By John Hughes-Wilson Colonel

A ground-breaking heritage of intelligence―from its classical origins to the onset of the surveillance country within the electronic age―that lifts the veil of secrecy from this clandestine world.

complete and authoritative, The mystery State skillfully examines the aptitude pitfalls of the conventional intelligence cycle; the damaging uncertainties of spies and human intelligence; how the chilly warfare turned an digital intelligence warfare; the technical revolution that all started with using reconnaissance images in international struggle I and through the Cuban Missile quandary; the legacy of Stalin's planned ignoring of important intelligence; how signs intelligence gave the USA one in all its maximum victories; how Wikileaks relatively occurred; and even if Sept. 11 might have been shunned if America's post-Cold battle intelligence organisations had tailored to the hot international of foreign terrorism.

Authoritative and analytical, Hughes-Wilson searches for tough solutions and scrutinizes why an important intelligence is so frequently missed, misunderstood, or spun by means of politicians and pro generals alike.

From yesterday's spies to tomorrow's cyber international, The mystery State is an engaging and thought-provoking historical past of this ever-changing and ever-important subject.
sixteen pages of B&W illustrations

Show description

Read Online or Download The Secret State: A History of Intelligence and Espionage PDF

Best intelligence & espionage books

Managing Risk in USAF Planning

Provides a risk-management method could support senior Air strength leaders to (1) concentration making plans at the so much salient threats, (2) achieve better readability at the hazards linked to substitute classes of motion throughout a number of futures, (3) continue a feeling of the chronic uncertainties linked to any coverage selection, and (4) successfully speak their judgments approximately probability to key audiences.

Networks and Netwars : The Future of Terror, Crime, and Militancy

Netwar―like cyberwar―describes a brand new spectrum of clash that's rising within the wake of the data revolution. What special netwar is the networked organizational constitution of its practitioners and their quickness in coming jointly in swarming assaults. To confront this new kind of clash, it's important for governments, army, and legislation enforcement to start networking themselves.

Nazi Refugee Turned Gestapo Spy: The Life of Hans Wesemann, 1895-1971

Why might a journalist who used to be an ardent socialist and an anti-Nazi in the course of the waning years of the Weimar Republic choose to visit paintings for the Gestapo overseas? Hans Wesemann, a veteran of worldwide battle I and a profitable journalist, fled his local Germany in 1933 after writing a few anti-Nazi articles.

The Easy Day Was Yesterday: The Extreme Life of An SAS Soldier

From his cage in a putrid, overcrowded Indian gaol, Paul Jordan displays on a lifestyles lived at the side and curses the miscalculation that robbed him of his freedom. His youth, marred by way of the lack of his father and brother, makes him hell bent on being the easiest of the simplest – an ambition he achieves by way of being chosen to affix the elite SAS.

Additional resources for The Secret State: A History of Intelligence and Espionage

Example text

By 1586 Stafford’s value as an ‘unconscious’ double agent was further reinforced when he became aware of the Spanish plans for an impending invasion of England a good two years before the Armada sailed. Walsingham was informed immediately. Walsingham’s intelligence network was well placed to frustrate Spanish intentions. Using his agents in northern Italy he got the Spanish government’s invoices and bills for loans ‘contested’ when they were presented for payment to the banks at Genoa (who were lending the capital to bankroll the Spanish project to invade England).

Again and again he fed false information to the British camp. He deliberately allowed over-inflated troop lists to fall into the hands of known British spies to mislead the enemy about the strength of the rebel forces and personally prepared fake correspondence in his own handwriting to add to the deception. It worked: the British didn’t realise just how weak their opponents really were. Washington also used disinformation as an offensive weapon. His planting of false ‘intelligence’ to protect the French landings at Newport in 1780 is a classic example of using disinformation to force the enemy into doing the wrong thing.

The Islamic agents of the Caliphate were as anxious to discover the secrets of Byzantium’s terror weapon as the defenders of Christendom’s Eastern Empire were to keep its secrets. For several hundred years, its formula was a Moorish intelligence priority. Astonishingly, and despite the systematic torture of thousands of captives over the years, and the lure of treachery and gold, the Byzantines appear to have kept their jealously guarded secret safe until about 1100. The other major intelligence collectors of the Middle East at the time were the fanatical followers of Hassan-i Sabbah, known as the ‘Assassins’.

Download PDF sample

Rated 4.47 of 5 – based on 14 votes