Jackson, Donald. "Zebulon M. Pike 'Tours' Mexico." American West 3, no. 3 (1966): 67-71, 89-93.
Argues that Pike's travels in 1806-1807 were not a spy mission.
Jackson, Ian. The Economic Cold War: America, Britain and East-West Trade, 1948-63. New York: Palgrave, 2001.
Heiss, The Historian 65 (2003), calls this work "a fine addition to recent scholarship that offers a compelling account of U.S. export-control policy during the Truman, Eisenhower, and Kennedy administrations.... In addition to clarifying U.S. policy on the export-control issue," the author "also demonstrates that the Anglo-American 'special relationship' during this period was often fraught with conflicts and difficulties over the issue of export controls.... Of special note here is Jackson's excellent discussion of Britain's determination to undertake relaxation, even if such a move generated U.S. displeasure."
Jackson, Janko. "A Methodolgy for Ocean Surveillance Analysis." Naval War College Review 27 (Sep.-Oct. 1974): 71-89.
Provides more on this subject than is normally found in the open literature.
Jackson, John. Hitler's Codebreakers: German Signals Intelligence in World War 2. Redditch, UK: BookTower Publishing, 2012.
Hamer, Cryptologia 37.4 (2013), finds that much of this book "is a verbatim compilation of the text from declassified NSA files," including the TICOM materials. The "author/editor's 'too-perfect verbatim' approach has resulted in the inclusion of inevitable errors that were included in the original TICOM coverage." The work does pull together in one place material available elsewhere.
Jackson, John. Ultra's Arctic War: PQ 17 Convoy Disaster, Sinking of the Scharnhorst, Hunting the Tirpitz. Milton Keynes, UK: Military Press, 2003.
Kruh, Cryptologia 28.3, says that this is "[a]n excellent book ... about the war at sea and how intelligence derived from breaking German Enigma messages played a vital role."
Jackson, John, ed. The Secret War of Hut 3: The First Story of How Intelligence from Enigma Signals Decoded at Bletchley Park Was Used During World War II. London: Military Press, 2002.
According to Kruh, Cryptologia 28.1, "Hut 3 was responsible for the processing of signals once the code in which they had been transmitted had been broken. They translated and annotated them and reported the contents to Government departments and commanders in the field." This work is based on the now declassified history of Hut 3's activities, written at the end of the war by those who worked there.
Jackson, Julian. France: The Dark Years, 1940-1944. Oxford: Oxford University Press, 2001. 2003 [pb]
The Publishers Weekly (2001) (via Amazon.com) reviewer notes that the author shows "the Resistance forces' diverse membership, including women, Jews, farm workers and foreigners.... This insightful, thoroughly researched book will be of interest to scholars and general readers, who will come away with a profound understanding of a crucial time in French history." Doyle, Library Journal (2001) (via Amazon.com), refers to Jackson's "detailed analysis" and "meticulous scholarship"
Jackson, Mark G. "The Court-Martial Is Closed: The Clash Between the Constitution and National Security." Air Force Law Review 30 (1989): 1-20.
Calder: There are difficulties "when military prosecution is initiated for crimes involving classified information."
Jackson, Robert. High Cold War: Strategic Air Reconnaissance and the Electronic Intelligence War. Somerset, UK: Patrick Stevens Limited, 1998.
Jackson, Robert. The Malayan Emergency: The Commonwealth's Wars, 1948-1960. London: Routledge, 1991.
Jackson, Sophie. Churchill's White Rabbit: The True Story of a Real-Life James Bond. Charleston, SC: History Press, 2012.
This is a new biography of SOE operative Edward Yeo-Thomas. See Jasper Copping, "Historian Reveals the Second World War Hero Who Inspired the Creation of James Bond," Telegraph (London), 23 Sep. 2012; and Rob Preece, "Revealed: The Second World War Spy Whose Ruthlessness with Enemies and Charming Way with Women Inspired Author to Create James Bond," Daily Mail (London), 23 Sep. 2012.
Jackson, Wayne G. Allen Welsh Dulles As Director of Central Intelligence, 26 February 1953-29 November 1961. 5 vols. Washington, DC: CIA History Office, [released with deletions,1994].
Zubok, "Spy vs. Spy," CWIHPB 4 (Fall 1994), fn. 22, describes this five-volume work as the "internal CIA history of [Dulles'] tenure as Director..., declassified with deletions in 1994, copy available from the CIA History Office and on file at the National Security Archive, Washington, DC."
Jackson, Wayne. "Scientific Estimating." Studies in Intelligence 9, no. 3 (Summer 1965): 7-11.
Estimators "have a troublesome time with the problem of incorporating scientific or technical contributions into a finished estimate."
Jackson, William. "Does NSA's Cybersecurity Mission Extend to the Dot-com Domain?" Federal Computer Week, 30 Aug. 2010. [http://fcw.com]
"Arguments can be made whether or not NSA should have the job of protecting our civilian critical infrastructure. Many security experts and civil libertarians would argue that this job should not be given to an agency cloaked in secrecy and with a record of surveillance abuses. But absent another agency with the authority and responsibility to do the job, we can expect DOD and NSA to become the de facto defenders of our networks."
Jackson, William H., Jr. "Congressional Oversight of Intelligence: Search for a Framework." Intelligence and National Security 5, no. 3 (Jul. 1990): 113-147.
Lowenthal describes this as an analysis of "the political dynamics, institutional arrangements and shifting values and interests that have determined the extent and level of congressional oversight since the creation of the modern Intelligence Community."
Return to J - Jac