![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The modern means of communication have turned the world into an information fishbowl and, in terms of foreign policy and national security in post-Cold War power politics, helped transform international power politics. Information operations (IO), in which time zones are as important as national boundaries, is the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior. Contemporary IO differs from traditional psychological operations practiced by nation-states, because the availability of low-cost high technology permits nongovernmental organizations and rogue elements, such as terrorist groups, to deliver influential content of their own as well as facilitates damaging cyber-attacks ("hactivism") on computer networks and infrastructure. As current vice president Dick Cheney once said, such technology has turned third-class powers into first-class threats. Conceived as a textbook by instructors at the Joint Command, Control, and Information Warfare School of the U.S. Joint Forces Staff College and involving IO experts from several countries, this book fills an important gap in the literature by analyzing under one cover the military, technological, and psychological aspects of information operations. The general reader will appreciate the examples taken from recent history that reflect the impact of IO on U.S. foreign policy, military operations, and government organization.
In 1939, several hundred people - students, professors, international chess players, junior military officers, actresses and debutantes - reported to a Victorian mansion in Buckinghamshire: Bletchley Park. This was to be 'Station X', the Allies' top-secret centre for deciphering enemy codes. Their task was to break the ingenious Enigma code used for German high-level communications. The settings for the Enigma machine changed continually and each day the German operators had 159 million million million different possibilities. Yet against all the odds this gifted group achieved the impossible, coping with even greater difficulties to break Shark, the U-Boat Enigma, and Fish, the cypher system used by Hitler to talk to his guards.
Ephraim Kam observes surprise attack through the eyes of its victim in order to understand the causes of the victim's failure to anticipate the coming of war. Emphasing the psychological aspect of warfare, Kam traces the behavior of the victim at various functional levels and from several points of view in order to examine the difficulties and mistakes that permit a nation to be taken by surprise. He argues that anticipation and prediction of a coming war are more complicated than any other issue of strategic estimation, involving such interdependent factors as analytical contradictions, judgemental biases, organizational obstacles, and political as well as military constraints.
The book that gives an insider's view of some of the great intelligence blunders of recent history. Including Stalin's Operation Barbarossa, Hitler being misled by his own intelligence staff, the bungling that enabled an attack on Pearl Harbor, lack of preparation for the Viet Cong's offensive 1968, Arab Israeli war 1973, Falkland Islands, Gulf War 1991...New material to include: The US failure to run warning system before 9/11; the War on Terrorism; the Islamic Terrorist threat; mis-use of intelligence by UK government in War with Iraq; intelligence problems of Middle East; challenges of 21st century.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
Peter Wilkinson's vivid insider account of the undercover campaigns
of the Special Operations Executive (SOE) during the Second World
War looks at the foundation and structure of the SOE, as well as
his personal experience as an intelligence officer during the
invasion of Czechoslovakia and the Polish Campaign of 1939. The
book is a valuable contribution to the secret history of the Second
World War. It concludes with an account of the SOE's hazardous
attempt under the author's command to infiltrate the Third Reich
from 1943-1945.
This classic account of the German Resistance during World War II remains one of the primary sources on a topic that continues to generate controversy more than a half century after the war's end. As OSS (office of strategic services) chief of station in Bern, Switzerland, from 1942 to 1945, Dulles was charged with determining the extent and commitment of the opposition to Hitler. "Germany's Underground" is the most important firsthand account we have of Allied contact with that opposition--and the most concise and readable history of the men and women from every stratum of German society who made up this complex web.
In the years following World War I, America's armed services, industry, and government took lessons from that conflict to enhance the country's ability to mobilize for war. Paul Koistinen examines how today's military-industrial state emerged during that period-a time when the army and navy embraced their increasing reliance on industry, and business accelerated its efforts to prepare the country for future wars. Planning War, Pursuing Peace is the third of an extraordinary five-volume study on the political economy of American warfare. It differs from preceding volumes by examining the planning and investigation of war mobilization rather than the actual harnessing of the economy for hostilities; and it is also the first book to treat all phases of the political economy of wartime during those crucial interwar years. Koistinen first describes and analyzes the War and Navy Departments' procurement and economic mobilization planning-never before examined in its entirety-and conveys the enormity of the task faced by the military in establishing ties with many sectors of the economy. He tells how the War Department created commodity committees to carry on the work of World War I's War Industries Board, and how both military and industrial powers strove to protect their mutual interests against those seeking to avoid war and to reform society. Koistinen then describes the American public's struggle to come to terms with modern warfare through the in-depth explorations of the work of the House Select Committee on Expenditures in the War Department, the War Policies Commission, and the Senate Special Committee Investigating the Munitions Industry. He tells how these investigations alarmed pacifists, isolationists, and neo-Jeffersonians, and how they led Senator Gerald Nye and others to warn against the creation of ""unhealthy alliances"" between the armed services and industry. Planning War, Pursuing Peaceclearly shows how the U.S. economy was both directly and indirectly planned based on knowledge gained from World War I. By revealing vital and previously unexplored links between America's World Wars, it further illuminates the political economy of twentieth-century warfare as a complex and continually evolving process.
First published in 1865, Belle Boyd's memoir of her experiences as a Confederate spy has stood the test of time and interest. Belle first gained notoriety when she killed a Union soldier in her home in 1861. During the Federal occupations of the Shenandoah Valley, she mingled with the servicemen and, using her feminine wiles, obtained useful information for the Rebel cause. In this new edition, Kennedy-Nolle and Faust consider the domestic side of the Civil War and also assess the value of Boyd's memoir for social and literary historians in its challenge to our understanding the most divisive years in American history.
"Changing Enemies is one of the last accounts we shall have by a witness to some of the high-level decision making during the war and its immediate aftermath. . . . Lord Annan's book valuably points to the contribution to German democracy that was distinctively British." Michael R. Beschloss, New York Times Book Review"In this crackling tale, former British intelligence officer Annan offers an insider's view of the military espionage that helped the Allies win the war against Hitler. . . . He vividly describes power struggles among the Allied forces occupying Germany, his work in guiding post-Nazi Germany toward multi-party democracy, and] his friendship with Konrad Adenauer." Publishers Weekly"A graceful and crystal style like Noel Annan's, all but absent from most contemporary political and historical literature, is enough to awaken an American reader's slumbering literary Anglophilia." David Mehegan, Boston Globe"One of the best books ever written about military intelligence during World War II." William Roger Louis, University of Texas, and Fellow of St. Antony's College, Oxford"
In this account of one of the worst intelligence failures in Americanhistory, James J. Wirtz explains why U.S. forces were surprised by the North Vietnamese Tet Offensive in 1968. Wirtz reconstructs the turning point of the Vietnam War in unprecedented detail. Drawing upon Vietcong and recently declassified U.S. sources, he is able to trace the strategy and unfolding of the Tet campaign as well as the U.S. response.
No major twentieth-century power has so short a history of national intelligence agencies or activities as does the United States, and few have been as public or as tumultuous. A major debate has now opened over the future structure, size, and role of U.S. intelligence in the aftermath of the cold war. This unique and fully updated book is a history of the U.S. intelligence community--as well as a detailed description of the organization and function of the major components of the community as they existed at the beginning of 1992. A welcome and timely update of one of the most concise and objective guides to the history and structure of U.S. intelligence. "Representative Dave McCurdy, Chairman, Permanent Select Committee on Intelligence, U.S. House of RepresentativeS" The history of the intelligence community can be divided into three distinct periods. From its creation in 1947 until the revelations and investigations of 1974-1975, the intelligence community operated under fairly broad grants of authority based on trust. After the Nixon administration, a previously dormant Congress was galvanized to write new oversight provisions and also took on a greater role as a shaper and consumer of intelligence. With the collapse of the Soviet Union and the end of the cold war in 1991, the intelligence community found its role and even its necessity questioned due to the sudden absence of its major target. Lowenthal emphasizes that a competent and challenged intelligence capability is an essential part of the U.S. national security structure, despite the status of external events or threats. The major requirement of this structure, he says, is providing timely, objective, and pointed analysis to policymakers across a wide range of issues.
Sensitive security information (SSI) is a category of sensitive but unclassified information under the United States government's information sharing and control rules. SSI plays a crucial role in all types of security. It is information obtained in the conduct of security activities which, if publicly disclosed, would constitute an unwarranted invasion of privacy, reveal trade secrets, share privileged or confidential information, harm transportation security, or allow hostile elements to avoid security controls. Divided into seven sections, the Sensitive Security Information Certified (R) (SSI) Body of Knowledge provides a comprehensive source that helps you prepare for certification in SSI protection. It reviews and discusses relevant topics in The history and definition of SSI Espionage, security breaches, and detection Personal information security Corporate security Government security Legislation and regulations Identity theft Within the sections, the book covers a wide range of subjects related to aiding protection of SSI, including Good information practices The psychology of spies Methods to detect potential betrayal Methods for handling sensitive information Establishing security plans for sensitive information Monitoring techniques such as the use of closed-circuit video cameras In a world of ever-changing technology with massive amounts of information available to the public in a matter of seconds, government, businesses, and individuals must take extra precautions in securing their SSI. This book equips you with the essential knowledge to become certified in SSI protection, and will serve as a valuable reference afterward in remaining an effective security professional charged with protecting SSI.
Much has been written about U.S. intelligence operations. However, intelligence, as it is conducted in the U.S. domestic environment, has usually been treated in a fractured and sensationalistic manner. This book dispassionately assesses the U.S. domestically oriented intelligence enterprise by first examining its individual components and then showing how those components, both federal and non-federal, work in conjunction to form an often unacknowledged structure that is more than the sum of its parts. The U.S. Domestic Intelligence Enterprise: History, Development, and Operations takes a unique, in-depth approach that assesses not only the current state of affairs but also the evolution of the domestic intelligence enterprise. To accomplish this, it examines the origins and progress of the major agencies to show why they operate in the way that they do. By providing this perspective, the book promotes an understanding of the factors to consider when developing effective intelligence policy. The book is divided into several thematic sections: The evolution of the domestically oriented intelligence enterprise The collection capabilities of the enterprise The role that domestically-developed intelligence has in the analytical process, which informs decision making The use of intelligence to implement decisions via disruption of threat actors The U.S. Domestic Intelligence Enterprise intends to prompt a rethinking of intelligence within the domestic environment. It takes into account the political realities, the organizational cultures, and the evolving missions that have shaped those agencies responsible for positive and negative intelligence and disruption of threats on American soil. This will hopefully provide a counterweight to future knee-jerk reactions and, instead, inspire a thoughtful approach to the advancement of U.S. strategic interests while protecting the rights of Americans.
During World War II, Britain enjoyed spectacular success in the secret war between hostile intelligence services, enabling a substantial and successful expansion of British counter-espionage which continued to grow in the Cold War era. Hugh Trevor-Roper's experiences working in the Secret Intelligence Service (MI6) during the war left a profound impression on him and he later observed the world of intelligence with particular discernment. To Trevor-Roper, who was always interested in the historical dimension of the present and was fully alive to the historical significance of the era in which he lived, the subjects of wartime intelligence and the complex espionage networks that developed in the Cold War period were as worthy of profound investigation and reflection as events from the more-distant past. Expressing his observations through some of his most ironic and entertaining correspondence, articles and reviews, Trevor-Roper wrote vividly about some of the greatest intelligence characters of the age - from Kim Philby and Michael Straight to the Germans Admiral Canaris and Otto John. The coherence, depth and historical vision which unites these writings can only be glimpsed when they are brought together from the scattered publications in which they appeared, and when read beside his unpublished, private reflections. The Secret World unites Trevor-Roper's writings on the subject of intelligence - including the full text of The Philby Affair and some of his personal letters to leading figures. Based on original material and extensive supplementary research by E.D.R Harrison, this book is a sharp, revealing and personal first-hand account of the intelligence world in World War II and the Cold War.
Since World War I, Cyprus has played a crucial role in British defence strategy. Panagiotis Dimitrakis here introduces new research which reveals the true role of British intelligence on the island throughout the twentieth century, particularly during World War II, the 1955-59 Archbishop Makarios and EOKA-led revolt and the 1974 Turkish invasion. He sheds fresh light on the stance of both Prime Minister Harold Wilson and Foreign Secretary James Callaghan towards Greece and Turkey in the turbulent 1970s, and provides important new perspectives on the 1978 Egyptian hostage crisis at Larnaca Airport and the research is based throughout on primary sources including previously unpublished declassified papers from British diplomats and intelligence officers. This is a valuable study for scholars of contemporary strategy and military history and for those interested in military intelligence and the history of Cyprus.
Building on Goldman's Words of Intelligence and Maret's On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms pertain to federal procedures, policies, and practices involving the information life cycle, national security controls over information, and collection and analysis of intelligence information. This work is intended for intelligence students and professionals at all levels, as well as information science students dealing with such issues as the Freedom of Information Act.
Words of Intelligence: An Intelligence Professional's Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels. The intelligence community has undergone massive changes since it developed after World War II. Intelligence work now involves several different processes, including the planning, collection, analysis, and production of information. It also requires extensive expertise in its terminology. And in the post-9/11 era, the intelligence community has expanded, requiring the transmission of information to state and local public administrators, health officials, and transportation planners in times of a possible domestic attack. The number of people who need to know the specialized terminology of the intelligence community continues to grow. This dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues from both a foreign intelligence perspective and a local perspective for law enforcement officials. The number of terms, abbreviations, and acronyms has more than doubled for this new edition, and it includes a topical index and extensively cross-referenced entries. This book explains terms that relate to intelligence operations, intelligence strategies, security classifications, obscure names of intelligence boards and organizations, and methodologies used to produce intelligence analysis. Both entry-level and experienced intelligence professionals in the domestic and foreign intelligence communities find this book useful. This book is more than just a reference book; it is a book to read and enjoy, and from which to learn the art and science of intelligence analysis.
On February 23, 1945, U.S. Marines claimed victory in the battle of Iwo Jima, one of the most important battles in the Pacific islands during World War II. Instrumental to this defeat of Japanese forces was a group of specialized Marines involved in a secret program. Throughout the war, Japanese intelligence agencies were able to intercept and break nearly every battlefield code the United States created. The Navajo Code Talkers, however, devised a complex code based on their native language and perfected it so that messages could be coded, transmitted, and decoded in minutes. The Navajo Code was the only battlefield code that Japan never deciphered. Unsung Heroes of World War II details the history of the men who created this secret code and used it on the battlefield to help the United States win World War II in the Pacific.
This is the last untold story of Bletchley Park. Using recently declassified information, Paul Gannon has written a gripping account of the invention of the world's first true computer, Colossus. Uncover the secrets of Bletchley Park's code-breaking computers. In 1940, almost a year after the outbreak of the Second World War, Allied radio operators at an interception station in South London began picking up messages in a strange new code. Using science, maths, innovation and improvisation BletchleyPark codebreakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these codebreakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and hidden away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of BletchleyPark. 'Gannon's book contains a mass of utterly fascinating and largely unknown material about an immensely important wartime project, and is very welcome indeed.' - Brian Randell, TES
Words of Intelligence: A Dictionary is intended for the intelligence and national security men and women who are fighting the Global War on Terrorism at all levels: local, state, and federal. The intelligence community has undergone massive changes since the Central Intelligence Agency, National Security Agency, and the Department of Defense were created, and recently, with the establishment of Homeland Security and a Director of National Intelligence, it has taken on even more duties and responsibilities. Intelligence now must be transmitted to state and local public administrators, health officials, and transportation planners (to name just a few) in times of a possible domestic attack. Containing over 600 terms related to theoretical aspects of intelligence, intelligence operations, intelligence strategies, security classification of information, obscure names of intelligence boards and organizations, and homeland security, this dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues. A topical index is also included.
Anticipating Surprise, originally written as a manual for training intelligence analysts during the Cold War, has been declassified and condensed to provide wider audiences with an inside look at intelligence gathering and analysis for strategic warning. Cynthia Grabo defines the essential steps in the warning process, examines distinctive ingredients of the analytic method of intelligence gathering, and discusses the guidelines for assessing the meaning of gathered information. Since the September 11, 2001 terrorist attacks on America, intelligence collection and analysis has been hotly debated. In this book, Grabo suggests ways of improving warning assessments that better convey warnings to policymakers and military commanders who are responsible for taking appropriate action to avert disaster.
Head of the Abwehr (German military intelligence) during World War II, Admiral Wilhelm Canaris (1887-1945) has been both damned as Hitler's master spy and praised as the true hero of the German anti-Nazi resistance. What emerges in Heinz Hohne's definitive biography is a panoramic view of the rise and fall of Nazism as reflected in the destiny of one man who hoped, for patriotic purposes, to harness evil temporarily, only to be destroyed by it.
The debonair Special Operations Executive agent Richard "Dick" Mallaby was the first Briton to be sent to Italy as an SOE operative, parachuted unceremoniously into Lake Como in August 1943. Arrested and initially tortured by the Italian authorities, he managed to sweet-talk his way out of trouble and helped Marshal Pietro Badoglio and King Victor Emmanuel III escape to the Allied lines. He also helped negotiate the armistice with Italy, for which he was awarded the Military Cross. He was back in action in 1945, when he crossed into Fascist-controlled northern Italy from Switzerland but was swiftly captured and interrogated by the SS. Narrowly avoiding a firing squad once again, he helped to secure the surrender of 800,000 German forces in Italy in May 1945. Based on 20 years of research, Gianluca Barneschi has uncovered the true story of a real-life James Bond. |
You may like...
An Intelligence Studies Anthology…
Richard M. Denholm II
Paperback
Keeping Us Safe - Secret Intelligence…
Arthur S. Hulnick
Hardcover
The Art and Science of Military…
Hy Rothstein, Barton Whaley
Hardcover
R3,191
Discovery Miles 31 910
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,286
Discovery Miles 52 860
|