![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The current legislative and oversight activity with respect to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) has drawn national attention to several overarching issues. This book outlines three such issues and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions are implicated in this debate - the Fourth and Fifth Amendments.
Britain relied upon secret intelligence operations to rule Mandatory Palestine. Statecraft by Stealth sheds light on a time in history when the murky triad of intelligence, policy, and security supported colonial governance. It emphasizes the role of the Anglo-Zionist partnership, which began during World War I and ended in 1939, when Britain imposed severe limits on Jewish immigration and settlement in Palestine. Steven Wagner argues that although the British devoted considerable attention to intelligence gathering and analysis, they never managed to solve the basic contradiction of their rule: a dual commitment to democratic self-government and to the Jewish national home through immigration and settlement. As he deftly shows, Britain's experiment in Palestine shed all pretense of civic order during the Palestinian revolt of 1936-41, when the police authority collapsed and was replaced by a security state, created by army staff intelligence. That shift, Wagner concludes, was rooted in Britain's desire to foster closer ties with Saudi Arabia just before the start of World War II, and thus ended its support of Zionist policy. Statecraft by Stealth takes us behind the scenes of British rule, illuminating the success of the Zionist movement and the failure of the Palestinians to achieve independence. Wagner focuses on four key issues to stake his claim: an examination of the "intelligence state" (per Martin Thomas's classic, Empires of Intelligence), the Arab revolt, the role of the Mufti of Jerusalem, and the origins and consequences of Britain's decision to end its support of Zionism. Wagner crafts a superb story of espionage and clandestine policy-making, showing how the British pitted individual communities against each other at particular times, and why.
The mission of the FBI is to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal and international agencies and partners. This book details what an FBI record is, what researchers can learn from these records, and how they can be used. The FBI has long been of interest to researchers, given the importance and scope of its mission and the range of historical events that is has been involved in over the years.
The attacks on the World Trade Center and the Pentagon on September 11th, 2001, dramatically demonstrated the intelligence threats facing the United States in the new century. In response, Congress approved significantly larger intelligence budgets and, in December 2004, passed the most extensive reorganisation of the intelligence community since the National Security Act of 1947. This book examines the background, oversight and issues that face the U.S. intelligence agency today.
The security classification regime in use within the federal executive branch traces its origins to armed forces information protection practices of the World War I era. This classification system - designating information, according to prescribed criteria and procedures, protected in accordance with one of three levels of sensitivity, is based on the amount of harm to the national security that would result from its disclosure. This book explores the history, status, and emerging management issues of security classified and controlled information today.
The Intelligence Community (IC) is a group of executive branch agencies and organisations that work separately and together to engage in intelligence activities necessary for the conduct of foreign relations and the protection of the national security of the United States. The U.S. government uses intelligence to improve and understand the consequences of its national security decisions. In this book, the Intelligence Community's Vision 2015 is examined, which enhances interagency intelligence organisations and helps consumers understand the mission, background, opportunities, and challenges facing the Intelligence Community today.
American policy on the interrogation of detainees is an exceptionally complex issue, one that cannot be adequately addressed nor satisfactorily resolved absent a clear understanding of the vital elements involved. This book is an overview of the controversy regarding U.S. treatment of enemy combatants and terrorist suspects detained in Iraq, Afghanistan, and other locations. Congress approved additional guidelines concerning the treatment of persons in U.S. custody and control via the Detainee Treatment Act (DTA). The DTA contains provisions that require Department of Defense (DoD) personnel to employ U.S. Army Field Manual guidelines while interrogating detainees, and prohibits the "cruel, inhuman and degrading treatment or punishment of persons under the detention, custody, or control of the U.S. Government." These provisions of the DTA, which were first introduced by Senator John McCain, have popularly been referred to as the "McCain Amendment." This book also discusses the Executive Order issued by President Barack Obama that generally instructs all U.S. agencies to comply with Army Field Manual requirements when interrogating persons captured in an armed conflict. This book consists of public documents which have been located, gathered, combined, reformatted, and enhanced with a subject index, selectively edited and bound to provide easy access.
This book highlights structured analytic techniques -- some widely used in the private sector and academia, some unique to the intelligence profession. Using the analytic techniques contained in this primer will assist analysts in dealing with the perennial problems of intelligence: the complexity of international developments, incomplete and ambiguous information, and the inherent limitations of the human mind. Understanding the intentions and capabilities of adversaries and other foreign actors is challenging, especially when either or both are concealed. Moreover, transnational threats today pose even greater complexity, in that they involve multiple actors -- including non-state entities -- that can adapt and transform themselves faster than those who seek to monitor and contain them. Finally, globalisation has increased the diversity of outcomes when complex, interactive systems such as financial flows, regional economies or the international system as a whole are in flux. Additionally, one of the least appreciated facts about the intelligence profession is that it exists in, and is influenced by, a very complex environment, one that includes everything from its relationships with policymakers, legislatures, military services, foreign partners, and last but not least, to its interaction with the public.
The twenty-first century has brought the perfect storm of conditions to create substantive global instability. This contemporary operating environment (COE) is characterized by complexity, ambiguity, volatility, and constant danger. It is a human invention that requires a human solution. Special operations forces (SOF), a group comprised of highly trained personnel with the ability to deploy rapidly and apply special skills in a variety of environments and circumstances, is the logical force of choice to achieve success in the COE. Increasing their effectiveness is cultural intelligence (CQ) – the ability to recognize the shared beliefs, values, attitudes, and behaviours of a group of people and then apply that knowledge toward a specific goal. Empowered by CQ, SOF are positioned to dominate in the COE. Solving the People Puzzle makes a convincing argument for the powerful union of the "force of choice" with the "tool of choice." This book will inspire and inform.
At last - the secrets of Bletchley Park's powerful codebreaking computers. This is a history of Colossus, the world's first fully-functioning electronic digital computer. Colossus was used during the Second World War at the Government Code and Cypher School at Bletchley Park, where it played an invaluable role cracking enemy codes. Until very recently, much about the Colossus machine was shrouded in secrecy, largely because the codes that were employed remained in use by the British security services until a short time ago. This book only became possible due to the declassification in the US of wartime documents. With an introductory essay on cryptography and the history of code-breaking by Simon Singh, this book reveals the workings of Colossus and the extraordinary staff at Bletchley Park through personal accounts by those who lived and worked with the computer. Among them is the testimony of Thomas Flowers, who was the architect of Colossus and whose personal account, written shortly before he died, is published here for the first time. Other essays consider the historical importance of this remarkable machine, and its impact on the generations of computing technology that followed.
'David Omand is exactly the man you need in a crisis' Rory Stewart 'An extraordinary achievement. Probably the best book ever written on crisis management' Christopher Andrew, author of Defence of the Realm We never know when a crisis might explode. Some 'sudden impact' events, such as terrorist attacks or natural disasters, blow up out of a clear blue sky. Other 'slow burn' crises smoulder away for years, often with warning signs ignored along the way until, as if from nowhere, the troops storm the palace. In How to Survive a Crisis, Professor Sir David Omand draws on his experience in defence, security and intelligence, including as Director of GCHQ and UK Security and Intelligence Coordinator, to show how you can detect a looming crisis and extinguish it (or at least survive it with minimum loss). Using gripping real-world examples from Omand's storied career, and drawing lessons from historic catastrophes such as Chernobyl, 9/11, the Deepwater Horizon oil spill and the WannaCry ransomware cyberattack, this empowering book is filled with practical advice on how to survive the multiplying crises of the future. Not every crisis need tip into disaster - if we have invested in personal, business and national resilience. This is an essential toolkit for our turbulent twenty-first century, as well as an exhilarating read for anyone interested in the state of our world - and how we might improve it. 'Piercingly insightful, brilliantly lucid and illuminating, frightening and wise . . . From nuclear meltdown to apocalyptic cyber-attacks, from pandemics to the drums of war, here is a remarkable record of how the threads of society can be held firm in the darkest days' Sinclair McKay, author of Berlin 'An amazing book. Timely, essential and important. The brilliantly insightful David Omand draws on his unmatched experience to explore the complexities of crisis. He shows us how poor preparation leads to failure, but applied intelligence saves lives' Richard Aldrich, author of GCHQ 'This book is the instruction manual we all need' Sir Alex Younger, Chief of MI6
Reports the results of a workshop on ensuring the security of information against malevolent actions by insiders in the intelligence community with access to sensitive information and information systems. Reports the results of a workshop on the problems of ensuring the security of information against malevolent actions by insiders in the intelligence community (IC) with access to sensitive information and information systems. Attendees discussed community system models, vulnerabilities and exploits, attacker models, and event characterization, and discussed databases that would aid them in their work.
"Remember, you are not going out there to start a war," Rear Admiral Frank Johnson reminded Commander Pete Bucher just prior to the maiden voyage of the U.S.S. Pueblo. And yet a war--one that might have gone nuclear--was what nearly happened when the Pueblo was attacked and captured by North Korean gunships in January 1968. Diplomacy prevailed in the end, but not without great cost to the lives of the imprisoned crew and to a nation already mired in an unwinnable war in Vietnam. The Pueblo was an aging cargo ship poorly refurbished as a signals intelligence collector for the top-secret Operation Clickbeetle. It was sent off with a first-time captain, an inexperienced crew, and no back-up, and was captured well before the completion of its first mission. Ignored for a quarter of a century, the Pueblo incident has been the subject of much polemic but no scholarly scrutiny. Mitchell Lerner now examines for the first time the details of this crisis and uses the incident as a window through which to better understand the limitations of American foreign policy during the Cold War. Drawing on thousands of pages of recently declassified documents from President Lyndon Johnson's administration, along with dozens of interviews with those involved, Lerner provides the most complete and accurate account of the Pueblo incident. He weaves on a grand scale a dramatic story of international relations, presidential politics, covert intelligence, capture on the high seas, and secret negotiations. At the same time, he highlights the very intimate struggles of the Pueblo's crew-through capture, imprisonment, indoctrination, torture, and release-and the still smoldering controversy over Commander Bucher's actions. In fact, Bucher emerges here for the first time as the truly steadfast hero his men have always considered him. More than an account of misadventure, The Pueblo Incident is an indictment of Cold War mentality that shows how the premises underlying the Pueblo's risky mission and the ensuing efforts to win the release of her crew were seriously flawed. Lerner argues that had U.S. policymakers regarded the North Koreans as people with a national agenda rather than one serving a global Communist conspiracy, they might have avoided the crisis or resolved it more effectively. He also addresses such unanswered questions as what the Pueblo's mission exactly was, why the ship had no military support, and how damaging the intelligence loss was to national security. With North Korea still seen as a rogue state by some policymakers, "The Pueblo Incident" provides key insights into the domestic imperatives behind that country's foreign relations. It astutely assesses the place of gunboat diplomacy in the modern world and is vital for understanding American foreign policy failures in the Cold War.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
Russian Information Warfare: Assault on Democracies in the Cyber Wild West examines how Moscow tries to trample the very principles on which democracies are founded and what we can do to stop it. In particular, the book analyzes how the Russian government uses cyber operations, disinformation, protests, assassinations, coup d'états, and perhaps even explosions to destroy democracies from within, and what the United States and other NATO countries can do to defend themselves from Russia's onslaught. The Kremlin has been using cyber operations as a tool of foreign policy against the political infrastructure of NATO member states for over a decade. Alongside these cyber operations, the Russian government has launched a diverse and devious set of activities which at first glance may appear chaotic. Russian military scholars and doctrine elegantly categorizes these activities as components of a single strategic playbook -- information warfare. This concept breaks down the binary boundaries of war and peace and views war as a continuous sliding scale of conflict, vacillating between the two extremes of peace and war but never quite reaching either. The Russian government has applied information warfare activities across NATO members to achieve various objectives. What are these objectives? What are the factors that most likely influence Russia's decision to launch certain types of cyber operations against political infrastructure and how are they integrated with the Kremlin's other information warfare activities? To what extent are these cyber operations and information warfare campaigns effective in achieving Moscow's purported goals? Dr. Bilyana Lilly addresses these questions and uses her findings to recommend improvements in the design of U.S. policy to counter Russian adversarial behavior in cyberspace by understanding under what conditions, against what election components, and for what purposes within broader information warfare campaigns Russia uses specific types of cyber operations against political infrastructure.
The history of scientific intelligence - its birth, its importance during the Second World War and its unique wartime qualities - has relied almost entirely on the memories of its pioneer, R.V. Jones. Through scrutiny of Jones' post-war literature (especially his war memoirs, entitled Most Secret War; his archival papers - as well as those of his colleagues and contemporaries - and other mediums he used to promote his account of scientific intelligence), this ground-breaking book constitutes a critique of the genesis of scientific and technical intelligence. Examining chronologically all of the key events Jones became famous for - the Battle of the Beams, the Bruneval Raid, the Radio War, the Battle of the V-Weapons - and comparing Jones' account of these (and many other) events with contemporary documentation, this book provides a rich understanding of the internal machinations within the British wartime air scientific intelligence organisation defined as ADI (Science) and their relationships with the many other political, military and intelligence sections that pursued similar and often closely-linked quests. This book importantly connects science and technology with the collection and collation of intelligence; is an analysis of wartime intelligence of a scientific and technical nature; argues that scientific intelligence was much more than one man's accomplishments, which involved many more individuals and organisations than has been perceived; and was much more crucial to the development of 20th century history than has been portrayed.
The complete story of how the German Enigma codes were broken. Perfect for fans of THE IMITATION GAME, the new film on Alan Turing's Enigma code, starring Benedict Cumberbatch. Breaking the German Enigma codes was not only about brilliant mathematicians and professors at Bletchley Park. There is another aspect of the story which it is only now possible to tell. It takes in the exploits of spies, naval officers and ordinary British seamen who risked, and in some cases lost, their lives snatching the vital Enigma codebooks from under the noses of Nazi officials and from sinking German ships and submarines. This book tells the whole Enigma story: its original invention and use by German forces and how it was the Poles who first cracked - and passed on to the British - the key to the German airforce Enigma. The more complicated German Navy Enigma appeared to them to be unbreakable.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
The official line is clear: the UK does not 'participate in, solicit, encourage or condone' torture. And yet, the evidence is irrefutable: when faced with potential threats to our national security, the gloves always come off. Drawing on previously unseen official documents, and the accounts of witnesses, victims and experts, prize-winning investigative journalist Ian Cobain looks beyond the cover-ups and the equivocations, to get to the truth. From WWII to the War on Terror, via Kenya and Northern Ireland, Cruel Britannia shows how the British have repeatedly and systematically resorted to torture, bending the law where they can, and issuing categorical denials all the while. What emerges is a picture of Britain that challenges our complacency and exposes the lie behind our reputation for fair play.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
Surveying the expanding conflict in Europe during one of his famous fireside chats in 1940, President Franklin Roosevelt ominously warned that "we know of other methods, new methods of attack. The Trojan horse. The fifth column that betrays a nation unprepared for treachery. Spies, saboteurs, and traitors are the actors in this new strategy." Having identified a new type of war -- a shadow war -- being perpetrated by Hitler's Germany, FDR decided to fight fire with fire, authorizing the formation of the Office of Strategic Services (OSS) to organize and oversee covert operations. Based on an extensive analysis of OSS records, including the vast trove of records released by the CIA in the 1980s and '90s, as well as a new set of interviews with OSS veterans conducted by the author and a team of American scholars from 1995 to 1997, "The Shadow War Against Hitler" is the full story of America's far-flung secret intelligence apparatus during World War II. In addition to its responsibilities generating, processing, and interpreting intelligence information, the OSS orchestrated all manner of dark operations, including extending feelers to anti-Hitler elements, infiltrating spies and sabotage agents behind enemy lines, and implementing propaganda programs. Planned and directed from Washington, the anti-Hitler campaign was largely conducted in Europe, especially through the OSS's foreign outposts in Bern and London. A fascinating cast of characters made the OSS run: William J. Donovan, one of the most decorated individuals in the American military who became the driving force behind the OSS's genesis; Allen Dulles, the future CIA chief who ran the Bern office, which he called "the big window onto the fascist world"; a veritable pantheon of Ivy League academics who were recruited to work for the intelligence services; and, not least, Roosevelt himself. A major contribution of the book is the story of how FDR employed Hitler's former propaganda chief, Ernst "Putzi" Hanfstengl, as a private spy. More than a record of dramatic incidents and daring personalities, this book adds significantly to our understanding of how the United States fought World War II. It demonstrates that the extent, and limitations, of secret intelligence information shaped not only the conduct of the war but also the face of the world that emerged from the shadows.
The modern means of communication have turned the world into an information fishbowl and, in terms of foreign policy and national security in post-Cold War power politics, helped transform international power politics. Information operations (IO), in which time zones are as important as national boundaries, is the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior. Contemporary IO differs from traditional psychological operations practiced by nation-states, because the availability of low-cost high technology permits nongovernmental organizations and rogue elements, such as terrorist groups, to deliver influential content of their own as well as facilitates damaging cyber-attacks ("hactivism") on computer networks and infrastructure. As current vice president Dick Cheney once said, such technology has turned third-class powers into first-class threats. Conceived as a textbook by instructors at the Joint Command, Control, and Information Warfare School of the U.S. Joint Forces Staff College and involving IO experts from several countries, this book fills an important gap in the literature by analyzing under one cover the military, technological, and psychological aspects of information operations. The general reader will appreciate the examples taken from recent history that reflect the impact of IO on U.S. foreign policy, military operations, and government organization.
Intelligence operations face the challenging task of predicting the shape of future wars. This task is hindered by their limited ability to warn of peacetime foreign military innovation. Using formerly classified sources in particular, the reports of military attaches and other diplomat-officers Thomas G. Mahnken sheds light on the shadowy world of U.S. intelligence-gathering, tracing how America learned of military developments in Japan, Germany, and Great Britain in the period between the two world wars. The interwar period witnessed both a considerable shift in the balance of power in Europe and Asia and the emergence of new ways of war, such as carrier aviation, amphibious operations, and combined-arms armored warfare. American attempts to follow these developments, Mahnken says, illustrate the problems that intelligence organizations face in their efforts to bridge the gulf between prewar expectations and wartime reality. He finds three reasons for intelligence's relative lack of success: intelligence agencies are more inclined to monitor established weapons systems than to search for new ones; their attention is more likely to focus on technology and doctrine already demonstrated in combat; and they have more success identifying innovation in areas their own country is testing. Uncovering Ways of War substantially revises the perception of how American intelligence performed prior to World War II. Mahnken challenges the assumption that intelligence regarding foreign militaries had little influence on the development of U.S. weapons and doctrine. Finally, he explains the obstacles these agencies must still negotiate as they seek to understand foreign efforts to exploit the information revolution."
Spy-masters, moles, and double-agents. Ciphers, saboteurs, and atomic secrets. The shady world of real-life espionage is as alarming and mysterious as any John Le Carré novel or James Bond movie. This outstanding book chronicles the international history of intelligence in the 20th century, exploring the impact of spies on world events during both war and peacetime. The work highlights the key events and breakthroughs in the history of intelligence and espionage - from the codebreaking and sabotage operations in the World Wars to the U2 incident and the CIA's secret war in Nicaragua. It also offers fascinating details of the colourful individuals who have made a mark as spies, defectors, and counterspies. |
![]() ![]() You may like...
Experiments and Modeling in Cognitive…
Fabien Mathy, Mustapha Chekaf
Hardcover
International Brigade Against Apartheid…
Ronnie Kasrils, Muff Andersson, …
Paperback
RNA Metabolism in Neurodegenerative…
Rita Sattler, Christopher J. Donnelly
Hardcover
R2,915
Discovery Miles 29 150
|