![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
On a chilly autumn night in 1942, a German spy was rowed ashore from a U-boat off the GaspT coast to begin a deadly espionage mission against the Allies. Thanks to an alert hotel-keeper's son, Abwehr agent 'Bobbi' was captured and forced by the RCMP to become Canada's first double-agent. For nearly fifty years the full story of the spy case, code-named Watchdog, was suppressed. Now, author Dean Beeby has uncovered nearly five thousand pages of formerly classified government documents, obtained through the Access to Information Act from the RCMP, the Canadian Security Intelligence Service, the Department of Justice, the National Archives of Canada, and Naval Intelligence. He has supplemented this treasure trove with research among still heavily censored FBI files, and interviews with surviving participants in the Watchdog story. Although British records of the case remain closed, Beeby also interviewed the MI5 case officer for Watchdog, the late Cyril Mills. The operation was Canada's first major foray into international espionage, predating the Gouzenko defection by three years. Watchdog, as Beeby reveals, was not the Allied success the RCMP has long claimed. Agent 'Bobbi' gradually ensnared his captors with a finely spun web of lies, transforming himself into a triple-agent who fed useful information back to Hamburg. Beeby argues that Canadian authorities were woefully unprepared for the subtleties of wartime counter-espionage, and that their mishandling of the case had long-term consequences that affected relations with their intelligence partners throughout the Cold War.
This survey of more than fifty years of national security policy juxtaposes declassified U.S. national intelligence estimates with recently released Soviet documents disclosing the views of Soviet leaders and their Communist allies on the same events. Matthias shows that U.S. intelligence estimates were usually correct but that our political and military leaders generally ignored them -- with sometimes disastrous results. The book begins with a look back at the role of U.S. intelligence during World War II, from Pearl Harbor through the plot against Hitler, from the D-Day invasion to the "unconditional surrender" of Japan, and reveals how better use of the intelligence available could have saved many lives and shortened the war. The following chapters dealing with the Cold War disclose what information and advice U.S. intelligence analysts passed on to policymakers, and also what sometimes bitter policy debates occurred within the Communist camp, concerning Vietnam, the Bay of Pigs, the Cuban missile crisis, the turmoil in Eastern Europe, the Six-Day and Yom Kippur wars in the Middle East, and the Soviet intervention in Afghanistan. In many ways, this is a story of missed opportunities that the U.S. government had to conduct a more responsible foreign policy which could have avoided large losses of life and massive expenditures on arms buildups. While not exonerating the CIA for its own mistakes, Matthias casts new light on the contributions that objective intelligence analysis did make during the Cold War and speculates on what might have happened if that analysis and advice had been heeded.
The Lockwood Analytical Method for Prediction (LAMP) is a systematic technique for predicting short-term, unique behaviors. Using primarily qualitative empirical data, LAMP allows the analyst to predict the most likely outcomes for specific research questions across a wide range of intelligence problems, such as cyber threats in the U.S., the possibility of an Al Qaeda attack, the likelihood of Iran providing nuclear capability to terrorist groups, or the future actions of the Mexican drug cartel. LAMP offers an innovative and powerful method for organizing all available information based on the perceptions of the national actors, using it to make relevant predictions as to which alternate future is most likely to occur at a given moment in time. Its transparent structure enables anyone to see how an analyst gets from point A to point B to produce an intelligence estimate. LAMP differs from other analytical techniques in that it is based on determining the relative probability of a range of alternate futures, rather than attempting to determine the quantitative probability of their occurrence. After explaining its theoretical framework, the text leads the reader through the process of predictive analysis before providing practical case studies showing how LAMP is applied against real world problems, such as the possible responses of Israel, the U.S., and Lebanon to the behavior of Hezbollah or the competing visions of the future of Afghanistan. Evaluation of the method is provided with the case studies to show the effectiveness of the LAMP predictions over time. The book is complemented by a website with downloadable software for use by students of intelligence in conducting their own predictive analysis. It will be an essential tool for the analyst and the student, not only for national security issues but also for competitive intelligence.
This is a unique document published here for the first time, giving new insights into Hitler's personality and how Nazi Germany's military and intelligence apparatus operated. Published for the very first time, the top secret report "Some Weaknesses in German Strategy and Organisation 1933-1945" was prepared by Whitehall's highest intelligence body, the Joint Intelligence Committee, and presented to Britain's Chiefs of Staff in 1946 to 'set down certain aspects of the War whilst there are still sources available who were closely connected with the events described...when it is finally possible to make a balanced historical survey, some of the acutely critical moments which are vividly remembered now are likely to become confused with the passage of time, and there will be a tendency...to underestimate the great and evident strength of the German war machine'. The report encompasses the peculiar idiosyncrasies of Hitler's personality and the failures of Germany's military organisation, and charts the rise and fall of the Third Reich through 200 pages of intelligence reporting. Paul Winter sets this unique and important document in its historical setting, providing biographies of key figures referenced in the report and a timeline of the crucial events of the Second World War.
The twenty-first century has brought the perfect storm of conditions to create substantive global instability. This contemporary operating environment (COE) is characterized by complexity, ambiguity, volatility, and constant danger. It is a human invention that requires a human solution. Special operations forces (SOF), a group comprised of highly trained personnel with the ability to deploy rapidly and apply special skills in a variety of environments and circumstances, is the logical force of choice to achieve success in the COE. Increasing their effectiveness is cultural intelligence (CQ) – the ability to recognize the shared beliefs, values, attitudes, and behaviours of a group of people and then apply that knowledge toward a specific goal. Empowered by CQ, SOF are positioned to dominate in the COE. Solving the People Puzzle makes a convincing argument for the powerful union of the "force of choice" with the "tool of choice." This book will inspire and inform.
Interest in congressional oversight of intelligence has risen again in the 110th Congress, in part because of the House Democratic majority's pledge to enact the remaining recommendations from the U.S. National Commission on Terrorist Attacks upon the United States, commonly known as the 9/11 Commission. Its 2004 conclusions set the stage for reconsideration of the problems affecting Congress' structure in this area. The commission's unanimous report, as detailed in this book, covers many issues, and concludes that congressional oversight of intelligence was "dysfunctional". This book proposes two distinct solutions:(1) creation of a joint committee on intelligence (JCI), modelled after the defunct Joint Committee on Atomic Energy (JCAE), or (2) enhanced status and power for the existing select committees on intelligence, by making them standing committees and granting both authorisation and appropriations power. This book consists of public domain documents which have been located, gathered, combined, reformatted, and enhanced with a subject index, selectively edited and bound to provide easy access.
Though much has been written about the American Civil War itself, little has been written about the spy war that went on within. The chronicling of Civil War intelligence activities challenges historians because of the lack of records, the lack of access to records, and the questionable truth of other records. Judah P. Benjamin, the Confederacy's Secretary of State, burned all the intelligence records he could find as federal troops entered Richmond. Union intelligence records were kept sealed in the National Archives until 1953. A few individuals involved in intelligence gathering burned their personal papers while others chose to publish their memoirs, though greatly embellishing their exploits. Even today, the identities of many spies remain secret. Henry Thomas Harrison, for example, was a Confederate spy whose intelligence set in motion the events that produced the battle of Gettysburg. But neither his first name nor details of his long career as a spy were known until 1986, when historian James O. Hall published an article about him. Though the idea of centralised intelligence gathering was decades away, the age-old resistance to the idea was present even then. Neither side saw the need to create such intelligence organisations, but each side approached the idea of effectively acquiring intelligence in their own way. The Confederacy's Signal Corps, devoted primarily to communications and intercepts, included a covert agency, the Secret Service Bureau. This unit ran espionage and counter-espionage operations in the North. Late in the war, the bureau set up a secret headquarters in Canada and sent out operatives on covert missions in Northern states. The Union's Bureau of Military Information, unlike the Confederacy's Secret Service Bureau, operated for specific generals rather than for the Union Army itself. But here was born the idea of what would eventually become a centralised military intelligence division. Each side still used age-old intelligence techniques, such as code-breaking, deception, and covert surveillance. However, into this modern war came two innovations that would endure as tools of espionage: wiretapping and overhead reconnaissance. What follows is a look at some of the highlights of how the North and the South gathered and used their information, the important missions, and the personalities. From this special view, the focus is not on the battlefield, but on a battle of wits.
On February 23, 1945, U.S. Marines claimed victory in the battle of Iwo Jima, one of the most important battles in the Pacific islands during World War II. Instrumental to this defeat of Japanese forces was a group of specialized Marines involved in a secret program. Throughout the war, Japanese intelligence agencies were able to intercept and break nearly every battlefield code the United States created. The Navajo Code Talkers, however, devised a complex code based on their native language and perfected it so that messages could be coded, transmitted, and decoded in minutes. The Navajo Code was the only battlefield code that Japan never deciphered. Unsung Heroes of World War II details the history of the men who created this secret code and used it on the battlefield to help the United States win World War II in the Pacific.
The objective of this study was to provide an analytic framework for intelligence analysis of irregular warfare (IW) environments that could be used as the basis for a subsequent IW intelligence analysis curriculum development effort. The authors conducted a review of recent policy, strategy, doctrinal, and other materials pertaining to IW, concluding that although the term irregular warfare remains somewhat nebulous, situations considered within the realm of IW generally can be thought of in terms of two main stylized types: (1) population-centric IW situations, which include such missions as counterinsurgency, foreign internal defense, and support to insurgency, where the indigenous population is the center of gravity; and (2) counterterrorism operations, whether conducted as one element of a theater commanderas campaign or as part of the U.S. Special Operations Command-led global war on terrorism, where a cellular network is being targeted. The authors identify the intelligence and analytic requirements associated with each of these two stylized forms of IW and describe a top-down framework, or analytic procedure, that can be used for assessing IW environments. Also included is a list of references to IW-relevant doctrinal publications.
An unprecedented high-level master narrative of America's intelligence wars, demonstrating in a time of new threats that espionage and the search for facts are essential to our democracy For General Michael Hayden, playing to the edge means playing so close to the line that you get chalk dust on your cleats. Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America. "Play to the edge" was Hayden's guiding principle when he ran the National Security Agency, and it remained so when he ran CIA. In his view, many shortsighted and uninformed people are quick to criticize, and this book will give them much to chew on but little easy comfort; it is an unapologetic insider's look told from the perspective of the people who faced awesome responsibilities head on, in the moment. How did American intelligence respond to terrorism, a major war and the most sweeping technological revolution in the last 500 years? What was NSA before 9/11 and how did it change in its aftermath? Why did NSA begin the controversial terrorist surveillance program that included the acquisition of domestic phone records? What else was set in motion during this period that formed the backdrop for the infamous Snowden revelations in 2013? As Director of CIA in the last three years of the Bush administration, Hayden had to deal with the rendition, detention and interrogation program as bequeathed to him by his predecessors. He also had to ramp up the agency to support its role in the targeted killing program that began to dramatically increase in July 2008. This was a time of great crisis at CIA, and some agency veterans have credited Hayden with actually saving the agency. He himself won't go that far, but he freely acknowledges that CIA helped turn the American security establishment into the most effective killing machine in the history of armed conflict. For 10 years, then, General Michael Hayden was a participant in some of the most telling events in the annals of American national security. General Hayden's goals are in writing this book are simple and unwavering: No apologies. No excuses. Just what happened. And why. As he writes, "There is a story here that deserves to be told, without varnish and without spin. My view is my view, and others will certainly have different perspectives, but this view deserves to be told to create as complete a history as possible of these turbulent times. I bear no grudges, or at least not many, but I do want this to be a straightforward and readable history for that slice of the American population who depend on and appreciate intelligence, but who do not have the time to master its many obscure characteristics."
This study explodes prevailing myths about the Phoenix Program, the CIA's top-secret effort to destroy the Viet Cong by neutralizing its "civilian" leaders. Drawing on recently declassified documents and interviews with American, South Vietnamese, and North Vietnamese sources, Mark Moyar examines the attempts to eradicate the Viet Cong infrastructure and analyzes their effectiveness. He addresses misconceptions about these efforts and provides an accurate, complete picture of the allies' decapitation of the Viet Cong shadow government. Combining social and political history with a study of military operations, Moyar offers a fresh interpretation of the crucial role the shadow government played in the Viet Cong's ascent. Detailed accounts of intelligence operations provide an insider's view of their development and reveal what really happened in the safe havens of the Viet Cong. Filled with new information, Moyar's study sets the record straight about one of the last secrets of the Vietnam War and offers poignant lessons for dealing with future Third World insurgencies. This Bison Books edition includes a new preface and chapter by the author.
Reports the results of a workshop on ensuring the security of information against malevolent actions by insiders in the intelligence community with access to sensitive information and information systems. Reports the results of a workshop on the problems of ensuring the security of information against malevolent actions by insiders in the intelligence community (IC) with access to sensitive information and information systems. Attendees discussed community system models, vulnerabilities and exploits, attacker models, and event characterization, and discussed databases that would aid them in their work.
The authors develop a mathematical framework for assessing how information is processed in a human world. Assessing how technology contributes to information superiority and decision dominance a major challenge, in part because it demands quantitative measures for what are usually considered qualitative concepts. The authors have developed a mathematical framework to aid these efforts. Additional work, such as data fitting, experimentation, linking decisions and actions, historical analysis, and gaming will further advance knowledge in this area.
The book that gives an insider's view of some of the great intelligence blunders of recent history. Including Stalin's Operation Barbarossa, Hitler being misled by his own intelligence staff, the bungling that enabled an attack on Pearl Harbor, lack of preparation for the Viet Cong's offensive 1968, Arab Israeli war 1973, Falkland Islands, Gulf War 1991...New material to include: The US failure to run warning system before 9/11; the War on Terrorism; the Islamic Terrorist threat; mis-use of intelligence by UK government in War with Iraq; intelligence problems of Middle East; challenges of 21st century.
In 1939, several hundred people - students, professors, international chess players, junior military officers, actresses and debutantes - reported to a Victorian mansion in Buckinghamshire: Bletchley Park. This was to be 'Station X', the Allies' top-secret centre for deciphering enemy codes. Their task was to break the ingenious Enigma code used for German high-level communications. The settings for the Enigma machine changed continually and each day the German operators had 159 million million million different possibilities. Yet against all the odds this gifted group achieved the impossible, coping with even greater difficulties to break Shark, the U-Boat Enigma, and Fish, the cypher system used by Hitler to talk to his guards.
This survey of more than fifty years of national security policy juxtaposes declassified U. S. national intelligence estimates with recently released Soviet documents disclosing the views of Soviet leaders and their Communist allies on the same events. Matthias shows that U. S. intelligence estimates were usually correct but that our political and military leaders generally ignored them--with sometimes disastrous results. The book begins with a look back at the role of U. S. intelligence during World War II, from Pearl Harbor through the plot against Hitler and the D-day invasion to the "unconditional surrender" of Japan, and reveals how better use of the intelligence available could have saved many lives and shortened the war. The following chapters dealing with the Cold War disclose what information and advice U. S. intelligence analysts passed on to policy makers, and also what sometimes bitter policy debates occurred within the Communist camp, concerning Vietnam, the Bay of Pigs, the Cuban missile crisis, the turmoil in Eastern Europe, the Six-Day and Yom Kippur wars in the Middle East, and the Soviet intervention in Afghanistan. In many ways, this is a story of missed opportunities the U. S. government had to conduct a more responsible foreign policy that could have avoided large losses of life and massive expenditures on arms buildups. While not exonerating the CIA for its own mistakes, Matthias casts new light on the contributions that objective intelligence analysis did make during the Cold War and speculates on what might have happened if that analysis and advice had been heeded.
Peter Wilkinson's vivid insider account of the undercover campaigns
of the Special Operations Executive (SOE) during the Second World
War looks at the foundation and structure of the SOE, as well as
his personal experience as an intelligence officer during the
invasion of Czechoslovakia and the Polish Campaign of 1939. The
book is a valuable contribution to the secret history of the Second
World War. It concludes with an account of the SOE's hazardous
attempt under the author's command to infiltrate the Third Reich
from 1943-1945.
This classic account of the German Resistance during World War II remains one of the primary sources on a topic that continues to generate controversy more than a half century after the war's end. As OSS (office of strategic services) chief of station in Bern, Switzerland, from 1942 to 1945, Dulles was charged with determining the extent and commitment of the opposition to Hitler. "Germany's Underground" is the most important firsthand account we have of Allied contact with that opposition--and the most concise and readable history of the men and women from every stratum of German society who made up this complex web.
Most histories of the Civil War explain victory and defeat in terms of the skill of commanders and their troops. Intelligence records disappeared after the war, and thus a critically important element has largely been ignored. Fishel has unearthed substantial collections of such records, and his "intelligence explanation" radically alters history's understanding of the campaigns. The Secret War for the Union is one of the most important Civil War works ever published.
In the years following World War I, America's armed services, industry, and government took lessons from that conflict to enhance the country's ability to mobilize for war. Paul Koistinen examines how today's military-industrial state emerged during that period-a time when the army and navy embraced their increasing reliance on industry, and business accelerated its efforts to prepare the country for future wars. Planning War, Pursuing Peace is the third of an extraordinary five-volume study on the political economy of American warfare. It differs from preceding volumes by examining the planning and investigation of war mobilization rather than the actual harnessing of the economy for hostilities; and it is also the first book to treat all phases of the political economy of wartime during those crucial interwar years. Koistinen first describes and analyzes the War and Navy Departments' procurement and economic mobilization planning-never before examined in its entirety-and conveys the enormity of the task faced by the military in establishing ties with many sectors of the economy. He tells how the War Department created commodity committees to carry on the work of World War I's War Industries Board, and how both military and industrial powers strove to protect their mutual interests against those seeking to avoid war and to reform society. Koistinen then describes the American public's struggle to come to terms with modern warfare through the in-depth explorations of the work of the House Select Committee on Expenditures in the War Department, the War Policies Commission, and the Senate Special Committee Investigating the Munitions Industry. He tells how these investigations alarmed pacifists, isolationists, and neo-Jeffersonians, and how they led Senator Gerald Nye and others to warn against the creation of ""unhealthy alliances"" between the armed services and industry. Planning War, Pursuing Peaceclearly shows how the U.S. economy was both directly and indirectly planned based on knowledge gained from World War I. By revealing vital and previously unexplored links between America's World Wars, it further illuminates the political economy of twentieth-century warfare as a complex and continually evolving process.
"Changing Enemies is one of the last accounts we shall have by a witness to some of the high-level decision making during the war and its immediate aftermath. . . . Lord Annan's book valuably points to the contribution to German democracy that was distinctively British." Michael R. Beschloss, New York Times Book Review"In this crackling tale, former British intelligence officer Annan offers an insider's view of the military espionage that helped the Allies win the war against Hitler. . . . He vividly describes power struggles among the Allied forces occupying Germany, his work in guiding post-Nazi Germany toward multi-party democracy, and] his friendship with Konrad Adenauer." Publishers Weekly"A graceful and crystal style like Noel Annan's, all but absent from most contemporary political and historical literature, is enough to awaken an American reader's slumbering literary Anglophilia." David Mehegan, Boston Globe"One of the best books ever written about military intelligence during World War II." William Roger Louis, University of Texas, and Fellow of St. Antony's College, Oxford"
For forty years the Central Intelligence Agency has published an in-house journal, Studies in Intelligence, for CIA eyes only. Now the agency has declassified much of this material. This engrossing book, which presents the most interesting articles from the journal, provides revealing insights into CIA strategies and into events in which the organization was involved. The articles were selected by H. Bradford Westerfield, an independent authority who teaches courses on intelligence operations but has never been affiliated with the CIA. Westerfield's comprehensive introduction sketches the history and basic structure of the CIA, sets the articles in context, and explains his process of selection. The articles span a wide range of intelligence activities, including intelligence data gathering inside the United States; analysis of data; interaction between analysts and policymakers; the development of economic intelligence targeted at friendly countries as well as at foes; use of double agents (the personal memoir of a CIA officer who pretended to the Russians to be their agent); evaluation of defectors (the Nosenko case); and coercive interrogation techniques and how to resist them.
For three years during World War II, future Director of Central Intelligence Allen Dulles commanded the OSS mission in Bern, Switzerland. From Hitler's Doorstep provides an annotated selection of his reports to Washington from 1942 to 1945. Dulles was a leading source of Allied intelligence on Nazi Germany and the occupied nations. The messages presented in this volume were based on information received through agents and networks operating in France, Italy, Austria, Eastern Europe, and Germany itself. They deal with subjects ranging from enemy troop strength and military plans to political developments, support of resistance movements, secret weapons, psychological warfare, and peace feelers. The Dulles reports reveal his own vision of grand strategy and presage the postwar turmoil in Europe. One of the largest collections of OSS records ever published, these telegrams and radiotelephone transmissions from the National Archives provide an exciting account of the course of the European war, offer insight on the development of American intelligence, and illuminate the origins of the Cold War. They will interest diplomatic and military historians as well as specialists on modern Europe. This volume is almost unique as document-based intelligence history and serves as a badly needed bridge between diplomatic history and intelligence studies.
In this account of one of the worst intelligence failures in Americanhistory, James J. Wirtz explains why U.S. forces were surprised by the North Vietnamese Tet Offensive in 1968. Wirtz reconstructs the turning point of the Vietnam War in unprecedented detail. Drawing upon Vietcong and recently declassified U.S. sources, he is able to trace the strategy and unfolding of the Tet campaign as well as the U.S. response.
No major twentieth-century power has so short a history of national intelligence agencies or activities as does the United States, and few have been as public or as tumultuous. A major debate has now opened over the future structure, size, and role of U.S. intelligence in the aftermath of the cold war. This unique and fully updated book is a history of the U.S. intelligence community--as well as a detailed description of the organization and function of the major components of the community as they existed at the beginning of 1992. A welcome and timely update of one of the most concise and objective guides to the history and structure of U.S. intelligence. "Representative Dave McCurdy, Chairman, Permanent Select Committee on Intelligence, U.S. House of RepresentativeS" The history of the intelligence community can be divided into three distinct periods. From its creation in 1947 until the revelations and investigations of 1974-1975, the intelligence community operated under fairly broad grants of authority based on trust. After the Nixon administration, a previously dormant Congress was galvanized to write new oversight provisions and also took on a greater role as a shaper and consumer of intelligence. With the collapse of the Soviet Union and the end of the cold war in 1991, the intelligence community found its role and even its necessity questioned due to the sudden absence of its major target. Lowenthal emphasizes that a competent and challenged intelligence capability is an essential part of the U.S. national security structure, despite the status of external events or threats. The major requirement of this structure, he says, is providing timely, objective, and pointed analysis to policymakers across a wide range of issues. |
![]() ![]() You may like...
The Shepherd And The Beast - The Hero's…
Tramayne Monaghan
Paperback
Fully Charged - How Great Leaders Boost…
Heike Bruch, Bernd Vogel
Hardcover
Human Resource Management In South…
Surette Warnich, Michael R. Carrell, …
Paperback
|