Научно-издательский отдел КГБ СССР, 1968. — 90 с. Многолетний опыт работы внешней разведки КГБ СССР, связанный с анализом, оценкой и обработкой разведывательных материалов, свидетельствует о том, что разведки империалистических держав широко используют в борьбе против Советского Союза дезинформацию. Эта работа, основанная на фактическом разведывательном материале, ставит своей...
Вестник Московского государственного областного университета. — 2021. — №1. — с. 100-132. Исследование новейшей практики (форм, методов, инструментов и технологий) информационных операций, особенностей их гибридизации, а также новейших форм и методов противодействия. Процедуры и методы. Нарастающая милитаризация информационного пространства ведёт к изменению взглядов на силовые...
Вестник Уфимского юридического института МВД России. — 2023. — № 2 (100). — с. 66–71. В статье рассмотрены вопросы использования сбора и анализа оперативно значимой информации по открытым источникам в сети Интернет в целях решения задач борьбы с преступностью. Освещены передовые практики добывания информации, представляющей оперативный интерес. Автором обозначен ряд проблем...
Минск: Адукацыя і выхаванне, 2011. — 624 с. — ISBN 978-985-471-440-0. Во все времена разведка и контрразведка были занятием тайным, в их тонкости посвящались лишь немногие. Всех тайн римских спецслужб мы не знаем и не узнаем никогда. Однако благодаря сохранившимся трудам древних авторов и анализу данных археологии, нумизматики и эпиграфики можно увидеть довольно ясно общую...
St. Martin's Press, 2015. — 320 p. Sent to the most violent battlefield in Iraq, Jocko Willink and Leif Babin’s SEAL task unit faced a seemingly impossible mission: help U.S. forces secure Ramadi, a city deemed “all but lost.” In gripping firsthand accounts of heroism, tragic loss, and hard-won victories in SEAL Team Three’s Task Unit Bruiser, they learned that leadership―at...
НИРИО КГБ СССР, 1977. — 79 с. Доверительные отношения (связи) во внешней разведке представляют собой особый вид агентурной работы разведчиков СССР с гражданами иностранных государств. Доверительные связи - менее эффективный, но более гибкий механизм разведывательной деятельности, чем агентурная вербовка иностранцев. Они характеризуются особым, сознательным, добровольным,...
Oxford University Press, 2010. — 902 p. The Oxford Handbook of National Security Intelligence is a state-of-the-art work on intelligence and national security. Edited by Loch Johnson, one of the world's leading authorities on the subject, the handbook examines the topic in full, beginning with an examination of the major theories of intelligence. It then shifts its focus to how...
НИРИО КГБ СССР, 1972. — 65 с. Внешняя разведка органов КГБ СССР в своей работе широко использует советских граждан, находящихся в длительных или кратковременных командировках за границей, и выполняющих там отдельные разведывательные поручения. Таких граждан именуют привлеченными к разведке лицами. Привлеченные лица ведут работу под руководством легальных резидентур с позиций...
Random House, 2018. — 763 p. The Talmud says: “If someone comes to kill you, rise up and kill him first.” This instinct to take every measure, even the most aggressive, to defend the Jewish people is hardwired into Israel’s DNA. From the very beginning of its statehood in 1948, protecting the nation from harm has been the responsibility of its intelligence community and armed...
Information Warfare Center, 2022. — 243 р. Do you want to learn more about OSINT or Open Source Intelligence, or are interested in online investigations? If your answer is yes, this is the Cyber Secrets issue for you. Inside, you will learn how to manually get evidence from some online sources, along with several tools that can help automate some of the processes. Most of the...
Boulder: Paladin Press, 1987. — 70 p. — ISBN 0-87364-036-5. This comprehensive manual covers such exotic military and sabotage topics as improvised firing systems and detonators, steel cutting techniques and derailment technology. For Information purposes only.
Palgrave Macmillan, 2014. — 202 p. This edited book provides an insight into the new approaches, challenges and opportunities that characterise open source intelligence (OSINT) at the beginning of the twenty-first century. It does so by considering the impacts of OSINT on three important contemporary security issues: nuclear proliferation, humanitarian crises and terrorism....
CQ Press, 2018. — 458 p. Bridging the divide between theory and practice, Deception: Counterdeception and Counterintelligence provides a thorough overview of the principles of deception and its uses in intelligence operations. This masterful guide focuses on practical training in deception for both operational planners and intelligence analysts using a case-based approach. Authors...
Skyhorse Publishing, 2015. — 426 p. During World War II, training in the black arts of covert operation was vital preparation for the ungentlemanly warfare” waged by the Special Operations Executive (SOE) against Hitler’s Germany and Tojo’s Japan. In the early years of the war, the SOE set up top secret training schools to instruct prospective agents in the art of being a spy....
Praeger Security International, 2010. — 440 p. Advanced analysis is a critically important aspect of winning engagements, battles, and campaigns against insurgents, irregulars, and terrorists. These adversaries are formidable, and they will purposefully engage U.S. forces from dense urban settings. They will hide in the noise and activities of the city and blend with the...
М.: Кучково поле, 2012. — 480 с. Второе издание первого тома Энциклопедии последовательно освещает основные этапы истории становления, развития и деятельности органов и подразделений государственной охраны и специальной связи - предшественников современных служб и подразделений Федеральной службы охраны России. Главное внимание уделяется рассмотрению общих закономерностей и...
Paladin Press, 1994. — 192 p. Learn to detect and evade surveillance efforts that threaten your personal security. These time-tested tactics of observation, detection and evasion are proven effective against the most sophisticated surveillance techniques used in the world.
Skyhorse Publishing, 2011. — 160 p. The official manual from the United States, meant for novices and experienced soldiers. Describes ways to use tannerite, aluminum powder, thermite, fuse cords, fuse igniters, and more in unconventional warfare—and much more. U.S. Army Special Forces Guide to Unconventional Warfare contains incredibly detailed information and visuals provided...
Special Tactics Press, 2016. — 83 p. — ISBN 978-0-9984555-0-1. Developed by Special Operations Veterans. Military units and SWAT teams that specialize in Close Quarters Battle (CQB) typically bring a large force to the fight and often have numerous supporting assets such as snipers, helicopters and tactical vehicles. Thus, the scenario of a single Soldier or SWAT officer having...
Independent Publishers, 2020. — 103 p. The "Rhodesian SAS Combat Manual" is a significant historical look of the small unit tactics employed by the special elite unit during the Rhodesian Bush War. Not only is it a glimpse back at how this unit operated, but a lot of the material is still relevant today fighting counter-insurgencies. This book covers tactical follow-ups, ambush...
Miami: Flores Publications, 1996. — 174 p. — ISBN 0-918751-40-3. The most complete, up-to-date information on spying available anywhere! Now you can study the techniques used by real professional spies and investigators. Learn how to gather any type of information you may want-or stop others from getting info on you! Just take a look at the Table of Contents to get an idea of...
Columbia University Press, 2012. — 352 p. Protecting information, identifying undercover agents, and operating clandestinely--efforts known as counterintelligence--are the primary objectives of terrorist groups evading detection by intelligence and law enforcement officials. Some strategies work well, some fail, and those tasked with tracking these groups are deeply invested in...
Вестник Уральского юридического института МВД России. — 2023. — № 1. — с. 62–66. В статье анализируется важность разведки по открытым источникам при раскрытии и расследовании преступлений. Раскрывается термин «OSINT» и его значение для правоохранительных органов. Особое внимание уделено наиболее популярным интернет-сервисам и программным средствам, которые могут быть...
Headquarters Department of the U.S. Army, 2012. — 91 p. This text establishes a common understanding, foundational concepts, and methods of use for Army opensource intelligence (OSINT). ATP 2-22.9 highlights the characterization of OSINT as an intelligence discipline, its interrelationship with other intelligence disciplines, and its applicability to unified land operations....
Headquarters Department of the U.S. Army, 2008. — 161 p. This manual expedites delivery of doctrine that the proponent has approved for immediate use in training and operations. The manual facilitates a common understanding of Army open source intelligence (OSINT) operations. As interim doctrine, it serves as a catalyst for analysis and development of Army OSINT training,...
Crown Publishing Group, 2018. — 368 p. If anyone could be considered a Russian counterpart to the infamous British double-agent Kim Philby, it was Oleg Gordievsky. The son of two KGB agents and the product of the best Soviet institutions, the savvy, sophisticated Gordievsky grew to see his nation's communism as both criminal and philistine. He took his first posting for Russian...
Skyhorse Publishing, 2011. — 960 p. Everyone knows that members of the U.S. Special Forces are the top-shelf, crème de la crème, A-Number-Ones, specially hand-picked people to train and serve as the avant garde of the largest, most well-funded military on the face of the earth. But that doesn’t happen overnight! There are special training procedures—over and above basic...
CRC Press, 2014. — 554 p. Tradecraft is a term used within the intelligence community to describe the methods, practices, and techniques used in espionage and clandestine investigations. Whether the practitioner is a covert agent for the government or an identity thief and con man, the methods, practices, tactics, and techniques are often the same and sometimes learned from the...
Independent Press, 2020. — 106 p. The book describes the methods of the KGB Special Forces against all types of attacks with a knife, such as stabbing and cutting blows, and includes methods of protection for each type of attack with a knife, such as knocking the knife out of the hands of a criminal with hands, feet, random objects and leaving the line of attack. All methods...
Third Edition. — CQ Press, 2020. — 677 p. The Third Edition of Structured Analytic Techniques for Intelligence Analysis by Randolph H. Pherson and Richards J. Heuer Jr showcases sixty-six structured analytic techniques―nine new to this edition―that represent the most current best practices in intelligence, law enforcement, homeland security, and business analysis. With more...
Scarecrow Press, 2010. — 248 p. With the exponential growth in the intelligence field in the last few years, the profession has grown much larger and its mission more complex. Government and private sector security agencies have recruited intelligence analysts to process what has become a voluminous amount of raw information flowing into these agencies' data collection systems....
Independently Publishers, 2021. — 192 p. What can you learn from a CIA spy who spent his career artfully manipulating regular people to steal high-value secrets? Plenty! In this explosive book, former intelligence officer Peter Warmka unveils detailed methodologies that he and other threat actors use to breach the security of their targets, whether they’re high-profile...
Routledge, 2020. — 679 p. — Second edition. The second edition of Secret Intelligence: A Reader brings together key essays from the field of intelligence studies, blending classic works on concepts and approaches with more recent essays dealing with current issues and ongoing debates about the future of intelligence. Secret intelligence has never enjoyed a higher profile. The...
Penguin Press, 2018. — 784 p. Resuming the narrative of his Pulitzer Prize-winning Ghost Wars, bestselling author Steve Coll tells for the first time the epic and enthralling story of America's intelligence, military, and diplomatic efforts to defeat Al Qaeda and the Taliban in Afghanistan and Pakistan since 9/11. Prior to 9/11, the United States had been carrying out small-scale...
Routledge, 2020. — 568 p. In an era of intensified international terror, universities have been increasingly drawn into an arena of locating, monitoring and preventing such threats, forcing them into often covert relationships with the security and intelligence agencies. With case studies from across the world, the Routledge International Handbook of Universities, Security and...
Routledge, 2002. — 480 p. In this volume Dr. Mitrokhin presents two dictionaries produced by the KGB itself to define their activities in both offensive and defensive intelligence work. The translated documents tell the story of the KGB's methods and targets and should interest the general public as well as the specialist.
NATO Publishing Sources, 2001. — 57 p. This publication provides preliminary joint and coalition training information on the subject of Open Source Intelligence (OSINT). It discusses the fundamentals of OSINT support to both the all-source intelligence process, and to the unclassified intelligence requirements of operators, logisticians, and civilian organizations participating...
Paladin Press, 1973. — 319 p. Black and white photographs and illustrations. Special armaments, explosives, keys, tools and manuals. Explosives are a favorite tool for saboteurs and guerrillas because they are effective, dramatic in action, and the best and most obvious tool for the destruction of many machines, structures, and other targets. Where subtLety is of minor...
Routledge, 2021. — 316 p. This new textbook outlines the main theories and concepts from a variety of disciplines that support homeland security operations, structures and strategies. Following the terrorist attacks of September 11th, "homeland security" (HLS) grew in importance within the U.S. government (and around the world) and matured from a concept discussed among a...
Portfolio, 2018. — 224 p. Brandon Webb has run life-threatening missions in the world's worst trouble spots, whether that meant jumping out of airplanes, taking down hostile ships on the open sea, or rolling prisoners in the dead of night in the mountains of Afghanistan. As a Navy SEAL, he learned how to manage the natural impulse to panic in the face of terrifying situations....
Вестник Российского университета дружбы народов. Серия: Международные отношения. — 2015. — Том 15, № 3. — с. 34-42. Сегодня эффективность обеспечения национальной безопасности во многом зависит от качественного анализа информации и своевременных прогнозов. Поэтому для современной разведки весьма актуальными являются работающие методики прогнозирования международных отношений. В...
Редакционно-издательский отдел КГБ СССР, 1964. — 44 с. Сотрудники советских органов госбезопасности должны быть всегда готовы пресечь враждебную деятельность буржуазных националистов. Они обязаны умело и грамотно вести следствие по их делам. Данное пособие должно позволить им более точно устанавливать обстоятельства, подлежащие доказыванию, планировать свое расследование,...
Bloomsbury Publishing, 2009. — 160 p. Most wars have had some element of espionage and subterfuge, but few have included as much as the Second World War, where the all-embracing nature of the conflict, new technology, and the battle of ideologies conspired to make almost everywhere a war zone. The occupation of much of Europe in particular left huge areas that could be...
Independently Publishers, 2019. — 177 p. Sambo is a eclectic martial arts hand to hand combat system that was derived from studying over 70 regional wrestling systems and Japanese combat traditions that stem back to Judo, Aikido which all find their roots in Ju Jitsu. The Soviet Union was very selective on who was taught their hand to hand combat traditions. The Spetnaz and KGB...
Viking, 2020. — 352 p. From the former director of GCHQ, learn the methodology used by the British intelligence agencies to reach judgements, establish the right level of confidence and act decisively. Intelligence officers discern the truth. They gather information - often contradictory or incomplete - and, with it, they build the most accurate possible image of the world....
Учебное пособие. — Красноярск: КГАУ, 2019. — 302 с. Изложены правовые основы и порядок применения сотрудниками полиции физической силы, специальных средств и огнестрельного оружия. Раскрыты предмет, задачи и содержание тактико специальной подготовки сотрудников правоохранительных органов. Даны основы топографической и инженерной подготовки сотрудников правоохранительных...
Сборник документов. — М.: АИРО-XXI; СПб.: Алетейя, 2014. — 350 c. Фигуры, поставленные рядом в заголовке, объединяет многое. В. К. Плеве — второй директор Департамента полиции, занимал этот пост с 15 апреля 1881-го по 20 июля 1884 г. В 1884 г. он был назначен товарищем министра внутренних дел, заведующим полицией. А 4 апреля 1902 г. стал министром внутренних дел. В. Ф....
Springer-Verlag, 2011. — 232 p. The current rapid development in both computing power and the ability to present and mine complex data sets in useful ways provides the backdrop to Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organized Crime. The chapters address the linkage between: law enforcement; developments in information and...
Paladin Press, 1991. — 78 p. Fear is the polygrapher's most powerful weapon, but you can defend yourself! All it takes is a little know-how and some concentration and practice. Arm yourself with these proven effective tactics for rendering the polygrapher impotent in his efforts to intimidate and manipulate you, and learn how to beat the box hands down!
Mentor Enterprises, 2020. — 257 p. Every Soldier dreams about conducting a night HALO jump onto a target building to snatch a High Value Target. In this book a retired 5th Special Forces Group CSM takes you through how to conduct many of the Advanced Special Operations techniques taught to our most elite Soldiers from snatching an EPW to conducting Special Reconnaissance. The...