Carter, Ashton B. "The Architecture of Government in the Face of Terrorism." International Security 26 (Winter 2001-2002): 5-23.
The author is a former Assistant Secretary for International Security Policy (1993-1997).
Carter, Ashton B., and William J. Perry. Preventive Defense: A New Security Strategy for America. Washington, DC: Brookings Institution Press, 1999.
Cerami, Parameters, Autumn 1999, notes that Perry was Defense Secretary and Carter Assistant Secretary for International Security Policy from 1993 through 1997. In this book, "they tell the story of their firsthand experiences in searching for new strategic concepts to guide US defense policy and programs during the first Clinton Administration.... The book introduces a model of emerging dangers, or what the authors call the A, B, and C lists of threats" -- vital interests at stake, important interests, and peripheral or humanitarian interests. This is an "important book that should be read by policymakers and students of national security strategy. It is especially important for military officers and those outside the Washington beltway for its insights into how strategic concepts are formulated and how high-ranking civilian defense officials construct defense policies and programs."
Carter, Ashton B., John Deutch, and Philip Zelikow. "Catastrophic Terrorism: Tackling the New Danger." Foreign Affairs 77, no. 6 (Nov.-Dec. 1998): 80-94.
Carter, Ashton B., and John P. White, eds. Keeping the Edge: Managing Defense for the Future. Cambridge, MA: MIT University Press, 2001.
Russell, Studies 46.1, notes that this "book is primarily directed toward a DOD audience." However, there are two intelligence-related chapters: Robert Hermann's "Keeping the Edge in Intelligence" and a collective chapter by John Deutch, Arnold Kanter, and Brent Scowcroft, "Stregthening the National Security Interagency Process." Although the work "only touches lightly on the major issues facing the IC," it provides "important glimpses into the thinking of influential individuals" who could have a role in any IC reforms.
Carter, Carolle J. Mission to Yenan: American Liaison with the Chinese Communists, 1944-1947. Lexington, KY: University Press of Kentucky, 1997.
Clark comment: This work concerns the American Observer Group (Dixie Mission) to the Chinese Communists, which arrived in Yenan in July 1944. Unsinger, IJI&C 12.2, notes that the author has "assembled a vast array of documents," but "she never really realizes [their] full potential." In particular, Carter relies too often on secondary sources.... [S]he just didn't do the job as well as it could have been done ... [and] contributes little to what has already been told." See also, Barrett, Dixie Mission (1970).
Carter, Carolle J. The Shamrock and the Swastika: German Espionage in Ireland in World War II. Palo Alto, CA: Pacific Books, 1977.
Constantinides finds that the "absence of access to Irish and British files" makes this book "less than comprehensive." Carter is at her best when discussing "the failures and incredible ineptitude of the German intelligence services."
Carter, Dan. "Marine Corps Counterintelligence in Somalia and Beyond." Defense Intelligence Journal 4, no. 1 (Spring 1995): 83-89.
In the Marine Corps, "all CI training and activities are oriented totally toward the tactical environment.... Additionally, Marine Corps CI has a distinctive tactical human intelligence (HUMINT) mission.... Marine Corps CI conducts ... HUMINT collection operations ... [to] assist the tactical intelligence collection effort in determining the enemy's order of battle ... and intentions.... Marine Corps CI is now expanding and defining its role in deception operations, information warfare, psychological operations and operational security."
Commenting on Carter's Bletchley Park materials overall, Christensen, Cryptologia 35.2 (Apr. 2011), finds that the author "has done an excellent job exploring and explaining the technical aspects of Bletchley Park codebreaking."
1. Codebreaking with the Colossus Computer. Bletchley Park Report no. 1. Bletchley Park, UK: Bletchley Park Co. Ltd., 1996. New ed. Bletchley Park, UK: Bletchley Park Trust, 2008.
Kruh, Cryptologia 22.2: "[I]ncludes details of the German Lorenz machine and its five pairs of wheels." Christensen, Cryptologia 35.2 (Apr. 2011), notes that this report "is a technical supplement to the Colossus Rebuild display at the Bletchley Park Museum."
2. Codebreaking with the Colossus Computer: An Account of the Methods Used for Finding the K-wheel Settings, including an Illustrated Example. Bletchley Park Report no. 3. Bletchley Park, UK: Bletchley Park Co. Ltd., 1997.
Kruh, Cryptologia 22.2: "[A] more detailed account of the technique of 'wheel setting' than previously given in Report No. 1."
3. Breaking Naval Enigma. Bletchley Park Report no. 3. New ed. Bletchley Park, UK: Bletchley Park Trust, 2008.
This numbering is from Christensen, Cryptologia 35.2 (Apr. 2011).
4. Codebreaking with the Colossus Computer: Finding the K-wheel Patterns. Bletchley Park Report no. 4. Bletchley Park, UK: Bletchley Park Co. Ltd., 1997.
Kruh, Cryptologia 22.2: "Readers should be familiar with Report No. 1."
5. and John Gallehawk. The Enigma Machine and the Bombe: The Story of the Breaking of the Enigma Cipher over the Period 1932-1945. Bletchley Park Report no. 9, rev. ed. Bletchley Park, UK: Bletchley Park Co. Ltd., 1999. New ed. Bletchley Park, UK: Bletchley Park Trust, 2008.
Kruh, Cryptologia 24.4: The authors "provide an outline description of the Bombe and historical notes." Christensen, Cryptologia 35.2 (Apr. 2011), notes that this is the least technical of the listed reports.
6. The First Breaking of Enigma: Some of the Pioneering Techniques Developed by the Polish Cipher Bureau. Bletchley Park Report no. 10. Bletchley Park, UK: Bletchley Park Co. Ltd., 1999. [Christensen, Cryptologia 35.2 (Apr. 2011): Bletchley Park Report no. 2. New ed. Bletchley Park, UK: Bletchley Park Trust, 2008.]
Kruh, Cryptologia 24.4: "An account of three remarkable methods developed by the Polish Cipher Bureau from 1932-1938, to decrypt intercepted German Enigma messages."
7. The Turing Bombe. Bletchley Park Report no. 16. New ed. Bletchley Park, UK: Bletchley Park Trust, 2008.
Christensen, Cryptologia 35.2 (Apr. 2011), says this report "explains how the Turing bombe operated and the logic behind using cribs."
Carter, Frank. "Keith Batey and John Herivel: Two Dustinguished Bletchley Park Cryptographers." Cryptologia 35, no. 3 (Jul. 2011): 277-281.
Carter, Jimmy. "Central Intelligence Agency: Remarks to Employees, August 16, 1978." Weekly Compilation of Presidential Documents 14 (21 Aug. 1978): 1434-1436. [Petersen]
Carter, Jimmy. Keeping Faith: Memoirs of a President. New York: Bantam Books, 1982. 3d. ed. Fayetteville, AR: University of Arkansas Press, 1995.
[GenPostwar/70s/Gen & Iran]
Carter, John J.
1. Covert Operations as a Tool of Presidential Foreign Policy in American History from 1800 to 1920: Foreign Policy in the Shadows. Lewiston, NY: Edwin Mellen, 2000.
2. Covert Operations and the Emergence of the Modern American Presidency, 1920-1960. Lewiston, NY: Edwin Mellen, 2002.
3. Covert Operations as a Tool of Presidential Foreign Policy: From the Bay of Pigs to Iran-Contra. Lewiston, NY: Edwin Mellen, 2006.
4. "Interbranch Conflict and the Early Evolution of Covert Action as a Presidential Tool of Foreign Policy." Southeastern Political Review 28, no. 4 (2000): 599-629.
Carter, Marshall N. "To Kill or Capture." Marine Corps Gazette 57 (Jun. 1973): 31-35.
Petersen: "Counter-guerrilla operations based on intelligence."
Carter, Miranda. Anthony Blunt: His Lives. London: Macmillan, 2001. New York: Farrar, Straus and Giroux, 2001.
Spencer, IJI&C 15.2, finds that the author "does a splendid [and readable] job of skimming the surface of the knowable." However, "she cannot cope with the simple question of 'why?'" Pitt, Booklist, 1 Dec. 2001, says that the author's "research appears impeccable, and her tone is evenhanded and straightforward.... Carter stays away from facile explanations for [Blunt's] complex behavior."
To West, I&NS 18.1, this work "is a compilation, with nothing very startlingly new, but one that gathers together all the earlier material, and settles a few areas of controversy.... The flaw running through the book is a fundamental misconception about MI5, its structure, responsibilities and personnel." Nevertheless, "[f]or all the niggling irritations on the intelligence front, His Lives is likely to be regarded as the best standard work on Blunt."
Carter, Samuel, III. The Riddle of Dr. Mudd. New York: Putnam's 1974. [Petersen]
Carter, Sara A. "U.S. Hones Intelligence Skills." Washington Times, 28 Apr. 2008. [http://www.washingtontimes.com]
Report on the Defense Department's Human Intelligence Training-Joint Center of Excellence (HIT-JCOE) at Fort Huachuca. Includes comments from intervews with Steve Norton, chief of the DIA's Defense Human Intelligence (HUMINT) Management Office; John Antonitis, "an intelligence professional and a staff member of the now-defunct" WMD Commission; and Maj. Gen. John M. Custer III, commander of the Army Intelligence Center and Fort Huachuca.
Carter, Tom. "Barr Would Restore U.S. License to Kill." Washington Times, 9 Feb. 2001, A13.
Return to Caro-Carz