0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (26)
  • R250 - R500 (110)
  • R500+ (465)
  • -
Status
Format
Author / Contributor
Publisher

Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence

??? - ????????????????AI?? (Chinese, Paperback): Cyrus A Parsa, ?????? 大重置 - 科技巨头精英与世人如何能被中共或AI奴役 (Chinese, Paperback)
Cyrus A Parsa, 人工智能组织
R627 Discovery Miles 6 270 Ships in 10 - 15 working days
Evadir y Escapar de la Captura - Tecnicas de Evasion y Escape Urbano para Civiles (Spanish, Paperback): Sam Fury Evadir y Escapar de la Captura - Tecnicas de Evasion y Escape Urbano para Civiles (Spanish, Paperback)
Sam Fury; Translated by Mincor Inc; Illustrated by Neil Germio
R710 Discovery Miles 7 100 Ships in 10 - 15 working days
Evadir y Escapar de la Captura - Tecnicas de Evasion y Escape Urbano para Civiles (Spanish, Hardcover): Sam Fury Evadir y Escapar de la Captura - Tecnicas de Evasion y Escape Urbano para Civiles (Spanish, Hardcover)
Sam Fury; Translated by Mincor Inc; Illustrated by Neil Germio
R921 Discovery Miles 9 210 Ships in 10 - 15 working days
Operation Lena and Hitler's Plots to Blow Up Britain (Paperback): Bernard O'Connor Operation Lena and Hitler's Plots to Blow Up Britain (Paperback)
Bernard O'Connor
R312 R256 Discovery Miles 2 560 Save R56 (18%) Ships in 9 - 15 working days

Hitler's Germany made sustained efforts to inflict a terror campaign on the streets of Britain through the use of secret agents and agents provocateurs. The aim was to blow up military, industrial, transport and telecommunication targets, to lower morale among the civilian population and disrupt the war effort. Even before the outbreak of war, the Nazis provided the IRA with assistance for their plan to sabotage the British mainland. Prior to their planned invasion in the summer of 1940, the Nazis were also keen to recruit members of the Welsh and Scottish Nationalist parties to sabotage British targets and, over the course of the war, infiltrated dozens of agents from countries including Norway, Denmark, Holland, France and Cuba. What happened to the myriad plots to blow up Britain? We know that intelligence obtained from decrypted enemy messages via Bletchley Park and double agents like ZIGZAG, SUMMER and TATE alerted MI5 to some of these spies' arrivals, but what about the others? And crucially, was the effort actually half-hearted? Just how well trained were these infiltrators?

The First Code Talkers - Native American Communicators in World War I (Hardcover): William C Meadows The First Code Talkers - Native American Communicators in World War I (Hardcover)
William C Meadows
R1,225 Discovery Miles 12 250 Ships in 10 - 15 working days

Many Americans know something about the Navajo code talkers in World War II - but little else about the military service of Native Americans, who have served in our armed forces since the American Revolution, and still serve in larger numbers than any other ethnic group. But, as we learn in this splendid work of historical restitution, code talking originated in World War I among Native soldiers whose extraordinary service resulted, at long last, in U.S. citizenship for all Native Americans. The first full account of these forgotten soldiers in our nation's military history, The First Code Talkers covers all known Native American code talkers of World War I - members of the Choctaw, Oklahoma Cherokee, Comanche, Osage, and Sioux nations, as well as the Eastern Band of Cherokee and Ho-Chunk, whose veterans have yet to receive congressional recognition. William C. Meadows, the foremost expert on the subject, describes how Native languages, which were essentially unknown outside tribal contexts and thus could be as effective as formal encrypted codes, came to be used for wartime communication. While more than thirty tribal groups were eventually involved in World Wars I and II, this volume focuses on Native Americans in the American Expeditionary Forces during the First World War. Drawing on nearly thirty years of research - in U.S. military and Native American archives, surviving accounts from code talkers and their commanding officers, family records, newspaper accounts, and fieldwork in descendant communities - the author explores the origins, use, and legacy of the code talkers. In the process, he highlights such noted decorated veterans as Otis Leader, Joseph Oklahombi, and Calvin Atchavit and scrutinizes numerous misconceptions and popular myths about code talking and the secrecy surrounding the practice. With appendixes that include a timeline of pertinent events, biographies of known code talkers, and related World War I data, this book is the first comprehensive work ever published on Native American code talkers in the Great War and their critical place in American military history.

Geospatial Intelligence - Origins and Evolution (Hardcover): Robert M. Clark Geospatial Intelligence - Origins and Evolution (Hardcover)
Robert M. Clark
R4,376 Discovery Miles 43 760 Ships in 10 - 15 working days

A riveting introduction to the complex and evolving field of geospatial intelligence. Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT. Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.

Intelligence Surveillance, Security Sector Reforms, Accountability Principles and National Security Challenges within European... Intelligence Surveillance, Security Sector Reforms, Accountability Principles and National Security Challenges within European Union (Paperback)
Musa Jalalzai
R667 Discovery Miles 6 670 Ships in 10 - 15 working days

In a rapidly changing environment, Intelligence Surveillance developed through different types of technologies, software, strategies and drones operations in Europe and the United Kingdom. There are various forms of surveillance mechanisms, including Human Agents, Computer Programs, and Global Positioning Satellite Devices. These surveillance devices are now even encroaching into the personal domain of the individuals without the knowledge of the individual being watched. In a surveillance state, people live in consternation, fear, and struggling to protect their privacy, family life, business secrets, and data. In a short period of time, it has amassed a rather sordid history of citizen surveillance- and it continues to be unlawful. These are some of the issues discussed in the book which has varied articles from the experts on the subject.

Secrets and Power in Myanmar - Intelligence and the Fall of General Khin Nyunt (Paperback): Andrew Selth Secrets and Power in Myanmar - Intelligence and the Fall of General Khin Nyunt (Paperback)
Andrew Selth
R975 R785 Discovery Miles 7 850 Save R190 (19%) Ships in 10 - 15 working days

No external observer knows more about Myanmar's security and intelligence apparatus than Andrew Selth. In this book he presents an account of the structure and functions of Myanmar's deep state, along with a tale of personal ambition, rivalry and ruthless power politics worthy of John Le Carre. A thoroughly educative, entertaining and intriguing read."" - Professor Michael Wesley, Dean, College of Asia and the Pacific, The Australian National University ""Andrew Selth has once again amply illustrated the depth and penetration of his study of Myanmar/Burma and its institutions. This work on the more recent aspects of the country's intelligence apparatus goes beyond a masterful and comprehensive analysis of the Burmese intelligence community, and probes the social and institutional bases of the attitudes giving rise to that critical aspect of power. We are once again in Dr Selth's debt. This is required reading for serious observers of the Burmese scene."" - David I. Steinberg, Distinguished Professor of Asian Studies Emeritus, Georgetown University ""By lifting the lid on a pervasive yet secretive intelligence apparatus, Andrew Selth makes an outstanding contribution to Myanmar Studies. For scholars and practitioners alike, this book provides an essential history of a security state that remains powerful even during the transition away from overt authoritarian rule."" - Professor Ian Holliday, Vice-President (Teaching and Learning), The University of Hong Kong

The Baghdad Set - Iraq through the Eyes of British Intelligence, 1941-45 (Hardcover, 1st ed. 2019): Adrian O'Sullivan The Baghdad Set - Iraq through the Eyes of British Intelligence, 1941-45 (Hardcover, 1st ed. 2019)
Adrian O'Sullivan
R2,697 Discovery Miles 26 970 Ships in 10 - 15 working days

This book provides the first ever intelligence history of Iraq from 1941 to 1945, and is the third and final volume of a trilogy on regional intelligence and counterintelligence operations that includes Nazi Secret Warfare in Occupied Persia (Iran) (2014), and Espionage and Counterintelligence in Occupied Persia (Iran) (2015). This account of covert operations in Iraq during the Second World War is based on archival documents, diaries, and memoirs, interspersed with descriptions of all kinds of clandestine activity, and contextualized with analysis showing the significance of what happened regionally in terms of the greater war. After outlining the circumstances of the rise and fall of the fascist Gaylani regime, Adrian O'Sullivan examines the activities of the Allied secret services (CICI, SOE, SIS, and OSS) in Iraq, and the Axis initiatives planned or mounted against them. O'Sullivan emphasizes the social nature of human intelligence work and introduces the reader to a number of interesting, talented personalities who performed secret roles in Iraq, including the distinguished author Dame Freya Stark.

Intelligence in Vex - The UK & EU Intelligence Agencies Operate in a State of Fret (Paperback): Musa Khan Jalalzai Intelligence in Vex - The UK & EU Intelligence Agencies Operate in a State of Fret (Paperback)
Musa Khan Jalalzai
R756 Discovery Miles 7 560 Ships in 10 - 15 working days

Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.

Intelligence in Vex - The UK & EU Intelligence Agencies Operate in a State of Fret (Hardcover): Musa Khan Jalalzai Intelligence in Vex - The UK & EU Intelligence Agencies Operate in a State of Fret (Hardcover)
Musa Khan Jalalzai
R1,102 R872 Discovery Miles 8 720 Save R230 (21%) Ships in 10 - 15 working days

Most discussions on electronic media and intellectual forums about the effects of globalization on national security focus on violent threats. Notwithstanding the plethora of books, journals and research papers on national and international security, there is an iota research work on issue of interconnectedness. The interconnectedness of violent threats and their mounting effect pose grave dangers to the aptitude of a state to professionally secure its territorial integrity. Technological evolution and aggrandized interlinkage of our world in general, and specifically information technology, has affected people and society in different ways. Daily life of every man and woman has become influenced by these challenges. The twenty first century appeared with different class of National Security threats. After the first decade, world leaders, research scholars, journalists, politicians, and security experts grasped that the world has become the most dangerous place. The avoidance of war was the primary objective of superpowers, but with the end of the Cold War, emergence of Takfiri Jihadism, extremism, and terrorism prompted many unmatched challenges. Home-grown extremism and radicalization continues to expose a significant threat to the National Security of the EU and Britain. The risks from state-based threats have both grown and diversified. The unmethodical and impulsive use of a military-grade nerve agent on British soil is the worse unlawful act of bioterrorists.

The Conduct of Intelligence in Democracies - Processes, Practices, Cultures (Hardcover): Florina Cristiana Matei, Carolyn... The Conduct of Intelligence in Democracies - Processes, Practices, Cultures (Hardcover)
Florina Cristiana Matei, Carolyn Halladay
R2,845 R2,307 Discovery Miles 23 070 Save R538 (19%) Ships in 12 - 17 working days

What are the role and place of secret services and covert operations in democratic settings? How do states balance the need for both secrecy and openness? What are the challenges to creating effective intelligence practices? Focusing on these crucial questions, the authors of The Conduct of Intelligence in Democracies examine the purposes and processes of intelligence communities in today's security environment.

The Intelligence War in Afghanistan - Regional and International Intelligence Agencies Play the Tom & Jerry Endless Game on the... The Intelligence War in Afghanistan - Regional and International Intelligence Agencies Play the Tom & Jerry Endless Game on the Local Chessboard (Hardcover)
Musa Khan Jalalzai
R1,925 R1,249 Discovery Miles 12 490 Save R676 (35%) Ships in 10 - 15 working days

Globalisation continues to challenge our world at unprecedented speed. Technological innovations, changing geographical developments, regional rivalries, and destruction of national critical infrastructures in several Muslim states due to the US so-called war on terrorism-all transformed the structures and hierarchies of societies. The idea of the development of a nation that sounds on tripods that are food, shelter, and security failed. The Edward Snowden leaks challenged policymakers and the public understanding and perspectives on the role of security intelligence in liberal democratic states. The persisting imbalance of power in the United States, its institutional turmoil, and intelligence war, and the noticeably tilting power have made the country feel vulnerable and prodded it into military ventures. The calibration of Western allies around Whitehouse as the sole center of globalization has only brought instability, destruction, and loss of human lives.

Canada's Road to the Pacific War - Intelligence, Strategy, and the Far East Crisis (Paperback): Timothy. Wilford Canada's Road to the Pacific War - Intelligence, Strategy, and the Far East Crisis (Paperback)
Timothy. Wilford
R936 Discovery Miles 9 360 Ships in 12 - 17 working days

In December 1941, Japan attacked multiple targets in the Far East
and the Pacific, including Hong Kong, where Canadian battalions were
stationed. The disaster suggested that the Allies were totally
unprepared for war with Japan. This book dispels that assumption by
offering the first in-depth account of Canadian intelligence gathering
and strategic planning leading up to the crisis.

Timothy Wilford reminds us that Canada was both a Pacific and an
Atlantic power, and the first nation to declare war on Japan. Canadian
intelligence officers and strategists monitored Japan's movements
and worked closely with their US and Allied counterparts to develop a
picture of Japan's intentions and a strategic plan to meet
challenges in the Pacific. Although Canada wanted to avoid conflict
with Japan until US participation was assured, policy makers fully
anticipated action in the Pacific and made preparations for national
and imperial defence, which included the internment of Japanese
Canadians.

Canada's Road to the Pacific War sheds new light on
Canadian decision making, Commonwealth strategic planning, and the
emerging Anglo-American special relationship during a crisis that led
to war in the Pacific, as well as to the creation of the Grand
Alliance.


Timothy Wilford received a doctorate in history from
the University of Ottawa and specializes in twentieth-century military
history.

A Tale of Two Eagles - The US-Mexico Bilateral Defense Relationship Post Cold War (Hardcover): Craig A. Deare A Tale of Two Eagles - The US-Mexico Bilateral Defense Relationship Post Cold War (Hardcover)
Craig A. Deare
R3,458 Discovery Miles 34 580 Ships in 10 - 15 working days

The United States and Mexico share a history shaped in the 19th century by numerous US forces interventions into Mexican territory and US expropriation of considerable swaths of Mexican territory. However, in spite of structural impediments and a history of resentment by Mexico of US intervention into its affairs and territory, the levels of cooperation and understanding slowly began to improve following a series of international and domestic factors. The decline of the former Soviet Union and the fall of the Berlin Wall at a global level, coupled with major political and economic challenges and reforms within Mexico are a starting point from which to assess the evolution of the bilateral defense relationship between the United States and Mexico. The American and Mexican militaries have evolved differently over the past 100 years and they each have very different responsibilities, mission sets, orientations, and capabilities. Yet in recent years, the Mexican armed forces have cooperated more closely with their US counterparts. This may be due to explicit direction coming from senior levels of the Mexican government and to operational requirements of the armed forces themselves as they seek to increase their capability and capacity to confront the growing levels in drug trafficking related violence. Today, both countries are dealing with the effects of this increased violence and insecurity in Mexico. Relying primarily on one-on-one interviews with senior practitioners and analysts on both sides of the border, the text examines the evolution of the U.S.-Mexican bilateral defense relationship to better understand how and why this unique relationship has improved, in fits and starts, over the past 25 years. It offers a new understanding of how defense policymakers from each respective country perceive the other, as well as how the lack of trust and understanding between the two neighbors has delayed greater cooperation.

A Tale of Two Eagles - The US-Mexico Bilateral Defense Relationship Post Cold War (Paperback): Craig A. Deare A Tale of Two Eagles - The US-Mexico Bilateral Defense Relationship Post Cold War (Paperback)
Craig A. Deare
R1,816 Discovery Miles 18 160 Ships in 10 - 15 working days

The United States and Mexico share a history shaped in the 19th century by numerous US forces interventions into Mexican territory and US expropriation of considerable swaths of Mexican territory. However, in spite of structural impediments and a history of resentment by Mexico of US intervention into its affairs and territory, the levels of cooperation and understanding slowly began to improve following a series of international and domestic factors. The decline of the former Soviet Union and the fall of the Berlin Wall at a global level, coupled with major political and economic challenges and reforms within Mexico are a starting point from which to assess the evolution of the bilateral defense relationship between the United States and Mexico. The American and Mexican militaries have evolved differently over the past 100 years and they each have very different responsibilities, mission sets, orientations, and capabilities. Yet in recent years, the Mexican armed forces have cooperated more closely with their US counterparts. This may be due to explicit direction coming from senior levels of the Mexican government and to operational requirements of the armed forces themselves as they seek to increase their capability and capacity to confront the growing levels in drug trafficking related violence. Today, both countries are dealing with the effects of this increased violence and insecurity in Mexico. Relying primarily on one-on-one interviews with senior practitioners and analysts on both sides of the border, the text examines the evolution of the U.S.-Mexican bilateral defense relationship to better understand how and why this unique relationship has improved, in fits and starts, over the past 25 years. It offers a new understanding of how defense policymakers from each respective country perceive the other, as well as how the lack of trust and understanding between the two neighbors has delayed greater cooperation.

Intelligence Engineering - Operating Beyond the Conventional (Paperback): Adam D.M. Svendsen Intelligence Engineering - Operating Beyond the Conventional (Paperback)
Adam D.M. Svendsen
R1,157 Discovery Miles 11 570 Ships in 10 - 15 working days

Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.

Intelligence Engineering - Operating Beyond the Conventional (Hardcover): Adam D.M. Svendsen Intelligence Engineering - Operating Beyond the Conventional (Hardcover)
Adam D.M. Svendsen
R2,236 Discovery Miles 22 360 Ships in 10 - 15 working days

Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.

Intelligence and Information Policy for National Security - Key Terms and Concepts (Hardcover): Jan Goldman, Susan Maret Intelligence and Information Policy for National Security - Key Terms and Concepts (Hardcover)
Jan Goldman, Susan Maret
R5,290 Discovery Miles 52 900 Ships in 10 - 15 working days

Building on Goldman's Words of Intelligence and Maret's On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms pertain to federal procedures, policies, and practices involving the information life cycle, national security controls over information, and collection and analysis of intelligence information. This work is intended for intelligence students and professionals at all levels, as well as information science students dealing with such issues as the Freedom of Information Act.

Redback One - The True Story of an Australian SAS Hero (Paperback): Robert Macklin Redback One - The True Story of an Australian SAS Hero (Paperback)
Robert Macklin
R742 Discovery Miles 7 420 Ships in 10 - 15 working days

'This is what an SAS career is really like' AUSTRALIAN DEFENCE MAGAZINE Elite SAS Patrol Commander Stuart 'Nev' Bonner takes us inside the extraordinary and dangerous world of secret combat operations in this explosive, behind-the-scenes look at life inside the SAS. A world where capture means torture or death, and every move is trained for with precision detail to bring elite soldiers to the very peak of fighting ability. In a career spanning twenty years, fourteen of them in the SAS, Bonner shares with us the inside story of being out in front - and often behind enemy lines. From patrolling the mountains of East Timor to covert operations in Bougainville and the Solomon Islands, from sweeping into the Iraqi desert ahead of invading US forces to cripple Saddam Hussein's communications to patrolling in war-torn Baghdad and being in the middle of the disastrous Operation Anaconda in Afghanistan - this is a no-holds-barred account of what it's like to live, eat and breathe SAS. Now part of the HACHETTE MILITARY COLLECTION.

U.S. Intelligence and the Soviet Strategic Threat - Updated Edition (Hardcover, Revised edition): Lawrence Freedman U.S. Intelligence and the Soviet Strategic Threat - Updated Edition (Hardcover, Revised edition)
Lawrence Freedman; Preface by Lawrence Freedman
R3,187 Discovery Miles 31 870 Ships in 10 - 15 working days

The author examines in detail the organization of the U.S. intelligence community, its attempts to monitor and predict the development of Soviet forces from the early days of the cold war, and how these attempts affected American policy and weapons production. Originally published in 1987. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.

Exporting Security - International Engagement, Security Cooperation, and the Changing Face of the US Military (Hardcover,... Exporting Security - International Engagement, Security Cooperation, and the Changing Face of the US Military (Hardcover, Second Edition)
Derek S. Reveron; Contributions by Derek S. Reveron
R2,909 Discovery Miles 29 090 Ships in 10 - 15 working days

In this thoroughly updated second edition, Derek S. Reveron provides a comprehensive analysis of the shift in US foreign policy from coercive diplomacy to cooperative military engagement. The US military does much more than fight wars; it responds to humanitarian crises and natural disasters, assists advanced militaries to support international peace, and trains and equips almost every military in the world. Rather than intervening directly, the United States can respond to crises by sending weapons, trainers, and advisers to assist other countries in tackling their own security deficits created by subnational, transnational, and regional challengers. By doing so, the United States seeks to promote partnerships and its soft power, strengthen the state sovereignty system, prevent localized violence from escalating into regional crises, and protect its national security by addressing underlying conditions that lead to war. Since coalition warfare is the norm, security cooperation also ensures partners are interoperable with US forces when the US leads international military coalitions. Exporting Security takes into account the Obama administration's foreign policy, the implications of more assertive foreign policies by Russia and China, and the US military's role in recent humanitarian crises and nation-building efforts.

The Image of the Enemy - Intelligence Analysis of Adversaries since 1945 (Paperback): Paul Maddrell The Image of the Enemy - Intelligence Analysis of Adversaries since 1945 (Paperback)
Paul Maddrell; Contributions by Raymond L. Garthoff, Paul Maddrell, Benjamin B. Fischer, Matthias Uhl, …
R1,059 Discovery Miles 10 590 Ships in 10 - 15 working days

Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.

The Image of the Enemy - Intelligence Analysis of Adversaries since 1945 (Hardcover): Paul Maddrell The Image of the Enemy - Intelligence Analysis of Adversaries since 1945 (Hardcover)
Paul Maddrell; Contributions by Raymond L. Garthoff, Paul Maddrell, Benjamin B. Fischer, Matthias Uhl, …
R2,885 Discovery Miles 28 850 Ships in 10 - 15 working days

Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.

Historical Dictionary of International Intelligence (Hardcover, Second Edition): Nigel West Historical Dictionary of International Intelligence (Hardcover, Second Edition)
Nigel West
R4,738 Discovery Miles 47 380 Ships in 10 - 15 working days

Intelligence is now acknowledged as the hidden dimension to international diplomacy and national security. It is the hidden piece of the jigsaw puzzle of global relations that cements relationships, undermines alliances and topples tyrants, and after many decades of being deliberately overlooked or avoided, it is now regarded as a subject of legitimate study by academics and historians. This second edition of Historical Dictionary of International Intelligence covers its history through a chronology, an introductory essay, and an extensive bibliography. The dictionary section has over 500 cross-referenced entries on espionage techniques, categories of agents, crucial operations spies, defectors, moles, double and triple agents, and the tradecraft they apply. This book is an excellent access point for students, researchers, and anyone wanting to know more about the international intelligence.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Spy - Uncovering Craig Williamson
Jonathan Ancer Paperback  (6)
R280 R219 Discovery Miles 2 190
Intelligence and Strategic Culture
Isabelle Duyvesteyn Hardcover R4,047 Discovery Miles 40 470
Soviet Military Intelligence in War
Colonel David M. Glantz Hardcover R4,678 Discovery Miles 46 780
Agent Molière - The Life of John…
Geoff Andrews Paperback R340 Discovery Miles 3 400
This Is How They Tell Me the World Ends…
Nicole Perlroth Paperback R345 R284 Discovery Miles 2 840
SAS - The Illustrated History of the SAS
Joshua Levine Hardcover R547 Discovery Miles 5 470
The Secret Life of Bletchley Park - The…
Sinclair McKay Paperback  (1)
R279 R207 Discovery Miles 2 070
Agent 407 - A South African Spy Breaks…
Olivia Forsyth Paperback  (2)
R567 Discovery Miles 5 670
No More Secrets - My part in…
Betty Webb Paperback R311 R255 Discovery Miles 2 550
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud Paperback R299 R234 Discovery Miles 2 340

 

Partners