysis, counterintelligence, covert action, and intelligence accountability. Readers will understand how intelligence directly informs policymakers and why democracies need secret agencies; learn how the CIA has become deeply involved in the war-like assassination operations that target suspected foreign terrorists, even some individuals who are American citizens; and appreciate how the existence of-and our reliance on-these intelligence agencies poses challenges for democratic governance. Provides a comprehensive, up-to-date examination of all aspects of intelligence by experts in the field, from collection-and-analysis and counterintelligence to covert action and accountability Probes into how the United States' intelligence agencies attempt to protect the nation from cyberattacks by foreign nations and terrorist groups-and documents the successes and failures Documents the involvement of the National Security Agency (NSA) in bulk "metadata" collection of information on the telephone records and social media communications of American citizens Examines the effects that have resulted from major leaks in the U.S. government, from Wikileaks to the NSA Snowden leaks
On a chilly autumn night in 1942, a German spy was rowed ashore from a U-boat off the GaspT coast to begin a deadly espionage mission against the Allies. Thanks to an alert hotel-keeper's son, Abwehr agent 'Bobbi' was captured and forced by the RCMP to become Canada's first double-agent. For nearly fifty years the full story of the spy case, code-named Watchdog, was suppressed. Now, author Dean Beeby has uncovered nearly five thousand pages of formerly classified government documents, obtained through the Access to Information Act from the RCMP, the Canadian Security Intelligence Service, the Department of Justice, the National Archives of Canada, and Naval Intelligence. He has supplemented this treasure trove with research among still heavily censored FBI files, and interviews with surviving participants in the Watchdog story. Although British records of the case remain closed, Beeby also interviewed the MI5 case officer for Watchdog, the late Cyril Mills. The operation was Canada's first major foray into international espionage, predating the Gouzenko defection by three years. Watchdog, as Beeby reveals, was not the Allied success the RCMP has long claimed. Agent 'Bobbi' gradually ensnared his captors with a finely spun web of lies, transforming himself into a triple-agent who fed useful information back to Hamburg. Beeby argues that Canadian authorities were woefully unprepared for the subtleties of wartime counter-espionage, and that their mishandling of the case had long-term consequences that affected relations with their intelligence partners throughout the Cold War.
Command, Control, Communications and Intelligence form the backbone of the Army's operating system. But while much attention has been given in the literature to the other three elements, Communications in the British Army during World War II have been widely ignored. This book rectifies the omission. It shows that failures in front line communications contributed to several of the set backs suffered by the Army but also that ultimate victory was only achieved after a successful communications system was in place. It explains how the outcome of the main campaigns in Europe and North Africa depended on communications, how the system operated and how it evolved from a relatively primitive and inadequately supplied state at Dunkirk to a generally effective system at the time of the Rhine crossings. Problems still occurred however, for example at infantry platoon level and famously with paratrooper communications at Arnhem, often simply due to the shortcomings of existing technology. The book concludes that it is only very recently that advances in technology have allowed those problems to be solved. |
![]() ![]() You may like...
Cognitive Psychology - EMEA Edition
E. Bruce Goldstein, Johanna C. van Hooff
Paperback
The Elamite World
Javier Alvarez-Mon, Gian Pietro Basello, …
Paperback
R1,592
Discovery Miles 15 920
Designing and Implementing Effective…
Kenneth J. Linfield, Steven Kniffley
Hardcover
R4,012
Discovery Miles 40 120
Formafatal - Award-winning Architectural…
Formafatal Formafatal
Hardcover
|