![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
In December 1941, Japan attacked multiple targets in the Far
East Timothy Wilford reminds us that Canada was both a Pacific and
an Canada's Road to the Pacific War sheds new light on
"A Classic in Counterintelligence -- Now Back in Print" Originally published in 1987, "Thwarting Enemies at Home and Abroad" is a unique primer that teaches the principles, strategy, and tradecraft of counterintelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations. Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.
Ephraim Kam observes surprise attack through the eyes of its victim in order to understand the causes of the victim's failure to anticipate the coming of war. Emphasing the psychological aspect of warfare, Kam traces the behavior of the victim at various functional levels and from several points of view in order to examine the difficulties and mistakes that permit a nation to be taken by surprise. He argues that anticipation and prediction of a coming war are more complicated than any other issue of strategic estimation, involving such interdependent factors as analytical contradictions, judgemental biases, organizational obstacles, and political as well as military constraints.
The book that gives an insider's view of some of the great intelligence blunders of recent history. Including Stalin's Operation Barbarossa, Hitler being misled by his own intelligence staff, the bungling that enabled an attack on Pearl Harbor, lack of preparation for the Viet Cong's offensive 1968, Arab Israeli war 1973, Falkland Islands, Gulf War 1991...New material to include: The US failure to run warning system before 9/11; the War on Terrorism; the Islamic Terrorist threat; mis-use of intelligence by UK government in War with Iraq; intelligence problems of Middle East; challenges of 21st century.
This is the first study to investigate the interlinked problems of domestic security and national defence in Ireland, from independence to the present day. Using a wealth of newly released material from Irish and foreign archives, Professor O'Halpin describes the development of the army and police since 1922, and examines how the emerging Irish state tried to balance an absolute commitment to military neutrality and independent defence with the need for close co-operation with Britain in dealing with perceived republican and communist threats.
This classic account of the German Resistance during World War II remains one of the primary sources on a topic that continues to generate controversy more than a half century after the war's end. As OSS (office of strategic services) chief of station in Bern, Switzerland, from 1942 to 1945, Dulles was charged with determining the extent and commitment of the opposition to Hitler. "Germany's Underground" is the most important firsthand account we have of Allied contact with that opposition--and the most concise and readable history of the men and women from every stratum of German society who made up this complex web.
What did the British or American soldier know about the German Army? Was this knowledge accurate - and just how did he know it? There have been several 'handbooks' of Second World War armies, but they never tell us exactly what the Allied soldier knew at the time, or how he was informed. This is of importance because it influenced both conduct on the battlefield, and the way in which the soldier thought about his enemy. The book explains the background history of the organisations involved, followed by short chapters based around a series of original documents. This puts the original into context and also discusses whether the document that follows was correct in the picture it painted, and what can be deduced about sources and the concerns of the intelligence officers who compiled the material. Most of the documents were produced at the time, by the British War Office or US War Department, and cover different aspects of the German Army, including tactics, weapons, and uniforms. Subjects include: Allied intelligence on the German Army from 1930 onwards, British SIS / MI6 and US Military Intelligence. The organisations responsible, how they worked, and how they changed very rapidly with the coming of war. The role of technology, modern - like the radio transmitter, ancient - as in scouring libraries and periodicals, reports on military manoeuvres and parades. Limitations of 'Ultra' The German army itself, from the tiny force left after Versailles, to the rapid expansion in the late 1930s. Innovation in tanks, tactics, machine guns, rocket weaponry. The problems of gathering intelligence, not just danger, but finance, asking the right questions and the limitations of reporting and distribution.
An examination of the military doctrine that animated the French defense against the German invasion in 1940.- Argues that the French learned the wrong lessons from World War I and were ill prepared for World War II- Lessons for modern armies about how to learn from past wars and prepare for future wars- Winner of the Paul Birdsall Prize of the American Historical Association
This is the last untold story of Bletchley Park. Using recently declassified information, Paul Gannon has written a gripping account of the invention of the world's first true computer, Colossus. Uncover the secrets of Bletchley Park's code-breaking computers. In 1940, almost a year after the outbreak of the Second World War, Allied radio operators at an interception station in South London began picking up messages in a strange new code. Using science, maths, innovation and improvisation BletchleyPark codebreakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these codebreakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and hidden away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of BletchleyPark. 'Gannon's book contains a mass of utterly fascinating and largely unknown material about an immensely important wartime project, and is very welcome indeed.' - Brian Randell, TES
A thoroughly updated revision of the first comprehensive overview of intelligence designed for both the student and the general reader, "Silent Warfare" is an insider's guide to a shadowy, often misunderstood world. Leading intelligence scholars Abram N. Shulsky and Gary J. Schmitt clearly explain such topics as the principles of collection, analysis, counterintelligence, and covert action, and their interrelationship with policymakers and democratic values. This new edition takes account of the expanding literature in the field of intelligence and deals with the consequences for intelligence of vast recent changes in telecommunication and computer technology-the new "information age." It also reflects the world's strategic changes since the end of the Cold War. This landmark book provides a valuable framework for understanding today's headlines, as well as the many developments likely to come in the real world of the spy.
The debonair Special Operations Executive agent Richard "Dick" Mallaby was the first Briton to be sent to Italy as an SOE operative, parachuted unceremoniously into Lake Como in August 1943. Arrested and initially tortured by the Italian authorities, he managed to sweet-talk his way out of trouble and helped Marshal Pietro Badoglio and King Victor Emmanuel III escape to the Allied lines. He also helped negotiate the armistice with Italy, for which he was awarded the Military Cross. He was back in action in 1945, when he crossed into Fascist-controlled northern Italy from Switzerland but was swiftly captured and interrogated by the SS. Narrowly avoiding a firing squad once again, he helped to secure the surrender of 800,000 German forces in Italy in May 1945. Based on 20 years of research, Gianluca Barneschi has uncovered the true story of a real-life James Bond.
Communicating with Intelligence was the first book to teach the skills needed to make sure that papers, reports, and other products be correctly written by intelligence students and professionals. It also responded to the increased number of degrees in intelligence and national security offered in academic institutions. Aimed at students, faculty, and practitioners, the book is designed to provide all necessary information on how to prepare, write, and read intelligence publications: .Foundations of successful intelligence communication .Differences between academic and intelligence writing .How to use arguments .Framework for analysis .Writing toolkit .How the briefing process works .Guide to creating citations .How to handle classified materials .Samples of individual and group exercises This fully revised and expanded edition will be an essential tool for anyone who needs to learn or hone their skills in how to communicate with intelligence effectively."
The actual field manual issued by the United States Army to its soldiers. U.S. Army intelligence relies on the tactics of intelligence interrogation to assess and combat enemy forces, but recent events at the Abu Ghraib prison in Iraq revealed violations of the rules of intelligence interrogation and human rights, officially codified in the U.S. ARMY INTELLIGENCE AND INTERROGATION HANDBOOK. Herein are the precise and regulated procedures and principles of interrogation, which must be followed to conduct meaningful interrogations and prevent violations that led to the questionable tactics of prison soldiers at Abu Ghraib. Features the established procedures of the U.S. Army to conduct intelligence interrogations, under the constraints established by the Hague and Geneva Conventions, and the Uniform Code of Military Justice. This invaluable resource lays out clear guidelines for the interrogation process, the role of the interrogator, handling captured enemy documents, and the direction and supervision of intelligence interrogation. It also includes information about the relationship between interrogation and its operational environment, debriefing strategy, and the construction and use of joint interrogation facilities. Principles and tactics include: The incidents at Abu Ghraib prison demonstrate the need to clarify law and procedure. With informative diagrams, a wealth of appended information, and a glossary full of the official military terminology, the U.S. ARMY INTELLIGENCE AND INTERROGATION HANDBOOK is an essential reference with global implications for the armed forces Principles and tactics include: Principles of interrogation Capabilities and limitations of interrogators Interrogator training Intelligence cycle Screening sources Counterintelligence Command, tasking, support, and interrogator relationships Components of strategic intelligence And many more important devices used and tested in actual military operations.
This edition of the dictionary contains 6794 entries. In addition to covering the four academic disciplines of analysis, collection, counterintelligence and covert action, it lists and defines more categories of the space, time, collection and functional aspects of intelligence than are listed in the official glossary of the US intelligence community. It is designed for active or retired intelligence, counterintelligence or security specialists, investigators, cryptologists, political scientists, historians and writers
This biography of Britain's leading wartime codebreaker by one of the top female codebreakers offers a portait of a great British eccentric and a fascinating and detailed behind-the-scenes look into the hidden side of war.
The story of the intelligence war in South Africa during the Second World War is one of suspense, drama and dogged persistence. In 1939, when the Union of South Africa entered the war on Britain’s side, the German government secretly reached out to the anti-war political opposition, and to the leadership of the pro-fascist Ossewabrandwag. The Nazis’ aim was to spread sedition in South Africa and to undermine the Allied war effort. To this end, they even offered to supply weapons to the Ossewabrandwag. But the critical strategic importance of the sea route round the Cape of Good Hope meant that the Germans were also after naval intelligence. Soon U-boat packs were sent to operate in South African waters, to deadly effect. With the help of the Ossewabrandwag, a network of German spies was established to gather important political and military intelligence and relay it back to the Reich. Agents would use a variety of channels to send coded messages to Axis diplomats in nearby Mozambique. Meanwhile, police detectives and MI5 agents hunted in vain for illegal wireless transmitters. Drawing on numerous primary and archival sources, Hitler’s South African Spies presents an unrivalled account of the German intelligence networks that operated in wartime South Africa and investigates the true threat level presented by Nazi Germany. It includes a fascinating account of the Royal Navy’s signals intelligence network in southern Africa and also details the hunt in post-war Europe for witnesses to help the South African government bring charges of high treason against key Ossewabrandwag members. |
![]() ![]() You may like...
Radical War - Data, Attention and…
Matthew Ford, Andrew Hoskins
Paperback
R604
Discovery Miles 6 040
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
Political Decision-Making and Security…
Luisa Dall'acqua, Irene M. Gironacci
Hardcover
R5,732
Discovery Miles 57 320
Destined for War - Can America and China…
Graham Allison
Paperback
![]()
|