ORPP logo
Image from Google Jackets

Why Spy? : On the Art of Intelligence.

By: Contributor(s): Material type: TextTextPublisher: Oxford : C. Hurst and Company (Publishers) Limited, 2015Copyright date: ©2015Edition: 1st edDescription: 1 online resource (238 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781849046114
Subject(s): Genre/Form: Additional physical formats: Print version:: Why Spy?DDC classification:
  • 327.12
LOC classification:
  • JF1525.I6 -- .S749 2015eb
Online resources:
Contents:
Cover -- Half-title -- Title -- Dedication -- Copyright -- Contents -- Acknowledgements -- Biographies of the Authors -- Writing Why Spy? -- Foreword -- Preface -- Introduction -- Definitions of Terms -- Structure of the Book -- Part One: Three Asian Cases -- 1. The Malayan Emergency: An Intelligence Success Story -- The Emergency -- Determinants of Success -- The Pre-Emergency Failure of Intelligence -- Appendix A: Summary of the Commissioner General's Conference, 26 June 1947 -- Appendix B: The MSS Political Intelligence Journal -- 2. Vietnam: A Can of Worms -- Historical Background and Overview of the War -- The US' Decades of Intervention -- The Tet Offensive -- Personal Reflections -- The Intelligence Performance -- The Malayan Red Herring -- 3. Chinese Affairs -- Conclusion -- Part Two: The Machinery and Methodology of Intelligence -- 4. The Organisation and Machinery of Intelligence -- Coordination of an Intelligence Community -- The US experience -- The British solution: The Joint Intelligence Committee -- The Customers -- Collectors and Assessors -- Intelligence Requirements -- Training and Education -- Conclusion -- 5. Types of Intelligence Collection Methods -- Human Intelligence (Humint) -- Agents -- Walk-ins and defectors -- Exile intelligence (Exint) -- Hunch intelligence (Hunchint) -- Trash intelligence (Trashint) -- Cab intelligence (Cabint) -- Rumour intelligence (Rumint) -- Technical Intelligence (Techint) -- The Complementary Nature of Techint and Humint -- Signals intelligence (Sigint) -- Imagery intelligence (Imint) -- Audio intelligence (Audint) -- Documentary intelligence (Docint) -- Open Source Intelligence -- Conclusion -- 6. Assessment: Problems and Common Fallacies -- Mirror Imaging -- Groupthink -- The Numbers Fallacy -- Wishful Thinking -- The Grass is Greener -- Conclusion -- 7. Moral Dilemmas.
Torture and Interrogation -- Historical examples -- America's views -- Northern Ireland and Strasbourg -- Polygraphs and Lie Detectors -- Oversight, Freedom of Information and Security -- Blackmail, Drugs and Sex -- Conclusion -- Part Three: Famous Cases of Intelligence in Practice -- 8. Pearl Harbor -- The Events of 1941: Prelude to War -- The Attack -- The Nature of the Intelligence Failure -- Japanese intelligence -- Conclusion -- 9. Cuba: The Bay of Pigs and the Missile Crisis -- The Bay of Pigs Disaster -- The performance of intelligence and its customers -- The Cuban Missile Crisis -- The performance of intelligence -- Conclusion -- 10. Iraq: The Intelligence Imbroglio and the Butler Review -- The Butler Review -- Conclusion -- Part Four: Non-Information Gathering Intelligence Operations -- 11. Special Operations -- Examples and Types of Special Operations -- China and Special Operations -- Conclusion -- 12. Deception Operations -- Eighteenth-Century Deception -- The First World War -- Soviet Deception -- Operation Fortitude -- The Double Cross Operation -- Conclusion -- 13. Assassination -- Conclusion -- Notes -- Valedictory -- Glossary and Abbreviations -- Select Bibliography -- Index.
Summary: Spying continues to fascinate us, as evidenced in the popularity of shows such as Homeland or the interest in Wikilieaks documents, and this book argues the case for traditional espionage.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Half-title -- Title -- Dedication -- Copyright -- Contents -- Acknowledgements -- Biographies of the Authors -- Writing Why Spy? -- Foreword -- Preface -- Introduction -- Definitions of Terms -- Structure of the Book -- Part One: Three Asian Cases -- 1. The Malayan Emergency: An Intelligence Success Story -- The Emergency -- Determinants of Success -- The Pre-Emergency Failure of Intelligence -- Appendix A: Summary of the Commissioner General's Conference, 26 June 1947 -- Appendix B: The MSS Political Intelligence Journal -- 2. Vietnam: A Can of Worms -- Historical Background and Overview of the War -- The US' Decades of Intervention -- The Tet Offensive -- Personal Reflections -- The Intelligence Performance -- The Malayan Red Herring -- 3. Chinese Affairs -- Conclusion -- Part Two: The Machinery and Methodology of Intelligence -- 4. The Organisation and Machinery of Intelligence -- Coordination of an Intelligence Community -- The US experience -- The British solution: The Joint Intelligence Committee -- The Customers -- Collectors and Assessors -- Intelligence Requirements -- Training and Education -- Conclusion -- 5. Types of Intelligence Collection Methods -- Human Intelligence (Humint) -- Agents -- Walk-ins and defectors -- Exile intelligence (Exint) -- Hunch intelligence (Hunchint) -- Trash intelligence (Trashint) -- Cab intelligence (Cabint) -- Rumour intelligence (Rumint) -- Technical Intelligence (Techint) -- The Complementary Nature of Techint and Humint -- Signals intelligence (Sigint) -- Imagery intelligence (Imint) -- Audio intelligence (Audint) -- Documentary intelligence (Docint) -- Open Source Intelligence -- Conclusion -- 6. Assessment: Problems and Common Fallacies -- Mirror Imaging -- Groupthink -- The Numbers Fallacy -- Wishful Thinking -- The Grass is Greener -- Conclusion -- 7. Moral Dilemmas.

Torture and Interrogation -- Historical examples -- America's views -- Northern Ireland and Strasbourg -- Polygraphs and Lie Detectors -- Oversight, Freedom of Information and Security -- Blackmail, Drugs and Sex -- Conclusion -- Part Three: Famous Cases of Intelligence in Practice -- 8. Pearl Harbor -- The Events of 1941: Prelude to War -- The Attack -- The Nature of the Intelligence Failure -- Japanese intelligence -- Conclusion -- 9. Cuba: The Bay of Pigs and the Missile Crisis -- The Bay of Pigs Disaster -- The performance of intelligence and its customers -- The Cuban Missile Crisis -- The performance of intelligence -- Conclusion -- 10. Iraq: The Intelligence Imbroglio and the Butler Review -- The Butler Review -- Conclusion -- Part Four: Non-Information Gathering Intelligence Operations -- 11. Special Operations -- Examples and Types of Special Operations -- China and Special Operations -- Conclusion -- 12. Deception Operations -- Eighteenth-Century Deception -- The First World War -- Soviet Deception -- Operation Fortitude -- The Double Cross Operation -- Conclusion -- 13. Assassination -- Conclusion -- Notes -- Valedictory -- Glossary and Abbreviations -- Select Bibliography -- Index.

Spying continues to fascinate us, as evidenced in the popularity of shows such as Homeland or the interest in Wikilieaks documents, and this book argues the case for traditional espionage.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.