![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
Signals Intelligence, or SIGINT, is the interception and evaluation of coded enemy messages. From Enigma to Ultra, Purple to Lorenz, Room 40 to Bletchley, SIGINT has been instrumental in both victory and defeat during the First and Second World War. In the First World War, a vast network of signals rapidly expanded across the globe, spawning a new breed of spies and intelligence operatives to code, de-code and analyse thousands of messages. As a result, signallers and cryptographers in the Admiralty's famous Room 40 paved the way for the code breakers of Bletchley Park in the Second World War. In the ensuing war years the world battled against a web of signals intelligence that gave birth to Enigma and Ultra, and saw agents from Britain, France, Germany, Russia, America and Japan race to outwit each other through infinitely complex codes. For the first time, Peter Matthews reveals the secret history of global signals intelligence during the world wars through original interviews with German interceptors, British code breakers, and US and Russian cryptographers. "SIGINT is a fascinating account of what Allied investigators learned postwar about the Nazi equivalent of Bletchley Park. Turns out, 60,000 crptographers, analysts and linguists achieved considerable success in solving intercepted traffic, and even broke the Swiss Enigma! Based on recently declassifed NSA document, this is a great contribution to the literature." - The St Ermin's Hotel Intelligence Book of the Year Award 2014
Tony Brooks was unique. He was barely out of school when recruited in 1941 by the Special Operations Executive (SOE), the wartime secret service established by Churchill to 'set Europe ablaze'. After extensive training he was parachuted into France in July 1942 - being among the first (and youngest) British agents sent to support the nascent French Resistance. Brook's success was primarily due to his exceptional qualities as a secret agent, although he was aided by large and frequent slices of luck. Among much else, he survived brushes with a British traitor and a notorious double agent; the Gestapo's capture of his wireless operator and subsequent attempts to trap Brooks; brief incarceration in a Spanish concentration camp; injuries resulting from a parachute jump into France; and even capture and interrogation by the Gestapo - although his cover story held and he was released. In an age when we so often take our heroes from the worlds of sport, film, television, music, fashion, or just 'celebrity', it is perhaps salutary to be reminded of a young man who ended the war in command of a disparate force of some 10,000 armed resistance fighters, and decorated with two of this country's highest awards for gallantry, the DSO and MC. At the time, he was just twenty-three years old. This remarkable, detailed and intimate account of a clandestine agent's dangerous wartime career combines the historian's expert eye with the narrative colour of remembered events. As a study in courage, it has few, if any, equals.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
This book is a professional military-intelligence officer's and a controversial insider's view of some of the greatest intelligence blunders of recent history. It includes the serious developments in government misuse of intelligence in the recent war with Iraq. Colonel John Hughes-Wilson analyses not just the events that conspire to cause disaster, but why crucial intelligence is so often ignored, misunderstood or spun by politicians and seasoned generals alike. This book analyses: how Hitler's intelligence staff misled him in a bid to outfox their Nazi Party rivals; the bureaucratic bungling behind Pearl Harbor; how in-fighting within American intelligence ensured they were taken off guard by the Viet Cong's 1968 Tet Offensive; how over confidence, political interference and deception facilitated Egypt and Syria's 1973 surprise attack on Israel; why a handful of marines and a London taxicab were all Britain had to defend the Falklands; the mistaken intelligence that allowed Saddam Hussein to remain in power until the second Iraq War of 2003; the truth behind the US failure to run a terrorist warning system before the 9/11 WTC bombing; and how governments are increasingly pressurising intelligence agencies to 'spin' the party-political line.
The General Staff Division of Fremde Heere Ost (Military Intelligence Service, Eastern Section) which from 1942 was led by Reinhard Gehlen, was the nerve-centre of Hitler's military reconnaissance on the Eastern Front. This department worked professionally and was operationally and tactically reliable. However, at a strategic level there were clear deficits: the industrial capacity of the Soviet arms industry, the politico-military intentions and the details of the Red Army's plans for their offensive remained for the most part hidden from the department. When the Second World War ended, Gehlen put the documents and personnel of Fremde Heere Ost at the disposal of the Americans. With their support he was able to build a new foreign secret service which later evolved into the Federal Intelligence Service. In this book, military historian Magnus Pahl presents a complete overview of the structure, personnel and working methods of Fremde Heere Ost based on a tremendous array of archival sources. This work includes an extensive case study of the East Pomeranian Operation 1945. Pahl's study is a significant contribution to our understanding of German strategic, operational and tactical thinking on the Eastern Front 1941-45.
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
This is a unique document published here for the first time, giving new insights into Hitler's personality and how Nazi Germany's military and intelligence apparatus operated. Published for the very first time, the top secret report "Some Weaknesses in German Strategy and Organisation 1933-1945" was prepared by Whitehall's highest intelligence body, the Joint Intelligence Committee, and presented to Britain's Chiefs of Staff in 1946 to 'set down certain aspects of the War whilst there are still sources available who were closely connected with the events described...when it is finally possible to make a balanced historical survey, some of the acutely critical moments which are vividly remembered now are likely to become confused with the passage of time, and there will be a tendency...to underestimate the great and evident strength of the German war machine'. The report encompasses the peculiar idiosyncrasies of Hitler's personality and the failures of Germany's military organisation, and charts the rise and fall of the Third Reich through 200 pages of intelligence reporting. Paul Winter sets this unique and important document in its historical setting, providing biographies of key figures referenced in the report and a timeline of the crucial events of the Second World War.
The history of scientific intelligence - its birth, its importance during the Second World War and its unique wartime qualities - has relied almost entirely on the memories of its pioneer, R.V. Jones. Through scrutiny of Jones' post-war literature (especially his war memoirs, entitled Most Secret War; his archival papers - as well as those of his colleagues and contemporaries - and other mediums he used to promote his account of scientific intelligence), this ground-breaking book constitutes a critique of the genesis of scientific and technical intelligence. Examining chronologically all of the key events Jones became famous for - the Battle of the Beams, the Bruneval Raid, the Radio War, the Battle of the V-Weapons - and comparing Jones' account of these (and many other) events with contemporary documentation, this book provides a rich understanding of the internal machinations within the British wartime air scientific intelligence organisation defined as ADI (Science) and their relationships with the many other political, military and intelligence sections that pursued similar and often closely-linked quests. This book importantly connects science and technology with the collection and collation of intelligence; is an analysis of wartime intelligence of a scientific and technical nature; argues that scientific intelligence was much more than one man's accomplishments, which involved many more individuals and organisations than has been perceived; and was much more crucial to the development of 20th century history than has been portrayed.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
This study explodes prevailing myths about the Phoenix Program, the CIA's top-secret effort to destroy the Viet Cong by neutralizing its "civilian" leaders. Drawing on recently declassified documents and interviews with American, South Vietnamese, and North Vietnamese sources, Mark Moyar examines the attempts to eradicate the Viet Cong infrastructure and analyzes their effectiveness. He addresses misconceptions about these efforts and provides an accurate, complete picture of the allies' decapitation of the Viet Cong shadow government. Combining social and political history with a study of military operations, Moyar offers a fresh interpretation of the crucial role the shadow government played in the Viet Cong's ascent. Detailed accounts of intelligence operations provide an insider's view of their development and reveal what really happened in the safe havens of the Viet Cong. Filled with new information, Moyar's study sets the record straight about one of the last secrets of the Vietnam War and offers poignant lessons for dealing with future Third World insurgencies. This Bison Books edition includes a new preface and chapter by the author.
Surveying the expanding conflict in Europe during one of his famous fireside chats in 1940, President Franklin Roosevelt ominously warned that "we know of other methods, new methods of attack. The Trojan horse. The fifth column that betrays a nation unprepared for treachery. Spies, saboteurs, and traitors are the actors in this new strategy." Having identified a new type of war -- a shadow war -- being perpetrated by Hitler's Germany, FDR decided to fight fire with fire, authorizing the formation of the Office of Strategic Services (OSS) to organize and oversee covert operations. Based on an extensive analysis of OSS records, including the vast trove of records released by the CIA in the 1980s and '90s, as well as a new set of interviews with OSS veterans conducted by the author and a team of American scholars from 1995 to 1997, "The Shadow War Against Hitler" is the full story of America's far-flung secret intelligence apparatus during World War II. In addition to its responsibilities generating, processing, and interpreting intelligence information, the OSS orchestrated all manner of dark operations, including extending feelers to anti-Hitler elements, infiltrating spies and sabotage agents behind enemy lines, and implementing propaganda programs. Planned and directed from Washington, the anti-Hitler campaign was largely conducted in Europe, especially through the OSS's foreign outposts in Bern and London. A fascinating cast of characters made the OSS run: William J. Donovan, one of the most decorated individuals in the American military who became the driving force behind the OSS's genesis; Allen Dulles, the future CIA chief who ran the Bern office, which he called "the big window onto the fascist world"; a veritable pantheon of Ivy League academics who were recruited to work for the intelligence services; and, not least, Roosevelt himself. A major contribution of the book is the story of how FDR employed Hitler's former propaganda chief, Ernst "Putzi" Hanfstengl, as a private spy. More than a record of dramatic incidents and daring personalities, this book adds significantly to our understanding of how the United States fought World War II. It demonstrates that the extent, and limitations, of secret intelligence information shaped not only the conduct of the war but also the face of the world that emerged from the shadows.
"MI6 and the Machinery of Spying "traces the development of the
agency's internal structure from its inception until the end of the
Cold War. The analysis examines how its management structure has
been driven by its operational environment on the one hand and its
position within the machinery of British central government on the
other. Close attention is paid to the agency's institutional links
to its consumers in Whitehall and Downing Street, as well as to the
causes and consequences of its operational organization and
provisions for counter-espionage and security.
The modern means of communication have turned the world into an information fishbowl and, in terms of foreign policy and national security in post-Cold War power politics, helped transform international power politics. Information operations (IO), in which time zones are as important as national boundaries, is the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior. Contemporary IO differs from traditional psychological operations practiced by nation-states, because the availability of low-cost high technology permits nongovernmental organizations and rogue elements, such as terrorist groups, to deliver influential content of their own as well as facilitates damaging cyber-attacks ("hactivism") on computer networks and infrastructure. As current vice president Dick Cheney once said, such technology has turned third-class powers into first-class threats. Conceived as a textbook by instructors at the Joint Command, Control, and Information Warfare School of the U.S. Joint Forces Staff College and involving IO experts from several countries, this book fills an important gap in the literature by analyzing under one cover the military, technological, and psychological aspects of information operations. The general reader will appreciate the examples taken from recent history that reflect the impact of IO on U.S. foreign policy, military operations, and government organization.
In this new edition of his classic 1970 memoir about the notorious U-2 incident, pilot Francis Gary Powers reveals the full story of what actually happened in the most sensational espionage case in Cold War history. After surviving the shoot-down of his reconnaissance plane and his capture on May 1, 1960, Powers endured sixty-one days of rigorous interrogation by the KGB, a public trial, a conviction for espionage, and the start of a ten-year sentence. After nearly two years, the U.S. government obtained his release from prison in a dramatic exchange for convicted Soviet spy Rudolph Abel. The narrative is a tremendously exciting suspense story about a man who was labeled a traitor by many of his countrymen but who emerged a Cold War hero.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
During World War II, Britain enjoyed spectacular success in the secret war between hostile intelligence services, enabling a substantial and successful expansion of British counter-espionage which continued to grow in the Cold War era. Hugh Trevor-Roper's experiences working in the Secret Intelligence Service (MI6) during the war left a profound impression on him and he later observed the world of intelligence with particular discernment. To Trevor-Roper, who was always interested in the historical dimension of the present and was fully alive to the historical significance of the era in which he lived, the subjects of wartime intelligence and the complex espionage networks that developed in the Cold War period were as worthy of profound investigation and reflection as events from the more-distant past. Expressing his observations through some of his most ironic and entertaining correspondence, articles and reviews, Trevor-Roper wrote vividly about some of the greatest intelligence characters of the age - from Kim Philby and Michael Straight to the Germans Admiral Canaris and Otto John. The coherence, depth and historical vision which unites these writings can only be glimpsed when they are brought together from the scattered publications in which they appeared, and when read beside his unpublished, private reflections. The Secret World unites Trevor-Roper's writings on the subject of intelligence - including the full text of The Philby Affair and some of his personal letters to leading figures. Based on original material and extensive supplementary research by E.D.R Harrison, this book is a sharp, revealing and personal first-hand account of the intelligence world in World War II and the Cold War.
In the eighty years since Pearl Harbor, the United States has developed a professional intelligence community that is far more effective than most people acknowledge--in part because only intelligence failures see the light of day, while successful collection and analysis remain secret for decades. Intelligence and the State explores the relationship between the community tasked to research and assess intelligence and the national decision makers it serves. The book argues that in order to accept intelligence as a profession, it must be viewed as a non-partisan resource to assist key players in understanding foreign societies and leaders. Those who review these classified findings are sometimes so invested in their preferred policy outcomes that they refuse to accept information that conflicts with preconceived notions. Rather than demanding that intelligence evaluations conform to administration policies, a wise executive should welcome a source of information that has not "drunk the Kool-Aid" by supporting a specific policy decision. Jonathan M. House offers a brief overview of the nature of national intelligence, and especially of the potential for misperception and misunderstanding on the part of executives and analysts. Furthermore, House examines the rise of intelligence organizations first in Europe and then in the United States. In those regions fear of domestic subversion and radicalism drove the need for foreign surveillance. This perception of a domestic threat tempted policy makers and intelligence officers alike to engage in covert action and other policy-based, partisan activities that colored their understanding of their adversaries. Such biases go far to explain the inability of Nazi Germany and the Soviet Union to predict and deal effectively with their opponents. The development of American agencies and their efforts differed to some degree from these European precedents but experienced some of the same problems as the Europeans, especially during the early decades of the Cold War. By now, however, the intelligence community has become a stable and effective part of the national security structure. House concludes with a historical examination of familiar instances in which intelligence allegedly failed to warn national leaders of looming attacks, ranging from the 1941 German invasion of the USSR to the Arab surprise attack on Israel in 1973.
Did President Roosevelt and other high-ranking U.S. government officials know about Japanese plans to attack Pearl Harbor in advance, and fail to warn U.S. Navy leadership in Hawaii? Drawing on recently declassified materials and revelations from other writers, this book traces the flow of intelligence and concludes the imminent attack was known about and was allowed to happen to win the support of the American public in a war against Japan. An epilogue describes the fate of Commander-in-Chief of the U.S. Pacific Fleet Admiral Husband E. Kimmel, the intelligence he received from Washington before the attack, and the intelligence he did not.
When Neville Chamberlain made his famous Peace in Our Time statement in 1938, after the Munich Agreement with Hitler, he may, or may not, have been aware that the new Section D of the Secret Intelligence Service was already making plans to mount an all-out political and sabotage war against Nazi Germany. This was a new form of warfare, encompassing bribery, black propaganda and sabotage by agents described as having no morals or scruples. To the horror of many, it disregarded the conventions of neutrality and was prepared to hit the Nazi state wherever it could do most damage. Malcolm Atkin reveals how Section Ds struggle to build a European wide anti-Nazi resistance movement was met with widespread suspicion from government, to the extent of a systematic destruction of its reputation. It was, however, a key pioneer of irregular warfare that led to the formation of the famous Special Operations Executive (SOE). His study is the first in-depth account of it to be published since the release of previously secret documents to the National Archives.
In this thoroughly updated second edition, Derek S. Reveron provides a comprehensive analysis of the shift in US foreign policy from coercive diplomacy to cooperative military engagement. The US military does much more than fight wars; it responds to humanitarian crises and natural disasters, assists advanced militaries to support international peace, and trains and equips almost every military in the world. Rather than intervening directly, the United States can respond to crises by sending weapons, trainers, and advisers to assist other countries in tackling their own security deficits created by subnational, transnational, and regional challengers. By doing so, the United States seeks to promote partnerships and its soft power, strengthen the state sovereignty system, prevent localized violence from escalating into regional crises, and protect its national security by addressing underlying conditions that lead to war. Since coalition warfare is the norm, security cooperation also ensures partners are interoperable with US forces when the US leads international military coalitions. Exporting Security takes into account the Obama administration's foreign policy, the implications of more assertive foreign policies by Russia and China, and the US military's role in recent humanitarian crises and nation-building efforts.
'This is what an SAS career is really like' AUSTRALIAN DEFENCE MAGAZINE Elite SAS Patrol Commander Stuart 'Nev' Bonner takes us inside the extraordinary and dangerous world of secret combat operations in this explosive, behind-the-scenes look at life inside the SAS. A world where capture means torture or death, and every move is trained for with precision detail to bring elite soldiers to the very peak of fighting ability. In a career spanning twenty years, fourteen of them in the SAS, Bonner shares with us the inside story of being out in front - and often behind enemy lines. From patrolling the mountains of East Timor to covert operations in Bougainville and the Solomon Islands, from sweeping into the Iraqi desert ahead of invading US forces to cripple Saddam Hussein's communications to patrolling in war-torn Baghdad and being in the middle of the disastrous Operation Anaconda in Afghanistan - this is a no-holds-barred account of what it's like to live, eat and breathe SAS. Now part of the HACHETTE MILITARY COLLECTION.
A highly valuable resource for students of intelligence studies, strategy and security, and foreign policy, this volume provides readers with an accessible and comprehensive exploration of U.S. espionage activities that addresses both the practical and ethical implications that attend the art and science of spying. Essentials of Strategic Intelligence investigates a subject unknown to or misunderstood by most American citizens: how U.S. foreign and security policy is derived from the information collection operations and data analysis by the sixteen major U.S. intelligence agencies. The essays in this work draw back the curtain on the hidden side of America's government, explaining the roles of various intelligence missions, justifying the existence of U.S. intelligence agencies, and addressing the complex moral questions that arise in the conduct of secret operations. After an introductory overview, the book presents accessibly written essays on the key topics: intelligence collection-and-analysis, counterintelligence, covert action, and intelligence accountability. Readers will understand how intelligence directly informs policymakers and why democracies need secret agencies; learn how the CIA has become deeply involved in the war-like assassination operations that target suspected foreign terrorists, even some individuals who are American citizens; and appreciate how the existence of-and our reliance on-these intelligence agencies poses challenges for democratic governance. Provides a comprehensive, up-to-date examination of all aspects of intelligence by experts in the field, from collection-and-analysis and counterintelligence to covert action and accountability Probes into how the United States' intelligence agencies attempt to protect the nation from cyberattacks by foreign nations and terrorist groups-and documents the successes and failures Documents the involvement of the National Security Agency (NSA) in bulk "metadata" collection of information on the telephone records and social media communications of American citizens Examines the effects that have resulted from major leaks in the U.S. government, from Wikileaks to the NSA Snowden leaks |
![]() ![]() You may like...
Arc Volcanism: Physics and Tectonics
D. Shimozuru, I. Yokoyama
Hardcover
R4,729
Discovery Miles 47 290
Washington, Dc, Jazz
Regennia N Williams, Sandra Butler-truesdale
Paperback
Handbook of Research on…
Anjali Awasthi, Katarzyna Grzybowska
Hardcover
R7,007
Discovery Miles 70 070
|