Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Strategic Intelligence for the 21st Century: The Mosaic Method provides an industry insider's assessment of current intelligence methods and offers a new strategic model, directed toward the police, military, and intelligence agencies. The birth of the internet, the advent of 24 hour news and the rise of social media is evidence of how governments and those dealing in intelligence commodities struggle not only to access but also to limit the information that is out there. At the same time, recent terrorist atrocities, such as 9/11 and the July 7th bombings in London, have highlighted the need for intelligence cooperation on a global scale - but how can this be achieved? Serving as a call to break from traditional models and forge more deeply and continuously inter-linked relationships, Strategic Intelligence for the 21st Century advocates more fluid, networked operating methods, incorporating far more open-sourced information and data in analysis. Featuring contributions from key figures in the industry, including Sir Colin McColl, R. James Woolsey, and Sir David Phillips, this book presents a history of intelligence developments alongside the current challenges, analysing the impact on society - both from within and due to propaganda and covert action - and the influence wrought by technological innovations. With discussion of the Deep Web, the post-9/11 era, and the resulting impact on civil liberty and police operations, Strategic Intelligence for the 21st Century offers a revolutionary new approach to intelligence analysis and global collaborations.
Spy-masters, moles, and double-agents. Ciphers, saboteurs, and atomic secrets. The shady world of real-life espionage is as alarming and mysterious as any John Le Carré novel or James Bond movie. This outstanding book chronicles the international history of intelligence in the 20th century, exploring the impact of spies on world events during both war and peacetime. The work highlights the key events and breakthroughs in the history of intelligence and espionage - from the codebreaking and sabotage operations in the World Wars to the U2 incident and the CIA's secret war in Nicaragua. It also offers fascinating details of the colourful individuals who have made a mark as spies, defectors, and counterspies.
The exposure of two senior republicans as informers for British intelligence in 2005 led to a popular perception that the IRA had 'lost' the intelligence war and was pressurised into peace. In this first in-depth study across the entire conflict, Thomas Leahy re-evaluates the successes and failures of Britain's intelligence activities against the IRA, from the use of agents and informers to special-forces, surveillance and electronic intelligence. Using new interview material alongside memoirs and Irish and UK archival materials, he suggests that the IRA was not forced into peace by British intelligence. His work sheds new light on key questions in intelligence and security studies. How does British intelligence operate against paramilitaries? Is it effective? When should governments 'talk to terrorists'? And does regional variation explain the outcome of intelligence conflicts? This is a major contribution to the history of the conflict and of why peace emerged in Northern Ireland.
Tony Brooks was unique. He was barely out of school when recruited in 1941 by the Special Operations Executive (SOE), the wartime secret service established by Churchill to 'set Europe ablaze'. After extensive training he was parachuted into France in July 1942 - being among the first (and youngest) British agents sent to support the nascent French Resistance. Brook's success was primarily due to his exceptional qualities as a secret agent, although he was aided by large and frequent slices of luck. Among much else, he survived brushes with a British traitor and a notorious double agent; the Gestapo's capture of his wireless operator and subsequent attempts to trap Brooks; brief incarceration in a Spanish concentration camp; injuries resulting from a parachute jump into France; and even capture and interrogation by the Gestapo - although his cover story held and he was released. In an age when we so often take our heroes from the worlds of sport, film, television, music, fashion, or just 'celebrity', it is perhaps salutary to be reminded of a young man who ended the war in command of a disparate force of some 10,000 armed resistance fighters, and decorated with two of this country's highest awards for gallantry, the DSO and MC. At the time, he was just twenty-three years old. This remarkable, detailed and intimate account of a clandestine agent's dangerous wartime career combines the historian's expert eye with the narrative colour of remembered events. As a study in courage, it has few, if any, equals.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
Surveying the expanding conflict in Europe during one of his famous fireside chats in 1940, President Franklin Roosevelt ominously warned that "we know of other methods, new methods of attack. The Trojan horse. The fifth column that betrays a nation unprepared for treachery. Spies, saboteurs, and traitors are the actors in this new strategy." Having identified a new type of war -- a shadow war -- being perpetrated by Hitler's Germany, FDR decided to fight fire with fire, authorizing the formation of the Office of Strategic Services (OSS) to organize and oversee covert operations. Based on an extensive analysis of OSS records, including the vast trove of records released by the CIA in the 1980s and '90s, as well as a new set of interviews with OSS veterans conducted by the author and a team of American scholars from 1995 to 1997, "The Shadow War Against Hitler" is the full story of America's far-flung secret intelligence apparatus during World War II. In addition to its responsibilities generating, processing, and interpreting intelligence information, the OSS orchestrated all manner of dark operations, including extending feelers to anti-Hitler elements, infiltrating spies and sabotage agents behind enemy lines, and implementing propaganda programs. Planned and directed from Washington, the anti-Hitler campaign was largely conducted in Europe, especially through the OSS's foreign outposts in Bern and London. A fascinating cast of characters made the OSS run: William J. Donovan, one of the most decorated individuals in the American military who became the driving force behind the OSS's genesis; Allen Dulles, the future CIA chief who ran the Bern office, which he called "the big window onto the fascist world"; a veritable pantheon of Ivy League academics who were recruited to work for the intelligence services; and, not least, Roosevelt himself. A major contribution of the book is the story of how FDR employed Hitler's former propaganda chief, Ernst "Putzi" Hanfstengl, as a private spy. More than a record of dramatic incidents and daring personalities, this book adds significantly to our understanding of how the United States fought World War II. It demonstrates that the extent, and limitations, of secret intelligence information shaped not only the conduct of the war but also the face of the world that emerged from the shadows.
The modern means of communication have turned the world into an information fishbowl and, in terms of foreign policy and national security in post-Cold War power politics, helped transform international power politics. Information operations (IO), in which time zones are as important as national boundaries, is the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior. Contemporary IO differs from traditional psychological operations practiced by nation-states, because the availability of low-cost high technology permits nongovernmental organizations and rogue elements, such as terrorist groups, to deliver influential content of their own as well as facilitates damaging cyber-attacks ("hactivism") on computer networks and infrastructure. As current vice president Dick Cheney once said, such technology has turned third-class powers into first-class threats. Conceived as a textbook by instructors at the Joint Command, Control, and Information Warfare School of the U.S. Joint Forces Staff College and involving IO experts from several countries, this book fills an important gap in the literature by analyzing under one cover the military, technological, and psychological aspects of information operations. The general reader will appreciate the examples taken from recent history that reflect the impact of IO on U.S. foreign policy, military operations, and government organization.
In this new edition of his classic 1970 memoir about the notorious U-2 incident, pilot Francis Gary Powers reveals the full story of what actually happened in the most sensational espionage case in Cold War history. After surviving the shoot-down of his reconnaissance plane and his capture on May 1, 1960, Powers endured sixty-one days of rigorous interrogation by the KGB, a public trial, a conviction for espionage, and the start of a ten-year sentence. After nearly two years, the U.S. government obtained his release from prison in a dramatic exchange for convicted Soviet spy Rudolph Abel. The narrative is a tremendously exciting suspense story about a man who was labeled a traitor by many of his countrymen but who emerged a Cold War hero.
Britain relied upon secret intelligence operations to rule Mandatory Palestine. Statecraft by Stealth sheds light on a time in history when the murky triad of intelligence, policy, and security supported colonial governance. It emphasizes the role of the Anglo-Zionist partnership, which began during World War I and ended in 1939, when Britain imposed severe limits on Jewish immigration and settlement in Palestine. Steven Wagner argues that although the British devoted considerable attention to intelligence gathering and analysis, they never managed to solve the basic contradiction of their rule: a dual commitment to democratic self-government and to the Jewish national home through immigration and settlement. As he deftly shows, Britain's experiment in Palestine shed all pretense of civic order during the Palestinian revolt of 1936-41, when the police authority collapsed and was replaced by a security state, created by army staff intelligence. That shift, Wagner concludes, was rooted in Britain's desire to foster closer ties with Saudi Arabia just before the start of World War II, and thus ended its support of Zionist policy. Statecraft by Stealth takes us behind the scenes of British rule, illuminating the success of the Zionist movement and the failure of the Palestinians to achieve independence. Wagner focuses on four key issues to stake his claim: an examination of the "intelligence state" (per Martin Thomas's classic, Empires of Intelligence), the Arab revolt, the role of the Mufti of Jerusalem, and the origins and consequences of Britain's decision to end its support of Zionism. Wagner crafts a superb story of espionage and clandestine policy-making, showing how the British pitted individual communities against each other at particular times, and why.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
When Neville Chamberlain made his famous Peace in Our Time statement in 1938, after the Munich Agreement with Hitler, he may, or may not, have been aware that the new Section D of the Secret Intelligence Service was already making plans to mount an all-out political and sabotage war against Nazi Germany. This was a new form of warfare, encompassing bribery, black propaganda and sabotage by agents described as having no morals or scruples. To the horror of many, it disregarded the conventions of neutrality and was prepared to hit the Nazi state wherever it could do most damage. Malcolm Atkin reveals how Section Ds struggle to build a European wide anti-Nazi resistance movement was met with widespread suspicion from government, to the extent of a systematic destruction of its reputation. It was, however, a key pioneer of irregular warfare that led to the formation of the famous Special Operations Executive (SOE). His study is the first in-depth account of it to be published since the release of previously secret documents to the National Archives.
In this thoroughly updated second edition, Derek S. Reveron provides a comprehensive analysis of the shift in US foreign policy from coercive diplomacy to cooperative military engagement. The US military does much more than fight wars; it responds to humanitarian crises and natural disasters, assists advanced militaries to support international peace, and trains and equips almost every military in the world. Rather than intervening directly, the United States can respond to crises by sending weapons, trainers, and advisers to assist other countries in tackling their own security deficits created by subnational, transnational, and regional challengers. By doing so, the United States seeks to promote partnerships and its soft power, strengthen the state sovereignty system, prevent localized violence from escalating into regional crises, and protect its national security by addressing underlying conditions that lead to war. Since coalition warfare is the norm, security cooperation also ensures partners are interoperable with US forces when the US leads international military coalitions. Exporting Security takes into account the Obama administration's foreign policy, the implications of more assertive foreign policies by Russia and China, and the US military's role in recent humanitarian crises and nation-building efforts.
A highly valuable resource for students of intelligence studies, strategy and security, and foreign policy, this volume provides readers with an accessible and comprehensive exploration of U.S. espionage activities that addresses both the practical and ethical implications that attend the art and science of spying. Essentials of Strategic Intelligence investigates a subject unknown to or misunderstood by most American citizens: how U.S. foreign and security policy is derived from the information collection operations and data analysis by the sixteen major U.S. intelligence agencies. The essays in this work draw back the curtain on the hidden side of America's government, explaining the roles of various intelligence missions, justifying the existence of U.S. intelligence agencies, and addressing the complex moral questions that arise in the conduct of secret operations. After an introductory overview, the book presents accessibly written essays on the key topics: intelligence collection-and-analysis, counterintelligence, covert action, and intelligence accountability. Readers will understand how intelligence directly informs policymakers and why democracies need secret agencies; learn how the CIA has become deeply involved in the war-like assassination operations that target suspected foreign terrorists, even some individuals who are American citizens; and appreciate how the existence of-and our reliance on-these intelligence agencies poses challenges for democratic governance. Provides a comprehensive, up-to-date examination of all aspects of intelligence by experts in the field, from collection-and-analysis and counterintelligence to covert action and accountability Probes into how the United States' intelligence agencies attempt to protect the nation from cyberattacks by foreign nations and terrorist groups-and documents the successes and failures Documents the involvement of the National Security Agency (NSA) in bulk "metadata" collection of information on the telephone records and social media communications of American citizens Examines the effects that have resulted from major leaks in the U.S. government, from Wikileaks to the NSA Snowden leaks
On a chilly autumn night in 1942, a German spy was rowed ashore from a U-boat off the GaspT coast to begin a deadly espionage mission against the Allies. Thanks to an alert hotel-keeper's son, Abwehr agent 'Bobbi' was captured and forced by the RCMP to become Canada's first double-agent. For nearly fifty years the full story of the spy case, code-named Watchdog, was suppressed. Now, author Dean Beeby has uncovered nearly five thousand pages of formerly classified government documents, obtained through the Access to Information Act from the RCMP, the Canadian Security Intelligence Service, the Department of Justice, the National Archives of Canada, and Naval Intelligence. He has supplemented this treasure trove with research among still heavily censored FBI files, and interviews with surviving participants in the Watchdog story. Although British records of the case remain closed, Beeby also interviewed the MI5 case officer for Watchdog, the late Cyril Mills. The operation was Canada's first major foray into international espionage, predating the Gouzenko defection by three years. Watchdog, as Beeby reveals, was not the Allied success the RCMP has long claimed. Agent 'Bobbi' gradually ensnared his captors with a finely spun web of lies, transforming himself into a triple-agent who fed useful information back to Hamburg. Beeby argues that Canadian authorities were woefully unprepared for the subtleties of wartime counter-espionage, and that their mishandling of the case had long-term consequences that affected relations with their intelligence partners throughout the Cold War.
This survey of more than fifty years of national security policy juxtaposes declassified U.S. national intelligence estimates with recently released Soviet documents disclosing the views of Soviet leaders and their Communist allies on the same events. Matthias shows that U.S. intelligence estimates were usually correct but that our political and military leaders generally ignored them -- with sometimes disastrous results. The book begins with a look back at the role of U.S. intelligence during World War II, from Pearl Harbor through the plot against Hitler, from the D-Day invasion to the "unconditional surrender" of Japan, and reveals how better use of the intelligence available could have saved many lives and shortened the war. The following chapters dealing with the Cold War disclose what information and advice U.S. intelligence analysts passed on to policymakers, and also what sometimes bitter policy debates occurred within the Communist camp, concerning Vietnam, the Bay of Pigs, the Cuban missile crisis, the turmoil in Eastern Europe, the Six-Day and Yom Kippur wars in the Middle East, and the Soviet intervention in Afghanistan. In many ways, this is a story of missed opportunities that the U.S. government had to conduct a more responsible foreign policy which could have avoided large losses of life and massive expenditures on arms buildups. While not exonerating the CIA for its own mistakes, Matthias casts new light on the contributions that objective intelligence analysis did make during the Cold War and speculates on what might have happened if that analysis and advice had been heeded.
Civilians and military personnel do not have a clear view of each other in the United States today. Conspiring against such understanding are the norms and traditions of the two cultures. On the one hand, the military is considered to like its secrecy and think of itself as morally superior to the civilians it is meant to serve. On the other hand, civilians praise or blame the armed forces based on political exigencies and generally without true comprehension of their culture. And their mutual misperceptions seem greater now than in the late 1960s and early 1970s during the Vietnam War.Yet, as U.S. Naval Academy professor Bruce Fleming points out, the military is linked to the civilian world so fundamentally that all of us pay the price if they do not develop an appreciation of one another but that is achievable only if each side also strives to see itself clearly. As the military fulfills its mission of protecting Americans and their way of life, civilians must also do their part and support the military through budget allocations, legislation, and enlistment. Without this shared commitment, American interests suffer as a whole.Fleming shows how to close a military-civilian gap that yawns so large in twenty-first-century America that it potentially threatens national security and essential freedoms.
The twenty-first century has brought the perfect storm of conditions to create substantive global instability. This contemporary operating environment (COE) is characterized by complexity, ambiguity, volatility, and constant danger. It is a human invention that requires a human solution. Special operations forces (SOF), a group comprised of highly trained personnel with the ability to deploy rapidly and apply special skills in a variety of environments and circumstances, is the logical force of choice to achieve success in the COE. Increasing their effectiveness is cultural intelligence (CQ) – the ability to recognize the shared beliefs, values, attitudes, and behaviours of a group of people and then apply that knowledge toward a specific goal. Empowered by CQ, SOF are positioned to dominate in the COE. Solving the People Puzzle makes a convincing argument for the powerful union of the "force of choice" with the "tool of choice." This book will inspire and inform.
On February 23, 1945, U.S. Marines claimed victory in the battle of Iwo Jima, one of the most important battles in the Pacific islands during World War II. Instrumental to this defeat of Japanese forces was a group of specialized Marines involved in a secret program. Throughout the war, Japanese intelligence agencies were able to intercept and break nearly every battlefield code the United States created. The Navajo Code Talkers, however, devised a complex code based on their native language and perfected it so that messages could be coded, transmitted, and decoded in minutes. The Navajo Code was the only battlefield code that Japan never deciphered. Unsung Heroes of World War II details the history of the men who created this secret code and used it on the battlefield to help the United States win World War II in the Pacific.
The objective of this study was to provide an analytic framework for intelligence analysis of irregular warfare (IW) environments that could be used as the basis for a subsequent IW intelligence analysis curriculum development effort. The authors conducted a review of recent policy, strategy, doctrinal, and other materials pertaining to IW, concluding that although the term irregular warfare remains somewhat nebulous, situations considered within the realm of IW generally can be thought of in terms of two main stylized types: (1) population-centric IW situations, which include such missions as counterinsurgency, foreign internal defense, and support to insurgency, where the indigenous population is the center of gravity; and (2) counterterrorism operations, whether conducted as one element of a theater commanderas campaign or as part of the U.S. Special Operations Command-led global war on terrorism, where a cellular network is being targeted. The authors identify the intelligence and analytic requirements associated with each of these two stylized forms of IW and describe a top-down framework, or analytic procedure, that can be used for assessing IW environments. Also included is a list of references to IW-relevant doctrinal publications.
While other books have speculated on the history and nature of Britain's intelligence services, this is the first to tell the story through the documents themselves. Only ten years ago access to these original sources would have been impossible, but now experts Twigge, Hampshire and Macklin draw on the spies' and spymasters' own words from the National Archives' unique intelligence files - including the very latest remarkable releases from MI5. Historical narrative is interwoven with colourful tales from the past that highlight some of the greatest successes - and failures - along the way, as well as the motives and machinations of those responsible for them. And readers who want to explore sources for themselves are given all the guidance they need. As the Iraq War and its aftermath bring the intelligence profession back into the spotlight, "British Intelligence" is compelling reading for anyone interested in the shadowy world of 20th-century espionage.
This study explodes prevailing myths about the Phoenix Program, the CIA's top-secret effort to destroy the Viet Cong by neutralizing its "civilian" leaders. Drawing on recently declassified documents and interviews with American, South Vietnamese, and North Vietnamese sources, Mark Moyar examines the attempts to eradicate the Viet Cong infrastructure and analyzes their effectiveness. He addresses misconceptions about these efforts and provides an accurate, complete picture of the allies' decapitation of the Viet Cong shadow government. Combining social and political history with a study of military operations, Moyar offers a fresh interpretation of the crucial role the shadow government played in the Viet Cong's ascent. Detailed accounts of intelligence operations provide an insider's view of their development and reveal what really happened in the safe havens of the Viet Cong. Filled with new information, Moyar's study sets the record straight about one of the last secrets of the Vietnam War and offers poignant lessons for dealing with future Third World insurgencies. This Bison Books edition includes a new preface and chapter by the author.
This is the last untold story of Bletchley Park. Using recently declassified information, Paul Gannon has written a gripping account of the invention of the world's first true computer, Colossus. Uncover the secrets of Bletchley Park's code-breaking computers. In 1940, almost a year after the outbreak of the Second World War, Allied radio operators at an interception station in South London began picking up messages in a strange new code. Using science, maths, innovation and improvisation BletchleyPark codebreakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these codebreakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and hidden away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of BletchleyPark. 'Gannon's book contains a mass of utterly fascinating and largely unknown material about an immensely important wartime project, and is very welcome indeed.' - Brian Randell, TES |
You may like...
Radical War - Data, Attention and…
Matthew Ford, Andrew Hoskins
Paperback
R561
Discovery Miles 5 610
The Billion Dollar Spy - A True Story of…
David E. Hoffman
Paperback
(1)
The Central Intelligence Agency…
Athan G. Theoharis, Richard H. Immerman, …
Hardcover
R2,804
Discovery Miles 28 040
|