Your cart is empty
Created in 1947, the Central Intelligence Agency plays an important part in the nation's intelligence activities, and is currently playing a vital role in the "war on terrorism." While the agency is often in the news and portrayed in television shows and films, it remains one of the most secretive and misunderstood organizations in the United States. This work provides an in-depth look into the Central Intelligence Agency and how its responsibilities affect American life. After a brief history of the agency, chapters describe its organization, intelligence/counterintelligence, covert operations, controversies, key events, and notable people.
Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.
Through in-depth research and interviews with veterans, William Fowler has produced the most complete history of this elite and elusive unit to date. Out of Africa 1941 - 1943 Into Italy 1943 - 1945 Overlord and Europe 1944 - 1945 Post War Phoenix Malaya 1948 - 1960 The Confrontation 1962 - 1966 Oman 1970 - 1976 The Cold War 1945 - 1990 The Falklands Interlude 1982 The First Gulf War 1990 - 1991 Back to Africa 1981 - 2000 Balkan interlude 1994 - Afghanistan 2001 - The Second Gulf War 2003 C Squadron to 1 SAS Regiment (Rhodesia) 1951 - 1980 Enter the Kiwis 1954 - The Australian Experience 1957 - The Future
"Spies of the Kaiser" examines the scope and objectives of German
covert operations in Great Britain before and during the First
World War. It assesses the effect of German espionage on
Anglo-German relations and discusses the extent to which the fear
of German espionage in the United Kingdom shaped the British
intelligence community in the early twentieth century. The study is
based on original archival material, including hitherto unexploited
German records and recently declassified British documents.
"The Lost Oasis" tells the true story behind "The English Patient," An extraordinary episode in World War II, it describes the Zerzura Club, a group of desert explorers and adventurers who indulged in desert travel by early-model-motor cars and airplanes, and who searched for lost desert oases and ancient cities of vanished civilizations. In reality, they were mapping the desert for military reasons and espionage. The club's members came from countries that soon would be enemies: England and the Allied Forces v. Italy and Germany. When war erupted in 1939, Ralph Bagnold founded the British Long Range Desert Group to spy on and disrupt Rommel's advance on Cairo, while a fellow club member, Hungarian Count Almasy, succeeded in placing German spies there. Ultimately, the British prevailed. Saul Kelly's riveting history draws on interviews with survivors and previously unknown documentary material in England, Italy, Germany, Hungary, and Egypt. His book reads like a thriller - with one key difference: it's all true.
ACCLAIM FOR ENIGMA
"CRACKING STUFF...VIVID AND HITHERTO UNKNOWN DETAILS." -Sunday Times (London)
"IN A CROWD OF BOOKS DEALING WITH THE ALLIED BREAKING OF THE WORLD WAR II CIPHER MACHINE ENIGMA, HUGH SEBAG-MONTEFIORE HAS SCORED A SCOOP." -Washington Post
Winston Churchill called the cracking of the German Enigma Code "the secret weapon that won the war." Now, for the first time, noted British journalist Hugh-Sebag-Montefiore reveals the c"omplete" story of the breaking of the code by the Allies--the breaking that played a crucial role in the outcome of World War II.
This fascinating account relates the never-before-told, hair-raising stories of the heroic British and American sailors, spies, and secret agents who faced death in order to capture vital codebooks from sinking ships and snatch them from under the noses of Nazi officials. Sebag-Montefiore also relates new details about the genesis of the code, little-known facts about how the Poles first cracked the Luftwaffe's version of the code (and then passed it along to the British), and the feverish activities at Bletchley Park, Based in part on documents recently unearthed from American and British archives--including previously confidential government files--and in part on unforgettable, firsthand accounts of surviving witnesses, "Enigma" unearths the stunning truth about the brilliant piece of decryption that changed history.
Dr. Christensen's work offers novel insights that contribute to our general understanding of military intelligence. It frames the study of intelligence against larger developments in U.S. military, diplomatic, and domestic political history. It examines bureaucratic and inter-ser vice rivalries and shows how they affected the development of important national policies. It assesses the impact of technical developments on policy questions that confronted U.S. officers.
This groundbreaking story is told through Bernardo Benes—a lawyer who joined the refugee exodus from Castro's Cuba in 1960. Benes quickly became one of the leading voices advocating the integration of Cubans into the city's Anglo, old-boy power structure. In 1978, Cuban Intelligence recruited him as an emissary between the Carter administration and Cuba. He did the same for the CIA under Reagan in the early 1980s. In all, Benes made seventy-five secret trips to meet with high-ranking Cuban officials, spending about 150 hours face-to-face with Fidel Castro. The 1978 dialogue resulted in the release of 3,600 Cuban political prisoners and the right for Cuban exiles to visit family members on the island.
Critical Acclaim for TOP SECRET TALES of World War II
"A book for rainy days and long solitary nights by the fire. If there were a genre for cozy nonfiction, this would be the template."–Publishers Weekly
"Perfect for the curious and adventure readers and those who love exotic tales and especially history buffs who will be surprised at what they didn’t know. Recommended for nearly everyone."–Kirkus Reviews
This war was fought by soldiers out of uniform. Stealth and ingenuity were their weapons. Victory was their only code of conduct.
In Top Secret Tales of World War II, noted military historian William Breuer documents espionage–in all its forms–as it evolved in the hands of both Allied and Axis agents of intelligence and counterintelligence. Here you’ll find riveting tales of patriotism and treachery, subversion and sabotage, kidnappings and assassinations, and bribes and blackmailing–with frequently startling revelations about the secret wars behind both the battlefields and the headlines.
In 1944, Secretary of War Henry L. Stimson, knowing that high-ranking members of the military had falsely testified before the various bodies investigating the attack on Pearl Harbour, selected a then-unknown major by the name of Henry C. Clausen to undertake a new investigation. From November 1944 to September 1945, Clausen travelled more than 55,000 miles and interviewed over a hundred US and British Army, Navy and civilian personnel. He was given the authority to go anywhere and question anyone under oath, from enlisted personnel right up to George C. Marshall, the Chief of Staff. He ultimately presented an 800-page report to Stimson - a report that revealed a massive operational failure by the United States to use the priceless signals intelligence that it had obtained months before Pearl Harbour. Pearl Harbour is the final judgement - the story behind Clausen's investigation and a blistering account of his conclusions.
Winston Churchill once remarked that the secret warfare waged in World War II equaled "the most fantastic inventions of romance and melodrama."
William Breuer vividly confirms that assessment with these compelling accounts of Allied and Axis intelligence throughout World War II. Here are riveting tales of patriotism and treachery, saboteurs, sleepers, and moles, giving fresh perspectives on the best-known interceptions and deceptions of the war—the breaking of the German code Enigma and the Japanese code Purple, Operation Overlord’s successful disguise of the D-Day invasion— as well as little-known feats of civilian bravado in the face of danger.
Meet Sidney Cotton, a British businessman and aviator who took the Luftwaffe’s General Albrecht Kesselring aloft for a test flight at a German air show and then coolly snapped valuable reconnaissance photographs after handing the controls over to the Nazi officer.
Shadow the covert armada that shipped the foundation of Great Britain’s financial security—including $2.5 billion in gold—from London to the Bank of Canada in Ottawa, without suffering a single loss from U-boats at the height of the Battle for the Atlantic.
Discover how U.S. taxpayers footed the bill for a successful Nazi propaganda effort that was documented in the Congressional Record, published by the Government Printing Office, and mailed on a congressman’s postal privileges.
Witness a German military spy so inept he carried his World War I medals on his mission, and another so bold that he advertised for industry secrets in the pages of Popular Aviation magazine. He paid twenty dollars each for the numerous—and significant—replies that poured in.
Drawn extensively from personal interviews, private correspondence, trial records, and declassified documents from official archives, this engrossing volume provides detailed, frequently startling revelations about the secret wars fought behind the battlefields—and the headlines—of World War II.
This war was fought by soldiers out of uniform. Stealth and ingenuity were their weapons. Victory was their only code of conduct."Gentlemen do not read each other’s mail."—Henry L. Stimson
Henry L. Stimson, the U.S. Secretary of War under President Franklin Roosevelt, was in for a rude shock as the military forces of Germany and Japan armed themselves for their assault on the world. Men at war not only read each other’s mail; they forged it whenever possible.
In Top Secret Tales of World War II, noted military historian William Breuer documents espionage—in all its forms—as it evolved in the hands of both Allied and Axis agents of intelligence and counter-intelligence. He reveals the acts of subversion and sabotage, the bribes, blackmailings, kidnappings, assassinations, grand deceptions, and bizarre assaults that were conducted in the name of victory at all costs.
Focusing on the fascinating characters that played key roles in these pivotal incidents, Breuer brings a fresh dimension to the war’s most notorious acts and provides new insights into missions conducted in such deep shadow they nearly eluded the history books as well as they did the enemy’s detection.
Head of the Abwehr (German military intelligence) during World War II, Admiral Wilhelm Canaris (1887-1945) has been both damned as Hitler's master spy and praised as the true hero of the German anti-Nazi resistance. What emerges in Heinz Hohne's definitive biography is a panoramic view of the rise and fall of Nazism as reflected in the destiny of one man who hoped, for patriotic purposes, to harness evil temporarily, only to be destroyed by it.
In October 1962, the world went to the brink of Armageddon. This study provides an archive based account of the Cuban missile crisis, providing the first detailed and authoritative account from the British perspective. The book draws upon British and US archival material and scholarship in the west and the former USSR. The diplomatic, military and intelligence dimensions of British policy are scrutinized. Material is presented and existing interpretations of UK US relations at this crucial moment are reassessed. The book contributes a fresh aspect to the literature on the Cuban missile crisis, by exploring where the views of Washington and its closest ally converged and diverged.
Spies and Saboteurs is the story of the origins of the Anglo-American 'Special Relationship' in human intelligence collection and special operations, which took place amidst the global conflagration that was the Second World War. It is the story of William 'Wild Bill' Donovan - the father of America's Central Intelligence Agency - and of his relationship with legendary British spymasters like William Stephenson, code named 'Intrepid', Stewart Menzies ('C'), chief of the Secret Intelligence Service, Admiral John Godfrey, the powerful and enigmatic director of Naval Intelligence, and General Colin Gubbins, Britain's master saboteur. Relying almost exclusively upon recently declassified OSS and British intelligence documents and survivor interviews, it examines the transatlantic association in espionage and sabotage, guerrilla warfare and disinformation. It explores the evolution of covert relations from a 'tutorial' arrangement with the U.S. as pupil, to an unequal then full partnership, and ultimately to competition and rivalry in the prosecution of the clandestine war.
Most histories of the Civil War explain victory and defeat in terms of the skill of commanders and their troops. Intelligence records disappeared after the war, and thus a critically important element has largely been ignored. Fishel has unearthed substantial collections of such records, and his "intelligence explanation" radically alters history's understanding of the campaigns. The Secret War for the Union is one of the most important Civil War works ever published.
One of Churchill s most controversial decisions during the Second World War was to switch SOE support in Yugoslavia in 1943 from the Cetniks loyal to the exiled Royal Government to backing Tito and his Communist Partisan guerrillas. It led to a Communist regime in Yugoslavia which lasted until Tito s death in 1980, and the nationalistic sentiments he had suppressed exploding into ethnic violence in the Balkan wars of the 1990s. Until now the story has been that SOE was infiltrated by Communists in Cairo and that Fitzroy Maclean, Churchill s personal delegate to Tito, was hoodwinked by the Communist leader, and that Churchill was duped into abandoning the royalists. However, the recently deposited papers of Sir Bill Deakin, Churchill's former assistant and an SOE operative in Yugoslavia, reveal that the decision was based upon absolutely solid evidence and in Britain's best military interests. The official history of SOE in Yugoslavia was never written, but Deakin was the main adviser to the person deputed to write it and Christopher Catherwood was the first person to examine the papers deposited in Washington. These papers reveal that Churchill made his decision based on evidence not just from SOE, but also from MI3, SIS and SIGINT at Bletchley Park. Christopher Catherwood can now demonstrate that one of Churchill s most significant and consequential decisions of the Second World War was not the terrible mistake that historians have portrayed it.
Cyberspace is one of the major bases of the economic development of industrialized societies and developing. The dependence of modern society in this technological area is also one of its vulnerabilities. Cyberspace allows new power policy and strategy, broadens the scope of the actors of the conflict by offering to both state and non-state new weapons, new ways of offensive and defensive operations. This book deals with the concept of "information war", covering its development over the last two decades and seeks to answer the following questions: is the control of the information space really possible remains or she a utopia? What power would confer such control, what are the benefits?
Military organizations around the world are normally huge producers and consumers of data. Accordingly, they stand to gain from the many benefits associated with data analytics. However, for leaders in defense organizations-either government or industry-accessible use cases are not always available. This book presents a diverse collection of cases that explore the realm of possibilities in military data analytics. These use cases explore such topics as: Context for maritime situation awareness Data analytics for electric power and energy applications Environmental data analytics in military operations Data analytics and training effectiveness evaluation Harnessing single board computers for military data analytics Analytics for military training in virtual reality environments A chapter on using single board computers explores their application in a variety of domains, including wireless sensor networks, unmanned vehicles, and cluster computing. The investigation into a process for extracting and codifying expert knowledge provides a practical and useful model for soldiers that can support diagnostics, decision making, analysis of alternatives, and myriad other analytical processes. Data analytics is seen as having a role in military learning, and a chapter in the book describes the ongoing work with the United States Army Research Laboratory to apply data analytics techniques to the design of courses, evaluation of individual and group performances, and the ability to tailor the learning experience to achieve optimal learning outcomes in a minimum amount of time. Another chapter discusses how virtual reality and analytics are transforming training of military personnel. Virtual reality and analytics are also transforming monitoring, decision making, readiness, and operations. Military Applications of Data Analytics brings together a collection of technical and application-oriented use cases. It enables decision makers and technologists to make connections between data analytics and such fields as virtual reality and cognitive science that are driving military organizations around the world forward.
The Broken Seal: The Story of "Operation Magic" and the Pearl Harbor Disaster explores the questions of why, if the United States knew the Japanese codes, did we not anticipate the December 7, 1941 surprise attack and how did the Japanese spy system in Hawaii operate? As a chief of research and planning in the Special Warfare Branch of the Office of Naval Intelligence, the author had access to both Japanese and American classified material to write this study. The author's intent was to independently ascertain the validity of earlier claims that the Pearl Harbor attack could have been avoided. The result is an eminently readable and engrossing story of the relationship between America and Japan in the interwar years and the relentless cat-and-mouse intelligence game conducted by both sides. Despite more recent suppositions that there was a conspiracy among American and British officials to ignore warnings of a Japanese attack that had been gleaned from deciphered diplomatic codes in order to force America into a world war, the author confirms that human error and misjudgment and the actual state of intelligence interpretation at the time made an accurate assessment of Japanese intentions impossible.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as `target centric' intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject. The book is general enough in nature that a lay student-interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement-will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations. Uses numerous hands-on activities-that can easily be modified by instructors to be more or less challenging depending on the course level-to reinforce concepts As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information As such, the non-sensitive information presented is appropriate-and methods applicable-for use for education and training overseas and internationally Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.
Spying, the "world's second oldest profession," is hardly limited to the traditional great power countries. Intelligence Elsewhere, nevertheless, is the first scholarly volume to deal exclusively with the comparative study of national intelligence outside of the anglosphere and European mainstream. Past studies of intelligence and counterintelligence have tended to focus on countries such as the United States, Great Britain, and Russia, as well as, to a lesser extent, Canada, Australia, France, and Germany. This volume examines the deep historical and cultural origins of intelligence in several countries of critical importance today: India, China, the Arab world, and indeed, Russia, the latter examined from a fresh perspective. The authors then delve into modern intelligence practice in countries with organizations significantly different from the mainstream: Iran, Pakistan, Japan, Finland, Sweden, Indonesia, Argentina, and Ghana. With contributions by leading intelligence experts for each country, the chapters give the reader important insights into intelligence culture, current practice, and security sector reform. As the world morphs into an increasingly multi-polar system, it is more important than ever to understand the national intelligence systems of rising powers and regional powers that differ significantly from those of the US, its NATO allies, and its traditional opponents. This fascinating book shines new light into intelligence practices in regions that, until now, have eluded our understanding.
Builds a revisionary theoretical framework for researching intelligence knowledge and applies it to the Swedish Military and Security DirectorateGunilla Eriksson revises our perception of intelligence as carefully collected data and objective truth, arguing that there are hidden aspects to intelligence analysis that need to be uncovered and critically examined. This twofold study investigates the character of intelligence knowledge and the social context in which it is produced, using the Swedish Military and Security Directorate (MUST) as a case study.Eriksson argues that there is an implicit framework that continuously influences knowledge production: what kind of data is considered relevant, how this data is interpreted and the specific social and linguistic context of the organisation, surrounded by unarticulated norms and specific procedures. She asks whether these conventions hamper or obstruct intelligence assessments; an essential analysis, given that history has shown us the grave consequences basing policy on intelligence's wrong conclusions.Sources includeThe annual Swedish Armed Forces Strategic Intelligence Estimates from 1998 2010Lengthy and highly valuable interviews with the analysts, including managers, working at MUST, giving insights into everyday life at the institution and leading to many important resultsParticipant observation carried out by the author at MUST working meetings and seminars during the production process of the 2010 estimate, and drawing on her experience from her years working as an active analyst
The United States and Mexico share a history shaped in the 19th century by numerous US forces interventions into Mexican territory and US expropriation of considerable swaths of Mexican territory. However, in spite of structural impediments and a history of resentment by Mexico of US intervention into its affairs and territory, the levels of cooperation and understanding slowly began to improve following a series of international and domestic factors. The decline of the former Soviet Union and the fall of the Berlin Wall at a global level, coupled with major political and economic challenges and reforms within Mexico are a starting point from which to assess the evolution of the bilateral defense relationship between the United States and Mexico. The American and Mexican militaries have evolved differently over the past 100 years and they each have very different responsibilities, mission sets, orientations, and capabilities. Yet in recent years, the Mexican armed forces have cooperated more closely with their US counterparts. This may be due to explicit direction coming from senior levels of the Mexican government and to operational requirements of the armed forces themselves as they seek to increase their capability and capacity to confront the growing levels in drug trafficking related violence. Today, both countries are dealing with the effects of this increased violence and insecurity in Mexico. Relying primarily on one-on-one interviews with senior practitioners and analysts on both sides of the border, the text examines the evolution of the U.S.-Mexican bilateral defense relationship to better understand how and why this unique relationship has improved, in fits and starts, over the past 25 years. It offers a new understanding of how defense policymakers from each respective country perceive the other, as well as how the lack of trust and understanding between the two neighbors has delayed greater cooperation.
Have Western experts fundamentally failed to understand the dynamics, leaders and culture of the Middle East? Dina Rezk analyses 8 case studies, culminating in the assassination of Egyptian President Anwar el Sadat on live television on 6 October 1981, Drawing on declassified documents, interviews and multi-archival research, she explores how the most powerful intelligence agencies in the world have been so notoriously caught off guard in post-WWII Middle East.
This is both a history of the service attache, beginning with the Napoleonic era, and a discussion of his changing role, past and present. Professor Vagts shows the military adviser temporarily joined to the diplomatic corps as a person often divided in his loyalties to diplomatic officials and to military leaders. Affected by increasing bureaucratic specialization, he sometimes became a "twilight" figure engaged in political activity and even espionage. Professor Vagts' numerous works on the history of militarism and the military, in both German and English, and his research in the chancelleries of Europe have given him perspective for this book. Originally published in 1967. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
You may like...
Surprise, Kill, Vanish - The Definitive…
Annie Jacobsen Paperback (1)
Secrets in a Dead Fish - The Spying Game…
Melanie King Hardcover (1)
MI6 - Life and Death in the British…
Gordon Corera Paperback (1)
The Secret Life of Bletchley Park - The…
Sinclair McKay Paperback (1)
Spy - Uncovering Craig Williamson
Jonathan Ancer Paperback (4)
Code-Breaker - The untold story of…
Marc Mcmenamin Paperback
Agent 407 - A South African Spy Breaks…
Olivia Forsyth Paperback (2)
Double Cross in Cairo - The True Story…
Nigel West Hardcover (1)
Enigma - The Battle For The Code
Hugh Sebag Montefiore Paperback
Black Ops - Danny Black Thriller 7
Chris Ryan Hardcover (1)