![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Britain relied upon secret intelligence operations to rule Mandatory Palestine. Statecraft by Stealth sheds light on a time in history when the murky triad of intelligence, policy, and security supported colonial governance. It emphasizes the role of the Anglo-Zionist partnership, which began during World War I and ended in 1939, when Britain imposed severe limits on Jewish immigration and settlement in Palestine. Steven Wagner argues that although the British devoted considerable attention to intelligence gathering and analysis, they never managed to solve the basic contradiction of their rule: a dual commitment to democratic self-government and to the Jewish national home through immigration and settlement. As he deftly shows, Britain's experiment in Palestine shed all pretense of civic order during the Palestinian revolt of 1936-41, when the police authority collapsed and was replaced by a security state, created by army staff intelligence. That shift, Wagner concludes, was rooted in Britain's desire to foster closer ties with Saudi Arabia just before the start of World War II, and thus ended its support of Zionist policy. Statecraft by Stealth takes us behind the scenes of British rule, illuminating the success of the Zionist movement and the failure of the Palestinians to achieve independence. Wagner focuses on four key issues to stake his claim: an examination of the "intelligence state" (per Martin Thomas's classic, Empires of Intelligence), the Arab revolt, the role of the Mufti of Jerusalem, and the origins and consequences of Britain's decision to end its support of Zionism. Wagner crafts a superb story of espionage and clandestine policy-making, showing how the British pitted individual communities against each other at particular times, and why.
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
___________ 'This excellent book demands the attention of anyone concerned about civil liberties in the United Kingdom' Guardian 1969 was a year of rising tension, violence and change for the people of Northern Ireland. Rioting in Derry's Bogside led to the deployment of British troops and a shortlived, uneasy truce. The British army soon found itself engaged in an undercover war against the Provisional IRA, which was to last for more than twenty years. In this enthralling and controversial book, Martin Dillon, author of the bestselling The Shankill Butchers, examines the roles played by the Provisional IRA, the State forces, the Irish Government and the British Army during this troubled period. He unravels the mystery of war in which informers, agents and double agents operate, revealing disturbing facts about the way in which the terrorists and the Intelligence Agencies target, undermine and penetrate each other's ranks. The Dirty War is investigative reporting at its very best, containing startling disclosures and throwing new light on previously inexplicable events.
The inside story of one of the most famous of all the 'back rooms' of the Second World War - and of the men and women who worked for it. Conceived by Winston Churchill to circumvent the delays, frustrations and inefficiencies of the service ministries, Department M.D.1. earned from its detractors the soubriquet 'Winston Churchill's Toyshop', yet from a tiny underground workshop housed in the cellars of the London offices of Radio Normandie in Portland Place, and subsequently from the 'stockbroker Tudor' of a millionaire's country mansion in Buckinghamshire, came an astonishing array of secret weapons ranging from the 'sticky bomb' and 'limpet mine' to giant bridge-carrying assault tanks, as well as the PIAT, a tank-destroying, hand-held mortar. Written by Colonel Stuart Macrae, who helped found M.D.1. and was its second-in-command throughout its life, the story is told of this relatively unknown establishment and the weapons it developed which helped destroy innumerable enemy tanks, aircraft and ships.
For almost sixty years after their deaths, three men, whose brave actions shortened the Second World War by as much as two years, remained virtually unknown and uncelebrated. Two lost their lives retrieving vital German codebooks from a sinking U-boat. The third survived the war, only to die in a house fire soon afterwards. But it was the precious documents they seized in October 1942 that enabled Bletchley Park's code-breakers to crack Enigma and so win the Battle of the Atlantic. Now recognised as a pivotal moment in world history, three British servicemen made it possible to finally beat the U-boats, but at the time not even their families could be told of the importance of their deeds. Shrouded in secrecy for decades, then recast as fictional Americans by the Hollywood film U-571, this book sets the record straight. It is written in celebration of Colin Grazier GC, Tony Fasson GC, and Tommy Brown GM - the REAL Enigma heroes.
Surveying the expanding conflict in Europe during one of his famous fireside chats in 1940, President Franklin Roosevelt ominously warned that "we know of other methods, new methods of attack. The Trojan horse. The fifth column that betrays a nation unprepared for treachery. Spies, saboteurs, and traitors are the actors in this new strategy." Having identified a new type of war -- a shadow war -- being perpetrated by Hitler's Germany, FDR decided to fight fire with fire, authorizing the formation of the Office of Strategic Services (OSS) to organize and oversee covert operations. Based on an extensive analysis of OSS records, including the vast trove of records released by the CIA in the 1980s and '90s, as well as a new set of interviews with OSS veterans conducted by the author and a team of American scholars from 1995 to 1997, "The Shadow War Against Hitler" is the full story of America's far-flung secret intelligence apparatus during World War II. In addition to its responsibilities generating, processing, and interpreting intelligence information, the OSS orchestrated all manner of dark operations, including extending feelers to anti-Hitler elements, infiltrating spies and sabotage agents behind enemy lines, and implementing propaganda programs. Planned and directed from Washington, the anti-Hitler campaign was largely conducted in Europe, especially through the OSS's foreign outposts in Bern and London. A fascinating cast of characters made the OSS run: William J. Donovan, one of the most decorated individuals in the American military who became the driving force behind the OSS's genesis; Allen Dulles, the future CIA chief who ran the Bern office, which he called "the big window onto the fascist world"; a veritable pantheon of Ivy League academics who were recruited to work for the intelligence services; and, not least, Roosevelt himself. A major contribution of the book is the story of how FDR employed Hitler's former propaganda chief, Ernst "Putzi" Hanfstengl, as a private spy. More than a record of dramatic incidents and daring personalities, this book adds significantly to our understanding of how the United States fought World War II. It demonstrates that the extent, and limitations, of secret intelligence information shaped not only the conduct of the war but also the face of the world that emerged from the shadows.
In this new edition of his classic 1970 memoir about the notorious U-2 incident, pilot Francis Gary Powers reveals the full story of what actually happened in the most sensational espionage case in Cold War history. After surviving the shoot-down of his reconnaissance plane and his capture on May 1, 1960, Powers endured sixty-one days of rigorous interrogation by the KGB, a public trial, a conviction for espionage, and the start of a ten-year sentence. After nearly two years, the U.S. government obtained his release from prison in a dramatic exchange for convicted Soviet spy Rudolph Abel. The narrative is a tremendously exciting suspense story about a man who was labeled a traitor by many of his countrymen but who emerged a Cold War hero.
The part played by code-cracking in World War II has been revealed in popular film and has also inspired several accounts by code-crackers. Much less well-known is how code-cracking was used in operational situations. In this account the "Silent Service" speaks through the voice of a young and inexperienced naval officer whose rites of passage to manhood required him to act as a seagoing eavesdropper, a role calling not only for quick intelligence but also for facing up to excitement and danger. Sir Alan Peacock's story is interlaced with graphic accounts of life on the lower deck, being torpedoed in a Channel action, and how to contribute to intelligence information that was required to foil enemy attacks on Russian convoys whilst facing atrocious weather conditions. The influence this intense experience exerted on Peacock's subsequent career in economics is also discussed.
Master of Deception is a biography of Peter Fleming, elder brother of Ian Fleming, creator of James Bond. Peter Fleming worked as a travel writer and journalist, serving with distinction throughout World War II and played a crucial role in British intelligence operations in the Far East. This biography ranges from the personal life of Fleming such as his marriage to Celia Johnson, a famous actor of the time, to his extensive military intelligence career which took him from Norway and Greece to the Far East. Framed through the life of Peter Fleming this book offers an in-depth study of British intelligence operations in the Far East during World War II.
On February 23, 1945, U.S. Marines claimed victory in the battle of Iwo Jima, one of the most important battles in the Pacific islands during World War II. Instrumental to this defeat of Japanese forces was a group of specialized Marines involved in a secret program. Throughout the war, Japanese intelligence agencies were able to intercept and break nearly every battlefield code the United States created. The Navajo Code Talkers, however, devised a complex code based on their native language and perfected it so that messages could be coded, transmitted, and decoded in minutes. The Navajo Code was the only battlefield code that Japan never deciphered. Unsung Heroes of World War II details the history of the men who created this secret code and used it on the battlefield to help the United States win World War II in the Pacific.
The United States and Mexico share a history shaped in the 19th century by numerous US forces interventions into Mexican territory and US expropriation of considerable swaths of Mexican territory. However, in spite of structural impediments and a history of resentment by Mexico of US intervention into its affairs and territory, the levels of cooperation and understanding slowly began to improve following a series of international and domestic factors. The decline of the former Soviet Union and the fall of the Berlin Wall at a global level, coupled with major political and economic challenges and reforms within Mexico are a starting point from which to assess the evolution of the bilateral defense relationship between the United States and Mexico. The American and Mexican militaries have evolved differently over the past 100 years and they each have very different responsibilities, mission sets, orientations, and capabilities. Yet in recent years, the Mexican armed forces have cooperated more closely with their US counterparts. This may be due to explicit direction coming from senior levels of the Mexican government and to operational requirements of the armed forces themselves as they seek to increase their capability and capacity to confront the growing levels in drug trafficking related violence. Today, both countries are dealing with the effects of this increased violence and insecurity in Mexico. Relying primarily on one-on-one interviews with senior practitioners and analysts on both sides of the border, the text examines the evolution of the U.S.-Mexican bilateral defense relationship to better understand how and why this unique relationship has improved, in fits and starts, over the past 25 years. It offers a new understanding of how defense policymakers from each respective country perceive the other, as well as how the lack of trust and understanding between the two neighbors has delayed greater cooperation.
Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.
This is the last untold story of Bletchley Park. Using recently declassified information, Paul Gannon has written a gripping account of the invention of the world's first true computer, Colossus. Uncover the secrets of Bletchley Park's code-breaking computers. In 1940, almost a year after the outbreak of the Second World War, Allied radio operators at an interception station in South London began picking up messages in a strange new code. Using science, maths, innovation and improvisation BletchleyPark codebreakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these codebreakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and hidden away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of BletchleyPark. 'Gannon's book contains a mass of utterly fascinating and largely unknown material about an immensely important wartime project, and is very welcome indeed.' - Brian Randell, TES
'This is what an SAS career is really like' AUSTRALIAN DEFENCE MAGAZINE Elite SAS Patrol Commander Stuart 'Nev' Bonner takes us inside the extraordinary and dangerous world of secret combat operations in this explosive, behind-the-scenes look at life inside the SAS. A world where capture means torture or death, and every move is trained for with precision detail to bring elite soldiers to the very peak of fighting ability. In a career spanning twenty years, fourteen of them in the SAS, Bonner shares with us the inside story of being out in front - and often behind enemy lines. From patrolling the mountains of East Timor to covert operations in Bougainville and the Solomon Islands, from sweeping into the Iraqi desert ahead of invading US forces to cripple Saddam Hussein's communications to patrolling in war-torn Baghdad and being in the middle of the disastrous Operation Anaconda in Afghanistan - this is a no-holds-barred account of what it's like to live, eat and breathe SAS. Now part of the HACHETTE MILITARY COLLECTION.
The Lockwood Analytical Method for Prediction (LAMP) is a systematic technique for predicting short-term, unique behaviors. Using primarily qualitative empirical data, LAMP allows the analyst to predict the most likely outcomes for specific research questions across a wide range of intelligence problems, such as cyber threats in the U.S., the possibility of an Al Qaeda attack, the likelihood of Iran providing nuclear capability to terrorist groups, or the future actions of the Mexican drug cartel. LAMP offers an innovative and powerful method for organizing all available information based on the perceptions of the national actors, using it to make relevant predictions as to which alternate future is most likely to occur at a given moment in time. Its transparent structure enables anyone to see how an analyst gets from point A to point B to produce an intelligence estimate. LAMP differs from other analytical techniques in that it is based on determining the relative probability of a range of alternate futures, rather than attempting to determine the quantitative probability of their occurrence. After explaining its theoretical framework, the text leads the reader through the process of predictive analysis before providing practical case studies showing how LAMP is applied against real world problems, such as the possible responses of Israel, the U.S., and Lebanon to the behavior of Hezbollah or the competing visions of the future of Afghanistan. Evaluation of the method is provided with the case studies to show the effectiveness of the LAMP predictions over time. The book is complemented by a website with downloadable software for use by students of intelligence in conducting their own predictive analysis. It will be an essential tool for the analyst and the student, not only for national security issues but also for competitive intelligence.
Today's intelligence community faces challenges that would have been inconceivable only a dozen years ago. Just as al-Qaeda's destruction of the Twin Towers heralded a revolution in global diplomacy, the events of 9/11 also threw two centuries of spy-craft into turmoil - because this new enemy could not be bought. Gone were the sleepers and moles whose trade in secrets had sustained intelligence agencies in both peacetime and war. A new method of intelligence had been born. The award-winning former Financial Times security correspondent Mark Huband here takes us deep inside this new unseen world of spies and intelligence. With privileged access to intelligence officers from Rome to Kabul and from Khartoum to Guantanamo Bay, he reveals how spies created secret channels to the IRA, deceived Iran's terrorist allies, frequently attempted to infiltrate al-Qaeda, and forced Libya to abandon its nuclear weapons. Using accounts from ex-KGB officers, Huband vividly describes the devastation caused by the West's misreading of Soviet intentions in Africa, and explains how ill-prepared western intelligence agencies were when the Cold War was replaced by the perception of a new terrorist threat. Benefiting from privileged access to intelligence sources across the world, Trading Secrets provides a unique and controversial assessment of the catastrophic failure of spies to grasp the realities of the Taliban's grip on Afghanistan, and draws upon exclusive interviews with serving officers in assessing the ability of the major intelligence agencies to combat the threat of twenty-first century terrorism.
This is a unique document published here for the first time, giving new insights into Hitler's personality and how Nazi Germany's military and intelligence apparatus operated. Published for the very first time, the top secret report "Some Weaknesses in German Strategy and Organisation 1933-1945" was prepared by Whitehall's highest intelligence body, the Joint Intelligence Committee, and presented to Britain's Chiefs of Staff in 1946 to 'set down certain aspects of the War whilst there are still sources available who were closely connected with the events described...when it is finally possible to make a balanced historical survey, some of the acutely critical moments which are vividly remembered now are likely to become confused with the passage of time, and there will be a tendency...to underestimate the great and evident strength of the German war machine'. The report encompasses the peculiar idiosyncrasies of Hitler's personality and the failures of Germany's military organisation, and charts the rise and fall of the Third Reich through 200 pages of intelligence reporting. Paul Winter sets this unique and important document in its historical setting, providing biographies of key figures referenced in the report and a timeline of the crucial events of the Second World War.
Interest in congressional oversight of intelligence has risen again in the 110th Congress, in part because of the House Democratic majority's pledge to enact the remaining recommendations from the U.S. National Commission on Terrorist Attacks upon the United States, commonly known as the 9/11 Commission. Its 2004 conclusions set the stage for reconsideration of the problems affecting Congress' structure in this area. The commission's unanimous report, as detailed in this book, covers many issues, and concludes that congressional oversight of intelligence was "dysfunctional". This book proposes two distinct solutions:(1) creation of a joint committee on intelligence (JCI), modelled after the defunct Joint Committee on Atomic Energy (JCAE), or (2) enhanced status and power for the existing select committees on intelligence, by making them standing committees and granting both authorisation and appropriations power. This book consists of public domain documents which have been located, gathered, combined, reformatted, and enhanced with a subject index, selectively edited and bound to provide easy access.
The twenty-first century has brought the perfect storm of conditions to create substantive global instability. This contemporary operating environment (COE) is characterized by complexity, ambiguity, volatility, and constant danger. It is a human invention that requires a human solution. Special operations forces (SOF), a group comprised of highly trained personnel with the ability to deploy rapidly and apply special skills in a variety of environments and circumstances, is the logical force of choice to achieve success in the COE. Increasing their effectiveness is cultural intelligence (CQ) – the ability to recognize the shared beliefs, values, attitudes, and behaviours of a group of people and then apply that knowledge toward a specific goal. Empowered by CQ, SOF are positioned to dominate in the COE. Solving the People Puzzle makes a convincing argument for the powerful union of the "force of choice" with the "tool of choice." This book will inspire and inform.
As of early 2010, more than two million U.S. troops have served in Iraq and Afghanistan. Yet the American public is neither much engaged in the issues of these two wars nor particularly knowledgeable about the troops experiences, which have ranged from positive and energizing to searing and debilitating. Based on scores of interview--some culled from the Library of Congress Veterans History Project and others conducted by the author himself--"Through Veterans Eyes" presents a composite narrative of the experiences of U.S. service personnel in Iraq and Afghanistan. Minear quotes more than 175 veterans by name and includes a dozen of their own photos from the conflict theaters. Thematic chapters cover duty and service, politics, cultural and ethical challenges, relationships to local populations, and reentry into American society. Neither pro-war nor anti-war, Minear s approach encourages veterans to express their views on issues critical to the nation. What has motivated U.S. military personnel to enlist? What specific challenges have they faced in Iraq and Afghanistan? What have been the impacts of deployment on their families and communities? Is their experience changing their views of their country and the world? What lessons may be learned from their stories? Veterans candid responses to these and other probing questions deserve pondering.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
While other books have speculated on the history and nature of Britain's intelligence services, this is the first to tell the story through the documents themselves. Only ten years ago access to these original sources would have been impossible, but now experts Twigge, Hampshire and Macklin draw on the spies' and spymasters' own words from the National Archives' unique intelligence files - including the very latest remarkable releases from MI5. Historical narrative is interwoven with colourful tales from the past that highlight some of the greatest successes - and failures - along the way, as well as the motives and machinations of those responsible for them. And readers who want to explore sources for themselves are given all the guidance they need. As the Iraq War and its aftermath bring the intelligence profession back into the spotlight, "British Intelligence" is compelling reading for anyone interested in the shadowy world of 20th-century espionage.
This study explodes prevailing myths about the Phoenix Program, the CIA's top-secret effort to destroy the Viet Cong by neutralizing its "civilian" leaders. Drawing on recently declassified documents and interviews with American, South Vietnamese, and North Vietnamese sources, Mark Moyar examines the attempts to eradicate the Viet Cong infrastructure and analyzes their effectiveness. He addresses misconceptions about these efforts and provides an accurate, complete picture of the allies' decapitation of the Viet Cong shadow government. Combining social and political history with a study of military operations, Moyar offers a fresh interpretation of the crucial role the shadow government played in the Viet Cong's ascent. Detailed accounts of intelligence operations provide an insider's view of their development and reveal what really happened in the safe havens of the Viet Cong. Filled with new information, Moyar's study sets the record straight about one of the last secrets of the Vietnam War and offers poignant lessons for dealing with future Third World insurgencies. This Bison Books edition includes a new preface and chapter by the author. |
You may like...
The Green Bottom Line - Environmental…
Martin Bennett, Peter James
Paperback
R1,257
Discovery Miles 12 570
Management And Cost Accounting
Colin Drury, Mike Tayles
Paperback
Semantic Web and Peer-to-Peer…
Steffen Staab, Heiner Stuckenschmidt
Hardcover
R2,693
Discovery Miles 26 930
|