![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Civil Air Transport (CAT), founded in China after World War II by Claire Chennault and Whiting Willauer, was initially a commercial carrier specializing in air freight. Its role quickly changed as CAT became first a paramilitary adjunct of the Nationalist Chinese Air Force, then the CIA's secret "air force" in Korea, then "the most shot-at airline in the world" in French Indochina, and eventually becoming reorganized as Air America at the height of the Vietnam War. William M. Leary's detailed operational history of CAT sets the story in the perspective of Asian and Cold War geopolitics and shows how CAT allowed the CIA to operate with a level of flexibility and secrecy that it would not have attained through normal military or commercial air transportation.
Master of Deception is a biography of Peter Fleming, elder brother of Ian Fleming, creator of James Bond. Peter Fleming worked as a travel writer and journalist, serving with distinction throughout World War II and played a crucial role in British intelligence operations in the Far East. This biography ranges from the personal life of Fleming such as his marriage to Celia Johnson, a famous actor of the time, to his extensive military intelligence career which took him from Norway and Greece to the Far East. Framed through the life of Peter Fleming this book offers an in-depth study of British intelligence operations in the Far East during World War II.
The history of scientific intelligence - its birth, its importance during the Second World War and its unique wartime qualities - has relied almost entirely on the memories of its pioneer, R.V. Jones. Through scrutiny of Jones' post-war literature (especially his war memoirs, entitled Most Secret War; his archival papers - as well as those of his colleagues and contemporaries - and other mediums he used to promote his account of scientific intelligence), this ground-breaking book constitutes a critique of the genesis of scientific and technical intelligence. Examining chronologically all of the key events Jones became famous for - the Battle of the Beams, the Bruneval Raid, the Radio War, the Battle of the V-Weapons - and comparing Jones' account of these (and many other) events with contemporary documentation, this book provides a rich understanding of the internal machinations within the British wartime air scientific intelligence organisation defined as ADI (Science) and their relationships with the many other political, military and intelligence sections that pursued similar and often closely-linked quests. This book importantly connects science and technology with the collection and collation of intelligence; is an analysis of wartime intelligence of a scientific and technical nature; argues that scientific intelligence was much more than one man's accomplishments, which involved many more individuals and organisations than has been perceived; and was much more crucial to the development of 20th century history than has been portrayed.
Signals Intelligence, or SIGINT, is the interception and evaluation of coded enemy messages. From Enigma to Ultra, Purple to Lorenz, Room 40 to Bletchley, SIGINT has been instrumental in both victory and defeat during the First and Second World War. In the First World War, a vast network of signals rapidly expanded across the globe, spawning a new breed of spies and intelligence operatives to code, de-code and analyse thousands of messages. As a result, signallers and cryptographers in the Admiralty's famous Room 40 paved the way for the code breakers of Bletchley Park in the Second World War. In the ensuing war years the world battled against a web of signals intelligence that gave birth to Enigma and Ultra, and saw agents from Britain, France, Germany, Russia, America and Japan race to outwit each other through infinitely complex codes. For the first time, Peter Matthews reveals the secret history of global signals intelligence during the world wars through original interviews with German interceptors, British code breakers, and US and Russian cryptographers. "SIGINT is a fascinating account of what Allied investigators learned postwar about the Nazi equivalent of Bletchley Park. Turns out, 60,000 crptographers, analysts and linguists achieved considerable success in solving intercepted traffic, and even broke the Swiss Enigma! Based on recently declassifed NSA document, this is a great contribution to the literature." - The St Ermin's Hotel Intelligence Book of the Year Award 2014
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
___________ 'This excellent book demands the attention of anyone concerned about civil liberties in the United Kingdom' Guardian 1969 was a year of rising tension, violence and change for the people of Northern Ireland. Rioting in Derry's Bogside led to the deployment of British troops and a shortlived, uneasy truce. The British army soon found itself engaged in an undercover war against the Provisional IRA, which was to last for more than twenty years. In this enthralling and controversial book, Martin Dillon, author of the bestselling The Shankill Butchers, examines the roles played by the Provisional IRA, the State forces, the Irish Government and the British Army during this troubled period. He unravels the mystery of war in which informers, agents and double agents operate, revealing disturbing facts about the way in which the terrorists and the Intelligence Agencies target, undermine and penetrate each other's ranks. The Dirty War is investigative reporting at its very best, containing startling disclosures and throwing new light on previously inexplicable events.
This is a unique document published here for the first time, giving new insights into Hitler's personality and how Nazi Germany's military and intelligence apparatus operated. Published for the very first time, the top secret report "Some Weaknesses in German Strategy and Organisation 1933-1945" was prepared by Whitehall's highest intelligence body, the Joint Intelligence Committee, and presented to Britain's Chiefs of Staff in 1946 to 'set down certain aspects of the War whilst there are still sources available who were closely connected with the events described...when it is finally possible to make a balanced historical survey, some of the acutely critical moments which are vividly remembered now are likely to become confused with the passage of time, and there will be a tendency...to underestimate the great and evident strength of the German war machine'. The report encompasses the peculiar idiosyncrasies of Hitler's personality and the failures of Germany's military organisation, and charts the rise and fall of the Third Reich through 200 pages of intelligence reporting. Paul Winter sets this unique and important document in its historical setting, providing biographies of key figures referenced in the report and a timeline of the crucial events of the Second World War.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
This study explodes prevailing myths about the Phoenix Program, the CIA's top-secret effort to destroy the Viet Cong by neutralizing its "civilian" leaders. Drawing on recently declassified documents and interviews with American, South Vietnamese, and North Vietnamese sources, Mark Moyar examines the attempts to eradicate the Viet Cong infrastructure and analyzes their effectiveness. He addresses misconceptions about these efforts and provides an accurate, complete picture of the allies' decapitation of the Viet Cong shadow government. Combining social and political history with a study of military operations, Moyar offers a fresh interpretation of the crucial role the shadow government played in the Viet Cong's ascent. Detailed accounts of intelligence operations provide an insider's view of their development and reveal what really happened in the safe havens of the Viet Cong. Filled with new information, Moyar's study sets the record straight about one of the last secrets of the Vietnam War and offers poignant lessons for dealing with future Third World insurgencies. This Bison Books edition includes a new preface and chapter by the author.
Surveying the expanding conflict in Europe during one of his famous fireside chats in 1940, President Franklin Roosevelt ominously warned that "we know of other methods, new methods of attack. The Trojan horse. The fifth column that betrays a nation unprepared for treachery. Spies, saboteurs, and traitors are the actors in this new strategy." Having identified a new type of war -- a shadow war -- being perpetrated by Hitler's Germany, FDR decided to fight fire with fire, authorizing the formation of the Office of Strategic Services (OSS) to organize and oversee covert operations. Based on an extensive analysis of OSS records, including the vast trove of records released by the CIA in the 1980s and '90s, as well as a new set of interviews with OSS veterans conducted by the author and a team of American scholars from 1995 to 1997, "The Shadow War Against Hitler" is the full story of America's far-flung secret intelligence apparatus during World War II. In addition to its responsibilities generating, processing, and interpreting intelligence information, the OSS orchestrated all manner of dark operations, including extending feelers to anti-Hitler elements, infiltrating spies and sabotage agents behind enemy lines, and implementing propaganda programs. Planned and directed from Washington, the anti-Hitler campaign was largely conducted in Europe, especially through the OSS's foreign outposts in Bern and London. A fascinating cast of characters made the OSS run: William J. Donovan, one of the most decorated individuals in the American military who became the driving force behind the OSS's genesis; Allen Dulles, the future CIA chief who ran the Bern office, which he called "the big window onto the fascist world"; a veritable pantheon of Ivy League academics who were recruited to work for the intelligence services; and, not least, Roosevelt himself. A major contribution of the book is the story of how FDR employed Hitler's former propaganda chief, Ernst "Putzi" Hanfstengl, as a private spy. More than a record of dramatic incidents and daring personalities, this book adds significantly to our understanding of how the United States fought World War II. It demonstrates that the extent, and limitations, of secret intelligence information shaped not only the conduct of the war but also the face of the world that emerged from the shadows.
"MI6 and the Machinery of Spying "traces the development of the
agency's internal structure from its inception until the end of the
Cold War. The analysis examines how its management structure has
been driven by its operational environment on the one hand and its
position within the machinery of British central government on the
other. Close attention is paid to the agency's institutional links
to its consumers in Whitehall and Downing Street, as well as to the
causes and consequences of its operational organization and
provisions for counter-espionage and security.
The modern means of communication have turned the world into an information fishbowl and, in terms of foreign policy and national security in post-Cold War power politics, helped transform international power politics. Information operations (IO), in which time zones are as important as national boundaries, is the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior. Contemporary IO differs from traditional psychological operations practiced by nation-states, because the availability of low-cost high technology permits nongovernmental organizations and rogue elements, such as terrorist groups, to deliver influential content of their own as well as facilitates damaging cyber-attacks ("hactivism") on computer networks and infrastructure. As current vice president Dick Cheney once said, such technology has turned third-class powers into first-class threats. Conceived as a textbook by instructors at the Joint Command, Control, and Information Warfare School of the U.S. Joint Forces Staff College and involving IO experts from several countries, this book fills an important gap in the literature by analyzing under one cover the military, technological, and psychological aspects of information operations. The general reader will appreciate the examples taken from recent history that reflect the impact of IO on U.S. foreign policy, military operations, and government organization.
In this new edition of his classic 1970 memoir about the notorious U-2 incident, pilot Francis Gary Powers reveals the full story of what actually happened in the most sensational espionage case in Cold War history. After surviving the shoot-down of his reconnaissance plane and his capture on May 1, 1960, Powers endured sixty-one days of rigorous interrogation by the KGB, a public trial, a conviction for espionage, and the start of a ten-year sentence. After nearly two years, the U.S. government obtained his release from prison in a dramatic exchange for convicted Soviet spy Rudolph Abel. The narrative is a tremendously exciting suspense story about a man who was labeled a traitor by many of his countrymen but who emerged a Cold War hero.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
During World War II, Britain enjoyed spectacular success in the secret war between hostile intelligence services, enabling a substantial and successful expansion of British counter-espionage which continued to grow in the Cold War era. Hugh Trevor-Roper's experiences working in the Secret Intelligence Service (MI6) during the war left a profound impression on him and he later observed the world of intelligence with particular discernment. To Trevor-Roper, who was always interested in the historical dimension of the present and was fully alive to the historical significance of the era in which he lived, the subjects of wartime intelligence and the complex espionage networks that developed in the Cold War period were as worthy of profound investigation and reflection as events from the more-distant past. Expressing his observations through some of his most ironic and entertaining correspondence, articles and reviews, Trevor-Roper wrote vividly about some of the greatest intelligence characters of the age - from Kim Philby and Michael Straight to the Germans Admiral Canaris and Otto John. The coherence, depth and historical vision which unites these writings can only be glimpsed when they are brought together from the scattered publications in which they appeared, and when read beside his unpublished, private reflections. The Secret World unites Trevor-Roper's writings on the subject of intelligence - including the full text of The Philby Affair and some of his personal letters to leading figures. Based on original material and extensive supplementary research by E.D.R Harrison, this book is a sharp, revealing and personal first-hand account of the intelligence world in World War II and the Cold War.
In the eighty years since Pearl Harbor, the United States has developed a professional intelligence community that is far more effective than most people acknowledge--in part because only intelligence failures see the light of day, while successful collection and analysis remain secret for decades. Intelligence and the State explores the relationship between the community tasked to research and assess intelligence and the national decision makers it serves. The book argues that in order to accept intelligence as a profession, it must be viewed as a non-partisan resource to assist key players in understanding foreign societies and leaders. Those who review these classified findings are sometimes so invested in their preferred policy outcomes that they refuse to accept information that conflicts with preconceived notions. Rather than demanding that intelligence evaluations conform to administration policies, a wise executive should welcome a source of information that has not "drunk the Kool-Aid" by supporting a specific policy decision. Jonathan M. House offers a brief overview of the nature of national intelligence, and especially of the potential for misperception and misunderstanding on the part of executives and analysts. Furthermore, House examines the rise of intelligence organizations first in Europe and then in the United States. In those regions fear of domestic subversion and radicalism drove the need for foreign surveillance. This perception of a domestic threat tempted policy makers and intelligence officers alike to engage in covert action and other policy-based, partisan activities that colored their understanding of their adversaries. Such biases go far to explain the inability of Nazi Germany and the Soviet Union to predict and deal effectively with their opponents. The development of American agencies and their efforts differed to some degree from these European precedents but experienced some of the same problems as the Europeans, especially during the early decades of the Cold War. By now, however, the intelligence community has become a stable and effective part of the national security structure. House concludes with a historical examination of familiar instances in which intelligence allegedly failed to warn national leaders of looming attacks, ranging from the 1941 German invasion of the USSR to the Arab surprise attack on Israel in 1973.
Did President Roosevelt and other high-ranking U.S. government officials know about Japanese plans to attack Pearl Harbor in advance, and fail to warn U.S. Navy leadership in Hawaii? Drawing on recently declassified materials and revelations from other writers, this book traces the flow of intelligence and concludes the imminent attack was known about and was allowed to happen to win the support of the American public in a war against Japan. An epilogue describes the fate of Commander-in-Chief of the U.S. Pacific Fleet Admiral Husband E. Kimmel, the intelligence he received from Washington before the attack, and the intelligence he did not.
Published for the first time, the history of the CIA's clandestine short-wave radio broadcasts to Eastern Europe and the USSR during the early Cold War is covered in-depth. Chapters describe the "gray" broadcasting of Radio Free Europe and Radio Liberty in Munich; clandestine or "black" radio broadcasts from Radio Nacional de Espana in Madrid to Estonia, Latvia, Lithuania and Ukraine; transmissions to Bulgaria, Romania, Albania, Ukraine and the USSR from a secret site near Athens; and broadcasts to Byelorussia and Slovakia. Infiltrated behind the Iron Curtain through dangerous air drops and boat landings, CIA and other intelligence service agents faced counterespionage, kidnapping, assassination, arrest and imprisonment. Excerpts from broadcasts taken from monitoring reports of Eastern Europe intelligence agencies are included.
When Neville Chamberlain made his famous Peace in Our Time statement in 1938, after the Munich Agreement with Hitler, he may, or may not, have been aware that the new Section D of the Secret Intelligence Service was already making plans to mount an all-out political and sabotage war against Nazi Germany. This was a new form of warfare, encompassing bribery, black propaganda and sabotage by agents described as having no morals or scruples. To the horror of many, it disregarded the conventions of neutrality and was prepared to hit the Nazi state wherever it could do most damage. Malcolm Atkin reveals how Section Ds struggle to build a European wide anti-Nazi resistance movement was met with widespread suspicion from government, to the extent of a systematic destruction of its reputation. It was, however, a key pioneer of irregular warfare that led to the formation of the famous Special Operations Executive (SOE). His study is the first in-depth account of it to be published since the release of previously secret documents to the National Archives.
In this thoroughly updated second edition, Derek S. Reveron provides a comprehensive analysis of the shift in US foreign policy from coercive diplomacy to cooperative military engagement. The US military does much more than fight wars; it responds to humanitarian crises and natural disasters, assists advanced militaries to support international peace, and trains and equips almost every military in the world. Rather than intervening directly, the United States can respond to crises by sending weapons, trainers, and advisers to assist other countries in tackling their own security deficits created by subnational, transnational, and regional challengers. By doing so, the United States seeks to promote partnerships and its soft power, strengthen the state sovereignty system, prevent localized violence from escalating into regional crises, and protect its national security by addressing underlying conditions that lead to war. Since coalition warfare is the norm, security cooperation also ensures partners are interoperable with US forces when the US leads international military coalitions. Exporting Security takes into account the Obama administration's foreign policy, the implications of more assertive foreign policies by Russia and China, and the US military's role in recent humanitarian crises and nation-building efforts.
'This is what an SAS career is really like' AUSTRALIAN DEFENCE MAGAZINE Elite SAS Patrol Commander Stuart 'Nev' Bonner takes us inside the extraordinary and dangerous world of secret combat operations in this explosive, behind-the-scenes look at life inside the SAS. A world where capture means torture or death, and every move is trained for with precision detail to bring elite soldiers to the very peak of fighting ability. In a career spanning twenty years, fourteen of them in the SAS, Bonner shares with us the inside story of being out in front - and often behind enemy lines. From patrolling the mountains of East Timor to covert operations in Bougainville and the Solomon Islands, from sweeping into the Iraqi desert ahead of invading US forces to cripple Saddam Hussein's communications to patrolling in war-torn Baghdad and being in the middle of the disastrous Operation Anaconda in Afghanistan - this is a no-holds-barred account of what it's like to live, eat and breathe SAS. Now part of the HACHETTE MILITARY COLLECTION. |
![]() ![]() You may like...
The Central Intelligence Agency…
Athan G. Theoharis, Richard H. Immerman, …
Hardcover
R2,899
Discovery Miles 28 990
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
ORBIT - The Science of Rapport-Based…
Laurence J. Alison, Emily Alison, …
Hardcover
|