Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Sylvanus G. Morley (1883-1948) has been highly regarded for over a
century for his archaeological work among the Maya pyramids. As
director of the Carnegie Archaeological Program, he supervised the
reconstruction of ChichA(c)n ItzA, one of today's most visited
sites in Central America.
As the world prepared for war in the 1930s, the United States discovered that it faced the real threat of foreign spies stealing military and industrial secrets-and that it had no established means to combat them. Into that breach stepped J. Edgar Hoover and the FBI. Although the FBI's expanded role in World War II has been well documented, few have examined the crucial period before Pearl Harbor when the Bureau's powers secretly expanded to face the developing international emergency. Former FBI agent Raymond Batvinis now tells how the Bureau grew from a small law enforcement unit into America's first organized counterespionage and counterintelligence service. Batvinis examines the FBI's emerging new roles during the two decades leading up to America's entry into World War II to show how it cooperated and competed with other federal agencies. He takes readers behind the scenes, as the State Department and Hoover fought fiercely over the control of counterintelligence, and tells how the agency combined its crime-fighting expertise with its new wiretapping authority to spy on foreign agents. Based on newly declassified documents and interviews with former agents, Batvinis's account reconstructs and greatly expands our understanding of the FBI's achievements and failures during this period. Among these were the Bureau's mishandling of the 1938 Rumrich/Griebl spy case, which Hoover slyly used to broaden his agency's powers; its cracking of the Duquesne Espionage Case in 1941, which enabled Hoover to boost public and congressional support to new heights; and its failure to understand the value of Soviet agent Walter Krivitsky, which slowed Bureau efforts to combat Soviet espionage in America. In addition, Batvinis offers a new view of the relationship between the FBI and the military, cites the crucial contributions of British intelligence to the FBI's counterintelligence education, and reveals the agency's ultra-secret role in mining financial records for the Treasury Department. He also reviews the early days of the top-secret Special Intelligence Service, which quietly dispatched FBI agents posing as businessmen to South America to spy on their governments. With an insider's knowledge and a storyteller's skill, Batvinis provides a page-turning history narrative that greatly revises our views of the FBI--and also resonates powerfully with our own post-9/11 world.
I have tried to give the public some idea of what was done by Boer women, during the great Anglo-Boer war, to keep their men in the field and to support them in what proved to be a hopeless struggle for independence and liberty. As far as I was able I have also described the perils and hardships connected with the Secret Service of the Boers and the heroism and resource displayed by the men. Although it is with the knowledge and consent of the Boer leaders that I give publicity to what is known to me of the methods employed in the Secret Service of the Boers, I do not wish to convey the impression that these events of the war at any time bore an official character. It is a purely personal narrative and has only been written at the repeated request, during the last ten years, of the many friends associated with the experiences of the diarist and of the principal characters appearing in this book. In order to preserve the historical value of the book no fictitious names have been employed. There are, as far as we know, very few records of this nature in existence, owing to the dangers connected with keeping a diary under martial law, and it seemed a pity, therefore, to withhold from the public materials which may be of use to those who are interested in studying or writing the history of those critical years. I cannot vouch for the truth of every war rumour related here, nor for the accuracy of the information which I have obtained from other people, but the experiences of the diarist, as they were recorded from day to day, are correct in every detail. My Dutch edition of this book, Die Kappie Kommando, is now appearing in the Dutch South African bi-monthly journal, Die Brandwag, and will, when completed, be published in book form in Holland. --The Author
Surveying the expanding conflict in Europe during one of his famous fireside chats in 1940, President Franklin Roosevelt ominously warned that "we know of other methods, new methods of attack. The Trojan horse. The fifth column that betrays a nation unprepared for treachery. Spies, saboteurs, and traitors are the actors in this new strategy." Having identified a new type of war -- a shadow war -- being perpetrated by Hitler's Germany, FDR decided to fight fire with fire, authorizing the formation of the Office of Strategic Services (OSS) to organize and oversee covert operations. Based on an extensive analysis of OSS records, including the vast trove of records released by the CIA in the 1980s and '90s, as well as a new set of interviews with OSS veterans conducted by the author and a team of American scholars from 1995 to 1997, "The Shadow War Against Hitler" is the full story of America's far-flung secret intelligence apparatus during World War II. In addition to its responsibilities generating, processing, and interpreting intelligence information, the OSS orchestrated all manner of dark operations, including extending feelers to anti-Hitler elements, infiltrating spies and sabotage agents behind enemy lines, and implementing propaganda programs. Planned and directed from Washington, the anti-Hitler campaign was largely conducted in Europe, especially through the OSS's foreign outposts in Bern and London. A fascinating cast of characters made the OSS run: William J. Donovan, one of the most decorated individuals in the American military who became the driving force behind the OSS's genesis; Allen Dulles, the future CIA chief who ran the Bern office, which he called "the big window onto the fascist world"; a veritable pantheon of Ivy League academics who were recruited to work for the intelligence services; and, not least, Roosevelt himself. A major contribution of the book is the story of how FDR employed Hitler's former propaganda chief, Ernst "Putzi" Hanfstengl, as a private spy. More than a record of dramatic incidents and daring personalities, this book adds significantly to our understanding of how the United States fought World War II. It demonstrates that the extent, and limitations, of secret intelligence information shaped not only the conduct of the war but also the face of the world that emerged from the shadows.
"The Lost Oasis" tells the true story behind "The English Patient," An extraordinary episode in World War II, it describes the Zerzura Club, a group of desert explorers and adventurers who indulged in desert travel by early-model-motor cars and airplanes, and who searched for lost desert oases and ancient cities of vanished civilizations. In reality, they were mapping the desert for military reasons and espionage. The club's members came from countries that soon would be enemies: England and the Allied Forces v. Italy and Germany. When war erupted in 1939, Ralph Bagnold founded the British Long Range Desert Group to spy on and disrupt Rommel's advance on Cairo, while a fellow club member, Hungarian Count Almasy, succeeded in placing German spies there. Ultimately, the British prevailed. Saul Kelly's riveting history draws on interviews with survivors and previously unknown documentary material in England, Italy, Germany, Hungary, and Egypt. His book reads like a thriller - with one key difference: it's all true.
This system-level resource specifically applies knowledge management principles, practices and technologies to the intelligence domain. Designed for those responsible for the management of an intelligence enterprise operation and its delivery of reliable intelligence to key decision-makers, the text describes the essential principles of intelligence, from collection, processing and analysis to dissemination, for both national intelligence and business applications. The author aims to provide a balanced treatment of the organizational and architectural components of knowledge management, offering an understanding of the system infrastructure, tools and technologies necessary to implement the intelligence enterprise. He explores real-world applications and presents a detailed example of competitive intelligence unit design. Including over 80 illustrations, the volume offers a practical description of enterprise architecture design methodology, and covers the full range of national, military, business and competitive intelligence.
This survey of more than fifty years of national security policy juxtaposes declassified U. S. national intelligence estimates with recently released Soviet documents disclosing the views of Soviet leaders and their Communist allies on the same events. Matthias shows that U. S. intelligence estimates were usually correct but that our political and military leaders generally ignored them--with sometimes disastrous results. The book begins with a look back at the role of U. S. intelligence during World War II, from Pearl Harbor through the plot against Hitler and the D-day invasion to the "unconditional surrender" of Japan, and reveals how better use of the intelligence available could have saved many lives and shortened the war. The following chapters dealing with the Cold War disclose what information and advice U. S. intelligence analysts passed on to policy makers, and also what sometimes bitter policy debates occurred within the Communist camp, concerning Vietnam, the Bay of Pigs, the Cuban missile crisis, the turmoil in Eastern Europe, the Six-Day and Yom Kippur wars in the Middle East, and the Soviet intervention in Afghanistan. In many ways, this is a story of missed opportunities the U. S. government had to conduct a more responsible foreign policy that could have avoided large losses of life and massive expenditures on arms buildups. While not exonerating the CIA for its own mistakes, Matthias casts new light on the contributions that objective intelligence analysis did make during the Cold War and speculates on what might have happened if that analysis and advice had been heeded.
Packed with the technological details and insights into military strategy that fans of Tom Clancy relish, The Silent War is a riveting look at the darkest days of the Cold War. It reveals, in gripping detail, the espionage, innovative high technology, and heroic seafaring the United States employed against the Soviet Union in the battle for nuclear and military supremacy. John Piña Craven, who shared management responsibility for the submarine-borne Polaris missile system, captures the excitement and the dangers of the times as he recounts the true stories behind some of the century's most shocking headlines and reveals harrowing episodes kept hidden from the public. Craven describes for the first time the structural problems that almost caused the destruction of the Nautilus, the world's first nuclear-powered submarine, and presents startling information about the race to recover a hydrogen bomb from the B-52 bomber that went down off the coast of Spain. In a report no fan of The Hunt for Red October will want to miss, he provides a fascinating, authoritative perspective on the Navy's reaction to the rogue Soviet submarine and its mission. A major contribution to Cold War history and literature, The Silent War will appeal to military buffs and fans of nonstop adventure thrillers alike.
New threats require new thinking. State attacks involving long-range missiles or conventional military forces are not the only threat to the U.S. homeland. Covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals-and even by residents of the United States-are significant issues for future U.S. security. In this comprehensive work, Cordesman offers a range of recommendations, from reevaluating what constitutes a threat and bolstering homeland defense measures, to improving resource allocation and sharpening intelligence. There is a wide spectrum of potential threats to the U.S. homeland that do not involve overt attacks by states using long-range missiles or conventional military forces. Such threats include covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals, and independent terrorist and extremist attacks by residents of the United States. These threats are currently limited in scope and frequency, but are emerging as potentially significant issues for future U.S. security. In this comprehensive work, Cordesman argues that new threats require new thinking, and offers a range of recommendations, from expanding the understanding of what constitutes a threat and bolstering Homeland defense measures, to bettering resource allocation and improving intelligence gathering and analysis. No pattern of actual attacks on U.S. territory has yet emerged that provides a clear basis for predicting how serious any given form of attack might be in the future, what means of attack might be used, or how lethal new forms of attack might be. As a result, there is a major ongoing debate over the seriousness of the threat and how the U.S. government should react. This work is an invaluable contribution to that debate.
Khe Sanh remains to this day, an extremely controversial and emotional aspect of the war in Vietnam. The U.S. Armed Forces fought to defend Khe Sanh in early 1968 and then abandoned the base after a 77-day siege by the North Vietnamese. This book contains fromerly Top Secret messages to President Lyndon Johnson from National Security Advisor W.W. "Walt" Rostow, Gen. William Westmoreland and many others. The siege and loss of Khe Sanh is the tragedy of the war in Vietnam in microcosm.
While the Second World War raged in Europe, demanding most of Canada's military effort, an equally fierce war with Japan was going on in the Far East. Army, navy, and air force signals units in Canada kept watch on the enemy's vital radio communications. To be more effective, Number One Canadian Special Wireless Group of the Royal Canadian Signals Corps was formed to go to the Southwest Pacific war theatre for close-in radio eavesdropping. Murray describes the often zany career of the only complete signals unit Canada sent to the War in the Pacific, and the significant part it played in the Allied signals intelligence operation known as "Magic."
A Cross of Iron provides the fullest account yet of the national security state that emerged in the first decade of the Cold War. Michael J. Hogan traces the process of state-making through struggles to unify the armed forces, harness science to military purposes, mobilize military manpower, control the defense budget, and distribute the cost of defense across the economy. President Harry S. Truman and his successor were in the middle of a fundamental contest over the nation's political identity and postwar purpose, and their efforts determined the size and shape of the national security state that finally emerged.
This book-length poem by one of the major poets of our era is structured as a series of messages transmitted by a master spy to the director of spy operations and to a number of his fellow spies. The spy speaks of his own alienation and sense of purposelessness as a secret agent-a metaphor for a human existence committed to ordering, deciphering, and making sense of a world of random signs. First published in 1974, the book is now reprinted with a substantial introduction by the author that elaborates on the genesis of the poem, the literary figures who inspired some of the characters, the poem's reception, and other matters. Reviews of the earlier edition: "These poems can be read and admired for their fluidity, their wonderful diversity of significance. . . . Many delights."-Richard Poirier, Los Angeles Times "Hollander's arch and subtle long poem allegorizes the mirror closeness between raveller and unraveller."-George Steiner, New Yorker "Hollander explores with wit and virtuosity the pleasures of poetry (encipherment) and the trials of the workaday world (one's 'cover.') . . . A rich, intelligent poem . . . a special pleasure for those with an ear for allusions, parodies, and puns."-Library Journal
How has the end of the Cold War affected America's intelligence agencies? When are aggressive clandestine operations justifiable, and who should be responsible for deciding to proceed with them? Should the United States engage in more aggressive economic espionage? These are just a few of the issues Loch Johnson examines in this thoughtful assessment of strategic intelligence and its vital role in modern governments. Johnson draws on historical data, more than five hundred interviews, and his own experience working for Congressional committees on intelligence. He begins by defining the functions of intelligence: espionage, counterintelligence, and covert action. He then provides an overview of America's secret operations abroad, assesses the moral implications of clandestine operations, and offers guidelines for a more ethical approach to the use of secret power. Johnson explores the question of intelligence accountability, looking closely at how well intelligence agencies have been monitored through the forum of Congressional hearings. He compares America's approach to intelligence with that of other nations, discusses the degree to which intelligence agencies should provide information about foreign businesses, and evaluates how well the U.S. intelligence agencies fared during the Cold War against the USSR. Secret agencies have the capacity not only to safeguard democracy but also to subvert it, says Johnson. As such, they deserve both our support and our scrutiny.
First published in 1865, Belle Boyd's memoir of her experiences as a Confederate spy has stood the test of time and interest. Belle first gained notoriety when she killed a Union soldier in her home in 1861. During the Federal occupations of the Shenandoah Valley, she mingled with the servicemen and, using her feminine wiles, obtained useful information for the Rebel cause. In this new edition, Kennedy-Nolle and Faust consider the domestic side of the Civil War and also assess the value of Boyd's memoir for social and literary historians in its challenge to our understanding the most divisive years in American history.
This highly acclaimed book-hailed as the definitive account of the Julius and Ethel Rosenberg case-now includes a new introduction that discusses the most recent evidence. It provides information from the Khrushchev and Molotov memoirs, the Venona papers, and material contained in a Discovery Channel documentary that was first aired in March 1997.
In the savage winter of 1876 Captain Frederick Burnaby rode 1,000 miles eastwards from Constantinople to see for himself what the Russians were up to in this remote corner of the Great Game battelfield. With wars between Turkey and Russia imminent, he wanted to discover, among other things, whether the Sultan's armies were capable of resisting a determined Tsarist thrust towards Constantinople. With his servant Radford, he spend five months riding across some of the cruellest winter landscape in the world before hastening home to write this best-seller.
For three years during World War II, future Director of Central Intelligence Allen Dulles commanded the OSS mission in Bern, Switzerland. From Hitler's Doorstep provides an annotated selection of his reports to Washington from 1942 to 1945. Dulles was a leading source of Allied intelligence on Nazi Germany and the occupied nations. The messages presented in this volume were based on information received through agents and networks operating in France, Italy, Austria, Eastern Europe, and Germany itself. They deal with subjects ranging from enemy troop strength and military plans to political developments, support of resistance movements, secret weapons, psychological warfare, and peace feelers. The Dulles reports reveal his own vision of grand strategy and presage the postwar turmoil in Europe. One of the largest collections of OSS records ever published, these telegrams and radiotelephone transmissions from the National Archives provide an exciting account of the course of the European war, offer insight on the development of American intelligence, and illuminate the origins of the Cold War. They will interest diplomatic and military historians as well as specialists on modern Europe. This volume is almost unique as document-based intelligence history and serves as a badly needed bridge between diplomatic history and intelligence studies.
The names, we sometimes say, have been changed "to protect the innocent". As regards those agents in KGB networks in the U.S. during and following World War II, their presence and their deeds (or misdeeds) were known, but their names were not. The FBI-KGB War is the exciting, true (which often really is stranger than fiction), and authentic story of how those names became known and how the not-so-innocent persons to whom those names belonged were finally called to account. Following World War II, FBI Special Agent Robert J. Lamphere set out to uncover the extensive American networks of the KGB. Lamphere used a large file of secret Russian messages intercepted during the war. The FBI-KGB War is the detailed (but never boring) story of how those messages were finally decoded and made to reveal their secrets, secrets that led to persons with such now-infamous names as Judith Coplon, Klaus Fuchs, Harry Gold, and Ethel and Julius Rosenberg.
Cracking the enemy's radio code is a task so urgent and so difficult that it demands the military's best minds and most sophisticated technology. But when the coded messages are in a language as complex as Japanese, decoding problems multiply dramatically. It took the U.S. Army a full two years after the attack on Pearl Harbor to break the codes of the Japanese Imperial Army. But by 1944 the U.S. was decoding more than 20,000 messages a month filled with information about enemy movements, strategy, fortifications, troop strengths, and supply convoys. In "MacArthur's ULTRA," historian Edward Drea recounts the story behind the Army's painstaking decryption operation and its dramatic breakthrough. He demonstrates how ULTRA (intelligence from decrypted Japanese radio communications) shaped MacArthur's operations in New Guinea and the Philippines and its effect on the outcome of World War II. From sources on both sides of the Pacific and national security agency declassified records, Drea has compiled a detailed listing of the ULTRA intelligence available to MacArthur. By correlating the existing intelligence with MacArthur's operational decisions, Drea shows how MacArthur usedand misusedintelligence information. He tells for the first time the story behind MacArthur's bold leap to Hollandia in 1944 and shows how ULTRA revealed the massive Japanese mobilization for what might have been (had it occurred) the bloodiest and most protracted engagement of the entire war the Allied invasion of Japan. Drea also clarifies the role of ULTRA in Truman's decision to drop atomic bombs on Japan in 1945, and concludes that ULTRA shortened the war by six to ten months.
Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules. SSI plays a crucial role in all types of security. It is information obtained in the conduct of security activities which, if publicly disclosed, would constitute an unwarranted invasion of privacy, reveal trade secrets, share privileged or confidential information, harm transportation security, or allow hostile elements to avoid security controls. Divided into seven sections, the Sensitive Security Information Certified (R) (SSI) Body of Knowledge provides a comprehensive source that helps you prepare for certification in SSI protection. It reviews and discusses relevant topics in The history and definition of SSI Espionage, security breaches, and detection Personal information security Corporate security Government security Legislation and regulations Identity theft Within the sections, the book covers a wide range of subjects related to aiding protection of SSI, including Good information practices The psychology of spies Methods to detect potential betrayal Methods for handling sensitive information Establishing security plans for sensitive information Monitoring techniques such as the use of closed-circuit video cameras In a world of ever-changing technology with massive amounts of information available to the public in a matter of seconds, government, businesses, and individuals must take extra precautions in securing their SSI. This book equips you with the essential knowledge to become certified in SSI protection, and will serve as a valuable reference afterward in remaining an effective security professional charged with protecting SSI.
When British troops first deployed to Northern Ireland in 1969 to keep apart rioting factions of loyalists and nationalists, they could not have known that they were being drawn into the longest campaign in the British Army's history, a battle against the threat of a new rising force - the Provisional Irish Republican Army. While patrols, vehicle bombs and incendiary speeches are the defining memories of the Troubles, the real war was fought out of sight and out of mind. For thirty years, Britain's Special Forces waged a ferocious, secretive struggle against a ruthless and implacable enemy. Harry McCallion's deep experience across the theatre of Northern Ireland offers a unique insight into nearly every major military action and operation in the Province. Having served seven tours with the Parachute Regiment, undergone selection for 14 Intelligence Company, completed six years with the SAS - including two tours with their anti-terrorism team - and received two commendations for bravery during service with the Royal Ulster Constabulary, there are few more qualified to tell this astonishing story. This book is his blistering account of the history of Britain's war against the IRA between 1970 and 1998. From new insights into high-profile killings and riveting accounts of enemy contact, to revelations about clandestine missions and the strategies used in combating a merciless enemy, Undercover War is the definitive inside story of the battle against the IRA, one of the most dangerous and effective terrorist organisations in recent history.
What did the British or American soldier know about the German Army? Was this knowledge accurate - and just how did he know it? There have been several 'handbooks' of Second World War armies, but they never tell us exactly what the Allied soldier knew at the time, or how he was informed. This is of importance because it influenced both conduct on the battlefield, and the way in which the soldier thought about his enemy. The book explains the background history of the organisations involved, followed by short chapters based around a series of original documents. This puts the original into context and also discusses whether the document that follows was correct in the picture it painted, and what can be deduced about sources and the concerns of the intelligence officers who compiled the material. Most of the documents were produced at the time, by the British War Office or US War Department, and cover different aspects of the German Army, including tactics, weapons, and uniforms. Subjects include: Allied intelligence on the German Army from 1930 onwards, British SIS / MI6 and US Military Intelligence. The organisations responsible, how they worked, and how they changed very rapidly with the coming of war. The role of technology, modern - like the radio transmitter, ancient - as in scouring libraries and periodicals, reports on military manoeuvres and parades. Limitations of 'Ultra' The German army itself, from the tiny force left after Versailles, to the rapid expansion in the late 1930s. Innovation in tanks, tactics, machine guns, rocket weaponry. The problems of gathering intelligence, not just danger, but finance, asking the right questions and the limitations of reporting and distribution.
Master of Deception is a biography of Peter Fleming, elder brother of Ian Fleming, creator of James Bond. Peter Fleming worked as a travel writer and journalist, serving with distinction throughout World War II and played a crucial role in British intelligence operations in the Far East. This biography ranges from the personal life of Fleming such as his marriage to Celia Johnson, a famous actor of the time, to his extensive military intelligence career which took him from Norway and Greece to the Far East. Framed through the life of Peter Fleming this book offers an in-depth study of British intelligence operations in the Far East during World War II. |
You may like...
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,578
Discovery Miles 55 780
Secrets in a Dead Fish - The Spying Game…
Melanie King
Hardcover
(1)
|