![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
'Never in the field of human conflict was so much owed by so many to so few.' The courageous pilots of the Royal Air Force who faced the Luftwaffe in the Battle of Britain, affectionately known as 'the Few', are rightly hailed as heroes. Recently, efforts have been made to recognise the thousands who supported RAF operations behind the scenes. And yet one group remains missing from the narrative: the Women's Auxiliary Air Force. The Women Behind the Few explores the Second World War from the perspective of the WAAFs working behind the scenes to collect and disseminate vital intelligence - intelligence that resulted in Allied victory. WAAFs worked within the Dowding System, the world's most sophisticated air defence network, as well as in the Y Service, intercepting German communications. Throughout the Blitz, they used radar to aid Fighter and Bomber Commands in protecting Britain's civilians. WAAFs also assisted with the Allied offensive bombing campaign and were behind the discovery of the terrifying German V-weapons. Their work was critical ahead of the Normandy landings and they were present in their hundreds at Bletchley Park. In this thrilling book, Sarah-Louise Miller brings the women of the force back to life, celebrating their wartime contribution to British military intelligence. Hidden behind the Few but vital to their success, WAAFs supplied the RAF with life-saving information. Here, for the first time, is their story.
With a Foreword by Lord Hague of Richmond The Intelligence Corps is one of the smallest and most secretive elements of the British Army. It has existed in various guises since the early twentieth century, but it was only formally constituted in July 1940. In this book, Michael Ashcroft tells the astonishing stories of some of its most courageous and ingenious figures, who have operated all over the world from the First World War to the present day. Whether carrying out surveillance work on the street, monitoring and analysing communications, working on overseas stakeouts, receiving classified information from a well-placed contact or interrogating the enemy in the heat of war, a hugely diverse range of people have served in the Corps, often supplementing their individual professional skills with original thinking and leadership in the name of the Crown. This book pays tribute to them and shows why, in the words of the 1st Duke of Marlborough, 'No war can be conducted successfully without early and good intelligence.'
War and Enlightenment in Russia explores how members of the military during the reign of Catherine II reconciled Enlightenment ideas about the equality and moral worth of all humans with the Russian reality based on serfdom, a world governed by autocracy, absolute respect for authority, and subordination to seniority. While there is a sizable literature about the impact of the Enlightenment on government, economy, manners, and literature in Russia, no analytical framework that outlines its impact on the military exists. Eugene Miakinkov's research addresses this gap and challenges the assumption that the military was an unadaptable and vertical institution. Using archival sources, military manuals, essays, memoirs, and letters, the author demonstrates how the Russian militaires philosophes operationalized the Enlightenment by turning thought into reality.
A CUNNING CHRONICLE OF THE 50 CODES THAT ALTERED THE COURSE OF HISTORY AND CHANGED THE WORLD From the bestselling author of Bletchley Park Brainteasers and The Scotland Yard Puzzle Book. There have been secret codes since before the Old Testament, and there were secret codes in the Old Testament too. Almost as soon as writing was invented, so too were the devious means to hide messages and keep them under the wraps of secrecy. In 50 Codes that Changed the World, Sinclair McKay explores these uncrackable codes, secret cyphers and hidden messages from across time to tell a new history of a secret world. From the temples of Ancient Greece to the court of Elizabeth I; from antique manuscripts whose codes might hold prophecies of doom to the modern realm of quantum mechanics, you will see how a few concealed words could help to win wars, spark revolutions and even change the faces of great nations. Here is the complete guide to the hidden world of codebreaking, with opportunities for you to see if you could have cracked some of the trickiest puzzles and lip-chewing codes ever created. ----------------------- Praise for Sinclair McKay's books: 'This book [The Secret Life of Bletchley Park] seems a remarkably faithful account of what we did, why it mattered, and how it all felt at the time by someone who couldn't possibly have been born then. - THE GUARDIAN [Bletchley Park Brainteasers] is outrageously difficult but utterly fascinating. - THE EXPRESS 'Sinclair McKay's account of this secret war of the airwaves in [Secret Listeners] is as painstakingly researched and fascinating as his bestselling The Secret Life Of Bletchley Park, and an essential companion to it.' - DAILY MAIL
In his bestselling Station X, Michael Smith brought us the astonishing true story of the breaking of the Enigma Code. In The Emperor's Codes, he continues the tale as he examines how Japan's codes were broken and explores the consequences for the Second World War. The Emperor's Codes tells the stories of John Tiltman, the eccentric British soldier turned codebreaker who made many of the early breaks into Japanese diplomatic and military codes; Eric Nave, the Australian sailor recruited to work for the British who pioneered breakthroughs in Japanese naval codes; and Hiroshi Oshima, the hard-drinking Japanese ambassador to Berlin whose candid reports to Tokyo of his conversations with Hitler and other high-ranking Nazis were a major source of intelligence in the war against Germany. Many of these revelations have been made possible only thanks to recently declassified British files, privileged access to Australian secret official histories and interviews with an unprecedented number of British, American and Australian codebreakers.
In 2013, Edward Snowden revealed that the NSA and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of security . In this compelling account, surveillance expert David Lyon guides the reader through Snowden s ongoing disclosures: the technological shifts involved, the steady rise of invisible monitoring of innocent citizens, the collusion of government agencies and for-profit companies and the implications for how we conceive of privacy in a democratic society infused by the lure of big data. Lyon discusses the distinct global reactions to Snowden and shows why some basic issues must be faced: how we frame surveillance, and the place of the human in a digital world. Surveillance after Snowden is crucial reading for anyone interested in politics, technology and society.
ORBIT (Observing Rapport Based Interpersonal Techniques) is an approach to interviewing high-value detainees, encompassing not only analysis and research into the methodology, but also a framework for training. ORBIT: The Science of Rapport-Based Interviewing for Law Enforcement, Security, and Military offers comprehensive treatment of ORBIT's unique perspective on human rapport and the role it plays in the interrogation of difficult subjects, including suspects, detainees, and high value targets. Alison and colleagues provide an overview of ORBIT, which was developed from analysis of nearly 2000 hours of recorded interrogations. They go on to define rapport, explaining how and why it works by reference to this corpus of data-by far the largest of its kind in the world. ORBIT reveals what this data shows: that rapport-based methods work, and that coercion, persuasion, and threats do not. Outlining the development of their own unique stance on rapport and its influences, the authors demonstrate, through real-life examples and careful analysis, why harsh methods must be rejected and why compassion and understanding work.
Large data sets arriving at every increasing speeds require a new set of efficient data analysis techniques. Data analytics are becoming an essential component for every organization and technologies such as health care, financial trading, Internet of Things, Smart Cities or Cyber Physical Systems. However, these diverse application domains give rise to new research challenges. In this context, the book provides a broad picture on the concepts, techniques, applications, and open research directions in this area. In addition, it serves as a single source of reference for acquiring the knowledge on emerging Big Data Analytics technologies.
Irish neutrality during the Second World War presented Britain with
significant challenges to its security. Exploring how British
agencies identified and addressed these problems, this book reveals
how Britain simultaneously planned sabotage in and spied on
Ireland, and at times sought to damage the neutral state's
reputation internationally through black propaganda operations. It
analyses the extent of British knowledge of Axis and other
diplomatic missions in Ireland, and shows the crucial role of
diplomatic code-breaking in shaping British policy. The book also
underlines just how much Ireland both interested and irritated
Churchill throughout the war.
This first history of British Imperial interventions in widely distant geographic areas in north and south Russia at the end of World War I describes the invention of a new kind of intelligence system. This careful study based on an extensive use of documents provides interesting lessons for dealing with Russia today at a similar turning point. Historians, Russian specialists, intelligence professionals, and others will find this a fascinating account of dirty deeds and a helpful analysis of intelligence planning and coordination. This history shows how intelligence was used as a substitute for open diplomacy and how the interventions were turned to economic advantage for both Britain and Canada. The system of intelligence is analyzed in terms of planning, tactics, communications, trade, transport, field operations and networks and coordination. Each of the interventions in the north and south are described in detail. Notes and a lengthy bibliography also offer important evidence of the remarkable events that took place.
Published specially by After the Battle to coincide with the suspension of Allied occupation rights in Berlin in October 1990, this map was produced in 1944 by the War Office and lists the location and use of all important buildings in Berlin to be used in the occupation of the city. Every building associated with the Reich Government, NSDAP, police, fire service, Reichsbahn, U-Bahn, hospitals, telephone exchanges, embassies, prisons, etc., is numbered and referenced to an index printed on the reverse of the map. This sheet covers the central area at 1:12500.
Security intelligence continues to be of central importance to the contemporary world: individuals, organizations and states all seek timely and actionable intelligence in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and to what ends? How can we ensure that intelligence is not abused? In this third edition of their classic text, Peter Gill and Mark Phythian set out a comprehensive framework for the study of intelligence, discussing how states organize the collection and analysis of information in order to produce intelligence, how it is acted upon, why it may fail and how the process should be governed in order to uphold democratic rights. Fully revised and updated throughout, the book covers recent developments, including the impact of the Snowden leaks on the role of intelligence agencies in Internet and social media surveillance and in defensive and offensive cyber operations, and the legal and political arrangements for democratic control. The role of intelligence as part of 'hybrid' warfare in the case of Russia and Ukraine is also explored, and the problems facing intelligence in the realm of counterterrorism is considered in the context of the recent wave of attacks in Western Europe. Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of inquiry - one that everyone has an interest in understanding.
This book provides the first ever intelligence history of Iraq from 1941 to 1945, and is the third and final volume of a trilogy on regional intelligence and counterintelligence operations that includes Nazi Secret Warfare in Occupied Persia (Iran) (2014), and Espionage and Counterintelligence in Occupied Persia (Iran) (2015). This account of covert operations in Iraq during the Second World War is based on archival documents, diaries, and memoirs, interspersed with descriptions of all kinds of clandestine activity, and contextualized with analysis showing the significance of what happened regionally in terms of the greater war. After outlining the circumstances of the rise and fall of the fascist Gaylani regime, Adrian O'Sullivan examines the activities of the Allied secret services (CICI, SOE, SIS, and OSS) in Iraq, and the Axis initiatives planned or mounted against them. O'Sullivan emphasizes the social nature of human intelligence work and introduces the reader to a number of interesting, talented personalities who performed secret roles in Iraq, including the distinguished author Dame Freya Stark.
A riveting introduction to the complex and evolving field of geospatial intelligence. Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT. Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.
Incels. Anti Vaxxers. Conspiracy theorists. Neo-Nazis. Once, these groups all belonged on the fringes of the political spectrum. Today, accelerated by a pandemic, global conflict and rapid technological change, their ideas are becoming more widespread: QAnon proponents run for U.S. Congress, neo-fascists win elections in Europe, and celebrity influencers like Kanye West spread dangerous myths to millions. Going Mainstream asks the question: What is happening here? Going undercover online and in person, UK counter-extremism expert Julia Ebner reveals how, united by a shared sense of grievance and scepticism about institutions, radicalised individuals are influencing the mainstream as never before. Hidden from public scrutiny, they leverage social media to create alternative information ecosystems and build sophisticated networks funded by dark money. Ebner's candid conversations with extremists offer a nuanced and gripping insight into why people have turned to the fringes. She explores why outlandish ideas have taken hold and disinformation is spreading faster than ever. And she speaks to the activists and educators who are fighting to turn the tide. Going Mainstream is a dispatch from the darkest front of the culture wars, and a vital wake-up call.
Khe Sanh remains to this day, an extremely controversial and emotional aspect of the war in Vietnam. The U.S. Armed Forces fought to defend Khe Sanh in early 1968 and then abandoned the base after a 77-day siege by the North Vietnamese. This book contains fromerly Top Secret messages to President Lyndon Johnson from National Security Advisor W.W. "Walt" Rostow, Gen. William Westmoreland and many others. The siege and loss of Khe Sanh is the tragedy of the war in Vietnam in microcosm.
This book examines the intersection between national and international counter-terrorism policies and civil society in numerous national and regional contexts. The 9/11 terrorist attacks against the United States in 2001 led to new waves of scholarship on the proliferation of terrorism and efforts to combat international terrorist groups, organizations, and networks. Civil society organisations have been accused of serving as ideological grounds for the recruitment of potential terrorists and a channel for terrorist financing. Consequently, states around the world have established new ranges of counter-terrorism measures that target the operations of civil society organisations exclusively. Security practices by states have become a common trend and have assisted in the establishment of 'best practices' among non-liberal democratic or authoritarian states, and are deeply entrenched in their security infrastructures. In developing or newly democratized states - those deemed democratically weak or fragile - these exceptional securities measures are used as a cover for repressing opposition groups, considered by these states as threats to their national security and political power apparatuses. This timely volume provides a detailed examination of the interplay of counter-terrorism and civil society, offering a critical discussion of the enforcement of global security measures by governments around the world. -- .
You know about MI5. You know about MI6.
The history of China is a history of warfare. Wars have caused dynasties to collapse, fractured the thin facade of national unity, and brought decades of alien occupation. But throughout Chinese history, its warfare has been guided by principles different from those that governed Europe. Chinese strategists followed the concept, first articulated by Sun-tzu in "The Art of War," of "qi (ch'i)," or unorthodox, warfare. The concept of "qi" involves creating tactical imbalances in order to achieve victory against even vastly superior forces. Ralph D. Sawyer, translator of "The Art of War" and one of America's preeminent experts on Chinese military tactics, here offers a comprehensive guide to the ancient practice of unorthodox warfare. He describes, among many other tactics, how Chinese generals have used false rumors to exploit opposing generals' distrust of their subordinates; dressed thousands of women as soldiers to create the illusion of an elite attack force; and sent word of a false surrender to lure enemy troops away from a vital escape route. "The Tao of Deception" is the book that military tacticians and military historians will turn to as the definitive guide to a new, yet ancient, way of thinking about strategy.
Despite publicity given to the successes of British and American codebreakers during the Second World War, the study of signals intelligence is still complicated by governmental secrecy over even the most elderly peacetime sigint. This book, first published in 1986, lifts the veil on some of these historical secrets. Christopher Andrew and Keith Neilson cast new light on how Tsarist codebreakers penetrated British code and cypher systems. John Chapman's study of German military codebreaking represents a major advance in our understanding of cryptanalysis during the Weimar Republic. The history of the Government Code and Cypher School - forerunner of today's GCHQ - by its operational head, the late A.G. Denniston, provides both a general assessment of the achievements of British cryptanalysis between the wars and a tantalising glimpse of what historians may one day find in GCHQ's forbidden archives. The distinguished cryptanalyst of Bletchley Park, the late Gordon Welchman, describes in detail how the Ultra programme defeated the German Enigma machine, while another Bletchley Park cryptographer, Christopher Morris, reminds us in his account of the valuable work on hand cyphers that wartime sigint consisted of much more than Ultra. Roger Austin's study of surveillance under the Vichy regime shows the continuing importance of older and simpler methods of message interception such as letter-opening. Taken together, the articles establish sigint as an essential field of study for both the modern historian and the political scientist.
This edited volume argues that producers of analysis need to shift from producing static, narrative products to much more dynamic, digitally-based platforms in order to remain competitive and relevant.
A riveting introduction to the complex and evolving field of geospatial intelligence. Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT. Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.
This book sheds new light on the origins and nature of modern military thinking. The ideas of Carl von Clausewitz (1780-1831) - which remain at the heart of strategic analysis today - have hitherto been examined largely in isolation from their cultural and philosophical roots in the eighteenth and early nineteenth centuries. Azar Gat now demonstrates the extent to which culture affects military theory. Dr Gat relates a series of military thinkers to their cultural background, demonstrating how the major currents of modern military thought have evolved from the world-view of the Enlightenment on the one hand and Romanticism on the other. Tracing the development of Clausewitz's ideas, he provides a provocative critique of Clausewitz's classic work, On War. In the process, he offers an illuminating insight into a great period of European culture and into warfare in the age of Napoleon. |
You may like...
Britain, France and the Empire…
Susan Rose, Margaret Kekewich
Hardcover
R4,000
Discovery Miles 40 000
Proclaiming the Gospel, Engaging the…
Michael Brautigam, Peter G. Riddell, …
Hardcover
Educational Ministry in the Logic of the…
James E. Loder
Hardcover
|