Beau - Becke

Beaumont, Frederick F. "On Balloon Reconnaissance as Practiced by the American Army." Papers of the Royal Engineer Corps 12 New Series (1963): 71-86. [Petersen]

[CivWar]

Beaumont, Roger A. "The Flawed Soothsayer: Willoughby -- General MacArthur's G-2." Espionage 1, no. 4 (1985): 20-37.

Beaumont, Roger. Special Operations and Elite Units, 1939-1988: A Research Guide. Westport, CT: Greenwood, 1988.

From publisher: "Beaumont provides the most comprehensive survey available of modern special operations literature. His wide-ranging introduction sets the subject in its historical, typological, and national contexts, offering an illuminating overview of the use of special operations and elite units from World War II to the present. The bibliographic entries describe a broad sampling of materials."

[MI/SpecOps/Ref]

Beavan, Colin. Operation Jedburgh: D-Day and America’s First Shadow War. New York: Penguin, 2006.

According to Peake, Studies 50.3 (Sep. 2006) and Intelligencer 15.2 (Fall-Winter 2006-2007), the author "includes a brief epilogue and a lengthy preface that digresses into gratuitous attacks on the CIA for its postwar covert action programs and the War on Terror. The preface also pays tribute to his grandfather, an OSS officer who worked with the Jeds but was not part of the Jedburgh teams. Beavan's claim that his grandfather was later the head of all CIA clandestine operations is incorrect."

[UK/WWII/Servs/SOE; WWII/OSS/France]

Beavan, Stanley. Aegean Masquerade: A Royal Air Force Odyssey. Studley, UK: Brewin Books, 1994.

Surveillant 3.6 notes that Aegean Masquerade concerns "RAF wireless operations in the Mediterranean ... and RAF covert operations in Turkey and Greece. It is based on the author's first-hand experiences and RAF service."

[UK/WWII/Med]

Beck, Alfred M. Hitler's Ambivalent Attaché: Lt. Gen. Friedrich von Boetticher in America, 1933-1941. Dulles, VA: Potomac, 2005.

Campbell, IJI&C 20.2 (Summer 2007), sees this work as "a careful presentation of Boetticher's ability and achievements in this very difficult environment." However, although the author "tell[s] exhaustively what General Boetticher did, the volume does not explain why he performed certain primary activities throughout his life."

For Bendersky, Army History 64 (Summer 2007), this is a "well-written, detached, and balanced biography, though one which leaves open key questions.... Beck portrays Boetticher ... as a man whose cosmopolitan heritage and education made him the kind of culturally versatile observer well suited to attaché duties in a critical time and place.... But the reader is still left with a sense of unease about whether he really understands Boetticher and his motives, particularly regarding the more controversial aspects of his relationship to Nazism and anti-Semitism and how this relationship may have affected his perspectives on America and how he interpreted the U.S. situation to Berlin."

[Germany/Interwar]

Beck, Melvin. Secret Contenders: The Myth of Cold-War Counter-Intelligence. New York: Sheridan Square, 1984.

[CI]

Beck, Neil J. "Espionage and the Law of War." American Intelligence Journal 29, no. 1 (2011): 126-136.

"This article suggests that jurists should reconsider how the law of war treats espionage. After tracing the development of IHL's [international humanitarian law] treatment of war spies, it will argue that the principal justifications for denying prisoner-of-war status to them are unfounded, and that the current rules and norms undermine broader goals of IHL."

[Overviews/Legal/Military]

Becker, Abraham. "Intelligence Fiasco or Reasoned Accounting: CIA Estimates of Soviet GNP." Post-Soviet Affairs 10 (1994): 291-329.

[Analysis/Soviet]

Becker, Anja. "The Spy Who Couldn’t Possibly Be French: Espionage (and) Culture in France." Journal of Intelligence History 1, no. 1 (Summer 2001). [http://www.intelligence-history.org/jih/previous.html]

From abstract: "In France, espionage might be considered a negative myth, a reluctance to discuss the topic can be traced back ... to the Ancien Régime.... [A]fter the French Revolution, disdain for the spy-business developed into a predominant theme in society.... The negative French sentiments ... culminated in the Dreyfus affaire (1894-1906) which, in turn, did not result in an open discussion of intelligence.... Charles de Gaulle ... might be regarded an antithesis to the spy-enthusiast Winston Churchill.... Even after the end of the Cold War..., a pronounced reluctance to talk about intelligence persists. Contemporary authors of popular fiction ... keep a certain distance from espionage, their protagonists are either not French or carry names that are not French; a glorious French spy hero has yet to make his appearance."

[France/00s]

Becker, Elizabeth. "Long History of Intercepting Key Words." New York Times, 24 Feb. 2000. [http://www.nytimes.com]

"The Echelon system was developed in the 1970's. It links computers in at least seven sites around the world to receive, analyze and sort information captured from satellite communications, newly declassified information shows. The computers watch and listen for key words in telephone, fax and Internet communications and route intercepted messages on a topic requested by a country."

[NSA/Echelon/00]

Becker, Elizabeth. "They're Unmanned, They Fly Low, and They Get the Picture." New York Times, 3 Jun. 1999. [http://www.nytimes.com]

"[L]ight unmanned aerial vehicles known as drones are crisscrossing the skies over Kosovo, acting as electronic scouts, finding and filming elusive targets, especially Serbian troops hidden in bunkers or woods, and sending those images immediately to fighter jets overhead.... The United States Army Hunter surveillance plane flies from the Skopje [Macedonia] airfield. The more sophisticated unmanned Air Force Predator is based in Bosnia, at Tuzla, according to NATO and Pentagon officials."

[GenPostCW/90s/Kosovo; Recon/UAVs]

Becker, Elizabeth. "Pentagon Sets Up New Center for Waging Cyberwarfare." New York Times, 8 Oct. 1999. [http://www.nytimes.com]

On 7 October 1999, JCS Chairman Gen. Henry Shelton announced the establishment of "a new center ... to defend the United States from hackers and to plot ways to attack an enemy's computer network.... The cyberwarfare center will take over what is now a scattered series of operations and will have headquarters in Colorado Springs under Gen. Richard Myers of the Air Force."

[GenPostwar/Issues/Infowar]

Becker, Eugene. "The National Cryptologic Museum Library." Studies in Intelligence 54, no. 3 (Sep. 2010): 23-26.

"[T]he museum and its library, with the support of the National Cryptologic Museum Foundation, is becoming a world center of historical intelligence research."

The museum's Website is at: http://www.nsa.gov/about/cryptologic_heritage/museum.

[Cryptography/RefMats]

Becker, Howard. "The Nature and Consequences of Black Propaganda." American Sociological Review 14 (Apr. 1949): 221-235. [Petersen]

[CA/PsyRad]

Becker, Joseph. "Comparative Survey of Soviet and US Access to Published Information." Studies in Intelligence 1, no. 4 (Fall 1957): 35-46.

"In general, US open source publications provide the Soviets with certain types of military intelligence and other valuable scientific and technical information, while Soviet publications provide the US with a reliable index to the over-all development of the Soviet system and a multiplicity of facts about its current status."

[OpenSource]

Becker, Louis, et al. Terrorism: Information as a Tool for Control. RS Report 78-1655 PR. Washington, DC: Congressional Research Service, Library of Congress, 1978. [Petersen]

[Terrorism]

Becket, Henry S.A. See Joseph C. Goulden.

Beckett, Ian F.W. Encyclopedia of Guerrilla Warfare. Santa Barbara, CA: ABC-CLIO, 1999. New York: Facts on File, 2001.

A Terrorism Bookshelf Review [http://www.terrorismcentral.com] notes that "[t]he entries in this well written and easy-to-understand guide cover guerrilla warfare from the late 18th century to the present day.... The entries cover the countries, wars, revolts, conflicts, movements, leaders, strategies, and concepts related to this type of military tactic.... The book also provides an extensive bibliography and a comprehensive historical time line of guerrilla warfare."

[MI/SpecOps/RefMats]

Beckett, Ian F.W. Modern Insurgencies and Counter-Insurgencies: Guerrillas and Their Opponents Since 1750. London: Routledge, 2001.

According to Berger, et al, I&NS 22.6 (Dec. 2007), the author "provides a long-term historical overview of insurgencies and counterinsurgencies." Beckett stresses "the historical and contemporary habit of Great Powers to take a relative lack of interest in counterinsurgency."

[MI/SpecOps/00s]

Beckett, Ian F.W. The Roots of Counter-Insurgency: Armies and Guerrilla Warfare, 1900-1945. London: Blandford, 1988.

[MI/SpecOps]

Beckett, Ian F.W., and John Pumlot. Armed Forces and Modern Counter-Insurgency. New York: St. Martin's, 1985.

[MI/SpecOps]

Return to B Table of Contents

Return to Alphabetical Table of Contents