![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules. SSI plays a crucial role in all types of security. It is information obtained in the conduct of security activities which, if publicly disclosed, would constitute an unwarranted invasion of privacy, reveal trade secrets, share privileged or confidential information, harm transportation security, or allow hostile elements to avoid security controls. Divided into seven sections, the Sensitive Security Information Certified (R) (SSI) Body of Knowledge provides a comprehensive source that helps you prepare for certification in SSI protection. It reviews and discusses relevant topics in The history and definition of SSI Espionage, security breaches, and detection Personal information security Corporate security Government security Legislation and regulations Identity theft Within the sections, the book covers a wide range of subjects related to aiding protection of SSI, including Good information practices The psychology of spies Methods to detect potential betrayal Methods for handling sensitive information Establishing security plans for sensitive information Monitoring techniques such as the use of closed-circuit video cameras In a world of ever-changing technology with massive amounts of information available to the public in a matter of seconds, government, businesses, and individuals must take extra precautions in securing their SSI. This book equips you with the essential knowledge to become certified in SSI protection, and will serve as a valuable reference afterward in remaining an effective security professional charged with protecting SSI.
The world's fastest growing continent demographically, Africa displays nearly all the features of today's global security challenges: armed conflict, terrorism, irregular migration, organized crime, great power competition, public discontent, and economic turbulence. John Siko and Jonah Victor present their lessons from professional practice and pedagogical approach from the classroom in a concise guidebook that leads students and professionals through the most important issues, dynamics, challenges, and considerations for analysing and planning responses to security developments in Africa. This book provides issue-by-issue primers on the causes and consequences of Africa's security challenges that include: -how to anticipate security problems across current political and economic events -how to analyse African security institutions and military capabilities -how to understand historical trends across the African continent and appreciate unique variations among countries. -how to identify key drivers of future trends -how to connect security analysis to policy planning Learning is supported through the following features: - Thematic chapters which are optimized to help the reader quickly connect to the key concepts and analytic frameworks within the field. - The most relevant historical case studies, enabling students to engage in sophisticated analysis and discussion. - Connections and contrasts between the situations in North Africa and sub-Saharan Africa, which are traditionally studied separately. - Special sections on understanding race and ethnicity, and advice on traveling in Africa. - Chapter-end checklists of key questions to enable practical engagement with the topics covered.
GRIPPING, MOVING AND INSPIRING: the remarkable life of a world-leading expert in chemical weapons defence. "His work has saved lives and given hope." - Professor David Nott, bestselling author of War Doctor For thirty years, Hamish has served and volunteered in conflict zones around the world. As the army's foremost chemical weapons expert, he built a unique first-hand understanding of how to prevent attacks and train doctors on the frontline - saving countless lives in the process. After suffering near-death experiences time and again, Hamish discovered he had a ticking time bomb in his own chest: a heart condition called Sudden Death Syndrome that could kill him at any time. But with a new awareness for the fragility of life, he fought harder to make his count. Despite facing extraordinary personal danger, Hamish has unearthed evidence of multiple chemical attacks in Syria and continues to advise the government at the highest level, including after the 2018 Novichok poisoning in Salisbury. Lifting the lid on Hamish's unique world of battlefield expertise and humanitarian work, Chemical Warrior is a thrilling story of bravery and compassion.
Over Iran an RAF Canberra flies a feint towards the Soviet border, to provoke Soviet air defence radar operators to reveal their location. He will not deliberately enter Soviet airspace, but the possibilities for miscalculation, or misunderstanding leading to tragedy are always there. These flights cost the lives of over 150 US airmen by the end of the Cold War. Also cruising nearby in Iranian airspace, is a heavily modified US Air Force C-130 transport aircraft. Onboard 10 Special Equipment Operators are listening through their headphones for Soviet radio and radar activity. Hearing Soviet ground controllers scramble fighters to intercept the Canberra. The US operators alert the British aircraft to the closing MiG's and it quickly alters course away from the border. This was the life of crews involved in Cold War intelligence collection flights. Enormous resources were committed to these operations and they shaped the structure of much modern military intelligence collection, analysis and sharing. This book explores their scope, conduct, plus the politics and new technologies behind these operations that started in the dying embers of World War Two. It examines how these often complex missions were planned, coordinated and flown and is supported by first-hand accounts from pilots, aircrews and intelligence analysts. It utilises recently declassified British and US archive material and is illustrated with a wide range of images. The author examines European and Far East operations and a number of topics not previously covered in depth elsewhere. These include authorisation and coordination arrangements for conduct of overflight and peripheral missions; plus the part played by key third party states in operations in Scandinavia, Turkey and others. He looks at why Tyuratam complex was of such major intelligence interest and details the many resources targeted against it. He looks at some of the less explored elements of U-2 operations, including British involvement, plus the development of powerful lenses intended to enable very long range peripheral photography and why the long mythologised `Kapustin Yar' overflight probably never took place with new details and analysis. This comprehensive book links together the realities of flying, advanced technology and politics to provide a detailed and illustrated examination of Cold War aerial intelligence collection.
The current legislative and oversight activity with respect to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) has drawn national attention to several overarching issues. This book outlines three such issues and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions are implicated in this debate - the Fourth and Fifth Amendments.
The mission of the FBI is to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal and international agencies and partners. This book details what an FBI record is, what researchers can learn from these records, and how they can be used. The FBI has long been of interest to researchers, given the importance and scope of its mission and the range of historical events that is has been involved in over the years.
The attacks on the World Trade Center and the Pentagon on September 11th, 2001, dramatically demonstrated the intelligence threats facing the United States in the new century. In response, Congress approved significantly larger intelligence budgets and, in December 2004, passed the most extensive reorganisation of the intelligence community since the National Security Act of 1947. This book examines the background, oversight and issues that face the U.S. intelligence agency today.
The security classification regime in use within the federal executive branch traces its origins to armed forces information protection practices of the World War I era. This classification system - designating information, according to prescribed criteria and procedures, protected in accordance with one of three levels of sensitivity, is based on the amount of harm to the national security that would result from its disclosure. This book explores the history, status, and emerging management issues of security classified and controlled information today.
The Intelligence Community (IC) is a group of executive branch agencies and organisations that work separately and together to engage in intelligence activities necessary for the conduct of foreign relations and the protection of the national security of the United States. The U.S. government uses intelligence to improve and understand the consequences of its national security decisions. In this book, the Intelligence Community's Vision 2015 is examined, which enhances interagency intelligence organisations and helps consumers understand the mission, background, opportunities, and challenges facing the Intelligence Community today.
The Center for the Study of Intelligence (CSI) was founded in 1974 in response to Director of Central Intelligence James Schlesinger's desire to create within the CIA an organisation that could "think through the functions of intelligence and bring the best intellects available to bear on intelligence problems". The centre, comprising professional historians and experienced practitioners, attempts to document lessons learned from past activities, to explore the needs and expectations of intelligence consumers, and to stimulate serious debate about current and future intelligence challenges. This book examines the numerous books and monographs addressing historical, operational, doctrinal and theoretical aspects of the intelligence profession and its relation to modern media.
American policy on the interrogation of detainees is an exceptionally complex issue, one that cannot be adequately addressed nor satisfactorily resolved absent a clear understanding of the vital elements involved. This book is an overview of the controversy regarding U.S. treatment of enemy combatants and terrorist suspects detained in Iraq, Afghanistan, and other locations. Congress approved additional guidelines concerning the treatment of persons in U.S. custody and control via the Detainee Treatment Act (DTA). The DTA contains provisions that require Department of Defense (DoD) personnel to employ U.S. Army Field Manual guidelines while interrogating detainees, and prohibits the "cruel, inhuman and degrading treatment or punishment of persons under the detention, custody, or control of the U.S. Government." These provisions of the DTA, which were first introduced by Senator John McCain, have popularly been referred to as the "McCain Amendment." This book also discusses the Executive Order issued by President Barack Obama that generally instructs all U.S. agencies to comply with Army Field Manual requirements when interrogating persons captured in an armed conflict. This book consists of public documents which have been located, gathered, combined, reformatted, and enhanced with a subject index, selectively edited and bound to provide easy access.
This book highlights structured analytic techniques -- some widely used in the private sector and academia, some unique to the intelligence profession. Using the analytic techniques contained in this primer will assist analysts in dealing with the perennial problems of intelligence: the complexity of international developments, incomplete and ambiguous information, and the inherent limitations of the human mind. Understanding the intentions and capabilities of adversaries and other foreign actors is challenging, especially when either or both are concealed. Moreover, transnational threats today pose even greater complexity, in that they involve multiple actors -- including non-state entities -- that can adapt and transform themselves faster than those who seek to monitor and contain them. Finally, globalisation has increased the diversity of outcomes when complex, interactive systems such as financial flows, regional economies or the international system as a whole are in flux. Additionally, one of the least appreciated facts about the intelligence profession is that it exists in, and is influenced by, a very complex environment, one that includes everything from its relationships with policymakers, legislatures, military services, foreign partners, and last but not least, to its interaction with the public.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as 'target centric' intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject. The book is general enough in nature that a lay student-interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement-will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations. Uses numerous hands-on activities-that can easily be modified by instructors to be more or less challenging depending on the course level-to reinforce concepts As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information As such, the non-sensitive information presented is appropriate-and methods applicable-for use for education and training overseas and internationally Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.
The exposure of two senior republicans as informers for British intelligence in 2005 led to a popular perception that the IRA had 'lost' the intelligence war and was pressurised into peace. In this first in-depth study across the entire conflict, Thomas Leahy re-evaluates the successes and failures of Britain's intelligence activities against the IRA, from the use of agents and informers to special-forces, surveillance and electronic intelligence. Using new interview material alongside memoirs and Irish and UK archival materials, he suggests that the IRA was not forced into peace by British intelligence. His work sheds new light on key questions in intelligence and security studies. How does British intelligence operate against paramilitaries? Is it effective? When should governments 'talk to terrorists'? And does regional variation explain the outcome of intelligence conflicts? This is a major contribution to the history of the conflict and of why peace emerged in Northern Ireland.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
Written by the renowned expert Nigel West, this book exposes the operations of Britain's overseas intelligence-gathering organisation, the famed Secret Intelligence Service, MI6, and traces its origins back to its inception in 1909. In this meticulously researched account, its activities and structure are described in detail, using original secret service documents. The main body of the book concerns MI6's operations during the Second World War, and includes some remarkable successes and failures, including how MI6 financed a glamorous confidant of the German secret service; how a suspected French traitor was murdered by mistake; how Franco's military advisors were bribed to keep Spain out of the war; how members of the Swedish secret police were blackmailed into helping the British war effort; how a sabotage operation in neutral Tangiers enabled the Allied landings in North Africa to proceed undetected; and how Britain's generals ignored the first ULTRA decrypts because MI6 said that the information had come from a well-placed source called BONIFACE'. In this new edition, operations undertaken by almost all of MI6's overseas stations are recounted in extraordinary detail. They will fascinate both the professional intelligence officer and the general reader. The book includes organisational charts to illustrate MI6's internal structure and its wartime network of overseas stations. Backed by numerous interviews with intelligence officers and their agents, this engaging inside story throws light on many wartime incidents that had previously remained unexplained.
Master of Deception is a biography of Peter Fleming, elder brother of Ian Fleming, creator of James Bond. Peter Fleming worked as a travel writer and journalist, serving with distinction throughout World War II and played a crucial role in British intelligence operations in the Far East. This biography ranges from the personal life of Fleming such as his marriage to Celia Johnson, a famous actor of the time, to his extensive military intelligence career which took him from Norway and Greece to the Far East. Framed through the life of Peter Fleming this book offers an in-depth study of British intelligence operations in the Far East during World War II.
The complete story of how the German Enigma codes were broken. Perfect for fans of THE IMITATION GAME, the new film on Alan Turing's Enigma code, starring Benedict Cumberbatch. Breaking the German Enigma codes was not only about brilliant mathematicians and professors at Bletchley Park. There is another aspect of the story which it is only now possible to tell. It takes in the exploits of spies, naval officers and ordinary British seamen who risked, and in some cases lost, their lives snatching the vital Enigma codebooks from under the noses of Nazi officials and from sinking German ships and submarines. This book tells the whole Enigma story: its original invention and use by German forces and how it was the Poles who first cracked - and passed on to the British - the key to the German airforce Enigma. The more complicated German Navy Enigma appeared to them to be unbreakable.
Britain relied upon secret intelligence operations to rule Mandatory Palestine. Statecraft by Stealth sheds light on a time in history when the murky triad of intelligence, policy, and security supported colonial governance. It emphasizes the role of the Anglo-Zionist partnership, which began during World War I and ended in 1939, when Britain imposed severe limits on Jewish immigration and settlement in Palestine. Steven Wagner argues that although the British devoted considerable attention to intelligence gathering and analysis, they never managed to solve the basic contradiction of their rule: a dual commitment to democratic self-government and to the Jewish national home through immigration and settlement. As he deftly shows, Britain's experiment in Palestine shed all pretense of civic order during the Palestinian revolt of 1936-41, when the police authority collapsed and was replaced by a security state, created by army staff intelligence. That shift, Wagner concludes, was rooted in Britain's desire to foster closer ties with Saudi Arabia just before the start of World War II, and thus ended its support of Zionist policy. Statecraft by Stealth takes us behind the scenes of British rule, illuminating the success of the Zionist movement and the failure of the Palestinians to achieve independence. Wagner focuses on four key issues to stake his claim: an examination of the "intelligence state" (per Martin Thomas's classic, Empires of Intelligence), the Arab revolt, the role of the Mufti of Jerusalem, and the origins and consequences of Britain's decision to end its support of Zionism. Wagner crafts a superb story of espionage and clandestine policy-making, showing how the British pitted individual communities against each other at particular times, and why.
Signals Intelligence, or SIGINT, is the interception and evaluation of coded enemy messages. From Enigma to Ultra, Purple to Lorenz, Room 40 to Bletchley, SIGINT has been instrumental in both victory and defeat during the First and Second World War. In the First World War, a vast network of signals rapidly expanded across the globe, spawning a new breed of spies and intelligence operatives to code, de-code and analyse thousands of messages. As a result, signallers and cryptographers in the Admiralty's famous Room 40 paved the way for the code breakers of Bletchley Park in the Second World War. In the ensuing war years the world battled against a web of signals intelligence that gave birth to Enigma and Ultra, and saw agents from Britain, France, Germany, Russia, America and Japan race to outwit each other through infinitely complex codes. For the first time, Peter Matthews reveals the secret history of global signals intelligence during the world wars through original interviews with German interceptors, British code breakers, and US and Russian cryptographers. "SIGINT is a fascinating account of what Allied investigators learned postwar about the Nazi equivalent of Bletchley Park. Turns out, 60,000 crptographers, analysts and linguists achieved considerable success in solving intercepted traffic, and even broke the Swiss Enigma! Based on recently declassifed NSA document, this is a great contribution to the literature." - The St Ermin's Hotel Intelligence Book of the Year Award 2014
Tony Brooks was unique. He was barely out of school when recruited in 1941 by the Special Operations Executive (SOE), the wartime secret service established by Churchill to 'set Europe ablaze'. After extensive training he was parachuted into France in July 1942 - being among the first (and youngest) British agents sent to support the nascent French Resistance. Brook's success was primarily due to his exceptional qualities as a secret agent, although he was aided by large and frequent slices of luck. Among much else, he survived brushes with a British traitor and a notorious double agent; the Gestapo's capture of his wireless operator and subsequent attempts to trap Brooks; brief incarceration in a Spanish concentration camp; injuries resulting from a parachute jump into France; and even capture and interrogation by the Gestapo - although his cover story held and he was released. In an age when we so often take our heroes from the worlds of sport, film, television, music, fashion, or just 'celebrity', it is perhaps salutary to be reminded of a young man who ended the war in command of a disparate force of some 10,000 armed resistance fighters, and decorated with two of this country's highest awards for gallantry, the DSO and MC. At the time, he was just twenty-three years old. This remarkable, detailed and intimate account of a clandestine agent's dangerous wartime career combines the historian's expert eye with the narrative colour of remembered events. As a study in courage, it has few, if any, equals.
The General Staff Division of Fremde Heere Ost (Military Intelligence Service, Eastern Section) which from 1942 was led by Reinhard Gehlen, was the nerve-centre of Hitler's military reconnaissance on the Eastern Front. This department worked professionally and was operationally and tactically reliable. However, at a strategic level there were clear deficits: the industrial capacity of the Soviet arms industry, the politico-military intentions and the details of the Red Army's plans for their offensive remained for the most part hidden from the department. When the Second World War ended, Gehlen put the documents and personnel of Fremde Heere Ost at the disposal of the Americans. With their support he was able to build a new foreign secret service which later evolved into the Federal Intelligence Service. In this book, military historian Magnus Pahl presents a complete overview of the structure, personnel and working methods of Fremde Heere Ost based on a tremendous array of archival sources. This work includes an extensive case study of the East Pomeranian Operation 1945. Pahl's study is a significant contribution to our understanding of German strategic, operational and tactical thinking on the Eastern Front 1941-45.
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats. |
![]() ![]() You may like...
Orthogonal Polynomials: Current Trends…
Francisco Marcellan, Edmundo J. Huertas
Hardcover
R4,617
Discovery Miles 46 170
When Love Kills - The Tragic Tale Of AKA…
Melinda Ferguson
Paperback
![]()
Diagnostic Imaging of Exotic Pets…
Maria-Elisabeth Krautwald-Junghanns, Michael Pees, …
Hardcover
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier
Paperback
Theoretical, Modelling and Numerical…
Samsul Ariffin Abdul Karim
Hardcover
R3,020
Discovery Miles 30 200
The Aurelian Wall and the Refashioning…
Hendrik W. Dey
Hardcover
Proceedings of 14th International…
Andrey Ronzhin, Vladislav Shishlakov
Hardcover
R6,057
Discovery Miles 60 570
Drought and Drought Mitigation in Europe
Jurgen V. Vogt, Francesca Somma
Hardcover
R4,632
Discovery Miles 46 320
|