Description |
1 online resource |
Series |
Intelligence and security |
|
Intelligence and security.
|
Contents |
Cover; Half-title; Title; Dedication; Copyright; Contents; Acknowledgements; Biographies of the Authors; Writing Why Spy?; Foreword; Preface; Introduction; Definitions of Terms; Structure of the Book; Part One: Three Asian Cases; 1. The Malayan Emergency: An Intelligence Success Story; The Emergency; Determinants of Success; The Pre-Emergency Failure of Intelligence; Appendix A: Summary of the Commissioner General's Conference, 26 June 1947; Appendix B: The MSS Political Intelligence Journal; 2. Vietnam: A Can of Worms; Historical Background and Overview of the War |
|
10. Iraq: The Intelligence Imbroglio and the Butler ReviewThe Butler Review; Conclusion; Part Four: Non-Information Gathering Intelligence Operations; 11. Special Operations; Examples and Types of Special Operations; China and Special Operations; Conclusion; 12. Deception Operations; Eighteenth-Century Deception; The First World War; Soviet Deception; Operation Fortitude; The Double Cross Operation; Conclusion; 13. Assassination; Conclusion; Notes; Valedictory; Glossary and Abbreviations; Select Bibliography; Index |
|
Exile intelligence (Exint)Hunch intelligence (Hunchint); Trash intelligence (Trashint); Cab intelligence (Cabint); Rumour intelligence (Rumint); Technical Intelligence (Techint); The Complementary Nature of Techint and Humint; Signals intelligence (Sigint); Imagery intelligence (Imint); Audio intelligence (Audint); Documentary intelligence (Docint); Open Source Intelligence; Conclusion; 6. Assessment: Problems and Common Fallacies; Mirror Imaging; Groupthink; The Numbers Fallacy; Wishful Thinking; The Grass is Greener; Conclusion; 7. Moral Dilemmas; Torture and Interrogation |
|
Historical examplesAmerica's views; Northern Ireland and Strasbourg; Polygraphs and Lie Detectors; Oversight, Freedom of Information and Security; Blackmail, Drugs and Sex; Conclusion; Part Three: Famous Cases of Intelligence in Practice; 8. Pearl Harbor; The Events of 1941: Prelude to War; The Attack; The Nature of the Intelligence Failure; Japanese intelligence; Conclusion; 9. Cuba: The Bay of Pigs and the Missile Crisis; The Bay of Pigs Disaster; The performance of intelligence and its customers; The Cuban Missile Crisis; The performance of intelligence; Conclusion |
|
The US' Decades of InterventionThe Tet Offensive; Personal Reflections; The Intelligence Performance; The Malayan Red Herring; 3. Chinese Affairs; Conclusion; Part Two: The Machinery and Methodology of Intelligence; 4. The Organisation and Machinery of Intelligence; Coordination of an Intelligence Community; The US experience; The British solution: The Joint Intelligence Committee; The Customers; Collectors and Assessors; Intelligence Requirements; Training and Education; Conclusion; 5. Types of Intelligence Collection Methods; Human Intelligence (Humint); Agents; Walk-ins and defectors |
Bibliography |
Includes bibliographical references and index |
Notes |
Vendor-supplied metadata |
Subject |
Espionage.
|
|
Intelligence service.
|
Form |
Electronic book
|
Author |
Newbery, Samantha, author
|
ISBN |
1849046115 (electronic bk.) |
|
9781849046114 (electronic bk.) |
|