Why Spy? : On the Art of Intelligence.
- 1st ed.
- 1 online resource (238 pages)
Cover -- Half-title -- Title -- Dedication -- Copyright -- Contents -- Acknowledgements -- Biographies of the Authors -- Writing Why Spy? -- Foreword -- Preface -- Introduction -- Definitions of Terms -- Structure of the Book -- Part One: Three Asian Cases -- 1. The Malayan Emergency: An Intelligence Success Story -- The Emergency -- Determinants of Success -- The Pre-Emergency Failure of Intelligence -- Appendix A: Summary of the Commissioner General's Conference, 26 June 1947 -- Appendix B: The MSS Political Intelligence Journal -- 2. Vietnam: A Can of Worms -- Historical Background and Overview of the War -- The US' Decades of Intervention -- The Tet Offensive -- Personal Reflections -- The Intelligence Performance -- The Malayan Red Herring -- 3. Chinese Affairs -- Conclusion -- Part Two: The Machinery and Methodology of Intelligence -- 4. The Organisation and Machinery of Intelligence -- Coordination of an Intelligence Community -- The US experience -- The British solution: The Joint Intelligence Committee -- The Customers -- Collectors and Assessors -- Intelligence Requirements -- Training and Education -- Conclusion -- 5. Types of Intelligence Collection Methods -- Human Intelligence (Humint) -- Agents -- Walk-ins and defectors -- Exile intelligence (Exint) -- Hunch intelligence (Hunchint) -- Trash intelligence (Trashint) -- Cab intelligence (Cabint) -- Rumour intelligence (Rumint) -- Technical Intelligence (Techint) -- The Complementary Nature of Techint and Humint -- Signals intelligence (Sigint) -- Imagery intelligence (Imint) -- Audio intelligence (Audint) -- Documentary intelligence (Docint) -- Open Source Intelligence -- Conclusion -- 6. Assessment: Problems and Common Fallacies -- Mirror Imaging -- Groupthink -- The Numbers Fallacy -- Wishful Thinking -- The Grass is Greener -- Conclusion -- 7. Moral Dilemmas. Torture and Interrogation -- Historical examples -- America's views -- Northern Ireland and Strasbourg -- Polygraphs and Lie Detectors -- Oversight, Freedom of Information and Security -- Blackmail, Drugs and Sex -- Conclusion -- Part Three: Famous Cases of Intelligence in Practice -- 8. Pearl Harbor -- The Events of 1941: Prelude to War -- The Attack -- The Nature of the Intelligence Failure -- Japanese intelligence -- Conclusion -- 9. Cuba: The Bay of Pigs and the Missile Crisis -- The Bay of Pigs Disaster -- The performance of intelligence and its customers -- The Cuban Missile Crisis -- The performance of intelligence -- Conclusion -- 10. Iraq: The Intelligence Imbroglio and the Butler Review -- The Butler Review -- Conclusion -- Part Four: Non-Information Gathering Intelligence Operations -- 11. Special Operations -- Examples and Types of Special Operations -- China and Special Operations -- Conclusion -- 12. Deception Operations -- Eighteenth-Century Deception -- The First World War -- Soviet Deception -- Operation Fortitude -- The Double Cross Operation -- Conclusion -- 13. Assassination -- Conclusion -- Notes -- Valedictory -- Glossary and Abbreviations -- Select Bibliography -- Index.
Spying continues to fascinate us, as evidenced in the popularity of shows such as Homeland or the interest in Wikilieaks documents, and this book argues the case for traditional espionage.