Bonafede, Dom. "The CIA Under Turner -- The Pleasure of His Company." National Journal 9 (17 Dec. 1977): 1948-1954. [Petersen]
Bond, Brian. "Calm Before the Storm: Britain and the Phoney War, 1939-1940." Journal of the Royal United Services Institute 135 (Spring 1990): 61-67.
Sexton identifies this article as an "excellent review of British intelligence on the eve of the German offensive in the West in 1940."
Bond, Donald. Radio Direction Finders. New York: McGraw-Hill, 1944. [Petersen]
Bond, Raymond T., ed. Famous Stories of Code and Cipher. New York: Collier, 1965. [Petersen]
Bondanella, John. Estimating the Army's Intelligence Requirements and Capabilities for 1997-2001: Analytic Support to the Military Intelligence Relook Task Force. Santa Monica, CA: Rand, 1993. [Surveillant 3.2/3]
Bonds, Russell S. Stealing the General: The Great Locomotive Chase and the First Medal of Honor. Yardley, PA: Westholme, 2006.
A reviewer in Publishers Weekly (via Amazon.com), 15 Oct. 2006, finds this book to be "a fast-paced, extremely well-told tale of espionage, capture, trial and escape.... With its authoritative tone and refreshing accessibility, [Stealing the General] should find a place on the nightstand of the general reader as well as the bookshelf of the Civil War enthusiast."
Bone, Elizabeth, and Christopher Bolkcom. Unmanned Aerial Vehicles: Background and Issues for Congress. Washington, DC: Congressional Research Service, Library of Congress, 25 Apr. 2003. Available at: http://www.fas.org/irp/crs/RL31872.pdf.
"Congressional considerations include the proper pace, scope, and management of DoD UAV procurement; appropriate investment priorities for UAVs versus manned aircraft; UAV future roles and applications; and aerospace industrial base considerations."
Bone, James. "Spy Satellite Resolves to Put Us All in the Picture." Times (London), 18 Sep. 1999. [http://www.the-times.co.uk]
If all goes well with the launch of Space Imaging's Ikonos II commercial imaging satellite "anyone with a laptop will [soon] be able to download from the Internet one-metre resolution satellite pictures of any co-ordinate on Earth." Philip Howard, "Nowhere Left to Hide," Times (London), 18 Sep. 1999, discusses the privacy and civil rights implications of the Ikonos II capabilities.
Bonen, Zeev. "The Role of Target Acquisition in Combat Intelligence Past and Future." Intelligence and National Security 4, no. 1 (Jan. 1989): 119- 126.
"[T]arget acquisition and damage assessment ... must be tailored to serve the needs of the new fire power and related tactics" associated with the "extended battle."
Bonham, Francis G. "Deception in War." Infantry Journal, Jul.-Aug. 1934, 272-278. [Petersen]
Bonini, Carlo, and Giuseppe D'Avanzo. Collusion: International Espionage and the War On Terror. Hoboken, NJ: Melville House, 2007.
Peake, Studies 51.3 (2007), says that this work "is well documented, well told and provides an explanation for some of the confused intelligence reporting leading to the war in Iraq."
Bonner, Raymond (New York Times).
Bonnet, Yves. Contre-espionnage: Memoirs d'un patron de la DST. Paris: Calmann-Levy, 2000.
Bonnet, Yves, and Pascal Krop. Le Grandes Oreilles du Président. [The President's Big Ears] Paris: Presses de la Cité, 2004.
Kahn, I&NS 23.2 (Apr. 2008), notes that this work "describes the extensive eavesdropping activities of French President François Mitterrand."
Bonsall, Arthur [Sir]. "Bletchley Park and the RAF Y Service: Some Recollections." Intelligence and National Security 23, no. 6 (Dec. 2008): 827-841.
The author served in Air Section of GC&CS from 1940 until the end of the war. He then served in GCHQ until his retirement in 1978. He was Director of GCHQ for 5 years. "About the Contributors," I&NS 23.6.
Here, the author notes that the UK "Air Ministry planned successfully for current exploitation" of German Air Force (GAF) radio communications, "but failed to realize that after the event exploitation could also produce useful intelligence. GC&CS also failed at first but later engaged in it successfully." In the end, "not only did the Air Section's support of the Y units improve but its output became an authoritative source of intelligence about GAF operations and tactics."
Bontecou, Eleanor. The Federal Loyalty-Security Program. Ithaca: Cornell University Press, 1953.
Bonthous, Jean-Marie. "Understanding Intelligence Across Cultures." International Journal of Intelligence and Counterintelligence 7, no. 3 (Fall 1994): 275-311.
Business intelligence, with national "models."
Boog, Horst. "German Air Intelligence in the Second World War." Intelligence and National Security 5, no. 2 (Apr. 1990): 350-424.
The author's ultimate conclusion is that "[t]he underestimation of foreign air power, war potential, and morale and the overestimation of German air strength by German air intelligence before the war and in its early years contributed substantially to corroborate Hitler's false view that he could successfully wage a succession of victorious campaigns against individual opponents unpunished."
Boog, Horst. "'Josephine' and the Northern Flank." Intelligence and National Security 4, no. 1 (Jan. 1989): 137-160.
The author concludes that deception plan "Fortitude North, as far as it was carried through by British controlled agents, worked well until after the invasion.... [N]ot only did the British-controlled agent reports corroborate Hitler's preoccupation with Norway, but also the reports of Josephine. Although ... Josephine was not controlled, the information he [actually, Josephine was a source designation for the Swedish air and naval attachés in London] furnished must have been controlled information intentionally leaked to diplomats in London."
Boone, J.V. A Brief History of Cryptology. Annapolis, MD: Naval Institute Press, 2005.
From advertisement: The author "presents a historical overview of technological developments in cryptology and the closely associated fields of communications and computers.... Although he writes primarily from a military intelligence and command/control viewpoint, there are no involved explanations about how individual pieces of equipment function and no elaborate mathematical presentations." Kruh, Cryptologia 30.2 (Apr. 2006), says that "[t]his is an excellent, well written book with a great deal of interesting and useful information."
Boone, J.V., and R.R. Peterson. The Start of the Digital Revolution: SIGSALY, Secure Digital Voice Communications in World War II. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2000.
Kruh, Cryptologia 28.1, says that this is "[a]n excellent brochure though necessarily limited by space restraints" (24 pages).
Return to B Table of Contents
Return to Alphabetical Table of Contents