0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (8)
  • R250 - R500 (101)
  • R500+ (419)
  • -
Status
Format
Author / Contributor
Publisher

Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence

SAS Behind Enemy Lines - Covert Operations 1941- the Present (Paperback): William Fowler SAS Behind Enemy Lines - Covert Operations 1941- the Present (Paperback)
William Fowler 1
R297 Discovery Miles 2 970 Ships in 18 - 22 working days

Through in-depth research and interviews with veterans, William Fowler has produced the most complete history of this elite and elusive unit to date. Out of Africa 1941 - 1943 Into Italy 1943 - 1945 Overlord and Europe 1944 - 1945 Post War Phoenix Malaya 1948 - 1960 The Confrontation 1962 - 1966 Oman 1970 - 1976 The Cold War 1945 - 1990 The Falklands Interlude 1982 The First Gulf War 1990 - 1991 Back to Africa 1981 - 2000 Balkan interlude 1994 - Afghanistan 2001 - The Second Gulf War 2003 C Squadron to 1 SAS Regiment (Rhodesia) 1951 - 1980 Enter the Kiwis 1954 - The Australian Experience 1957 - The Future

Knowledge Management in the Intelligence Enterprise (Hardcover): Edward Waltz Knowledge Management in the Intelligence Enterprise (Hardcover)
Edward Waltz
R3,363 Discovery Miles 33 630 Ships in 18 - 22 working days

This system-level resource specifically applies knowledge management principles, practices and technologies to the intelligence domain. Designed for those responsible for the management of an intelligence enterprise operation and its delivery of reliable intelligence to key decision-makers, the text describes the essential principles of intelligence, from collection, processing and analysis to dissemination, for both national intelligence and business applications. The author aims to provide a balanced treatment of the organizational and architectural components of knowledge management, offering an understanding of the system infrastructure, tools and technologies necessary to implement the intelligence enterprise. He explores real-world applications and presents a detailed example of competitive intelligence unit design. Including over 80 illustrations, the volume offers a practical description of enterprise architecture design methodology, and covers the full range of national, military, business and competitive intelligence.

The Comanche Code Talkers of World War II (Paperback, 1st ed): William C Meadows The Comanche Code Talkers of World War II (Paperback, 1st ed)
William C Meadows
R927 Discovery Miles 9 270 Ships in 18 - 22 working days

"Of all the books on Native American service in the U.S. armed forces, this is the best.... Readers will find the story of the Comanche Code Talkers compelling, humorous, thought-provoking, and inspiring." -- Tom Holm, author of Strong Hearts, Wounded Souls: Native American Veterans of the Vietnam War

Among the allied troops that came ashore in Normandy on D-Day, June 6, 1944, were thirteen Comanches in the 4th Infantry Division, 4th Signal Company. Under German fire they laid communications lines and began sending messages in a form never before heard in Europe-- coded Comanche. For the rest of World War II, the Comanche Code Talkers played a vital role in transmitting orders and messages in a code that was never broken by the Germans.

This book tells the full story of the Comanche Code Talkers for the first time. Drawing on interviews with all surviving members of the unit, their original training officer, and fellow soldiers, as well as military records and news accounts, William C. Meadows follows the group from their recruitment and training to their active duty in World War II and on through their postwar lives up to the present. He also provides the first comparison of Native American code talking programs, comparing the Comanche Code Talkers with their better-known Navajo counterparts in the Pacific and with other Native Americans who used their languages, coded or not, for secret communication. Meadows sets this history in a larger discussion of the development of Native American code talking in World Wars I and II, identifying two distinct forms of Native American code talking, examining the attitudes of the American military toward Native American codetalkers, and assessing the complex cultural factors that led Comanche and other Native Americans to serve their country in this way.

The Silent War - The Cold War Battle Beneath the Sea (Paperback): John Pina Craven The Silent War - The Cold War Battle Beneath the Sea (Paperback)
John Pina Craven
R476 Discovery Miles 4 760 Ships in 18 - 22 working days

Packed with the technological details and insights into military strategy that fans of Tom Clancy relish, The Silent War is a riveting look at the darkest days of the Cold War. It reveals, in gripping detail, the espionage, innovative high technology, and heroic seafaring the United States employed against the Soviet Union in the battle for nuclear and military supremacy. John Piña Craven, who shared management responsibility for the submarine-borne Polaris missile system, captures the excitement and the dangers of the times as he recounts the true stories behind some of the century's most shocking headlines and reveals harrowing episodes kept hidden from the public.

Craven describes for the first time the structural problems that almost caused the destruction of the Nautilus, the world's first nuclear-powered submarine, and presents startling information about the race to recover a hydrogen bomb from the B-52 bomber that went down off the coast of Spain. In a report no fan of The Hunt for Red October will want to miss, he provides a fascinating, authoritative perspective on the Navy's reaction to the rogue Soviet submarine and its mission.

A major contribution to Cold War history and literature, The Silent War will appeal to military buffs and fans of nonstop adventure thrillers alike.

The Invisible War - The Untold Secret Story of Number One Canadian Special Wireless Group (Paperback): Gil Murray The Invisible War - The Untold Secret Story of Number One Canadian Special Wireless Group (Paperback)
Gil Murray
R355 R323 Discovery Miles 3 230 Save R32 (9%) Ships in 18 - 22 working days

While the Second World War raged in Europe, demanding most of Canada's military effort, an equally fierce war with Japan was going on in the Far East. Army, navy, and air force signals units in Canada kept watch on the enemy's vital radio communications. To be more effective, Number One Canadian Special Wireless Group of the Royal Canadian Signals Corps was formed to go to the Southwest Pacific war theatre for close-in radio eavesdropping.

Murray describes the often zany career of the only complete signals unit Canada sent to the War in the Pacific, and the significant part it played in the Allied signals intelligence operation known as "Magic."

Security Threats to North East India - The Socio-Ethnic Tension (Hardcover): N.S. Narahari Security Threats to North East India - The Socio-Ethnic Tension (Hardcover)
N.S. Narahari
R270 Discovery Miles 2 700 Ships in 10 - 15 working days
Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction - Defending the U.S. Homeland (Paperback): Anthony H. Cordesman Terrorism, Asymmetric Warfare, and Weapons of Mass Destruction - Defending the U.S. Homeland (Paperback)
Anthony H. Cordesman
R946 Discovery Miles 9 460 Ships in 18 - 22 working days

New threats require new thinking. State attacks involving long-range missiles or conventional military forces are not the only threat to the U.S. homeland. Covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals-and even by residents of the United States-are significant issues for future U.S. security. In this comprehensive work, Cordesman offers a range of recommendations, from reevaluating what constitutes a threat and bolstering homeland defense measures, to improving resource allocation and sharpening intelligence. There is a wide spectrum of potential threats to the U.S. homeland that do not involve overt attacks by states using long-range missiles or conventional military forces. Such threats include covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals, and independent terrorist and extremist attacks by residents of the United States. These threats are currently limited in scope and frequency, but are emerging as potentially significant issues for future U.S. security. In this comprehensive work, Cordesman argues that new threats require new thinking, and offers a range of recommendations, from expanding the understanding of what constitutes a threat and bolstering Homeland defense measures, to bettering resource allocation and improving intelligence gathering and analysis. No pattern of actual attacks on U.S. territory has yet emerged that provides a clear basis for predicting how serious any given form of attack might be in the future, what means of attack might be used, or how lethal new forms of attack might be. As a result, there is a major ongoing debate over the seriousness of the threat and how the U.S. government should react. This work is an invaluable contribution to that debate.

The Vietnam War - Confidential Files on the Siege and Loss of Khesanh (Paperback): Thomas Fensch The Vietnam War - Confidential Files on the Siege and Loss of Khesanh (Paperback)
Thomas Fensch
R682 Discovery Miles 6 820 Ships in 18 - 22 working days

Khe Sanh remains to this day, an extremely controversial and emotional aspect of the war in Vietnam. The U.S. Armed Forces fought to defend Khe Sanh in early 1968 and then abandoned the base after a 77-day siege by the North Vietnamese. This book contains fromerly Top Secret messages to President Lyndon Johnson from National Security Advisor W.W. "Walt" Rostow, Gen. William Westmoreland and many others. The siege and loss of Khe Sanh is the tragedy of the war in Vietnam in microcosm.

Reflections on Espionage - The Question of Cupcake (Paperback, New Ed): John Hollander Reflections on Espionage - The Question of Cupcake (Paperback, New Ed)
John Hollander
R634 Discovery Miles 6 340 Ships in 18 - 22 working days

This book-length poem by one of the major poets of our era is structured as a series of messages transmitted by a master spy to the director of spy operations and to a number of his fellow spies. The spy speaks of his own alienation and sense of purposelessness as a secret agent-a metaphor for a human existence committed to ordering, deciphering, and making sense of a world of random signs. First published in 1974, the book is now reprinted with a substantial introduction by the author that elaborates on the genesis of the poem, the literary figures who inspired some of the characters, the poem's reception, and other matters. Reviews of the earlier edition: "These poems can be read and admired for their fluidity, their wonderful diversity of significance. . . . Many delights."-Richard Poirier, Los Angeles Times "Hollander's arch and subtle long poem allegorizes the mirror closeness between raveller and unraveller."-George Steiner, New Yorker "Hollander explores with wit and virtuosity the pleasures of poetry (encipherment) and the trials of the workaday world (one's 'cover.') . . . A rich, intelligent poem . . . a special pleasure for those with an ear for allusions, parodies, and puns."-Library Journal

Secret Agencies - U.S. Intelligence in a Hostile World (Paperback, New edition): Loch K. Johnson Secret Agencies - U.S. Intelligence in a Hostile World (Paperback, New edition)
Loch K. Johnson
R1,265 Discovery Miles 12 650 Ships in 18 - 22 working days

How has the end of the Cold War affected America's intelligence agencies? When are aggressive clandestine operations justifiable, and who should be responsible for deciding to proceed with them? Should the United States engage in more aggressive economic espionage? These are just a few of the issues Loch Johnson examines in this thoughtful assessment of strategic intelligence and its vital role in modern governments. Johnson draws on historical data, more than five hundred interviews, and his own experience working for Congressional committees on intelligence. He begins by defining the functions of intelligence: espionage, counterintelligence, and covert action. He then provides an overview of America's secret operations abroad, assesses the moral implications of clandestine operations, and offers guidelines for a more ethical approach to the use of secret power. Johnson explores the question of intelligence accountability, looking closely at how well intelligence agencies have been monitored through the forum of Congressional hearings. He compares America's approach to intelligence with that of other nations, discusses the degree to which intelligence agencies should provide information about foreign businesses, and evaluates how well the U.S. intelligence agencies fared during the Cold War against the USSR. Secret agencies have the capacity not only to safeguard democracy but also to subvert it, says Johnson. As such, they deserve both our support and our scrutiny.

Rosenberg File - Second Edition (Updated) (Paperback, Updated): Ronald Radosh Rosenberg File - Second Edition (Updated) (Paperback, Updated)
Ronald Radosh; As told to Joyce Milton
R2,110 Discovery Miles 21 100 Ships in 18 - 22 working days

This highly acclaimed book-hailed as the definitive account of the Julius and Ethel Rosenberg case-now includes a new introduction that discusses the most recent evidence. It provides information from the Khrushchev and Molotov memoirs, the Venona papers, and material contained in a Discovery Channel documentary that was first aired in March 1997.

Cloak and Gown - Scholars in the Secret War, 1939-1961, Second Edition (Paperback, 2nd Ed): Robin Winks Cloak and Gown - Scholars in the Secret War, 1939-1961, Second Edition (Paperback, 2nd Ed)
Robin Winks
R2,039 Discovery Miles 20 390 Ships in 18 - 22 working days

The CIA and its World War II predecessor, the Office of Strategic Services (OSS), were for many years largely populated by members of Ivy League colleges, particularly Yale. In this highly acclaimed book, Robin Winks explores the underlying bonds between the university and the intelligence communities, introducing a fascinating cast of characters that include safe-crackers and experts in Azerbaijani as well as such social luminaries as Paul Mellon, David Bruce, John P. Marquand, Jr., and William Vanderbilt. This edition of the book includes a new preface by Winks. Reviews of the first edition: "One of the best studies of intelligence in recent years."-Edward Jay Epstein, Los Angeles Times Book Review "The most original book yet written on the interpenetration of counter-intelligence and campus."-Andrew Sinclair, Sunday Times (London) "Winks writes a lively compound of analysis and anecdote to illuminate the bonds between academe and the intelligence community. His book is a towering achievement."-Robert W. Smith, Chicago Sun-Times "Among the more important contributions to the history of Anglo-American espionage to appear this or any other year. . . . Moves with an unfolding pace that any thriller writer might envy."-Tom Dowling, San Francisco Examiner "A brilliant book."-Sallie Pisani, Journal of American History

The FBI-KGB War - A Special Agent's Story (Paperback, New edition): Robert J Lamphere, Tom Shachtman The FBI-KGB War - A Special Agent's Story (Paperback, New edition)
Robert J Lamphere, Tom Shachtman
R1,062 Discovery Miles 10 620 Ships in 18 - 22 working days

The names, we sometimes say, have been changed "to protect the innocent". As regards those agents in KGB networks in the U.S. during and following World War II, their presence and their deeds (or misdeeds) were known, but their names were not. The FBI-KGB War is the exciting, true (which often really is stranger than fiction), and authentic story of how those names became known and how the not-so-innocent persons to whom those names belonged were finally called to account. Following World War II, FBI Special Agent Robert J. Lamphere set out to uncover the extensive American networks of the KGB. Lamphere used a large file of secret Russian messages intercepted during the war. The FBI-KGB War is the detailed (but never boring) story of how those messages were finally decoded and made to reveal their secrets, secrets that led to persons with such now-infamous names as Judith Coplon, Klaus Fuchs, Harry Gold, and Ethel and Julius Rosenberg.

MacArthur's ""Ultra - Codebreaking and the War Against Japan, 1942-45 (Paperback, New edition): Edward J. Drea MacArthur's ""Ultra - Codebreaking and the War Against Japan, 1942-45 (Paperback, New edition)
Edward J. Drea
R1,113 Discovery Miles 11 130 Ships in 18 - 22 working days

Cracking the enemy's radio code is a task so urgent and so difficult that it demands the military's best minds and most sophisticated technology. But when the coded messages are in a language as complex as Japanese, decoding problems multiply dramatically.

It took the U.S. Army a full two years after the attack on Pearl Harbor to break the codes of the Japanese Imperial Army. But by 1944 the U.S. was decoding more than 20,000 messages a month filled with information about enemy movements, strategy, fortifications, troop strengths, and supply convoys.

In "MacArthur's ULTRA," historian Edward Drea recounts the story behind the Army's painstaking decryption operation and its dramatic breakthrough. He demonstrates how ULTRA (intelligence from decrypted Japanese radio communications) shaped MacArthur's operations in New Guinea and the Philippines and its effect on the outcome of World War II.

From sources on both sides of the Pacific and national security agency declassified records, Drea has compiled a detailed listing of the ULTRA intelligence available to MacArthur. By correlating the existing intelligence with MacArthur's operational decisions, Drea shows how MacArthur usedand misusedintelligence information. He tells for the first time the story behind MacArthur's bold leap to Hollandia in 1944 and shows how ULTRA revealed the massive Japanese mobilization for what might have been (had it occurred) the bloodiest and most protracted engagement of the entire war the Allied invasion of Japan. Drea also clarifies the role of ULTRA in Truman's decision to drop atomic bombs on Japan in 1945, and concludes that ULTRA shortened the war by six to ten months.


The Collectors - Us and British Cold War Aerial Intelligence Gathering (Paperback): Kevin Wright The Collectors - Us and British Cold War Aerial Intelligence Gathering (Paperback)
Kevin Wright
R714 R619 Discovery Miles 6 190 Save R95 (13%) Ships in 9 - 17 working days

Over Iran an RAF Canberra flies a feint towards the Soviet border, to provoke Soviet air defence radar operators to reveal their location. He will not deliberately enter Soviet airspace, but the possibilities for miscalculation, or misunderstanding leading to tragedy are always there. These flights cost the lives of over 150 US airmen by the end of the Cold War. Also cruising nearby in Iranian airspace, is a heavily modified US Air Force C-130 transport aircraft. Onboard 10 Special Equipment Operators are listening through their headphones for Soviet radio and radar activity. Hearing Soviet ground controllers scramble fighters to intercept the Canberra. The US operators alert the British aircraft to the closing MiG's and it quickly alters course away from the border. This was the life of crews involved in Cold War intelligence collection flights. Enormous resources were committed to these operations and they shaped the structure of much modern military intelligence collection, analysis and sharing. This book explores their scope, conduct, plus the politics and new technologies behind these operations that started in the dying embers of World War Two. It examines how these often complex missions were planned, coordinated and flown and is supported by first-hand accounts from pilots, aircrews and intelligence analysts. It utilises recently declassified British and US archive material and is illustrated with a wide range of images. The author examines European and Far East operations and a number of topics not previously covered in depth elsewhere. These include authorisation and coordination arrangements for conduct of overflight and peripheral missions; plus the part played by key third party states in operations in Scandinavia, Turkey and others. He looks at why Tyuratam complex was of such major intelligence interest and details the many resources targeted against it. He looks at some of the less explored elements of U-2 operations, including British involvement, plus the development of powerful lenses intended to enable very long range peripheral photography and why the long mythologised `Kapustin Yar' overflight probably never took place with new details and analysis. This comprehensive book links together the realities of flying, advanced technology and politics to provide a detailed and illustrated examination of Cold War aerial intelligence collection.

The Intelligence War against the IRA (Hardcover): Thomas Leahy The Intelligence War against the IRA (Hardcover)
Thomas Leahy
R2,233 Discovery Miles 22 330 Ships in 10 - 15 working days

The exposure of two senior republicans as informers for British intelligence in 2005 led to a popular perception that the IRA had 'lost' the intelligence war and was pressurised into peace. In this first in-depth study across the entire conflict, Thomas Leahy re-evaluates the successes and failures of Britain's intelligence activities against the IRA, from the use of agents and informers to special-forces, surveillance and electronic intelligence. Using new interview material alongside memoirs and Irish and UK archival materials, he suggests that the IRA was not forced into peace by British intelligence. His work sheds new light on key questions in intelligence and security studies. How does British intelligence operate against paramilitaries? Is it effective? When should governments 'talk to terrorists'? And does regional variation explain the outcome of intelligence conflicts? This is a major contribution to the history of the conflict and of why peace emerged in Northern Ireland.

Winston Churchill's Toyshop - The Inside Story of Military Intelligence (Research) (Paperback): Stuart Macrae Winston Churchill's Toyshop - The Inside Story of Military Intelligence (Research) (Paperback)
Stuart Macrae
R367 R331 Discovery Miles 3 310 Save R36 (10%) Ships in 9 - 17 working days

The inside story of one of the most famous of all the 'back rooms' of the Second World War - and of the men and women who worked for it. Conceived by Winston Churchill to circumvent the delays, frustrations and inefficiencies of the service ministries, Department M.D.1. earned from its detractors the soubriquet 'Winston Churchill's Toyshop', yet from a tiny underground workshop housed in the cellars of the London offices of Radio Normandie in Portland Place, and subsequently from the 'stockbroker Tudor' of a millionaire's country mansion in Buckinghamshire, came an astonishing array of secret weapons ranging from the 'sticky bomb' and 'limpet mine' to giant bridge-carrying assault tanks, as well as the PIAT, a tank-destroying, hand-held mortar. Written by Colonel Stuart Macrae, who helped found M.D.1. and was its second-in-command throughout its life, the story is told of this relatively unknown establishment and the weapons it developed which helped destroy innumerable enemy tanks, aircraft and ships.

The Black Banners Declassified (Paperback): Ali Soufan The Black Banners Declassified (Paperback)
Ali Soufan
R492 R449 Discovery Miles 4 490 Save R43 (9%) Ships in 9 - 17 working days

A new, fully uncensored edition of the definitive insider's account of the War on Terror 'A former FBI agent's memoir on the War on Terror is declassified after 9 years' Time 'One of the most valuable and detailed accounts of its subject to appear in the past decade' Economist The ultimate insider's account of the battle against terrorism, Ali Soufan's revelatory account of his history-making decade as the FBI's lead investigator into al-Qaeda shaped our understanding of counter-terror operations - and led to hard questions being asked of American and British leaders. When The Black Banners was first published in 2011, significant portions of the text were redacted. After a CIA review those restrictions have been lifted, and the result is this explosive new edition, The Black Banners (Declassified). Alongside a new foreword by Soufan, the declassified documents uncover shocking details on the use of torture on terror suspects, how these 'enhanced interrogation techniques' failed to secure reliable intelligence, and in fact actively derailed the fight against al-Qaeda. By contrast we see Soufan at work using empathy and intelligent questioning - not force or violence - to extract some of the most important confessions in the war. Taking us from the interrogation rooms where Soufan would share food and films with the suspects so he could bond with them, to the hideouts of bin Laden, Ali Soufan reveals with intimate, first-hand knowledge the unbelievable truth about America's security agencies, 9/11, and the global 'War on Terror'.

Contractors in the Civilian Intelligence Community - An Assessment of Their Use (Paperback): Maxwell Gibbs Contractors in the Civilian Intelligence Community - An Assessment of Their Use (Paperback)
Maxwell Gibbs
R1,632 Discovery Miles 16 320 Ships in 10 - 15 working days

The intelligence community (IC) uses core contract personnel to augment its workforce. These contractors typically work alongside government personnel and perform staff-like work. Some core contract personnel require enhanced oversight because they perform services that could inappropriately influence the government's decision making. This book examines the extent to which the eight civilian IC elements use core contract personnel; the functions performed by these personnel and the reasons for their use; and whether the elements developed policies and strategically planned for their use. GAO reviewed and assessed the reliability of the eight civilian IC elements' core contract personnel inventory data for fiscal years 2010 and 2011, including reviewing a sample of 287 contract records.

Strategic Intelligence for the 21st Century - The Mosaic Method (Paperback): Alfred Rolington Strategic Intelligence for the 21st Century - The Mosaic Method (Paperback)
Alfred Rolington
R1,258 Discovery Miles 12 580 Ships in 10 - 15 working days

Strategic Intelligence for the 21st Century: The Mosaic Method provides an industry insider's assessment of current intelligence methods and offers a new strategic model, directed toward the police, military, and intelligence agencies. The birth of the internet, the advent of 24 hour news and the rise of social media is evidence of how governments and those dealing in intelligence commodities struggle not only to access but also to limit the information that is out there. At the same time, recent terrorist atrocities, such as 9/11 and the July 7th bombings in London, have highlighted the need for intelligence cooperation on a global scale - but how can this be achieved? Serving as a call to break from traditional models and forge more deeply and continuously inter-linked relationships, Strategic Intelligence for the 21st Century advocates more fluid, networked operating methods, incorporating far more open-sourced information and data in analysis. Featuring contributions from key figures in the industry, including Sir Colin McColl, R. James Woolsey, and Sir David Phillips, this book presents a history of intelligence developments alongside the current challenges, analysing the impact on society - both from within and due to propaganda and covert action - and the influence wrought by technological innovations. With discussion of the Deep Web, the post-9/11 era, and the resulting impact on civil liberty and police operations, Strategic Intelligence for the 21st Century offers a revolutionary new approach to intelligence analysis and global collaborations.

Foreign Intelligence Surveillance Act (Paperback): Markus Korjus Foreign Intelligence Surveillance Act (Paperback)
Markus Korjus
R1,361 Discovery Miles 13 610 Ships in 10 - 15 working days

The current legislative and oversight activity with respect to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) has drawn national attention to several overarching issues. This book outlines three such issues and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions are implicated in this debate - the Fourth and Fifth Amendments.

Guide to Conducting Research in FBI Records (Paperback): Peter J. Anderson, Darren B Carter Guide to Conducting Research in FBI Records (Paperback)
Peter J. Anderson, Darren B Carter
R1,219 Discovery Miles 12 190 Ships in 10 - 15 working days

The mission of the FBI is to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal and international agencies and partners. This book details what an FBI record is, what researchers can learn from these records, and how they can be used. The FBI has long been of interest to researchers, given the importance and scope of its mission and the range of historical events that is has been involved in over the years.

U.S. Intelligence - Congressional Role & Important Issues (Hardcover, New): Justin A Morales U.S. Intelligence - Congressional Role & Important Issues (Hardcover, New)
Justin A Morales
R3,492 Discovery Miles 34 920 Ships in 10 - 15 working days

The attacks on the World Trade Center and the Pentagon on September 11th, 2001, dramatically demonstrated the intelligence threats facing the United States in the new century. In response, Congress approved significantly larger intelligence budgets and, in December 2004, passed the most extensive reorganisation of the intelligence community since the National Security Act of 1947. This book examines the background, oversight and issues that face the U.S. intelligence agency today.

Classified Information - Protections & Issues (Paperback, New): Meredith B. Carro Classified Information - Protections & Issues (Paperback, New)
Meredith B. Carro
R1,122 R1,056 Discovery Miles 10 560 Save R66 (6%) Ships in 10 - 15 working days

The security classification regime in use within the federal executive branch traces its origins to armed forces information protection practices of the World War I era. This classification system - designating information, according to prescribed criteria and procedures, protected in accordance with one of three levels of sensitivity, is based on the amount of harm to the national security that would result from its disclosure. This book explores the history, status, and emerging management issues of security classified and controlled information today.

Intelligence Community - Overview & User's Guidelines (Hardcover, New): Melanie S Flores Intelligence Community - Overview & User's Guidelines (Hardcover, New)
Melanie S Flores
R3,480 Discovery Miles 34 800 Ships in 10 - 15 working days

The Intelligence Community (IC) is a group of executive branch agencies and organisations that work separately and together to engage in intelligence activities necessary for the conduct of foreign relations and the protection of the national security of the United States. The U.S. government uses intelligence to improve and understand the consequences of its national security decisions. In this book, the Intelligence Community's Vision 2015 is examined, which enhances interagency intelligence organisations and helps consumers understand the mission, background, opportunities, and challenges facing the Intelligence Community today.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ireland 2021
Organisation for Economic Cooperation and Development Paperback R1,399 Discovery Miles 13 990
Materials Processing Fundamentals
Lifeng Zhang, Antoine Allanore, … Hardcover R3,420 Discovery Miles 34 200
Materials for Chemical Sensing
Thiago Regis Longo Cesar Paixao, Subrayal Medapati Reddy Hardcover R4,671 Discovery Miles 46 710
Air Pollution Control and Design
Pen-Chi Chiang, Xiang Gao Hardcover R2,791 Discovery Miles 27 910
Transport strategies for net-zero…
Organisation for Economic Cooperation and Development Paperback R1,440 Discovery Miles 14 400
Responsible Tourism - Using Tourism for…
Harold Goodwin Paperback R1,144 Discovery Miles 11 440
Egalite Femmes-Hommes Et Environnement…
Oecd Paperback R2,831 Discovery Miles 28 310
The Fragrant Alabaster Box
Pat Hagius Hardcover R541 Discovery Miles 5 410
Fostering water resilience in Brazil…
Organisation for Economic Cooperation and Development Paperback R972 Discovery Miles 9 720
ABCs of the Keys of the Kingdom of…
Yuliya Rahimova Hardcover R638 R577 Discovery Miles 5 770

 

Partners