My Account Log in

1 option

Why spy? : the art of intelligence / Brian Stewart, Samantha Newbery.

Ebook Central Academic Complete Available online

View online
Format:
Book
Author/Creator:
Stewart, Brian, author.
Newbery, Samantha, author.
Series:
Intelligence and security.
Intelligence and Security
Language:
English
Subjects (All):
Intelligence service--Management.
Intelligence service.
Physical Description:
1 online resource (238 p.)
Place of Publication:
London, England : Hurst & Company, 2015.
Language Note:
English
Summary:
Why Spy? is the result of Brian Stewart's seventy years of working in, and studying the uses and abuses of, intelligence in the real world. Few books currently available to those involved either as professionals or students in this area have been written by someone like the present author, who has practical experience both of field work and of the intelligence bureaucracy at home and abroad. It relates successes and failures via case studies, and draws conclusions that should be pondered by all those concerned with the limitations and usefulness of the intelligence product, as well as with how to avoid the tendency to abuse or ignore it when its conclusions do not fit with preconceived ideas. It reminds the reader of the multiplicity of methods and organisations and the wide range of talents making up the intelligence world. The co-author, scholar Samantha Newbery, examines such current issues as the growth of intelligence studies in universities, and the general emphasis throughout the volume is on the necessity of embracing a range of sources, including police, political, military and overt, to ensure that secret intelligence is placed in as wide a context as possible when decisions are made.
With practical experience both of field work and of the intelligence bureaucracy at home and abroad, Stewart examines successes and failures via case studies, considers the limitations and usefulness of the intelligence product, and warns against the tendency to abuse or ignore it when its conclusions do not fit with preconceived ideas.
Contents:
Cover; Half-title; Title; Dedication; Copyright; Contents; Acknowledgements; Biographies of the Authors; Writing Why Spy?; Foreword; Preface; Introduction; Definitions of Terms; Structure of the Book; Part One: Three Asian Cases; 1. The Malayan Emergency: An Intelligence Success Story; The Emergency; Determinants of Success; The Pre-Emergency Failure of Intelligence; Appendix A: Summary of the Commissioner General's Conference, 26 June 1947; Appendix B: The MSS Political Intelligence Journal; 2. Vietnam: A Can of Worms; Historical Background and Overview of the War
The US' Decades of InterventionThe Tet Offensive; Personal Reflections; The Intelligence Performance; The Malayan Red Herring; 3. Chinese Affairs; Conclusion; Part Two: The Machinery and Methodology of Intelligence; 4. The Organisation and Machinery of Intelligence; Coordination of an Intelligence Community; The US experience; The British solution: The Joint Intelligence Committee; The Customers; Collectors and Assessors; Intelligence Requirements; Training and Education; Conclusion; 5. Types of Intelligence Collection Methods; Human Intelligence (Humint); Agents; Walk-ins and defectors
Exile intelligence (Exint)Hunch intelligence (Hunchint); Trash intelligence (Trashint); Cab intelligence (Cabint); Rumour intelligence (Rumint); Technical Intelligence (Techint); The Complementary Nature of Techint and Humint; Signals intelligence (Sigint); Imagery intelligence (Imint); Audio intelligence (Audint); Documentary intelligence (Docint); Open Source Intelligence; Conclusion; 6. Assessment: Problems and Common Fallacies; Mirror Imaging; Groupthink; The Numbers Fallacy; Wishful Thinking; The Grass is Greener; Conclusion; 7. Moral Dilemmas; Torture and Interrogation
Historical examplesAmerica's views; Northern Ireland and Strasbourg; Polygraphs and Lie Detectors; Oversight, Freedom of Information and Security; Blackmail, Drugs and Sex; Conclusion; Part Three: Famous Cases of Intelligence in Practice; 8. Pearl Harbor; The Events of 1941: Prelude to War; The Attack; The Nature of the Intelligence Failure; Japanese intelligence; Conclusion; 9. Cuba: The Bay of Pigs and the Missile Crisis; The Bay of Pigs Disaster; The performance of intelligence and its customers; The Cuban Missile Crisis; The performance of intelligence; Conclusion
10. Iraq: The Intelligence Imbroglio and the Butler ReviewThe Butler Review; Conclusion; Part Four: Non-Information Gathering Intelligence Operations; 11. Special Operations; Examples and Types of Special Operations; China and Special Operations; Conclusion; 12. Deception Operations; Eighteenth-Century Deception; The First World War; Soviet Deception; Operation Fortitude; The Double Cross Operation; Conclusion; 13. Assassination; Conclusion; Notes; Valedictory; Glossary and Abbreviations; Select Bibliography; Index
Notes:
Description based upon print version of record.
Description based on online resource; title from PDF title page (ebrary, viewed June 16, 2016).
ISBN:
1-84904-611-5
OCLC:
938003019

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account