Military intelligence Books

189 products


  • Pen & Sword Books Ltd Countering Hitler's Spies: British Military

    1 in stock

    Book SynopsisWhen the military aspect of the Second World War is discussed, especially regarding how the war was won, people tend to talk about, Winston Churchill, D-Day, Dunkirk, the Battle of Britain, the Blitz, the Dam Busters, the Allied bombing of German cities, Montgomery and the North Africa campaign, etc. However, there is one aspect, rarely mentioned and never quite fully appreciated, which played a massive role in winning the war. The Double Cross system, operated by MI5, involved capturing German spies who had been sent to the United Kingdom and offering them the opportunity to become double agents and spy for the British against the Germans. Most agreed, although the alternative wasn't that pleasant: refusing to become a spy would have almost certainly resulted in death. Spies who worked for MI5, especially those who had initially worked for the Germans, carried out sterling work which resulted in the saving of thousands of Allied lives. The success of the D-Day landings at Normandy, for example, was in part due to the excellent work of a double agent, who helped convince Nazi Germany that the Allied invasion of Europe would take place across the English Channel, at Calais. One double agent was so good at what he did that Germany awarded him the Iron Cross, whilst Britain made him a Member of the British Empire (MBE).

    1 in stock

    £15.99

  • A French GI at Omaha Beach

    Pen & Sword Books Ltd A French GI at Omaha Beach

    1 in stock

    Book SynopsisBernard Dargols was a young Parisian student working in New York when war broke out in 1939. While his family remained in France and was threatened by the Vichy regime's anti-Semitic laws,�Bernard decided to enlist in the US Army, convinced that it would be more useful to fight the occupying forces. Following his long military training, Bernard became a GI in the Military Intelligence Service, 2nd US Infantry Division, and landed on the infamous Omaha Beach in June 1944.�He took part in the liberation of Normandy, Brittany and the Ardennes, before becoming a member of the CIC, the American counter-espionage service, and was finally demobilised in 1946. This extraordinary story of the 'GI from the Place des Vosges', is told here by his granddaughter, Caroline Jolivet.

    1 in stock

    £17.99

  • MI6: British Secret Intelligence Service

    Pen & Sword Books Ltd MI6: British Secret Intelligence Service

    1 in stock

    Book SynopsisWritten by the renowned expert Nigel West, this book exposes the operations of Britain's overseas intelligence-gathering organisation, the famed Secret Intelligence Service, MI6, and traces its origins back to its inception in 1909. In this meticulously researched account, its activities and structure are described in detail, using original secret service documents. The main body of the book concerns MI6's operations during the Second World War, and includes some remarkable successes and failures, including how MI6 financed a glamorous confidant of the German secret service; how a suspected French traitor was murdered by mistake; how Franco's military advisors were bribed to keep Spain out of the war; how members of the Swedish secret police were blackmailed into helping the British war effort; how a sabotage operation in neutral Tangiers enabled the Allied landings in North Africa to proceed undetected; and how Britain's generals ignored the first ULTRA decrypts because MI6 said that the information had come from a well-placed source called BONIFACE'. In this new edition, operations undertaken by almost all of MI6's overseas stations are recounted in extraordinary detail. They will fascinate both the professional intelligence officer and the general reader. The book includes organisational charts to illustrate MI6's internal structure and its wartime network of overseas stations. Backed by numerous interviews with intelligence officers and their agents, this engaging inside story throws light on many wartime incidents that had previously remained unexplained.

    1 in stock

    £21.25

  • Secrets of the Cold War: Espionage and

    Pen & Sword Books Ltd Secrets of the Cold War: Espionage and

    1 in stock

    Book SynopsisThe Cold War, which lasted from the end of the Second World War to the collapse of the Soviet Union in 1991, was fought mostly in the shadows, with the superpowers manoeuvring for strategic advantage in an anticipated global armed confrontation that thankfully never happened. How did the intelligence organisations of the major world powers go about their work? What advantages were they looking for? Did they succeed? By examining some of the famous, infamous, or lesser-known intelligence operations from both sides of the Iron Curtain, this book explains how the superpowers went about gathering intelligence on each other, examines the type of information they were looking for, what they did with it, and how it enabled them to stay one step ahead of the opposition. Possession of these secrets threatened a Third World War, but also helped keep the peace for more than four decades. With access to previously unreleased material, the author explores how the intelligence organisations, both civilian and military, took advantage of rapid developments in technology, and how they adapted to the changing threat. The book describes the epic scale of some of these operations, the surprising connections between them, and how they contributed to a complex multi-layered intelligence jigsaw which drove decision making at the highest level. On top of all the tradecraft, gadgets and cloak and dagger', the book also looks at the human side of espionage: their ideologies and motivations, the winners and losers, and the immense courage and frequent betrayal of those whose lives were touched by the Secrets of the Cold War.

    1 in stock

    £21.25

  • Covert Radio Operators, 1939-1945: Signals From

    Pen & Sword Books Ltd Covert Radio Operators, 1939-1945: Signals From

    Out of stock

    Book SynopsisClandestine radio operators had one of the most dangerous jobs of World War 2\. Those in Nazi-occupied Europe for the SOE, MI6 and the OSS had a life-expectancy of just six weeks. In the Gilbert Islands the Japanese decapitated 17 New Zealand 'Coastwatchers'. These 'behind the lines' highly skilled agents' main tasks were to maintain regular contact with their home base and pass vital intelligence back. As this meticulously researched book reveals, many operators did more than that. Norwegian Odd Starheim hi-jacked a ship and sailed it to the Shetlands. In the Solomon Islands Jack Read and Paul Mason warned the defenders of Guadalcanal about incoming enemy air raids giving American fighters a chance to inflict irreversible damage on the Japanese Air Force. In 1944 Arthur Brown was central to Operation Jedburgh's success delaying the arrival of the SS Das Reich armoured division at the Normandy beach-heads. The author also explains in layman's terms the technology of 1940s radios and the ingenious codes used. Most importantly, Covert Radio Agents tells the dramatic human stories of these gallant behind-the-lines radio agents. Who were they? How were they trained? How did they survive against the odds? This is both a highly informative and uplifting work about unsung heroes.

    Out of stock

    £21.25

  • Codebreaker Girls: A Secret Life at Bletchley

    Pen & Sword Books Ltd Codebreaker Girls: A Secret Life at Bletchley

    15 in stock

    Book SynopsisWhat would it be like to keep a secret for fifty years? Never telling your parents, your children, or even your husband? Codebreaker Girls: A Secret Life at Bletchley Park tells the true story of Daisy Lawrence. Following extensive research, the author uses snippets of information, unpublished photographs and her own recollections to describe scenes from her mother's poor, but happy, upbringing in London, and the disruptions caused by the outbreak of the Second World War to a young woman in the prime of her life. The author asks why, and how, Daisy was chosen to work at the Government war station, as well as the clandestine operation she experienced with others, deep in the British countryside, during a time when the effects of the war were felt by everyone. In addition, the author examines her mother's personal emotions and relationships as she searches for her young fianc e, who was missing in action overseas. The three years at Bletchley Park were Daisy's university, but having closed the door in 1945 on her hidden role of national importance dealing with Germany, Italy and Japan this significant period in her life was camouflaged for decades in the filing cabinet of her mind. Now her story comes alive with descriptions, original letters, documents, newspaper cuttings and unique photographs, together with a rare and powerful account of what happened to her after the war.

    15 in stock

    £24.27

  • Historical Dictionary of Chinese Intelligence

    Rowman & Littlefield Historical Dictionary of Chinese Intelligence

    Out of stock

    Book SynopsisThe second edition of Historical Dictionary of Chinese Intelligence covers the history of Chinese Intelligence from 400 B.C. to modern times. The dictionary section has over 400 cross-referenced entries on the agencies and agents, the operations and equipment, the tradecraft and jargon, and many of the countries involved.

    Out of stock

    £91.80

  • The Handbook of African Intelligence Cultures

    Rowman & Littlefield The Handbook of African Intelligence Cultures

    Out of stock

    Book SynopsisNational intelligence cultures are shaped by their country’s history and environment. This book examines the national intelligence cultures of Africa. Focusing on nearly sixty countries, the volume offers a concise account of African intelligence and security services by examining the environmental factors that informs the countries’ intelligence cultures. The chapters address each countries’ history, national and international settings, ethnic and religious groups, the legal framework for intelligence, and key intelligence events. They also look at the intelligence cycle, including describing the consumers of intelligence and targets, as well as resources and reputation. Each chapter is written by an expert with detailed knowledge of the countries’ intelligence agencies. The authors explore the factors that shape how intelligence services in Africa are structured and operate as well as how the services’ role in security and government. For the first time, African intelligence and security is front-and-center in a handbook that examines the issues that influence intelligence operations and collection, and how the intelligence services shape African governments and society.Table of ContentsIntroduction, Algeria, Angola, Benin, Botswana, Burkina Faso, Burundi, Cabo Verde, Cameroon, Central African Republic, Chad, Comoros, Congo, Democratic Republic of the, Congo- Republic of the Cote d'Ivoire, Djibouti, Egypt, Equatorial Guinea, Eritrea, Eswatini (formerly Swaziland), Ethiopia, Gabon, Gambia, Ghana, Guinea, Guinea-Bissau, Kenya, Lesotho, Liberia, Libya, Madagascar, Malawi, Mali, Mauritania, Mauritius, Morocco, Mozambique, Namibia, Niger, Nigeria, Rwanda, Sao Tome and Principe, Senegal, Seychelles, Sierra Leone, Somalia, South Africa, South Sudan, Sudan, Tanzania, Togo, Tunisia, Uganda, Zambia and Zimbabwe

    Out of stock

    £97.20

  • Knowledge Management in the Intelligence Enterprise

    Artech House Publishers Knowledge Management in the Intelligence Enterprise

    15 in stock

    Book SynopsisThis system-level resource specifically applies knowledge management principles, practices and technologies to the intelligence domain. Designed for those responsible for the management of an intelligence enterprise operation and its delivery of reliable intelligence to key decision-makers, the text describes the essential principles of intelligence, from collection, processing and analysis to dissemination, for both national intelligence and business applications. The author aims to provide a balanced treatment of the organizational and architectural components of knowledge management, offering an understanding of the system infrastructure, tools and technologies necessary to implement the intelligence enterprise. He explores real-world applications and presents a detailed example of competitive intelligence unit design. Including over 80 illustrations, the volume offers a practical description of enterprise architecture design methodology, and covers the full range of national, military, business and competitive intelligence.Table of ContentsKnowledge management and intelligence; the intelligence enterprise; knowledge management processes; the knowledge-based intelligence organization; intelligence analysis and synthesis; implementing analysis-synthesis; knowledge internalization and externalization; explicit knowledge combination and transformation; the intelligence enterprise architecture; knowledge management technologies.

    15 in stock

    £118.25

  • Vaults, Mirrors, and Masks: Rediscovering U.S.

    Georgetown University Press Vaults, Mirrors, and Masks: Rediscovering U.S.

    Out of stock

    Book SynopsisDecision makers matching wits with an adversary want intelligence-good, relevant information to help them win. Intelligence can gain these advantages through directed research and analysis, agile collection, and the timely use of guile and theft. Counterintelligence is the art and practice of defeating these endeavors. Its purpose is the same as that of positive intelligence - to gain advantage - but it does so by exploiting, disrupting, denying, or manipulating the intelligence activities of others.The tools of counterintelligence include security systems, deception, and disguise: vaults, mirrors, and masks. In one indispensable volume, top practitioners and scholars in the field explain the importance of counterintelligence today and explore the causes of - and practical solutions for - U.S. counterintelligence weaknesses. These experts stress the importance of developing a sound strategic vision in order to improve U.S. counterintelligence and emphasize the challenges posed by technological change, confused purposes, political culture, and bureaucratic rigidity. "Vaults, Mirrors, and Masks" skillfully reveals that robust counterintelligence is vital to ensuring America's security. Published in cooperation with the Center for Peace and Security Studies and the George T. Kalaris Memorial Fund, Edmund A. Walsh School of Foreign Service, Georgetown University.Trade ReviewThe scope of the articles is such that both the counterintelligence expert and neophyte will gain greater understanding of the challenges of this intelligence field. A must-read for anyone who is serious about intelligence reorganization and the use of counterintelligence for more than just spy catching. International Journal of Intelligence EthicsTable of ContentsPreface IntroductionDemocracies and Counterintelligence: The Enduring ChallengeJennifer E. Sims Part One: Framing the Problem 1. Twenty-first Century Counterintelligence: The Theoretical Basis for ReformJennifer E. Sims 2. Counterintelligence: The American ExperienceJohn Fox Jr. and Michael Warner 3. Intelligence, Counterintelligence, Perception, and DeceptionRobert Jervis 4. Counterintelligence and U. S. Strategic CultureAustin K. Yamada Part Two: Tools and Tactics 5. A Time for CounterespionageRobert Wallace 6. Defense Counterintelligence, ReconceptualizedVincent H. Bridgeman7. Counterintelligence and Law EnforcementKathleen L. Kiernan 8. Counterintelligence: Too Narrowly PracticedJames R. Gosler 9. Economic or Industrial Espionage: Who is Eating America's Lunch, and How Do We Stop It?Harvey Rishikof Part Three: Strategies 10. Private-Sector Counterintelligence Strategies: Principles for ConsiderationRodney Faraon 11. A Federal Approach to Domestic IntelligenceTimothy R. Sample 12. Counterintelligence, Counterterrorism, Civil Liberties, and the Domestic Intelligence ControversyRichard A. Posner 13. The Way AheadJennifer E. Sims and Burton Gerber Contributors Index

    Out of stock

    £25.20

  • Eyes in the Sky

    Naval Institute Press Eyes in the Sky

    3 in stock

    Book SynopsisA CIA expert provides the inside story of President Dwight D. Eisenhower''s efforts to use spy planes and satellites to gather intelligence, revealing Eisenhower to be a hands-on president who, contrary to popular belief, took an active role in assuring that the latest technology was used to gather aerial intelligence.

    3 in stock

    £28.49

  • Rebuttal: The CIA Responds to the Senate

    Naval Institute Press Rebuttal: The CIA Responds to the Senate

    3 in stock

    Book SynopsisIn December 2014, the Senate Select Committee on Intelligence (SSCI) released a 500+ page executive summary of a 6,000 page study of the CIA's detention and interrogation of al Qa'ida terrorists. In early 2015 publishers released the study in book form and called it ""the report"" on ""torture."" Rebuttal presents the ""rest of the story."" In addition to reprinting the official responses from the SSCI minority and CIA, this publication also includes eight essays from senior former CIA officials who all are deeply knowledgeable about the program - and yet none of whom were interviewed by the SSCI staff during the more than four years the report was in preparation. These authors of the eight essays are George Tenet, Porter Goss, Gen. Michael V. Hayden, USAF (Ret.), John McLaughlin, Michael Morrell, J. Philip Mudd, John Rizzo, and Jose A. Rodriguez, Jr.

    3 in stock

    £17.06

  • Intelligence Oversight & Disclosure Issues

    Nova Science Publishers Inc Intelligence Oversight & Disclosure Issues

    1 in stock

    Book SynopsisInterest in congressional oversight of intelligence has risen again in the 110th Congress, in part because of the House Democratic majority''s pledge to enact the remaining recommendations from the U.S. National Commission on Terrorist Attacks upon the United States, commonly known as the 9/11 Commission. Its 2004 conclusions set the stage for reconsideration of the problems affecting Congress'' structure in this area. The commission''s unanimous report, as detailed in this book, covers many issues, and concludes that congressional oversight of intelligence was "dysfunctional". This book proposes two distinct solutions:(1) creation of a joint committee on intelligence (JCI), modelled after the defunct Joint Committee on Atomic Energy (JCAE), or (2) enhanced status and power for the existing select committees on intelligence, by making them standing committees and granting both authorisation and appropriations power. This book consists of public domain documents which have been located, gathered, combined, reformatted, and enhanced with a subject index, selectively edited and bound to provide easy access.

    1 in stock

    £80.24

  • U.S. Government Interrogations: Requirements &

    Nova Science Publishers Inc U.S. Government Interrogations: Requirements &

    1 in stock

    Book SynopsisAmerican policy on the interrogation of detainees is an exceptionally complex issue, one that cannot be adequately addressed nor satisfactorily resolved absent a clear understanding of the vital elements involved. This book is an overview of the controversy regarding U.S. treatment of enemy combatants and terrorist suspects detained in Iraq, Afghanistan, and other locations. Congress approved additional guidelines concerning the treatment of persons in U.S. custody and control via the Detainee Treatment Act (DTA). The DTA contains provisions that require Department of Defense (DoD) personnel to employ U.S. Army Field Manual guidelines while interrogating detainees, and prohibits the "cruel, inhuman and degrading treatment or punishment of persons under the detention, custody, or control of the U.S. Government." These provisions of the DTA, which were first introduced by Senator John McCain, have popularly been referred to as the "McCain Amendment." This book also discusses the Executive Order issued by President Barack Obama that generally instructs all U.S. agencies to comply with Army Field Manual requirements when interrogating persons captured in an armed conflict. This book consists of public documents which have been located, gathered, combined, reformatted, and enhanced with a subject index, selectively edited and bound to provide easy access.

    1 in stock

    £46.49

  • Intelligence Tradecraft Primer & Media Exposure

    Nova Science Publishers Inc Intelligence Tradecraft Primer & Media Exposure

    1 in stock

    Book SynopsisThis book highlights structured analytic techniques -- some widely used in the private sector and academia, some unique to the intelligence profession. Using the analytic techniques contained in this primer will assist analysts in dealing with the perennial problems of intelligence: the complexity of international developments, incomplete and ambiguous information, and the inherent limitations of the human mind. Understanding the intentions and capabilities of adversaries and other foreign actors is challenging, especially when either or both are concealed. Moreover, transnational threats today pose even greater complexity, in that they involve multiple actors -- including non-state entities -- that can adapt and transform themselves faster than those who seek to monitor and contain them. Finally, globalisation has increased the diversity of outcomes when complex, interactive systems such as financial flows, regional economies or the international system as a whole are in flux. Additionally, one of the least appreciated facts about the intelligence profession is that it exists in, and is influenced by, a very complex environment, one that includes everything from its relationships with policymakers, legislatures, military services, foreign partners, and last but not least, to its interaction with the public.

    1 in stock

    £107.99

  • Intelligence in Contemporary Media

    Nova Science Publishers Inc Intelligence in Contemporary Media

    1 in stock

    Book Synopsis

    1 in stock

    £39.74

  • The Fires of Babylon: Eagle Troop and the Battle

    Casemate Publishers The Fires of Babylon: Eagle Troop and the Battle

    Out of stock

    Book SynopsisAs a new generation of main battle tanks came on line during the 1980s, neither the US nor USSR had the chance to pit them in combat. But once the Cold War between the superpowers waned, Iraq’s Saddam Hussein provided that chance with his invasion of Kuwait. Finally the new US M1A1 tank would see how it fared against the vaunted Soviet-built T-72.On the morning of August 2, 1990, Iraqi armored divisions invaded the tiny emirate of Kuwait. The Iraqi Army, after its long war with Iran, had more combat experience than the U.S. Army. Who knew if America’s untested forces could be shipped across the world and thence contest the battle-hardened Iraqis on their homeground? The Kuwaitis had collapsed easily enough, but then the invasion drew fierce condemnation from the UN, which demanded Saddam’s withdrawal. Undeterred by the rhetoric, the Iraqi dictator massed his forces along the Saudi Arabian border and dared the world to stop him. In response, the U.S. led the world community in a coalition of 34 nations in what became known as Operation Desert Storm – a violent air and ground campaign to eject the Iraqis from Kuwait. Leading this charge into Iraq were the men of Eagle Troop in the US Army’s 2d Armored Cavalry Regiment.Commanded by then-Captain HR McMaster, Eagle Troop was the lead element of the US VII Corps’ advance into Iraq. On February 26, 1991, Eagle Troop encountered the Tawakalna Brigade of Iraq’s elite Republican Guard. By any calculation, the 12 American tanks didn’t stand a chance. Yet within a mere 23 minutes, the M1A1 tanks of Eagle Troop destroyed more than 50 enemy vehicles and plowed a hole through the Iraqi front. History would call it the Battle of 73 Easting.Based on hours of interviews and archival research by renowned author Mike Guardia, this minute-by-minute account of the U.S. breakthrough reveals an intimate, no-holds-barred account of modern warfare. Trade Review**** - An easy read with plenty of photos and maps * Soldier Magazine 07/07/2015 *

    Out of stock

    £23.75

  • Break in the Chain: Intelligence Ignored:

    Casemate Publishers Break in the Chain: Intelligence Ignored:

    15 in stock

    Book SynopsisFor the first two weeks of the Easter Offensive of 1972, the 571st Military Intelligence Detachment provided the only pertinent collateral intelligence available to American forces. Twice daily, the Detachment provided intelligence to the USS Buchanan (DDG-14), US Navy SEALS and Special Forces units including tactical and strategic forecasts of enemy movements, information that was otherwise unavailable to U.S. units and advisors in-country.In the weeks before the offensive, vital agent reports and verbal warnings by the 571st MI Detachment had been ignored by all the major commands; they were only heeded, and then only very reluctantly, once the Offensive began. This refusal to listen to the intelligence explains why no Army or USMC organizations were on-call to recover prisoners discovered or U.S. personnel downed behind enemy lines, as in the BAT-21 incident, as the last two Combat Recon Platoons in Vietnam had been disbanded six weeks before the offensive began. The lessons and experiences of Operation Lam Son 719 in the previous year were ignored, especially with regard to the NVA’s tactical use of tanks and artillery. In his memoir, Bob Baker, the only intelligence analyst with the 571st MI Detachment in 1972, reveals these and other heroics and blunders during a key moment in the Vietnam War.Trade Review...provides the historical intelligence example that can be used today by current military leaders and educators regarding the planning staff’s responsibility to help the commander’s visual the battlefield. * Military Review 16/12/2022 *Table of ContentsPreface Chapter 1 – Growing Up an Army Brat Chapter 2 – Basic Training Chapter 3 – USA Intelligence School Chapter 4 – On To Vietnam Chapter 5 – My New Home Chapter 6 – The Laos Prelude Chapter 7 – Skyline Ridge/Campaign Z Chapter 8 – Disrupting Internal Affairs Chapter 9 – ABC’s of the Easter Offensive of 1972 Chapter 10 -The Enemy Plan Chapter 11 – What Enemy? Chapter 12 – Day 1: Thursday, 30 March 1972 “...let slip the dogs of war.” Chapter 13 - The South Vietnamese Marines and their U.S. Advisors Chapter 14 - Cut and Run: What ARVN called “Mobility” Chapter 15 - The 571st “Recce Squadron” Chapter 16 - Too, Too Many Tanks Chapter 17 - In Retrospect Chapter 18 - Prologue to Surrender Chapter 19 - A Massacre near the Rockpile? Chapter 20 - NVA Artillery in the Easter Offensive Chapter 21 - The Bridge at Dong Ha Chapter 22 - NVA Tanks Resume Chapter 23 - U.S.S. Buchanan (DDG-14) Chapter 24 - BAT-21 Chapter 25 - Independent NVA Regiment Actions in I Corps Area Chapter 26 – National Intelligence Chapter 27 – Theater and Area Commands Chapter 28 – Diversions and Deceptions at the Onset Chapter 29 – 571st Military Intelligence Detachment Chapter 30 - Observations, Reflections, and Conclusions Chapter 31 – Astrology (tu vi) Use Chapter 32 – Southern I Corps Chapter 33 - Quang Trung 729 Chapter 34 – Lessons Still Disregarded Epilogue Appendices Index

    15 in stock

    £24.75

  • U.S. Intelligence: Congressional Role & Important

    Nova Science Publishers Inc U.S. Intelligence: Congressional Role & Important

    1 in stock

    Book SynopsisThe attacks on the World Trade Center and the Pentagon on September 11th, 2001, dramatically demonstrated the intelligence threats facing the United States in the new century. In response, Congress approved significantly larger intelligence budgets and, in December 2004, passed the most extensive reorganisation of the intelligence community since the National Security Act of 1947. This book examines the background, oversight and issues that face the U.S. intelligence agency today.

    1 in stock

    £139.49

  • Classified Information: Protections & Issues

    Nova Science Publishers Inc Classified Information: Protections & Issues

    1 in stock

    Book SynopsisThe security classification regime in use within the federal executive branch traces its origins to armed forces information protection practices of the World War I era. This classification system - designating information, according to prescribed criteria and procedures, protected in accordance with one of three levels of sensitivity, is based on the amount of harm to the national security that would result from its disclosure. This book explores the history, status, and emerging management issues of security classified and controlled information today.

    1 in stock

    £39.74

  • Classified Information Policy & Executive Order

    Nova Science Publishers Inc Classified Information Policy & Executive Order

    2 in stock

    Book SynopsisRecently, there have been multiple high-profile incidents involving the release of classified government information. Perhaps most prominent was Wikileaks.org''s unauthorised publication of more than 600,000 classified Department of Defense documents. Such incidents have further heightened congressional, media and public interest in classified information policy. This book provides information on classified information policy, also known as security classification policy and national security classification information policy. It discusses the history, costs and agencies assigned roles in classified information policy and focuses on Executive Order 13526, which establishes much of the current policy and possible oversight issues for Congress.

    2 in stock

    £39.74

  • Guide to Conducting Research in FBI Records

    Nova Science Publishers Inc Guide to Conducting Research in FBI Records

    1 in stock

    Book SynopsisThe mission of the FBI is to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal and international agencies and partners. This book details what an FBI record is, what researchers can learn from these records, and how they can be used. The FBI has long been of interest to researchers, given the importance and scope of its mission and the range of historical events that is has been involved in over the years.

    1 in stock

    £46.49

  • Fusion Centers: Counterterrorism Information

    Nova Science Publishers Inc Fusion Centers: Counterterrorism Information

    2 in stock

    Book SynopsisSharing terrorism-related information between state, local and federal officials is crucial to protecting the United States from another terrorist attack. Achieving this objective was the motivation for Congress and the White House to invest hundreds of millions of taxpayer dollars over the last nine years in support of dozens of state and local fusion centres across the United States. Congress directed the Department of Homeland Security (DHS) to lead this initiative. A bipartisan investigation has found, however, that DHS'' work with those state and local fusion centres has not produced useful intelligence to support federal counter-terrorism efforts. This book offers recommendations to clarify DHS'' role with respect to state and local fusion centres; to improve oversight of federal grand funds supporting fusion centres; conduct promised assessments of fusion centre information-sharing; and strengthen its protection of civil liberties in fusion centre intelligence reporting.

    2 in stock

    £146.24

  • Exporting Security: International Engagement,

    Georgetown University Press Exporting Security: International Engagement,

    Out of stock

    Book SynopsisIn this thoroughly updated second edition, Derek S. Reveron provides a comprehensive analysis of the shift in US foreign policy from coercive diplomacy to cooperative military engagement. The US military does much more than fight wars; it responds to humanitarian crises and natural disasters, assists advanced militaries to support international peace, and trains and equips almost every military in the world. Rather than intervening directly, the United States can respond to crises by sending weapons, trainers, and advisers to assist other countries in tackling their own security deficits created by subnational, transnational, and regional challengers. By doing so, the United States seeks to promote partnerships and its soft power, strengthen the state sovereignty system, prevent localized violence from escalating into regional crises, and protect its national security by addressing underlying conditions that lead to war. Since coalition warfare is the norm, security cooperation also ensures partners are interoperable with US forces when the US leads international military coalitions. Exporting Security takes into account the Obama administration's foreign policy, the implications of more assertive foreign policies by Russia and China, and the US military's role in recent humanitarian crises and nation-building efforts.Trade ReviewReveron's book remains among the few works to offer a dedicated focus on the clear, growing importance of security cooperation to U.S. foreign policy. . . . Reveron is lucid and detailed in presenting what can seem a Byzantine policy world, and the book offers a superb resource as an introduction to security cooperation. . . . Reveron's work is essential reading for students, scholars, and policymakers interested in U.S. foreign policy and military strategy for the twenty-first century. * Orbis *Provides an excellent overview. . . . Makes important contributions to the framework academics and military professionals should use. * Parameters *Reveron is lucid and detailed in presenting what can seem a Byzantine policy world, and the book offers a superb resource as an introduction to security cooperation. . . . Reveron provokes some important questions about wider debates, both within the 'practical' world of security cooperation, and concerning larger questions about the US global role in the future. . . . Reveron’s work is essential reading for students, scholars, and policymakers interested in US foreign policy and military strategy for the twenty-first century. * Orbis *Table of ContentsPrefaceIntroduction1. Beyond Warfare2. Military Engagement, Strategy, and Policy3. Resistance to Military Engagement4. Demilitarizing Combatant Commands5. Security Cooperation6. Promoting Maritime Security 7. Implications for the Force8. From Confrontation to CooperationIndexAbout the Author

    Out of stock

    £71.40

  • Researching National Security Intelligence:

    Georgetown University Press Researching National Security Intelligence:

    Out of stock

    Book SynopsisResearchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.Table of ContentsIntroduction: A Pluralistic Approach to Intelligence Scholarship Stephen Coulthart, Michael Landon-Murray, and Damien Van Puyvelde Part I. Framing Intelligence Research 1. Framing the Challenges and Opportunities of Intelligence Studies Research Mark Phythian 2. Confessions of an Intelligence Historian John Ferris Part II. Data Sources and the Study of National Security Intelligence 3. The Why, Who, and How of Using Qualitative Interviews to Research Intelligence Practices Damien Van Puyvelde 4. The Use of Structured Behavioral Observation Systems to Address Research Questions in Intelligence Misty Duke 5. A Sociological Approach to Intelligence Studies Bridget Rose Nolan Part III. Multidisciplinary Perspectives on National Security Intelligence Research 6. Enhancing Political Science Contributions to American Intelligence Studies Stephen Marrin 7. Can Decision Science Improve Intelligence Analysis? David R. Mandel 8. Charting a Research Agenda for Intelligence Studies Using Public Administration and Organization Theory Scholarship Rick Caceres-Rodriguez and Michael Landon-Murray 9. How the Field of Communication Can Contribute to the Understanding and Study of National Security Intelligence Rubén Arcos Part IV. Beyond the Ivory Tower: The Research and Practice of Intelligence 10. Bridging the Gap: The Scholar-Practitioner Divide in Intelligence Brent Durbin 11. The Ivory Tower and the Fourth Estate Paul Lashmar 12. The Ethics of Intelligence Research Ross Bellaby Conclusion: The Past, Present, and Future of Intelligence ResearchStephen Coulthart, Michael Landon-Murray, and Damien Van Puyvelde List of Contributors Index

    Out of stock

    £87.55

  • Researching National Security Intelligence:

    Georgetown University Press Researching National Security Intelligence:

    Out of stock

    Book SynopsisResearchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.Table of ContentsIntroduction: A Pluralistic Approach to Intelligence Scholarship Stephen Coulthart, Michael Landon-Murray, and Damien Van Puyvelde Part I. Framing Intelligence Research 1. Framing the Challenges and Opportunities of Intelligence Studies Research Mark Phythian 2. Confessions of an Intelligence Historian John Ferris Part II. Data Sources and the Study of National Security Intelligence 3. The Why, Who, and How of Using Qualitative Interviews to Research Intelligence Practices Damien Van Puyvelde 4. The Use of Structured Behavioral Observation Systems to Address Research Questions in Intelligence Misty Duke 5. A Sociological Approach to Intelligence Studies Bridget Rose Nolan Part III. Multidisciplinary Perspectives on National Security Intelligence Research 6. Enhancing Political Science Contributions to American Intelligence Studies Stephen Marrin 7. Can Decision Science Improve Intelligence Analysis? David R. Mandel 8. Charting a Research Agenda for Intelligence Studies Using Public Administration and Organization Theory Scholarship Rick Caceres-Rodriguez and Michael Landon-Murray 9. How the Field of Communication Can Contribute to the Understanding and Study of National Security Intelligence Rubén Arcos Part IV. Beyond the Ivory Tower: The Research and Practice of Intelligence 10. Bridging the Gap: The Scholar-Practitioner Divide in Intelligence Brent Durbin 11. The Ivory Tower and the Fourth Estate Paul Lashmar 12. The Ethics of Intelligence Research Ross Bellaby Conclusion: The Past, Present, and Future of Intelligence ResearchStephen Coulthart, Michael Landon-Murray, and Damien Van Puyvelde List of Contributors Index

    Out of stock

    £31.05

  • U.S. Army Intelligence and Interrogation Handbook

    Skyhorse Publishing U.S. Army Intelligence and Interrogation Handbook

    Out of stock

    Book SynopsisThe U.S. Army Intelligence and Interrogation Handbook provides doctrinal guidance, techniques, and procedures governing the use of interrogators as human intelligence collection agents in support of a commander’s intelligence needs. It outlines the interrogator’s role within the greater intelligence effort as well as the unit’s day-to-day operations, and includes details on how interrogators accomplish their assigned missions. This handbook is intended for use by interrogators as well as commanders, staff officers, and military intelligence personnel charged with conducting interrogations, and applies to operations at all levels of conflict intensity, including conditions involving the use of electronic warfare or nuclear, biological, or chemical weapons.The U.S. Army Intelligence and Interrogation Handbook builds upon existing doctrine and moves interrogation into the twenty-first century within the constraints of the Uniform Code of Military Justice and the Geneva Conventions. Principles, guidelines, and topics covered include:The definition of interrogationInterrogator capabilities and limitationsWarfighting doctrineThe intelligence cycle, and its disciplines and operationsAmphibious and airborne operationsThe interrogation processExploiting captured enemy documentsA tactical questioning guideAnd many more tactics and techniques used by the U.S. Army!

    Out of stock

    £10.99

  • Foreign Intelligence Surveillance Act

    Nova Science Publishers Inc Foreign Intelligence Surveillance Act

    1 in stock

    Book SynopsisThe current legislative and oversight activity with respect to electronic surveillance under the Foreign Intelligence Surveillance Act (FISA) has drawn national attention to several overarching issues. This book outlines three such issues and touches upon some of the perspectives reflected in the ongoing debate. These issues include the inherent and often dynamic tension between national security and civil liberties, particularly rights of privacy and free speech; the need for the intelligence community to be able to efficiently and effectively collect foreign intelligence information from the communications of foreign persons located outside the United States in a changing, fast-paced, and technologically sophisticated international environment or from United States persons abroad, and the differing approaches suggested to meet this need; and limitations of liability for those electronic communication service providers who furnish aid to the federal government in its foreign intelligence collection. Two constitutional provisions are implicated in this debate - the Fourth and Fifth Amendments.

    1 in stock

    £52.49

  • Foreign Intelligence Surveillance Courts:

    Nova Science Publishers Inc Foreign Intelligence Surveillance Courts:

    2 in stock

    Book SynopsisRecent disclosures concerning the size and scope of the National Security Agency''s (NSA''s) surveillance activities both in the United States and abroad have prompted a flurry of congressional activity aimed at reforming the foreign intelligence gathering process. While some measures would overhaul the substantive legal rules of the USA PATRIOT Act or other provisions of the Foreign Intelligence Surveillance Act (FISA), there are a host of bills designed to make procedural and operational changes to the Foreign Intelligence Surveillance Court (FISC), a specialised Article III court that hears applications and grants orders approving of certain foreign intelligence gathering activities, and the Foreign Intelligence Surveillance Court of Review, a court that reviews rulings of the FISC. This book will explore a selection of these proposals and address potential legal questions such proposals may raise.

    2 in stock

    £52.49

  • Balancing Liberty, Privacy & Security with

    Nova Science Publishers Inc Balancing Liberty, Privacy & Security with

    2 in stock

    Book SynopsisThis book presents the final report of the review group on intelligence and communications technologies. Recommendations are provided that are designed to protect national security and maintain intelligence capabilities while also respecting our longstanding commitment to privacy, civil liberties, and the trust of allies abroad, with due consideration of reducing the risk of unauthorised disclosures.

    2 in stock

    £196.49

  • Contractors in the Civilian Intelligence

    Nova Science Publishers Inc Contractors in the Civilian Intelligence

    1 in stock

    Book SynopsisThe intelligence community (IC) uses core contract personnel to augment its workforce. These contractors typically work alongside government personnel and perform staff-like work. Some core contract personnel require enhanced oversight because they perform services that could inappropriately influence the government''s decision making. This book examines the extent to which the eight civilian IC elements use core contract personnel; the functions performed by these personnel and the reasons for their use; and whether the elements developed policies and strategically planned for their use. GAO reviewed and assessed the reliability of the eight civilian IC elements'' core contract personnel inventory data for fiscal years 2010 and 2011, including reviewing a sample of 287 contract records.

    1 in stock

    £63.74

  • And the Rest Is History: Tales of Hostages, Arms

    Permuted Press And the Rest Is History: Tales of Hostages, Arms

    Out of stock

    Book SynopsisForeword by Rabbi Abraham Cooper, Associate Dean, Simon Wiesenthal Center A real-life adventure story told by a New York Times bestselling author and war correspondent who reveals how he became a hostage, an arms dealer, and an Israeli spy.And the Rest Is History takes readers on a traveling circus from Paris to Beirut, Baghdad, and beyond, introducing them to spies and terrorists, arms dealers and crooks, and along the way reveals a few surprises about the secret underbelly of recent history you won’t find in WikiLeaks. This book pinpoints precisely when the era of “fake news” actually began in America, and will change the way you think about journalism and journalists. It includes: • riveting testimony of the author’s torture and born-again experience as a hostage in a Beirut cellar; • unusual insight into the beginnings of the Iran–Contra scandal; • eyewitness reporting from the battlefields of the Middle East; • the inside scoop on Saddam Hussein’s WMD programs; • astonishing stories of French government dirty tricks, the intelligence underworld, Israeli hostage negotiations, and the real-life escapades of a Soviet sleeper agent. And the Rest Is History is a reporter’s journey from Left-Bank leftist to born-again Christian conservative. But most of all it’s a rollicking good read full of unusual characters, places, and events you will never hear about on the evening news. “Ken Timmerman is a superb investigative reporter—and old school—which means he does his research. His behind-the-scenes adventures in Iraq, Syria, Egypt, Israel, and even France are a terrific read for those of us who share his passion for tracking down the facts, not molding the facts to a ‘narrative.’” —Peter Schweizer, president of the Government Accountability Institute and NY Times bestselling author of Clinton Cash and Profiles in Corruption “I have followed for some time your excellent reporting on the Mid-East. You consistently provide insights and facts nowhere else available to the public. Your professionalism and persistence make a great contribution to our understanding, to the public debate, and ultimately to our national security.” —R. James Woolsey, former director, Central Intelligence Agency “I have spent my life tracking the murderers of yesterday. Mr. Timmerman is tracking the murderers of tomorrow.” —Nazi hunter Simon Wiesenthal, introducing the author to an audience in Paris, France, in 2002Trade Review"Although I have known national security journalist Ken Timmerman for over twenty years, he only told me how he barely escaped execution by radical Islamists in a Beirut cell a few years ago. His professionalism, modesty, and faith are qualities seen far too rarely in today's ego-driven field of journalism." -- Fred Fleitz, Former National Security Council Chief of Staff under President Trump"And the Rest is History is a memoir that reads like a rollicking, page-turning novel. From the cold war through the war on terror and beyond, Ken takes us on the wild adventure that has been his life as a global-trotting reporter: we enter war zones and the halls of power, eavesdrop on conversations with world leaders, terrorists, arms dealers, and spies, and become witnesses to extraordinary history, Dripping in vivid detail, his unforgettable story will have you riveted from page one." -- Monica Crowley, Ph.D., Former Assistant Secretary of the Treasury"Real reporters don't follow the pack. Ken Timmerman takes us down roads where few reporters have managed to go before and knows how to evoke people and places with remarkable grace." -- Walid Phares, FoxNews National Security and Foreign Policy expert

    Out of stock

    £16.50

  • PEGASUS BOOKS The Red Hotel

    10 in stock

    Book Synopsis

    10 in stock

    £16.96

  • Pegasus Books Rogue Agent

    10 in stock

    Book Synopsis

    10 in stock

    £22.46

  • Geospatial Intelligence: Origins and Evolution

    Georgetown University Press Geospatial Intelligence: Origins and Evolution

    15 in stock

    Book SynopsisA riveting introduction to the complex and evolving field of geospatial intelligence. Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT. Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.Trade ReviewIt is a pioneering text suitable for everyone’s reading list as well as the classroom. * AFIO Intelligencer *To call Robert Clark’s Geospatial Intelligence: Origins and Evolution the best GEOINT primer that I have read is necessary— accurate —and insufficient. It is much more. * The Cipher Brief *Table of ContentsList of Illustrations Preface Prologue List of Abbreviations 1. Intelligence and Geospatial Intelligence The Boundaries of Intelligence Geospatial Terminology The Power of a Single Word Defining Geospatial Intelligence 2. A Brief History of Maps and Charts Mapping The Silk Road Cartography Photogrammetry Nautical Charts Aeronautical Charts Establishing Claims with Cartography Chapter Summary 3. Terrain Measuring and Representing Terrain Digital Elevation Models Military Use of Terrain Civil Use of Terrain Oceanographic Terrain Chapter Summary 4. Navigation Celestial Navigation Radio Navigation Satellite Navigation Chapter Summary 5. Geopolitics Mahan’s Sea Power Theory Mackinder’s Heartland Theory German Geopolitik Spykman’s Rimland Theory The Continuing Influence of Geopolitical Theories Thematic Cartography Geopolitical Strategy Chapter Summary 6. Geographic Information Systems The Cluttered Map Hard Copy Layers Roger Tomlinson, the Father of GIS The Harvard Connection ESRI and Intergraph Interactive Maps and Charts The GIS Choice: Raster or Vector? The Power of GIS The Explosion of GIS Applications Are Paper Maps Obsolete? GIS and GEOINT Chapter Summary 7. Geolocation Geolocation Basics Using Imagery Radiofrequency Geolocation Acoustic Geolocation Cyber Geolocation Chapter Summary 8. Gaining the High Ground Gettysburg Observation Towers Lighter-than-Air Craft Exotic Approaches to the High Ground Aircraft Chapter Summary 9. The Ultimate High Ground Remote-Sensing Satellites Government Nonmilitary Applications Military Applications Commercial Imaging Satellites Chapter Summary 10. Visible Imaging Aerial Film Cameras Satellite Film Cameras Digital Cameras Video Cameras Getting the Image Right Analyzing the Image Chapter Summary 11. Spectral Imaging The Infrared Bands The Ultraviolet Spectrum Imaging outside the Visible Band Spectral Imagers Chapter Summary 12. Radar Imaging Conventional Radar Side-Looking Airborne Radar Synthetic Aperture Radar Laser Radar Chapter Summary 13. The Drivers of Geospatial Intelligence Denial and Deception Fleeting Targets Precision and Accuracy Outside Expertise Characterizing Oceans and Ocean Traffic New Issues A Complete Picture Chapter Summary 14. The Tools of Geospatial Intelligence Geomatics Geographic Information System Geovisualization Big Data Data Analytics and Visual Analytics Geospatial Simulation Modeling Chapter Summary 15. Sociocultural GEOINT Sociocultural Factors in Conflict Resolution Activity-Based Intelligence Pattern-of-Life Analysis Volunteered Geographic Information Involuntary Geographic Information Chapter Summary 16. The Story of the National Geospatial-Intelligence Agency The Defense Mapping Agency The National Photographic Interpretation Center The National Imagery and Mapping Agency’s Standup A Tale of Two Cities The Fight to Survive The NGA’s Standup Reaching Out Establishing the Boundaries of GEOINT Chapter Summary 17. The GEOINT Explosion US Geospatial Intelligence Organizations Five Eyes GEOIN Other National GEOINT Organizations Transnational GEOINT Organizations Chapter Summary 18. Non-National Geospatial Intelligence State/Provincial and Local Government Nongovernmental Organizations Chapter Summary 19. Commercial GEOINT Geospatial Business Intelligence Strategic GEOINT Operational GEOINT Geospatial Competitive Intelligence Chapter Summary 20. The Road Ahead Predicting the Future The Future of Cartography The Tools Applications of GEOINT National-Level GEOINT The Challenge of Ubiquitous GEOINT Chapter Summary Glossary Selected Bibliography Index About the Author

    15 in stock

    £47.93

  • Canadian Military Intelligence: Operations and

    Georgetown University Press Canadian Military Intelligence: Operations and

    Out of stock

    Book SynopsisThe most comprehensive history of Canadian military intelligence and its influence on key military operations Canadian intelligence has become increasingly central to the operations of the Canadian Armed Forces (CAF). Canadian Military Intelligence: Operations and Evolution from the October Crisis to the War in Afghanistan is the first comprehensive history that examines the impact of tactical, operational, and strategic intelligence on the Canadian military. Drawing upon a wide range of original documents and interviews with participants in specific operations, author David A. Charters provides an inside perspective on the development of military intelligence since the Second World War. He shows how intelligence influenced key military operations, from domestic internal security to peacekeeping efforts to high-intensity air campaigns—including the October Crisis of 1970, the Oka Crisis, the Gulf War, peacekeeping and enforcement operations in the Balkans, and the war in Afghanistan. He describes how decades of experience, innovation, and increasingly close cooperation with its Five Eyes and NATO allies allowed Canada’s military intelligence to punch above its weight. Its tactical effectiveness and ability to overcome challenges reshaped the outlook of military commanders, and intelligence emerged from the margins to become a central feature of military and defense operations. Canadian Military Intelligence offers lessons from the past and critical implications for future intelligence support with the creation of the Canadian Forces Intelligence Command. This book will be essential to both intelligence history and military history readers and collections.Trade ReviewCharters has produced an excellent book which will remain useful for many years. * Intelligence and National Security *Table of ContentsList of Photographs Acknowledgments Introduction Part I. The Evolution of Canadian Defence and Military Intelligence, 1945–2005 1. Policies, Budgets, Resources, and Commitments: Canadian Defence in Context 2. Uncertain Foundations: Canadian Defence and Military Intelligence, 1945–1970 3. When in Debt, Reorganize: Canadian Defence Intelligence, 1975–2005 4. From Adaptation to Transformation: Canadian Military Intelligence, 1975–2005 Part II. Intelligence Support to Canadian Military Operations, 1970–2010 5. The October Crisis: Countering Terrorism in Quebec, 1970 6. Operation SALON: Internal Security Operations in the Oka Crisis, 1990 7. Operation FRICTION: Naval and Air Operations in the Gulf War, 1990–1991 8. Peacekeeping in the Balkans: The UN Years, 1992–1995 9. Peace Enforcement in Bosnia: The NATO Years, 1996–2004 10. Peace Enforcement in Kosovo: Air and Ground Operations, 1999-2000 11. Kandahar and Kabul: Stabilizing Afghanistan, 2001–2005 12. Return to Kandahar: Counterinsurgency in Afghanistan, 2005–2010 Conclusion List of Acronyms and Abbreviations Select Bibliography Index About the Author

    Out of stock

    £81.60

  • Canadian Military Intelligence: Operations and

    Georgetown University Press Canadian Military Intelligence: Operations and

    Out of stock

    Book SynopsisThe most comprehensive history of Canadian military intelligence and its influence on key military operations Canadian intelligence has become increasingly central to the operations of the Canadian Armed Forces (CAF). Canadian Military Intelligence: Operations and Evolution from the October Crisis to the War in Afghanistan is the first comprehensive history that examines the impact of tactical, operational, and strategic intelligence on the Canadian military. Drawing upon a wide range of original documents and interviews with participants in specific operations, author David A. Charters provides an inside perspective on the development of military intelligence since the Second World War. He shows how intelligence influenced key military operations, from domestic internal security to peacekeeping efforts to high-intensity air campaigns—including the October Crisis of 1970, the Oka Crisis, the Gulf War, peacekeeping and enforcement operations in the Balkans, and the war in Afghanistan. He describes how decades of experience, innovation, and increasingly close cooperation with its Five Eyes and NATO allies allowed Canada’s military intelligence to punch above its weight. Its tactical effectiveness and ability to overcome challenges reshaped the outlook of military commanders, and intelligence emerged from the margins to become a central feature of military and defense operations. Canadian Military Intelligence offers lessons from the past and critical implications for future intelligence support with the creation of the Canadian Forces Intelligence Command. This book will be essential to both intelligence history and military history readers and collections.Trade ReviewCharters has produced an excellent book which will remain useful for many years. * Intelligence and National Security *Table of ContentsList of Photographs Acknowledgments Introduction Part I. The Evolution of Canadian Defence and Military Intelligence, 1945–2005 1. Policies, Budgets, Resources, and Commitments: Canadian Defence in Context 2. Uncertain Foundations: Canadian Defence and Military Intelligence, 1945–1970 3. When in Debt, Reorganize: Canadian Defence Intelligence, 1975–2005 4. From Adaptation to Transformation: Canadian Military Intelligence, 1975–2005 Part II. Intelligence Support to Canadian Military Operations, 1970–2010 5. The October Crisis: Countering Terrorism in Quebec, 1970 6. Operation SALON: Internal Security Operations in the Oka Crisis, 1990 7. Operation FRICTION: Naval and Air Operations in the Gulf War, 1990–1991 8. Peacekeeping in the Balkans: The UN Years, 1992–1995 9. Peace Enforcement in Bosnia: The NATO Years, 1996–2004 10. Peace Enforcement in Kosovo: Air and Ground Operations, 1999-2000 11. Kandahar and Kabul: Stabilizing Afghanistan, 2001–2005 12. Return to Kandahar: Counterinsurgency in Afghanistan, 2005–2010 Conclusion List of Acronyms and Abbreviations Select Bibliography Index About the Author

    Out of stock

    £28.80

  • Crown, Cloak, and Dagger: The British Monarchy

    Georgetown University Press Crown, Cloak, and Dagger: The British Monarchy

    15 in stock

    Book SynopsisSurprising revelations about the active role of the monarch in British intelligence The British Royal Family and the intelligence community are two of the most mysterious and mythologized actors of the British State. Crown, Cloak, and Dagger offers a new history of how the two have been inextricably linked from the reign of Queen Victoria to the present. Richard J. Aldrich and Rory Cormac unveil a wealth of archival detail that changes our understanding of the role of the monarch in politics, intelligence, and international relations. Successive queens and kings have all played an active role in steering British intelligence, sometimes against the wishes of prime ministers. Even today, the monarch receives “copy No. 1” of every intelligence report. Attempted assassinations and kidnappings, the abdication crisis, world wars and the Cold War, and the death of Princess Diana are just some of the topics covered in the book. Fascinating and fast-paced, Crown, Cloak, and Dagger demonstrates that the British monarch continues to be far more than a figurehead. This book will inform as well as entertain anyone with an interest in history, espionage, and the royals.Trade ReviewFor both aficionados of the royal family and serious students of the history of intelligence, this is a remarkable and fascinating read, made possible by the author's extraordinary access to royal and official government archives only recently opened to researchers. * New York Journal of Books *Quite interestingly, convincingly, and informatively, Crown, Cloak, and Dagger puts into historical light and context the secret relationship or partnership between the royals and the British intelligence services. * The Cipher Brief *Readers will find Crown, Cloak, and Dagger a page-turner. * CHOICE connect *Table of ContentsBritish Royal Family Tree Since Victoria Introduction: 007 Part I: The Rise and Fall of Royal Intelligence1. Queen Victoria: Assassins and Revolutionaries2. Queen Victoria's Secrets: War and the Rise of Germany3. Queen Victoria's Great Game: Empire and Intrigue4. Queen Victoria's Security: Anarchists and Fenians5. Edward VII and the Modernization of Intelligence Part II: Royal Relations and Intrigues6. King George V and the First World War7. King George V and the Bolsheviks8. Abdication: Spying on Edward VIII and Wallis Simpson Part III: Royals and Spies at War9. Outbreak of the Second World War10. War in the Americas, 1941-194211. The end of the Second World War, 1943–1945 Part IV: Royal Secrets12. Queen Elizabeth II: Coronation and Cold War13. Queen Elizabeth's Empire: Intrigue in the Middle East14. The Global Queen Part V: Protecting the Realm and the Royals15. Terrorists and Lunatics, 1969–197716. Terrorists and Lunatics, 1979–198417. The Diana ConspiracyConclusion: The Secret Royals Appendix: Ruling the Past, A Note on MethodsAcknowledgmentsEndnotesBibliographyIndexAbout the Author

    15 in stock

    £24.75

  • Twilight Warriors: Covert Air Operations Against

    US Naval Institute Press Twilight Warriors: Covert Air Operations Against

    Out of stock

    Book SynopsisFrom the start of the Cold War to the fall of Saigon, from the Congo to Tibet, from the Bay of Pigs to North Vietnam and Nicaragua, here is a comprehensive overview of U.S. air-supported covert operations against the Soviet bloc. Twilight Warriors brings a sense of continuity to the shifting, shadowy battlefronts of the Cold War, spanning the postwar decades with one fascinating account after another. The known and not-so well known are woven together to provide the big picture: failed early attempts to set up spy cells behind the Iron Curtain (confounded by the agent Kim Philby), the actual CIA plane that secretly appeared in the James Bond film Thunderball, Operation Mongoose, clandestine airlines, and the gutsy breed who took to the skies as airborne spies. This is a sweeping, globe-trotting account of covert ops in the post-war era that reads like an epic secret history.

    Out of stock

    £17.99

  • Russian Information Warfare: Assault on

    Naval Institute Press Russian Information Warfare: Assault on

    Out of stock

    Book SynopsisRussian Information Warfare: Assault on Democracies in the Cyber Wild West examines how Moscow tries to trample the very principles on which democracies are founded and what we can do to stop it. In particular, the book analyzes how the Russian government uses cyber operations, disinformation, protests, assassinations, coup d'états, and perhaps even explosions to destroy democracies from within, and what the United States and other NATO countries can do to defend themselves from Russia's onslaught.The Kremlin has been using cyber operations as a tool of foreign policy against the political infrastructure of NATO member states for over a decade. Alongside these cyber operations, the Russian government has launched a diverse and devious set of activities which at first glance may appear chaotic. Russian military scholars and doctrine elegantly categorizes these activities as components of a single strategic playbook -- information warfare. This concept breaks down the binary boundaries of war and peace and views war as a continuous sliding scale of conflict, vacillating between the two extremes of peace and war but never quite reaching either. The Russian government has applied information warfare activities across NATO members to achieve various objectives. What are these objectives? What are the factors that most likely influence Russia's decision to launch certain types of cyber operations against political infrastructure and how are they integrated with the Kremlin's other information warfare activities? To what extent are these cyber operations and information warfare campaigns effective in achieving Moscow's purported goals? Dr. Bilyana Lilly addresses these questions and uses her findings to recommend improvements in the design of U.S. policy to counter Russian adversarial behavior in cyberspace by understanding under what conditions, against what election components, and for what purposes within broader information warfare campaigns Russia uses specific types of cyber operations against political infrastructure.Trade Review“This is a well-done, highly researched book. The foundations here are definitely more of an academic paper turned into a full-on book (as the author states), but once you get going it is a great read…. Having a cohesive book on this topic that strives to be somewhat impartial is a godsend…. Do yourself a favor and check [out this book] as it is quite eye-opening.”—Arcadia Pod “If you want to understand how Russia seeks to undermine Western democracies, see the techniques they use, and understand their fondness for using local allies, or puppets, Russian Information Warfare is a must read.”—Coot’s Reviews “Completed before Russia’s 2022 invasion of Ukraine, Dr. Lilly has researched and written an authoritative book of extraordinary breadth, containing careful analysis, abundant details, new insights, and extensive documentation. It should be read for its conceptual frameworks, the seven case studies, and the concluding policy recommendations.” —Michael Rich, president and CEO, RAND Corporation “For years, people have puzzled the relationship between cyber operations and information operations. This pathbreaking and carefully researched work examines how Russia has combined them against the West, showing how tightly they are intertwined. Its insights will prove invaluable in understanding Russia’s information strategy in Ukraine and beyond.” —Martin C. Libicki, author of Cyberspace in Peace and War, Second Edition “If you think Russia is limited to fake Facebook accounts, Lilly’s Russian Information Warfare will change your perspective. This well-researched book lays out Russia’s approach to a critical part of modern conflict – the information space. Anyone interested in cybersecurity, disinformation, or Russia’s foreign policy would benefit from reading this book.” —J. Michael Daniel, president and CEO of Cyber Threat Alliance “Russian Information Warfare” is a complex and multilayered book that both demands and rewards close reading as the case studies are brimming with detail and nuance. — Diplomatic Courier

    Out of stock

    £26.21

  • Revealing Secrets: An unofficial history of

    NewSouth Publishing Revealing Secrets: An unofficial history of

    1 in stock

    Book SynopsisThis unofficial account of Australian Signals intelligence reveals the organisation's efforts to reveal the secrets of others.What is Australian signals intelligence? Why do we have a national signals intelligence agency and why are our three armed services involved? What do they all do and why is it controversial? And how significant are our ties with the United States, the United Kingdom, Canada and New Zealand, the formidable Five Eyes partnership?For a long time, much of the Australian Signals intelligence (or Sigint) story has been kept secret. Revealing Secrets unearths the fascinating story of the organisation that collects intelligence about foreign adversaries, and keeps our own national secrets safe, not forgetting the vital signals intelligence contribution of our three armed services. This book provides historical context, including how techniques used today for breaking codes draw on methods devised centuries earlier. It explains clearly what Sigint is, how it works and its connection with cyber. Security experts John Blaxland and Clare Birgin shine a light on the Australians whose efforts were for so long unknown and why they were so important to the country. They discuss the essential, and largely unheralded, contribution of women from before the Second World War to today. By lifting the veil on this hidden, frequently misunderstood, but absolutely integral part of Australian statecraft, Revealing Secrets deepens our understanding of the past, the present and what may lie ahead.Trade ReviewRevealing Secrets tell the remarkable but little-known story of how a small, back-room military office grew into a major Australian government agency. Deeply researched, authoritative and accessible, it is a valuable and timely contribution to understanding issues that have never been more important to national security."" - Emeritus Professor David Horner, author of The Spy Catchers""A meticulous compilation of the largely unsung past achievements of our most consistently productive intelligence source. And a thoughtful analysis of how to approach the extraordinary challenges posed by the new cyber universe. Blaxland and Birgin make an important contribution to our understanding of issues needing much more open debate than our own and allied governments have traditionally allowed or encouraged."" - Gareth Evans, Former Australian Foreign Minister

    1 in stock

    £24.76

  • Australia's First Spies: The remarkable story of

    Allen & Unwin Australia's First Spies: The remarkable story of

    5 in stock

    Book SynopsisAustralia was born with its eyes wide open. Although politicians spoke publicly of loyalty to Britain and the empire, in secret they immediately set about protecting Australia's interests from the Germans, the Japanese - and from Britain itself.As an experienced intelligence officer, John Fahey knows how the security services disguise their activities within government files. He has combed the archives to compile the first account of Australia's intelligence operations in the years from Federation to World War II. He tells the stories of dedicated patriots who undertook dangerous operations to protect their new nation, despite a lack of training and support. He shows how the early adoption of advanced radio technology by Australia contributed to the war effort in Europe. He also exposes the bureaucratic mismanagement in World War II that cost many lives, and the leaks that compromised Australia's standing with its wartime allies so badly that Australia was nearly expelled from the Anglo-Saxon intelligence network.Australia's First Spies shows Australia always has been a far savvier operator in international affairs than much of the historical record suggests, and it offers a glimpse into the secret history of the nation.Trade ReviewFills a major gap in the history of Australian intelligence organisations. -- Professor David Horner, author of THE SPY CATCHERS: THE OFFICIAL HISTORY OF ASIO 1949-1963Great intelligence is often shared by great story telling, and John Fahey shares a great story in Australia's First Spies. -- Rear Admiral Paul Becker, USN (Retired), Former Director for Intelligence of the U.S. Pacific Command and Joint Chiefs of StaffTable of ContentsPreface, Introduction1 Wilson Le Couteur's Pacific Mission, 1901 2 Atlee Hunt: Public Servant, Spy Master, 1901-23 3 Enlightened Princes and Wise Generals: Military Intelligence in Early Australia 4 A Prescient Letter: Suspecting Japanese Spies 5 Join the Navy and Spy on the World 6 Australian Success, 1914 7 The Wanetta Organisation, 1901-20 8 National Intelligence, 1901-20 9 The First Coastwatcher 10 Australian Signals Intelligence, 1914-29 11 Hand to Mouth: Australian Signals Intelligence in the 1930s 12 Harry Freame's Japanese Mission, 1941 13 The Coastwatchers Go to War, 1939-42 14 The Lions in the Den: Japanese Counterintelligence 15 Herding Cats: The Allied Intelligence Bureau 16 Australia's First National Signals Intelligence Effort 17 Battle in Asia and the Pacific, 1941-42 18 Establishing Central Bureau, 1942 19 Stepping on Toes: Australia's Attack on Japan's Diplomatic Codes 20 Allied Secret Intelligence Compromised, 1944 21 Saving Australian SIGINT, 1945-47 22 Coastwatching behind Enemy Lines 23 The Solomons and Pacific Area, 1943 24 Human Intelligence in the Attack, 1943-45 25 The Kempeitai's Game, 1942-45Notes, bibliographyIndex

    5 in stock

    £15.29

  • The Nature of Honour: Son, Duty-bound Soldier,

    Penguin Random House Australia The Nature of Honour: Son, Duty-bound Soldier,

    5 in stock

    Book Synopsis

    5 in stock

    £14.44

  • University of Calgary Press Stress Tested: The COVID-19 Pandemic and Canadian National Security

    15 in stock

    Book SynopsisThe emergence of COVID-19 has raised urgent and important questions about the role of Canadian intelligence and national security within a global health crisis. Some argue that the effects of COVID-19 on Canada represent an intelligence failure, or a failure of early warning. Others argue that the role of intelligence and national security in matters of health is—and should—remain limited. At the same time, traditional security threats have rapidly evolved, themselves impacted and influenced by the global pandemic.Stress Tested brings together leading experts to examine the role of Canada's national security and intelligence community in anticipating, responding to, and managing a global public welfare emergency. This interdisciplinary collection offers a clear-eyed view of successes, failures, and lessons learned in Canada's pandemic response.Addressing topics including supply chain disruptions, infrastructure security, the ethics of surveillance within the context of pandemic response, the threats and potential threats of digital misinformation and fringe beliefs, and the challenges of maintaining security and intelligence operations during an ongoing pandemic, Stress Tested is essential reading for anyone interested in the lasting impacts of the COVID-19 pandemic.Table of Contents IntroductionAmarnath Amarasingam, Thomas Juneau and Leah West Part 1: Threats They Got it All Under Control: Fringe Conspiracy Theories and Threats to Canadian National SecurityMarc-Andre Argentino and Amarnath Amarasingam Exploiting Chaos: How Malicious Non-State Actors Leverage COVID-19 to their Advantage in CyberspaceCasey Babb and Alex Wilner Supply Chains During the COVID-19 PandemicStephanie Carvin, Edie Brenning, Djomeni Raphael Desire, Walid Elgazzar, Habab Elkhalifa, Annie Huang, Ilia Nizenko, Richard Oum, Rafael Pozuelo-Perron, Raman Singh, Randall Whiteside, Erin van Weerdhuizen, Randall Whiteside, Anisha Yogalingam Getting the Politics of Protecting Critical Infrastructure Right <Bessma Momani and Jean-François Bélanger Part II: The Responses A Health Intelligence Priority for Canada? Costs, Benefits, and ConsiderationsJessica Davis and Alexander Corbeil National Security and Intelligence Operations During the COVID-19 PandemicStephanie Carvin Collection and Protection in the Time of Infection: The Communications Security Establishment During the COVID-19 PandemicBill Robinson Corona as Constraint on the CAF?: As Always, the Mission Matters Stephen M. Saideman, Stéfanie von Hlatky, and Graeme Hopkins Defence Intelligence and COVID-19Jim Cox Reviving the Role of GPHIN in Global Epidemic Intelligence Kelley Lee and Julianne Piper Privacy vs. Health: Surveillance to Stop the Spread? Leah West Enforcing Canadian Security Laws through Criminal Prosecution During a Pandemic?: Lessons from Canada's COVID-19 Experience Michael Nesbitt and Tara Hansen National Security Lessons Regarding the Disproportionate Impact of COVID-19 on Migrant and Refugee Communities in the U.S. and Canada: A Bilateral ApproachAdham Shaloul and Diana Rayes Untangling deportation law from national security: the pandemic invites a softer touchSimon Wallace Conclusion Thomas Juneau

    15 in stock

    £26.96

  • A Ride to Khiva: An Adventure in Central Asia

    Eland Publishing Ltd A Ride to Khiva: An Adventure in Central Asia

    15 in stock

    Book SynopsisIn the winter of 1875, a young British officer set out across central Asia on an unofficial mission to investigate the latest Russian moves in the Great Game. His goal was the mysterious Central Asian city of Khiva, closed to all European travellers by the Russians following their seizure of it two years earlier. His aim was to discover whether this remote and dangerous oasis could be used as a springboard for an invasion of India. An immediate bestseller when first published in 1877, Burnaby s delight in a life of risk and adventure still burns through the pages, as does his spontaneous affection for the Cossack troopers and Tartar, Khirgiz and Turkoman tribesmen that he encounters on his way.

    15 in stock

    £11.69

  • SS-Major Horst Kopkow: From the Gestapo to

    Fonthill Media Ltd SS-Major Horst Kopkow: From the Gestapo to

    5 in stock

    Book SynopsisOn 27 May 1942, SS General Reinhard Heydrich was assassinated by British-trained Czech agents who had parachuted into Czechoslovakia. He died of his wounds on 4 June 1942. Two days later, Gestapo Captain Horst Kopkow's department at Reich National Security HQ was given fresh directions. From 6 June 1942 until the end of the war, Kopkow was responsible for coordinating the fight against Soviet and British parachute agents dropped anywhere in Germany or German-occupied territories. This new direction for Kopkow made his name. Within months the "Rote Kapelle" Soviet espionage ring was uncovered in Belgium, who could be traced directly to Berlin and Paris. A new counter-espionage fight had begun, and any agents caught would pay with their lives. In France and Holland the Gestapo caught many Special Operations Executive agents trained in Britain. By spring 1944 almost 150 British agents had been caught and deported to German concentration camps, and almost all had been murdered without trial by the December. Kopkow was directly involved in these murders. Arrested by British forces after the war, Kopkow was extensively interrogated due to his counter-espionage experience. For the next 20 years, Kopkow was a consultant for Britain's Secret Intelligence Service.

    5 in stock

    £21.25

  • Radio War: The Secret Espionage War of the Radio

    Fonthill Media Ltd Radio War: The Secret Espionage War of the Radio

    Out of stock

    Book SynopsisDuring the Second World War German intelligence had deployed wireless teams throughout occupied Europe. Agents had even been deployed to mainland Britain to spy on British military activity. Monitoring and reporting of their wireless transmissions fell to a small, secretive and largely unknown unit manned almost exclusively by volunteers. The Voluntary Interceptors (VI) as they became known would spend hours every day at home monitoring the short wavelengths for often faint and difficult to copy signals transmitted by these German secret intelligence services. This unit was to become known as the Radio Security Service (RSS) and was at the core of the signals intelligence production effort at Bletchley and the insights into German military tactical and strategic planning. Without interceptors like the RSS, Bletchley would not have existed. Their story has never truly been written and RADIO WAR focuses on the secret world of wireless espionage and includes first-hand accounts from the surviving veterans of the unit. Its existence was only made public 35 years after WWII ended, shortly after Bletchley Park’s secrets were exposed. Patrick Reilly, the Assistant to Head of MI6 Stewart Menzies, was to say of the RSS.… `a team of brilliance unparalleled anywhere in the intelligence machine.’Table of ContentsForeword; Acknowledgements; List of Abbreviations; Introduction; 1 Scrubs; 2 Committee; 3 Volunteers; 4 Stations; 5 Adversary; 6 Overseas; 7 Pedigree; Appendix I: VI Poems; Appendix II: Notes on the Detection of Illicit Wireless 1940; Appendix III: RSS Timeline; Appendix IV: RSS Roll Call; Bibliography; Index.

    Out of stock

    £25.00

  • Super Snoopers: The Evolution and Service Career

    Fonthill Media Ltd Super Snoopers: The Evolution and Service Career

    15 in stock

    Book SynopsisThe US Air Force has performed peripheral reconnaissance adjacent to the traditional foe of Russia, China, North Korea and others for seven decades. Evolving from rudimentary aircraft to an unprecedented level of sophistication, the current, elderly airframes boast unmatched performance. The book details the aircraft, equipment, sensors, air bases involved, and limited operational details-as much remains highly classified. Additionally, stories by the personnel involved, who have flown these mission, and often faced their quarry at very close range. The majority of aircraft involved are the Boeing C-135 series, including more than 100 different airframes, of 48 different versions. Missions include strategic intelligence, airborne command and control, treaty compliance, Open Skies, weather reconnaissance, aerial refuelling, and transportation. Details the different aircraft missions, bewildering programme names, operating locations, and flying units involved. Background support organisations are presented. A potted history of every aircraft involved is included, together with units operated, and designations applied. Sixty years of operations, which continue to this day, are mostly shrouded in secrecy. A cat and mouse adventure, throughout the Cold War, into the new peace dividend, and now in the face of renewed Russian aggression. The veil of secrecy is lifted, ever so slightly!Table of ContentsIntroduction; Chapter One :The 55th Wing and Offutt AFB; Chapter Two: Current Strategic Reconnaissance Wings and the Aircraft; Chapter Three: Airborne Command Posts; Chapter Four: Other Current Aircraft Types: Chapter Five: Past Aircraft Types; Chapter Six: Support and Facilities - East and West; Chapter Seven: Operations; Chapter Eight: Offutt at War; Chapter Nine: Spooky Tales; Chapter Ten: Individual Aircraft; Histories; Appendices - Units.

    15 in stock

    £34.00

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account