By John Hughes-Wilson Colonel
A ground-breaking heritage of intelligence―from its classical origins to the onset of the surveillance country within the electronic age―that lifts the veil of secrecy from this clandestine world.
complete and authoritative, The mystery State skillfully examines the aptitude pitfalls of the conventional intelligence cycle; the damaging uncertainties of spies and human intelligence; how the chilly warfare turned an digital intelligence warfare; the technical revolution that all started with using reconnaissance images in international struggle I and through the Cuban Missile quandary; the legacy of Stalin's planned ignoring of important intelligence; how signs intelligence gave the USA one in all its maximum victories; how Wikileaks relatively occurred; and even if Sept. 11 might have been shunned if America's post-Cold battle intelligence organisations had tailored to the hot international of foreign terrorism.
Authoritative and analytical, Hughes-Wilson searches for tough solutions and scrutinizes why an important intelligence is so frequently missed, misunderstood, or spun by means of politicians and pro generals alike.
From yesterday's spies to tomorrow's cyber international, The mystery State is an engaging and thought-provoking historical past of this ever-changing and ever-important subject.
sixteen pages of B&W illustrations
Read Online or Download The Secret State: A History of Intelligence and Espionage PDF
Best intelligence & espionage books
Provides a risk-management method could support senior Air strength leaders to (1) concentration making plans at the so much salient threats, (2) achieve better readability at the hazards linked to substitute classes of motion throughout a number of futures, (3) continue a feeling of the chronic uncertainties linked to any coverage selection, and (4) successfully speak their judgments approximately probability to key audiences.
Netwar―like cyberwar―describes a brand new spectrum of clash that's rising within the wake of the data revolution. What special netwar is the networked organizational constitution of its practitioners and their quickness in coming jointly in swarming assaults. To confront this new kind of clash, it's important for governments, army, and legislation enforcement to start networking themselves.
Why might a journalist who used to be an ardent socialist and an anti-Nazi in the course of the waning years of the Weimar Republic choose to visit paintings for the Gestapo overseas? Hans Wesemann, a veteran of worldwide battle I and a profitable journalist, fled his local Germany in 1933 after writing a few anti-Nazi articles.
From his cage in a putrid, overcrowded Indian gaol, Paul Jordan displays on a lifestyles lived at the side and curses the miscalculation that robbed him of his freedom. His youth, marred by way of the lack of his father and brother, makes him hell bent on being the easiest of the simplest – an ambition he achieves by way of being chosen to affix the elite SAS.
- Devil's Game: The Civil War Intrigues of Charles A. Dunham
- Counterinsurgency in a Test Tube: Analyzing the Success of the Regional Assistance Mission to Solomon Islands (RAMSI)
- Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation (Scarecrow Professional Intelligence Education)
- Intelligence and Espionage in the Reign of Charles II, 1660-1685
- Special Forces Hand to Hand Fighting Martial Arts Self Defense
- Assessing Irregular Warfare: A Framework for Intelligence Analysis
Additional resources for The Secret State: A History of Intelligence and Espionage
By 1586 Stafford’s value as an ‘unconscious’ double agent was further reinforced when he became aware of the Spanish plans for an impending invasion of England a good two years before the Armada sailed. Walsingham was informed immediately. Walsingham’s intelligence network was well placed to frustrate Spanish intentions. Using his agents in northern Italy he got the Spanish government’s invoices and bills for loans ‘contested’ when they were presented for payment to the banks at Genoa (who were lending the capital to bankroll the Spanish project to invade England).
Again and again he fed false information to the British camp. He deliberately allowed over-inflated troop lists to fall into the hands of known British spies to mislead the enemy about the strength of the rebel forces and personally prepared fake correspondence in his own handwriting to add to the deception. It worked: the British didn’t realise just how weak their opponents really were. Washington also used disinformation as an offensive weapon. His planting of false ‘intelligence’ to protect the French landings at Newport in 1780 is a classic example of using disinformation to force the enemy into doing the wrong thing.
The Islamic agents of the Caliphate were as anxious to discover the secrets of Byzantium’s terror weapon as the defenders of Christendom’s Eastern Empire were to keep its secrets. For several hundred years, its formula was a Moorish intelligence priority. Astonishingly, and despite the systematic torture of thousands of captives over the years, and the lure of treachery and gold, the Byzantines appear to have kept their jealously guarded secret safe until about 1100. The other major intelligence collectors of the Middle East at the time were the fanatical followers of Hassan-i Sabbah, known as the ‘Assassins’.