![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
No external observer knows more about Myanmar's security and intelligence apparatus than Andrew Selth. In this book he presents an account of the structure and functions of Myanmar's deep state, along with a tale of personal ambition, rivalry and ruthless power politics worthy of John Le Carre. A thoroughly educative, entertaining and intriguing read."" - Professor Michael Wesley, Dean, College of Asia and the Pacific, The Australian National University ""Andrew Selth has once again amply illustrated the depth and penetration of his study of Myanmar/Burma and its institutions. This work on the more recent aspects of the country's intelligence apparatus goes beyond a masterful and comprehensive analysis of the Burmese intelligence community, and probes the social and institutional bases of the attitudes giving rise to that critical aspect of power. We are once again in Dr Selth's debt. This is required reading for serious observers of the Burmese scene."" - David I. Steinberg, Distinguished Professor of Asian Studies Emeritus, Georgetown University ""By lifting the lid on a pervasive yet secretive intelligence apparatus, Andrew Selth makes an outstanding contribution to Myanmar Studies. For scholars and practitioners alike, this book provides an essential history of a security state that remains powerful even during the transition away from overt authoritarian rule."" - Professor Ian Holliday, Vice-President (Teaching and Learning), The University of Hong Kong
Globalisation continues to challenge our world at unprecedented speed. Technological innovations, changing geographical developments, regional rivalries, and destruction of national critical infrastructures in several Muslim states due to the US so-called war on terrorism-all transformed the structures and hierarchies of societies. The idea of the development of a nation that sounds on tripods that are food, shelter, and security failed. The Edward Snowden leaks challenged policymakers and the public understanding and perspectives on the role of security intelligence in liberal democratic states. The persisting imbalance of power in the United States, its institutional turmoil, and intelligence war, and the noticeably tilting power have made the country feel vulnerable and prodded it into military ventures. The calibration of Western allies around Whitehouse as the sole center of globalization has only brought instability, destruction, and loss of human lives.
Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.
Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.
An ancient esoteric object, once used by Elizabethan Magician John Dee in his infamous occult rituals, attracts a deadly interest from the clandestine world of outsourced military operations and leads Antiquarian and former Scottish Military hero, Tavish Stewart, to uncover a global conspiracy to control world leaders and enslave the whole of humanity. Stewart's discovery leads him, and his friends, into a race across the globe to locate ancient maps, mysterious lost cities, magical relics and a forgotten civilisation so ancient and advanced that it would rewrite human history. Stewart must use all his Military and Martial Arts expertise to overcome the elite warriors, weapons and technologies that are set against him before a final apocalyptic confrontation in the desolate wastes of Asia, to preserve the greatest secret of all time!
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
The highly eccentric Alfred Dillwyn Knox, known simply as 'Dilly', was one of the leading figures in the British codebreaking successes of the two world wars. During the first, he was the chief codebreaker in the Admiralty, breaking the German Navy's main flag code, before going on to crack the German Enigma ciphers during the Second World War at Bletchley Park.Here, he enjoyed the triumphant culmination of his life's work: a reconstruction of the Enigma machine used by the Abwehr, the German Secret Service. This kept the British fully aware of what the German commanders knew about Allied plans, allowing MI5 and MI6 to use captured German spies to feed false information back to the Nazi spymasters.Mavis Batey was one of 'Dilly's girls', the young female codebreakers who helped him to break the various Enigma ciphers. She was called upon to advise Kate Winslet, star of the film Enigma, on what it was like to be one of the few female codebreakers at Bletchley Park. This gripping new edition of Batey's critically acclaimed book reveals the vital part Dilly played in the deception operation that ensured the success of the D-Day landings, altering the course of the Second World War.
Strategy in the Missile Age first reviews the development of modern military strategy to World War II, giving the reader a reference point for the radical rethinking that follows, as Dr. Brodie considers the problems of the Strategic Air Command, of civil defense, of limited war, of counterforce or pre-emptive strategies, of city-busting, of missile bases in Europe, and so on. The book, unlike so many on modern military affairs, does not present a program or defend a policy, nor is it a brief for any one of the armed services. It is a balanced analysis of the requirements of strength for the 1960's, including especially the military posture necessary to prevent war. A unique feature is the discussion of the problem of the cost of preparedness in relation to the requirements of the national economy, so often neglected by other military thinkers. Originally published in 1959. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analyzed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Applicants to the Central Intelligence Agency often asked Edward Mickolus what they might expect in a career there. Mickolus, who was a CIA intelligence officer, whose duties also included recruiting and public affairs, never had a simple answer. If applicants were considering a life in the National Clandestine Service, the answer was easy. Numerous memoirs show the lives of operations officers collecting secret intelligence overseas, conducting counterintelligence investigations, and running covert action programs. But the CIA isn't only about case officers in far-flung areas of the world, recruiting spies to steal secrets. For an applicant considering a career as an analyst, a support officer, a scientist, or even a secretary, few sources provide reliable insight into what a more typical career at the CIA might look like. This collection of the exploits and insights of twenty-nine everyday agency employees is Mickolus's answer. From individuals who have served at the highest levels of the agency to young officers just beginning their careers, Stories from Langley reveals the breadth of career opportunities available at the CIA and offers advice from agency officers themselves. "Stories from Langley provides an invaluable behind-the-scenes look at professional life inside the CIA. While many have written about great operational exploits, few have focused on the daily lives and challenges of analysts, support officers, and engineers, members of the organization whose work is as essential if not as glamorous in the public eye. Young men and women wondering about what to expect in these varied CIA careers will find the book fascinating, revealing, and perhaps even enticing."-George Tenet, former director of Central Intelligence for the CIA "One of the most difficult aspects of intelligence is trying to convey to outsiders what that life-especially as an analyst-is really like. Most fiction is overblown and inevitably focuses on operations and spying. Stories from Langley is a delightful foray into the actual experiences of a broad range of intelligence officers and fills an important gap in our intelligence literature. Anyone interested in the nuts and bolts of an intelligence career will find this a useful and worthwhile read."-Mark Lowenthal, former assistant director of Central Intelligence for Analysis& Production for the CIA and author of Intelligence: From Secrets to Policy
The book is relevant to all those who wish to know why and how terrorism shifted from West Asia to South and Southeast Asia and Africa. This significant shift needs to be studied in depth for policy formulation and future strategy. The book will reveal that the so called Islamic Terrorism is traceable to Pakistan from concept to reality. Pakistan as a state has provided the platform for outward and inward march of Jihadis. For this to happen, the ISI has been playing the principal role. Thus, the focus in this book is on ISI as an instrument of spreading jihadi culture in Pakistan and elsewhere.
Recent disclosures concerning the size and scope of the National Security Agency's (NSA's) surveillance activities both in the United States and abroad have prompted a flurry of congressional activity aimed at reforming the foreign intelligence gathering process. While some measures would overhaul the substantive legal rules of the USA PATRIOT Act or other provisions of the Foreign Intelligence Surveillance Act (FISA), there are a host of bills designed to make procedural and operational changes to the Foreign Intelligence Surveillance Court (FISC), a specialised Article III court that hears applications and grants orders approving of certain foreign intelligence gathering activities, and the Foreign Intelligence Surveillance Court of Review, a court that reviews rulings of the FISC. This book will explore a selection of these proposals and address potential legal questions such proposals may raise.
This book presents the final report of the review group on intelligence and communications technologies. Recommendations are provided that are designed to protect national security and maintain intelligence capabilities while also respecting our longstanding commitment to privacy, civil liberties, and the trust of allies abroad, with due consideration of reducing the risk of unauthorised disclosures.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analysed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
On a chilly autumn night in 1942, a German spy was rowed ashore from a U-boat off the GaspT coast to begin a deadly espionage mission against the Allies. Thanks to an alert hotel-keeper's son, Abwehr agent 'Bobbi' was captured and forced by the RCMP to become Canada's first double-agent. For nearly fifty years the full story of the spy case, code-named Watchdog, was suppressed. Now, author Dean Beeby has uncovered nearly five thousand pages of formerly classified government documents, obtained through the Access to Information Act from the RCMP, the Canadian Security Intelligence Service, the Department of Justice, the National Archives of Canada, and Naval Intelligence. He has supplemented this treasure trove with research among still heavily censored FBI files, and interviews with surviving participants in the Watchdog story. Although British records of the case remain closed, Beeby also interviewed the MI5 case officer for Watchdog, the late Cyril Mills. The operation was Canada's first major foray into international espionage, predating the Gouzenko defection by three years. Watchdog, as Beeby reveals, was not the Allied success the RCMP has long claimed. Agent 'Bobbi' gradually ensnared his captors with a finely spun web of lies, transforming himself into a triple-agent who fed useful information back to Hamburg. Beeby argues that Canadian authorities were woefully unprepared for the subtleties of wartime counter-espionage, and that their mishandling of the case had long-term consequences that affected relations with their intelligence partners throughout the Cold War.
A highly valuable resource for students of intelligence studies, strategy and security, and foreign policy, this volume provides readers with an accessible and comprehensive exploration of U.S. espionage activities that addresses both the practical and ethical implications that attend the art and science of spying. Essentials of Strategic Intelligence investigates a subject unknown to or misunderstood by most American citizens: how U.S. foreign and security policy is derived from the information collection operations and data analysis by the sixteen major U.S. intelligence agencies. The essays in this work draw back the curtain on the hidden side of America's government, explaining the roles of various intelligence missions, justifying the existence of U.S. intelligence agencies, and addressing the complex moral questions that arise in the conduct of secret operations. After an introductory overview, the book presents accessibly written essays on the key topics: intelligence collection-and-analysis, counterintelligence, covert action, and intelligence accountability. Readers will understand how intelligence directly informs policymakers and why democracies need secret agencies; learn how the CIA has become deeply involved in the war-like assassination operations that target suspected foreign terrorists, even some individuals who are American citizens; and appreciate how the existence of-and our reliance on-these intelligence agencies poses challenges for democratic governance. Provides a comprehensive, up-to-date examination of all aspects of intelligence by experts in the field, from collection-and-analysis and counterintelligence to covert action and accountability Probes into how the United States' intelligence agencies attempt to protect the nation from cyberattacks by foreign nations and terrorist groups-and documents the successes and failures Documents the involvement of the National Security Agency (NSA) in bulk "metadata" collection of information on the telephone records and social media communications of American citizens Examines the effects that have resulted from major leaks in the U.S. government, from Wikileaks to the NSA Snowden leaks
Command, Control, Communications and Intelligence form the backbone of the Army's operating system. But while much attention has been given in the literature to the other three elements, Communications in the British Army during World War II have been widely ignored. This book rectifies the omission. It shows that failures in front line communications contributed to several of the set backs suffered by the Army but also that ultimate victory was only achieved after a successful communications system was in place. It explains how the outcome of the main campaigns in Europe and North Africa depended on communications, how the system operated and how it evolved from a relatively primitive and inadequately supplied state at Dunkirk to a generally effective system at the time of the Rhine crossings. Problems still occurred however, for example at infantry platoon level and famously with paratrooper communications at Arnhem, often simply due to the shortcomings of existing technology. The book concludes that it is only very recently that advances in technology have allowed those problems to be solved.
Recently, there have been multiple high-profile incidents involving the release of classified government information. Perhaps most prominent was Wikileaks.org's unauthorised publication of more than 600,000 classified Department of Defense documents. Such incidents have further heightened congressional, media and public interest in classified information policy. This book provides information on classified information policy, also known as security classification policy and national security classification information policy. It discusses the history, costs and agencies assigned roles in classified information policy and focuses on Executive Order 13526, which establishes much of the current policy and possible oversight issues for Congress.
The amount of publicly and often freely available information is
staggering. Yet, the intelligence community still continues to
collect and use information in the same manner as during WWII, when
the OSS set out to learn as much as possible about Nazi Germany and
Imperial Japan by scrutinizing encyclopedias, guide books, and
short-wave radio. Today, the supply of information is greater than
any possible demand, and anyone can provide information. In effect,
intelligence analysts are drowning in information.
On January 26, 1993, a young Palestinian man named Abdel Nasser Zaben was arrested and incarcerated in New York City for kidnapping and robbery. Just thirty days later, while he remained locked up, radical Islamic fundamentalists detonated a bomb in the World Trade Center. These two events, connected by common threads, signaled the coming of jihad to America. From the seemingly insulated environment of prison, this same young man, thought to have been merely a common criminal, swore allegiance to Osama bin Laden and began to convert other young minds to the cause. A dangerous terrorist recruitment cell had been born. How did it happen?Through the story of Abdel Nasser Zaben s recruitment efforts in prison, "The Fertile Soil of Jihad" explores in vivid detail how the American prison subculture fosters terrorism. Dunleavy shows how Zaben carefully and knowingly selected the most likely candidates for conversion to his cause. He reveals how Zaben used his apprentice role in the prison chaplain s office as a cover for his work and how prison resources were used in the service of terrorism. This book yields invaluable insights for intelligence and corrections professionals as well as informed citizens eager to learn what progress the U.S. government is making in countering terrorism.
The post-9/11 world has witnessed a rebirth of irregular and asymmetrical warfare, which, in turn, has led to an increase in conflicts between conventional armies and non-state armed groups. In their haste to respond to the threat from insurgencies, nations often fail to plan effectively not only for combat operations but also for withdrawal, which is inevitable, win or lose. In order to answer the question of how to withdraw from engagement with an insurgency, Gleis examines how insurgencies are conducted and what, if anything, is unique about an Islamist insurgency. He then proposes ways to combat these groups successfully and to disentangle one’s military forces from the war once strategic objectives have been met—or once it is clear that they cannot be. Because this type of warfare is dynamic and ever-changing, this book is not meant to suggest a set of cookie-cutter solutions for how to withdraw from insurgencies. Rather, the author analyzes six counterinsurgency operations that have taken place in the past, with the intention of gleaning from them as many lessons as possible to better prepare for future withdrawals.The literature on how wars end has failed to explore irregular warfare.This much needed reexamination serves as an indispensable starting point.
In the 2010 federal election, independent candidate Andrew Wilkie grabbed headlines after winning the seat of Denison, and with it a key role in deciding who would form the next government of Australia.Before he was a politician, however, Wilkie was Australia's most talked-about whistleblower. In March 2003, Wilkie resigned from Australia's peak intelligence agency in protest over the looming war in Iraq. He was the only serving intelligence officer from the 'coalition of the willing' - the US, the UK and Australia - to do so, and his dramatic move was reported throughout the world. Wilkie's act of conscience put him on a collision course with the Australian government. Why was he willing to risk his career and reputation to tell the truth? What happened when he decided to take a stand? In Axis of Deceit, Wilkie tells his story. He exposes how governments skewed, spun and fabricated intelligence advice. And he offers a rare glimpse into the world of international intelligence and life as a spook. With a brand-new preface, this is the fascinating inside story of a man now set to play a pivotal role in our public life.
The British codebreakers at Bletchley Park are now believed to have shortened the duration of the Second World War by up to two years. During the dark days of 1941, as Britain stood almost alone against the the Nazis, this remarkable achievement seemed impossible. This extraordinary book, originally published as Action This Day, includes descriptions by some of Britain's foremost historians of the work of Bletchley Park, from the breaking ofEnigma and other wartime codes to the invention of modern computing, and its influence on Cold War codebreaking. Crucially, it features personal reminiscences and very human stories of wartime codebreaking from former Bletchley Park codebreakers themselves. This edition includes new material from one of those who was there, making The Bletchley Park Codebreakers compulsive reading. The best collection of military, espionage, and adventure stories ever told. The Dialogue Espionage Classics series began in 2010 with the purpose of bringing back classic out-of-print spying and espionage tales. From WWI and WWII to the Cold War, D-Day to the SOE, Bletchley Park to the Comet Line this fascinating spy history series brings you the best stories that should never be forgotten.
As the fifth full year of America's global war on terrorism continues, statistics concerning terrorist attacks show a disturbing trend: from a twenty-one-year high in 2003, attacks tripled in 2004 and then doubled in 2005. And as the incidence of terrorist attacks increased, so has the number of terrorists. While the primary leaders of the Taliban, al Qaeda, and al Qaeda in Iraq remain at large, a 2006 Department of Defense study reportedly identified thirty new al Qaeda-affiliated terrorist groups that have been created since September 11, 2001. We may not have metrics that measure our success in the war on terrorism, but these realities certainly illuminate our failures.In "Thinking Like a Terrorist," former FBI counterterrorism agent Mike German contends that the overarching problem is a fundamental failure to understand the terrorists-namely, what they want and how they intend to get it. When our counterterrorism policies are driven by misunderstanding and misperception, we shouldn't be surprised at the results. Today's terrorists have a real plan-a blueprint that has brought them victory in the past-that they are executing to perfection; moreover, their plan is published and available to anyone who bothers to read it. Once the terrorists' plan is understood, we can develop and implement more effective counterterrorism strategies.A former undercover agent who infiltrated neo-Nazi terrorist groups in the United States, German explains the terrorist's point of view and discusses ways to counter the terrorism threat. Based on his unusual experience in the field, "Thinking Like a Terrorist" provides unique insights into why terrorism is such a persistent and difficult problem and whythe U.S. approach to counterterrorism isn't working. |
You may like...
Handbook of Research on Computational…
Francisco Miranda, Carlos Abreu
Hardcover
R10,267
Discovery Miles 102 670
|