Newn - Nez

 

New Republic. Editors. "Struggle in the OWI." 26 Apr. 1943, 551-552. [Winkler]

[WWII/PsyWar]

Newsinger, John. British Counterinsurgency: From Palestine to Northern Ireland. London: Palgrave Macmillan, 2002.

From publisher: This book "looks at the guerrilla campaigns in Palestine, Malaya, Kenya, Cyprus, South Yemen, Oman, and most recently in Northern Ireland, and considers the reasons for British success or failure in suppressing them."

[UK/Postwar/Counterinsurgency]

Newsinger, John. "From Counter-insurgency to Internal Security: Northern Ireland, 1969-1992." Small Wars and Insurgencies 6, no. 1 (1995): 88-91.

[UK/Postwar/IRA]

NewsMax.com. "Hussein Researched West Nile Virus, But Not for Terror Attack: Scott Ritter." 12 Oct. 1999. [http://www.newsmax.com]

"In an exclusive interview with Inside Cover, former UNSCOM weapons inspector Scott Ritter said on [11 October 1999] that he doubts Iraqi dictator Saddam Hussein has launched a West Nile virus bio-terror attack on New York City.... Ritter said: 'The Iraqis did do work on vaccines for a variety of things like West Nile encephalitis. But that was a standard protective measure. There's no evidence that they ever tried to convert that into an offensive program.'"

[Terrorism/90s/99/Virus]

Newsinger, John. "From Counter-insurgency to Internal Security: Northern Ireland, 1969-1992." Small Wars and Insurgencies 6, no. 1 (1995): 88-91.

[UK/Postwar/NIreland]

Newson, David D. "Aiding Guerrillas Cannot Be Covert." Christian Science Monitor, 14 Sep. 1987, 14.

[CA/80s]

Newsweek

Newton, David E. Encyclopedia of Cryptology. Santa Barbara, CA: ABC-CLIO, 1997.

Kruh, Cryptologia 22.2, declares that this encyclopedia, with over 550 entries, is "a fascinating introduction to the world of cryptology" and "an excellent volume" for the personal libraries of even experienced cryptologists.

[Cryptography/Reference]

Newton, Jim. Eisenhower: The White House Years. New York: Doubleday, 2011.

Gage, Washington Post, 2 Dec. 2011, finds this to be "an engaging if conflicted work of presidential history, with the author torn between putting Eisenhower on a pedestal and tearing him back down.... Eisenhower amassed a troubling record ... on covert action, arguably his most innovative strategy for fighting the Cold War.... It is unclear how deeply Eisenhower was involved in planning these missions. Newton shows nonetheless that the president heartily approved of such activity, both as a military man who enjoyed a logistical challenge and as a political leader eager to avoid direct nuclear confrontation with the Soviet Union."

For Reeve, Los Angeles Times, 9 Oct. 2011, "Newton's book is thorough and reasonable.... Particularly in the early years of his presidency, Ike ... became foolishly enamored with the efficacy of covert action. It seemed to be war on the cheap." Smith, Christian Science Monitor, 4 Oct. 2011, says that this work "amounts to little more than a love letter to the man who occupied the Oval Office from 1953 to 1961.... Eisenhower was the president to begin the awful practice of employing the CIA to overthrow foreign governments."

[GenPostwar.50s/Gen]

Newton, Polly. "Agent Lecturer Travelled on Stasi False Passport." Telegraph (London), 20 Sep. 1999. [http://www.telegraph.co.uk]

According to BBC2's "The Spying Game," broadcast on 19 September 1999, Hull University lecturer Robin Pearson "had a false passport, gave the East Germans information on Solidarity members in Poland and tried to set up an exchange scheme for student agents to be recruited."

[UK/SpyCases/99/Fever]

Newton, Rick. "Operation Kingpin: The Son Tay Raid." Air Commando Journal 1, no. 3 (Spring 2012): 12-15. [http://www.aircommando.org]

This is an easy-reading recap of events surrounding the Son Tay raid. See also, Annie Jacobsen, "Element of Surprise," Air Commando Journal 1, no. 3 (Spring 2012): 16-17 (originally published in LA Times Magazine (Jan. 2012).

[Vietnam/SonTay]

Newton, Verne W. The Cambridge Spies: The Untold Story of Maclean, Philby, and Burgess in America. New York: Madison Books, 1990. Lanham, MD: University Press of America, 1991. Lanham, MD: Madison, 1993. [pb]

To Kerr, I&NS 9.1, the title is a "rather odd choice" since the book is largely about Maclean. This is a "very worthy effort," but is "flawed in both conception and execution.... [He] reduces the motives of three very different individuals into just one disreputable motive: they became Soviets agents because they were impelled by an addiction to the drug of deceit."

New York Times

New Zealand. Department of the Prime Minister and Cabinet. Domestic and External Security Secretariat. Securing our Nation's Safety: How New Zealand Manages Its Security and Intelligence Agencies. Wellington: DESS, 2000.

Contents:

Foreword from the Prime Minister
Introduction
Needs and safeguards - a contribution from The Rt. Hon. Sir Geoffrey Palmer
New Zealand's security and intelligence arrangements - An Overview
The New Zealand Security Intelligence Service
The Government Communications Security Bureau
The External Assessments Bureau
The Directorate of Defence Intelligence and Security
Conclusion
Committee Roles
Directory

[OtherCountries/NewZealand]

New Zealand Herald. "Chinese Defector Kept Out." 26 Aug. 2005. [http://www.nzherald.co.nz]

Hao Fengjun, "granted a protection visa in Australia after backing claims of a spy network there," has been denied entry to New Zealand because of the lack of a proper entry visa. Hao, "who claims to be a defector from the Chinese National Security Bureau and former member of a spy agency known as 610 Office," has said that "he would reveal details of espionage in New Zealand."

[China; OtherCountries/NewZealand]

Ney, Virgil. "Bibliography on Guerrilla Warfare." Military Affairs 29 (Fall 1960): 146-149. [Petersen]

[MI/SpecOps/Ref]

Nez, Chester, with Judith Schiess Avila. Code Talker: The First and Only Memoir By One of the Original Navajo Code Talkers of WWII. New York: Berkley, 2011. 2012. [pb]

"Chester Nez, 93, last of the original 29 Navaho codetalkers of World War II, died ... on 4 June 2014." Intelligencer 20.3 (Spring-Summer 2014), 83-84.

Christensen, Cryptologia 37.3 (2013), says this "is an engaging story. It reads quickly.... What stands out ... is the description of the cryptographic principles used in the constuction of the Navaho code."

[WWII/FEPac/Navajo]

Return to N Table of Contents

Return to Alphabetical Table of Contents