![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Packed with the technological details and insights into military strategy that fans of Tom Clancy relish, The Silent War is a riveting look at the darkest days of the Cold War. It reveals, in gripping detail, the espionage, innovative high technology, and heroic seafaring the United States employed against the Soviet Union in the battle for nuclear and military supremacy. John Piña Craven, who shared management responsibility for the submarine-borne Polaris missile system, captures the excitement and the dangers of the times as he recounts the true stories behind some of the century's most shocking headlines and reveals harrowing episodes kept hidden from the public. Craven describes for the first time the structural problems that almost caused the destruction of the Nautilus, the world's first nuclear-powered submarine, and presents startling information about the race to recover a hydrogen bomb from the B-52 bomber that went down off the coast of Spain. In a report no fan of The Hunt for Red October will want to miss, he provides a fascinating, authoritative perspective on the Navy's reaction to the rogue Soviet submarine and its mission. A major contribution to Cold War history and literature, The Silent War will appeal to military buffs and fans of nonstop adventure thrillers alike.
New threats require new thinking. State attacks involving long-range missiles or conventional military forces are not the only threat to the U.S. homeland. Covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals-and even by residents of the United States-are significant issues for future U.S. security. In this comprehensive work, Cordesman offers a range of recommendations, from reevaluating what constitutes a threat and bolstering homeland defense measures, to improving resource allocation and sharpening intelligence. There is a wide spectrum of potential threats to the U.S. homeland that do not involve overt attacks by states using long-range missiles or conventional military forces. Such threats include covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals, and independent terrorist and extremist attacks by residents of the United States. These threats are currently limited in scope and frequency, but are emerging as potentially significant issues for future U.S. security. In this comprehensive work, Cordesman argues that new threats require new thinking, and offers a range of recommendations, from expanding the understanding of what constitutes a threat and bolstering Homeland defense measures, to bettering resource allocation and improving intelligence gathering and analysis. No pattern of actual attacks on U.S. territory has yet emerged that provides a clear basis for predicting how serious any given form of attack might be in the future, what means of attack might be used, or how lethal new forms of attack might be. As a result, there is a major ongoing debate over the seriousness of the threat and how the U.S. government should react. This work is an invaluable contribution to that debate.
Khe Sanh remains to this day, an extremely controversial and emotional aspect of the war in Vietnam. The U.S. Armed Forces fought to defend Khe Sanh in early 1968 and then abandoned the base after a 77-day siege by the North Vietnamese. This book contains fromerly Top Secret messages to President Lyndon Johnson from National Security Advisor W.W. "Walt" Rostow, Gen. William Westmoreland and many others. The siege and loss of Khe Sanh is the tragedy of the war in Vietnam in microcosm.
While the Second World War raged in Europe, demanding most of Canada's military effort, an equally fierce war with Japan was going on in the Far East. Army, navy, and air force signals units in Canada kept watch on the enemy's vital radio communications. To be more effective, Number One Canadian Special Wireless Group of the Royal Canadian Signals Corps was formed to go to the Southwest Pacific war theatre for close-in radio eavesdropping. Murray describes the often zany career of the only complete signals unit Canada sent to the War in the Pacific, and the significant part it played in the Allied signals intelligence operation known as "Magic."
A Cross of Iron provides the fullest account yet of the national security state that emerged in the first decade of the Cold War. Michael J. Hogan traces the process of state-making through struggles to unify the armed forces, harness science to military purposes, mobilize military manpower, control the defense budget, and distribute the cost of defense across the economy. President Harry S. Truman and his successor were in the middle of a fundamental contest over the nation's political identity and postwar purpose, and their efforts determined the size and shape of the national security state that finally emerged.
This book-length poem by one of the major poets of our era is structured as a series of messages transmitted by a master spy to the director of spy operations and to a number of his fellow spies. The spy speaks of his own alienation and sense of purposelessness as a secret agent-a metaphor for a human existence committed to ordering, deciphering, and making sense of a world of random signs. First published in 1974, the book is now reprinted with a substantial introduction by the author that elaborates on the genesis of the poem, the literary figures who inspired some of the characters, the poem's reception, and other matters. Reviews of the earlier edition: "These poems can be read and admired for their fluidity, their wonderful diversity of significance. . . . Many delights."-Richard Poirier, Los Angeles Times "Hollander's arch and subtle long poem allegorizes the mirror closeness between raveller and unraveller."-George Steiner, New Yorker "Hollander explores with wit and virtuosity the pleasures of poetry (encipherment) and the trials of the workaday world (one's 'cover.') . . . A rich, intelligent poem . . . a special pleasure for those with an ear for allusions, parodies, and puns."-Library Journal
How has the end of the Cold War affected America's intelligence agencies? When are aggressive clandestine operations justifiable, and who should be responsible for deciding to proceed with them? Should the United States engage in more aggressive economic espionage? These are just a few of the issues Loch Johnson examines in this thoughtful assessment of strategic intelligence and its vital role in modern governments. Johnson draws on historical data, more than five hundred interviews, and his own experience working for Congressional committees on intelligence. He begins by defining the functions of intelligence: espionage, counterintelligence, and covert action. He then provides an overview of America's secret operations abroad, assesses the moral implications of clandestine operations, and offers guidelines for a more ethical approach to the use of secret power. Johnson explores the question of intelligence accountability, looking closely at how well intelligence agencies have been monitored through the forum of Congressional hearings. He compares America's approach to intelligence with that of other nations, discusses the degree to which intelligence agencies should provide information about foreign businesses, and evaluates how well the U.S. intelligence agencies fared during the Cold War against the USSR. Secret agencies have the capacity not only to safeguard democracy but also to subvert it, says Johnson. As such, they deserve both our support and our scrutiny.
First published in 1865, Belle Boyd's memoir of her experiences as a Confederate spy has stood the test of time and interest. Belle first gained notoriety when she killed a Union soldier in her home in 1861. During the Federal occupations of the Shenandoah Valley, she mingled with the servicemen and, using her feminine wiles, obtained useful information for the Rebel cause. In this new edition, Kennedy-Nolle and Faust consider the domestic side of the Civil War and also assess the value of Boyd's memoir for social and literary historians in its challenge to our understanding the most divisive years in American history.
In the years following World War I, America's armed services, industry, and government took lessons from that conflict to enhance the country's ability to mobilize for war. Paul Koistinen examines how today's military-industrial state emerged during that period-a time when the army and navy embraced their increasing reliance on industry, and business accelerated its efforts to prepare the country for future wars. Planning War, Pursuing Peace is the third of an extraordinary five-volume study on the political economy of American warfare. It differs from preceding volumes by examining the planning and investigation of war mobilization rather than the actual harnessing of the economy for hostilities; and it is also the first book to treat all phases of the political economy of wartime during those crucial interwar years. Koistinen first describes and analyzes the War and Navy Departments' procurement and economic mobilization planning-never before examined in its entirety-and conveys the enormity of the task faced by the military in establishing ties with many sectors of the economy. He tells how the War Department created commodity committees to carry on the work of World War I's War Industries Board, and how both military and industrial powers strove to protect their mutual interests against those seeking to avoid war and to reform society. Koistinen then describes the American public's struggle to come to terms with modern warfare through the in-depth explorations of the work of the House Select Committee on Expenditures in the War Department, the War Policies Commission, and the Senate Special Committee Investigating the Munitions Industry. He tells how these investigations alarmed pacifists, isolationists, and neo-Jeffersonians, and how they led Senator Gerald Nye and others to warn against the creation of ""unhealthy alliances"" between the armed services and industry. Planning War, Pursuing Peaceclearly shows how the U.S. economy was both directly and indirectly planned based on knowledge gained from World War I. By revealing vital and previously unexplored links between America's World Wars, it further illuminates the political economy of twentieth-century warfare as a complex and continually evolving process.
This highly acclaimed book-hailed as the definitive account of the Julius and Ethel Rosenberg case-now includes a new introduction that discusses the most recent evidence. It provides information from the Khrushchev and Molotov memoirs, the Venona papers, and material contained in a Discovery Channel documentary that was first aired in March 1997.
The CIA and its World War II predecessor, the Office of Strategic Services (OSS), were for many years largely populated by members of Ivy League colleges, particularly Yale. In this highly acclaimed book, Robin Winks explores the underlying bonds between the university and the intelligence communities, introducing a fascinating cast of characters that include safe-crackers and experts in Azerbaijani as well as such social luminaries as Paul Mellon, David Bruce, John P. Marquand, Jr., and William Vanderbilt. This edition of the book includes a new preface by Winks. Reviews of the first edition: "One of the best studies of intelligence in recent years."-Edward Jay Epstein, Los Angeles Times Book Review "The most original book yet written on the interpenetration of counter-intelligence and campus."-Andrew Sinclair, Sunday Times (London) "Winks writes a lively compound of analysis and anecdote to illuminate the bonds between academe and the intelligence community. His book is a towering achievement."-Robert W. Smith, Chicago Sun-Times "Among the more important contributions to the history of Anglo-American espionage to appear this or any other year. . . . Moves with an unfolding pace that any thriller writer might envy."-Tom Dowling, San Francisco Examiner "A brilliant book."-Sallie Pisani, Journal of American History
The names, we sometimes say, have been changed "to protect the innocent". As regards those agents in KGB networks in the U.S. during and following World War II, their presence and their deeds (or misdeeds) were known, but their names were not. The FBI-KGB War is the exciting, true (which often really is stranger than fiction), and authentic story of how those names became known and how the not-so-innocent persons to whom those names belonged were finally called to account. Following World War II, FBI Special Agent Robert J. Lamphere set out to uncover the extensive American networks of the KGB. Lamphere used a large file of secret Russian messages intercepted during the war. The FBI-KGB War is the detailed (but never boring) story of how those messages were finally decoded and made to reveal their secrets, secrets that led to persons with such now-infamous names as Judith Coplon, Klaus Fuchs, Harry Gold, and Ethel and Julius Rosenberg.
During World War II, Britain enjoyed spectacular success in the secret war between hostile intelligence services, enabling a substantial and successful expansion of British counter-espionage. Hugh Trevor-Roper's experiences working for the Secret Intelligence Service (MI6) during the war had a profound impact on him and he later observed the world of intelligence with particular sharpness. To him, the subjects of wartime espionage and the complex espionage networks that developed in the Cold War period were as worthy of profound investigation and reflection as events from the more distant past. Expressing his observations through some of his most ironic and entertaining correspondence, articles and reviews, Trevor-Roper wrote vividly about some of the greatest intelligence characters of the age - from Kim Philby and Michael Straight to the Germans Admiral Canaris and Otto John. Including some previously unpublished material, this book is a sharp, revealing and personal first-hand account of the intelligence world in World War II and the Cold War.
Cracking the enemy's radio code is a task so urgent and so difficult that it demands the military's best minds and most sophisticated technology. But when the coded messages are in a language as complex as Japanese, decoding problems multiply dramatically. It took the U.S. Army a full two years after the attack on Pearl Harbor to break the codes of the Japanese Imperial Army. But by 1944 the U.S. was decoding more than 20,000 messages a month filled with information about enemy movements, strategy, fortifications, troop strengths, and supply convoys. In "MacArthur's ULTRA," historian Edward Drea recounts the story behind the Army's painstaking decryption operation and its dramatic breakthrough. He demonstrates how ULTRA (intelligence from decrypted Japanese radio communications) shaped MacArthur's operations in New Guinea and the Philippines and its effect on the outcome of World War II. From sources on both sides of the Pacific and national security agency declassified records, Drea has compiled a detailed listing of the ULTRA intelligence available to MacArthur. By correlating the existing intelligence with MacArthur's operational decisions, Drea shows how MacArthur usedand misusedintelligence information. He tells for the first time the story behind MacArthur's bold leap to Hollandia in 1944 and shows how ULTRA revealed the massive Japanese mobilization for what might have been (had it occurred) the bloodiest and most protracted engagement of the entire war the Allied invasion of Japan. Drea also clarifies the role of ULTRA in Truman's decision to drop atomic bombs on Japan in 1945, and concludes that ULTRA shortened the war by six to ten months.
Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules. SSI plays a crucial role in all types of security. It is information obtained in the conduct of security activities which, if publicly disclosed, would constitute an unwarranted invasion of privacy, reveal trade secrets, share privileged or confidential information, harm transportation security, or allow hostile elements to avoid security controls. Divided into seven sections, the Sensitive Security Information Certified (R) (SSI) Body of Knowledge provides a comprehensive source that helps you prepare for certification in SSI protection. It reviews and discusses relevant topics in The history and definition of SSI Espionage, security breaches, and detection Personal information security Corporate security Government security Legislation and regulations Identity theft Within the sections, the book covers a wide range of subjects related to aiding protection of SSI, including Good information practices The psychology of spies Methods to detect potential betrayal Methods for handling sensitive information Establishing security plans for sensitive information Monitoring techniques such as the use of closed-circuit video cameras In a world of ever-changing technology with massive amounts of information available to the public in a matter of seconds, government, businesses, and individuals must take extra precautions in securing their SSI. This book equips you with the essential knowledge to become certified in SSI protection, and will serve as a valuable reference afterward in remaining an effective security professional charged with protecting SSI.
The world's fastest growing continent demographically, Africa displays nearly all the features of today's global security challenges: armed conflict, terrorism, irregular migration, organized crime, great power competition, public discontent, and economic turbulence. John Siko and Jonah Victor present their lessons from professional practice and pedagogical approach from the classroom in a concise guidebook that leads students and professionals through the most important issues, dynamics, challenges, and considerations for analysing and planning responses to security developments in Africa. This book provides issue-by-issue primers on the causes and consequences of Africa's security challenges that include: -how to anticipate security problems across current political and economic events -how to analyse African security institutions and military capabilities -how to understand historical trends across the African continent and appreciate unique variations among countries. -how to identify key drivers of future trends -how to connect security analysis to policy planning Learning is supported through the following features: - Thematic chapters which are optimized to help the reader quickly connect to the key concepts and analytic frameworks within the field. - The most relevant historical case studies, enabling students to engage in sophisticated analysis and discussion. - Connections and contrasts between the situations in North Africa and sub-Saharan Africa, which are traditionally studied separately. - Special sections on understanding race and ethnicity, and advice on traveling in Africa. - Chapter-end checklists of key questions to enable practical engagement with the topics covered.
GRIPPING, MOVING AND INSPIRING: the remarkable life of a world-leading expert in chemical weapons defence. "His work has saved lives and given hope." - Professor David Nott, bestselling author of War Doctor For thirty years, Hamish has served and volunteered in conflict zones around the world. As the army's foremost chemical weapons expert, he built a unique first-hand understanding of how to prevent attacks and train doctors on the frontline - saving countless lives in the process. After suffering near-death experiences time and again, Hamish discovered he had a ticking time bomb in his own chest: a heart condition called Sudden Death Syndrome that could kill him at any time. But with a new awareness for the fragility of life, he fought harder to make his count. Despite facing extraordinary personal danger, Hamish has unearthed evidence of multiple chemical attacks in Syria and continues to advise the government at the highest level, including after the 2018 Novichok poisoning in Salisbury. Lifting the lid on Hamish's unique world of battlefield expertise and humanitarian work, Chemical Warrior is a thrilling story of bravery and compassion.
As of early 2010, more than two million U.S. troops have served in Iraq and Afghanistan. Yet the American public is neither much engaged in the issues of these two wars nor particularly knowledgeable about the troops experiences, which have ranged from positive and energizing to searing and debilitating. Based on scores of interview--some culled from the Library of Congress Veterans History Project and others conducted by the author himself--"Through Veterans Eyes" presents a composite narrative of the experiences of U.S. service personnel in Iraq and Afghanistan. Minear quotes more than 175 veterans by name and includes a dozen of their own photos from the conflict theaters. Thematic chapters cover duty and service, politics, cultural and ethical challenges, relationships to local populations, and reentry into American society. Neither pro-war nor anti-war, Minear s approach encourages veterans to express their views on issues critical to the nation. What has motivated U.S. military personnel to enlist? What specific challenges have they faced in Iraq and Afghanistan? What have been the impacts of deployment on their families and communities? Is their experience changing their views of their country and the world? What lessons may be learned from their stories? Veterans candid responses to these and other probing questions deserve pondering.
Britain relied upon secret intelligence operations to rule Mandatory Palestine. Statecraft by Stealth sheds light on a time in history when the murky triad of intelligence, policy, and security supported colonial governance. It emphasizes the role of the Anglo-Zionist partnership, which began during World War I and ended in 1939, when Britain imposed severe limits on Jewish immigration and settlement in Palestine. Steven Wagner argues that although the British devoted considerable attention to intelligence gathering and analysis, they never managed to solve the basic contradiction of their rule: a dual commitment to democratic self-government and to the Jewish national home through immigration and settlement. As he deftly shows, Britain's experiment in Palestine shed all pretense of civic order during the Palestinian revolt of 1936-41, when the police authority collapsed and was replaced by a security state, created by army staff intelligence. That shift, Wagner concludes, was rooted in Britain's desire to foster closer ties with Saudi Arabia just before the start of World War II, and thus ended its support of Zionist policy. Statecraft by Stealth takes us behind the scenes of British rule, illuminating the success of the Zionist movement and the failure of the Palestinians to achieve independence. Wagner focuses on four key issues to stake his claim: an examination of the "intelligence state" (per Martin Thomas's classic, Empires of Intelligence), the Arab revolt, the role of the Mufti of Jerusalem, and the origins and consequences of Britain's decision to end its support of Zionism. Wagner crafts a superb story of espionage and clandestine policy-making, showing how the British pitted individual communities against each other at particular times, and why.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as 'target centric' intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject. The book is general enough in nature that a lay student-interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement-will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations. Uses numerous hands-on activities-that can easily be modified by instructors to be more or less challenging depending on the course level-to reinforce concepts As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information As such, the non-sensitive information presented is appropriate-and methods applicable-for use for education and training overseas and internationally Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.
Tony Brooks was unique. He was barely out of school when recruited in 1941 by the Special Operations Executive (SOE), the wartime secret service established by Churchill to 'set Europe ablaze'. After extensive training he was parachuted into France in July 1942 - being among the first (and youngest) British agents sent to support the nascent French Resistance. Brook's success was primarily due to his exceptional qualities as a secret agent, although he was aided by large and frequent slices of luck. Among much else, he survived brushes with a British traitor and a notorious double agent; the Gestapo's capture of his wireless operator and subsequent attempts to trap Brooks; brief incarceration in a Spanish concentration camp; injuries resulting from a parachute jump into France; and even capture and interrogation by the Gestapo - although his cover story held and he was released. In an age when we so often take our heroes from the worlds of sport, film, television, music, fashion, or just 'celebrity', it is perhaps salutary to be reminded of a young man who ended the war in command of a disparate force of some 10,000 armed resistance fighters, and decorated with two of this country's highest awards for gallantry, the DSO and MC. At the time, he was just twenty-three years old. This remarkable, detailed and intimate account of a clandestine agent's dangerous wartime career combines the historian's expert eye with the narrative colour of remembered events. As a study in courage, it has few, if any, equals.
The exposure of two senior republicans as informers for British intelligence in 2005 led to a popular perception that the IRA had 'lost' the intelligence war and was pressurised into peace. In this first in-depth study across the entire conflict, Thomas Leahy re-evaluates the successes and failures of Britain's intelligence activities against the IRA, from the use of agents and informers to special-forces, surveillance and electronic intelligence. Using new interview material alongside memoirs and Irish and UK archival materials, he suggests that the IRA was not forced into peace by British intelligence. His work sheds new light on key questions in intelligence and security studies. How does British intelligence operate against paramilitaries? Is it effective? When should governments 'talk to terrorists'? And does regional variation explain the outcome of intelligence conflicts? This is a major contribution to the history of the conflict and of why peace emerged in Northern Ireland.
The complete story of how the German Enigma codes were broken. Perfect for fans of THE IMITATION GAME, the new film on Alan Turing's Enigma code, starring Benedict Cumberbatch. Breaking the German Enigma codes was not only about brilliant mathematicians and professors at Bletchley Park. There is another aspect of the story which it is only now possible to tell. It takes in the exploits of spies, naval officers and ordinary British seamen who risked, and in some cases lost, their lives snatching the vital Enigma codebooks from under the noses of Nazi officials and from sinking German ships and submarines. This book tells the whole Enigma story: its original invention and use by German forces and how it was the Poles who first cracked - and passed on to the British - the key to the German airforce Enigma. The more complicated German Navy Enigma appeared to them to be unbreakable.
Civil Air Transport (CAT), founded in China after World War II by Claire Chennault and Whiting Willauer, was initially a commercial carrier specializing in air freight. Its role quickly changed as CAT became first a paramilitary adjunct of the Nationalist Chinese Air Force, then the CIA's secret "air force" in Korea, then "the most shot-at airline in the world" in French Indochina, and eventually becoming reorganized as Air America at the height of the Vietnam War. William M. Leary's detailed operational history of CAT sets the story in the perspective of Asian and Cold War geopolitics and shows how CAT allowed the CIA to operate with a level of flexibility and secrecy that it would not have attained through normal military or commercial air transportation. |
![]() ![]() You may like...
|