Gun - Gz

 

Gunaratna, Rohan. Inside Al Qaeda: Global Network of Terror. New York: Columbia University Press, 2002.

From publisher: This work "examines the leadership, ideology, structure, strategies, and tactics of the most violent politico-religious organization the world has ever seen. The definitive work on Al Qaeda, this book is based on five years of research, including extensive interviews with its members; field research in Al Qaeda-supported conflict zones in Central, South and Southeast Asia and the Middle East; and monitoring Al Qaeda infiltration of diaspora and migrant communities in North America and Europe."

[Terrorism/00s/Gen]

Gunaratna, Rohan, ed. Terrorism in the Asia Pacific: Threat and Response. Singapore: Eastern Universities Press, 2003.

Banlaoi, I&NS 19.4 (Winter 2004), says this work, with its "eleven well-written papers on Asia Pacific terrorism," is "an excellent piece of literature that elevates the ... region to the mainstream of international terrorism discourse.... The strength of the book lies in the mix of insights and perspectives articulated by the various contributors who are well-known authorities on the subject."

[Terrorism/00s/Gen]

Gunsburg, Jeffery. Divided and Conquered: The French High Command and the Defeat of the West, 1940. Westport, CT: Greenwood, 1979.

[WWII/Eur/Fr/Gen]

Gunter, Michael M.

Guo, Xuezhi. China's Security State: Philosophy, Evolution, and Politics. Cambridge: Cambridge University Press, 2012.

Peake, Studies 59.1 (Mar. 2015), says that this "dense" narrative tells "the story of multiple organizations whose names change frequently and whose missions overlap as they compete to collect the intelligence used to control citizens and officials and identify spies and dissidents, who often spy on one another while protecting CCP leaders." This work "provides a necessary foundation toward th[e] goal" of understanding China's security and intelligence services."

[China/Gen/10s/Books]

Gup, Ted.

Gurdon, Hugo. "Dirty Tricks II: How Moscow Faked CIA Plot to Kill Kennedy." Telegraph (London), 13 Sep. 1999. [http://www.telegraph.co.uk]

According to the upcoming book by Vasily Mitrokhin and Christopher Andrew, "[t]he KGB forged a letter purporting to be from Lee Harvey Oswald and leaked it to unwitting conspiracy theorists to spread the idea that the CIA was involved in the assassination of President Kennedy." The KGB also targeted Martin Luther King, planting "unfavourable articles in African newspapers in the hope that more radical black Americans would take his place."

[CIA/Accusations; Russia/Disinformation; UK/SpyCases/99/Fever]

Gurrey, Donald. Across the Lines: Axis Intelligence and Sabotage Operations in Italy, 1943-1945. Tunbridge Wells: Parapress, Ltd., 1994.

Dovey, I&NS 10.3: The author "is well suited to his subject. His experience in GSI(b) at Allied Headquarters in Italy familiarized him with the enemy and Allied organizations.... By 1944 the Abwehr was recruiting and training agents while the Sicherheitsdienst was mounting sabotage operations.... As the campaign progressed the Germans did not rely solely on line-crossers. They also made use of stay-behind agents equipped with radio transmitters.... The Special Counter-Intelligence Units were sometimes able to turn agents round and use them to penetrate the German organizations." The book's substantive errors "are relatively minor," but "there are no notes to link the text to the sources." Nevertheless, the book is welcome as "a much-needed reminder of the scale of the Intelligence war in Italy and a tribute to the Allied security machine -- well-organized, well-led and outstandingly successful."

[WWII/Eur/Italy]

Gustafson, Kristian.

Gutjahr, Melanie M. H. The Intelligence Archipelago: The Community's Struggle to Reform in the Globalized Era. Washington, DC: Joint Military Intelligence College, 2005.

According to Van Nederveen, Air & Space Power Journal 21.2 (Summer 2007), this work "examines efforts to reform the intelligence community dating back to World War II.... [T]he author provides a useful service to anyone attempting to gather information about what transpired in the House and Senate Intelligence Committees" in the "turbulent years" following "the collapse of the Soviet Union.... [T]the text suffers from ... too many quotations, poor layout, and wordiness that makes it difficult for the reader to follow the author's key points. Nevertheless, these flaws should in no way stop the intelligence professional, historian, or political scientist from studying the data therein. The Intelligence Archipelago is a gold mine of information."

[Reform/00s/Gen]

Gutman, Roy. Banana Diplomacy: The Making of American Policy in Nicaragua, 1981-1987. New York: Simon & Schuster, 1989.

[CIA/80s/Nicarauga]

Gutman, Roy. "What Did the CIA Know?" Newsweek, 27 Aug. 2001. [http://www.msnbc.com]

Croatian General Ante Gotovina, accused at the Hague Tribunal of war crimes in Krajina in 1995, is arguing that reconnaissance photography taken by CIA-operated GNAT-750 drones "is relevant to establishing [his] innocence."

[CIA/00s/01; Recon/UAVs]

Guttman, Nathan. "U.S. Agency Confirms Sinking of USS Liberty Was Accident." Haaretz (Tel Aviv), 9 Jul. 2003. [http://www.haaretzdaily.com]

Documents released by NSA "support Israel's version" of the attack on the USS Liberty during the 1967 war. The NSA "transcript of conversations held by two Israeli Air Force helicopter pilots who were hovering over the Liberty as it was sinking ... confirm Israel's claim that the sinking of the ship ... was a tragic error."

[GenPostwar/60s/Liberty]

Guy, Jack C., and Steven Collins. "Current Challenges and Possible Roles for Army Reserve PSYOP Forces." Special Warfare 13 (Summer 2000): 28-35.

[MI/Reserves]

Gwertzman, Bernard. "Government in Iran Vows Help in Seige; U.S. Uncertain Despite Promise by Tehran to Do Its Best." New York Times, 5 Nov. 1979, A1.

[GenPostwar/70s/Iran]

Gwertzman, Bernard. "Israel Asks U.S. for Gift of Jets, Citing Saudi Sale." New York Times, 4 Apr. 1981, 2.

Includes indication that the Israelis had asked the United States for direct access to a U.S reconnaissance satellite.

[Israel/Space]

Gwertzman, Bernard. "Israeli Payment to Close the Book on '67 Attack on Department of the Navy Vessel." New York Times, 19 Dec. 1980,. A1, A4.

[GenPostwar/60s/Liberty]

Gwynne, Sam C. "Spies Like Us: The Internet Is Changing the World's Most Dangerous Game." Time, 25 Jan. 1999, 48.

Clark comment: If you can get beyond the the silly (and incorrect) title (there are plenty of games in which there have been more deaths than the spy business), this article is about the growth of the use of open source intelligence in the business world.

"[T]he World Wide Web has given birth to a whole industry of point-and-click spying. The spooks call it 'open-source intelligence,' and as the Net grows, it is becoming increasingly influential.... Among the firms making the biggest splash in this new world is Stratfor, Inc., a private intelligence-analysis firm based in Austin, Texas. Stratfor makes money by selling the results of its sleuthing (covering nations from China to Chile) to corporations like energy-services firm McDermott International. Many of its predictions are available online at www.stratfor.com."

[OpenSource]

Gylden, Yves. The Contributions of the Cryptographic Bureaus in the World War. Washington. DC: GPO, 1935. Laguna Hills, CA: Aegean Park Press, n.d.

Constantinides: "Strictly speaking, Gylden has recounted the history of military cryptology, not the broader field the title implies. Much of what he writes is from the French, Austrian, and German experiences.... There is nothing on British accomplishments in military cryptology." Nevertheless, experts in the field give the book high marks.

[WWI/Other]

 

Return to G Table of Contents

Return to Alphabetical Table of Contents