1. "The Easter Offensive of 1972: A Failure to Use Intelligence." Military Intelligence 24, no. 1 (Jan.-Mar. 1998): 40-42, 60.
The author concludes that U.S. and South Vietnamese commanders "had prior knowledge of NVA activity in preparation for the attack, but did not use that information to the maximum extent possible."
2. "Warning Intelligence: The Battle of the Bulge and the NVN Easter Offensive." American Intelligence Journal 17, no. 3/4 (1997): 71-79.
The author compares and discusses the role of warning intelligence in the Battle of the Bulge in 1944 and the North Vietnamese Easter Offensive of 1972. He concludes: "Though the location, numbers and types of forces were not the same, the command assumptions, the weather and the use and misuse of intelligence had almost the same catastrophic effects in both clashes....
"In studies of both campaigns, analysts and historians often cite the failure of intelligence to properly inform and alert the commanders of enemy intentions and capabilities as the chief reason for the successful 'surprise' achieved by the assaults. Upon closer examination, the 'cause' lies elsewhere.... 'It was not intelligence (evaluated information of the enemy) that failed. The failure was the commanders and certain G-2's, who did not act on the intelligence they had,' stated one of Patton's subordinates regarding the Bulge. It could just as easily have been written about Easter offensive of 1972."
[Analysis/Warning; Vietnam/Gen; WWII/Eur/Bulge][c]
Baker, Caleb. "Deception Techniques Put Target in Eye of the Beholder." Defense News, 4 (30 Oct. 1989): 12. [Seymour]
Baker, Carol M., and Matthew H. Fox. Classified Files: The Yellowing Pages. New York: Twentieth Century, 1972.
Baker, James E. In the Common Defense: National Security Law for Perilous Times. New York: Cambridge University Press, 2007.
Keiser, Proceedings 133.11 (Nov. 2007), finds that "[t]he author has given us a superb -- and not too arduous -- guide to comprehending the complexities of our laws and how they relate to national defense." While noting that Baker "does not address ... what to do when an operational situation is not covered by existing law," Peake, Studies 52.4 (Dec. 2008) and Intelligencer 17.1 (Winter-Spring 2009), still calls the book "a valuable resource for better understanding of the rule of law and the pervasive role lawyers play in the national security process."
For Fontenot. Military Review (Mar.-Apr. 2009), Baker "is able to make the basis of our national security system understandable. He does not, however, make it particularly easy to read. The book is heavy going. The topic is difficult and the writing sometimes dense, but the book is well organized and finished with a lawyer's rigor.... Every Soldier, regardless of service or grade, should read this excellent work."
Baker, Jeffrey L. "Domestic and National Security Wiretaps: A Fourth Amendment Perspective." International Journal of Intelligence and Counterintelligence 12, no. 1 (Spring 1999): 1-17.
"Throughout the twentieth century, a well-balanced process of coordinating electronic surveillance evolved out of both legislation and Supreme Court decisions."
Baker, John C., Kevin O'Connell, and Ray A. Williamson, eds. Commercial Observation Satellites: At the Leading Edge of Transparency. Washington, DC: Rand, 2001.
Baker, Kristin M. "Operation Joint Endeavor: Joint Stars in the Balkans." Military Intelligence 22, no. 4 (Oct.-Dec. 1996): 27-29.
The terrain in Bosnia-Herzegovina presents particular challenges to the Joint STARS collection system. Nevertheless, the system allowed its users to track the absence of gross violations of the Dayton Peace Accord.
Baker, Lafayette C.
1. Daring Exploits of Scouts and Spies. Chicago: Thompson & Thomas, 1894.
2. History of the United States Secret Service. Philadelphia: L.C. Baker, 1867. Philadelphia: King & Baird, 1868.
Petersen notes that the "Federal 'secret service,' run first by the Pinkerton detective agency and then by Lafayette Baker, was essentially a counterintelligence organization. Baker's writings are considered unreliable by experts." Fishel, Secret War, pp. 25-26, says that Baker "grossly inflates" his Civil War activities. But no matter how much Baker's saga "stretches credulity," there is sufficient evidence available that "it cannot be entirely written off."
Baker, Luke. "Israel Engaged in Covert War Inside Iran: Report." Reuters, 17 Feb. 2009. [http://www.washingtonpost.com]
"[Q]uoting a former CIA agent and intelligence experts," Britain's Daily Telegraph said on 17 February 2009 that "Israel is involved in a covert war of sabotage inside Iran to try to delay Tehran's alleged attempts to develop a nuclear weapon.... Some analysts caution that reports of such a 'dirty war' may form part of a psychological warfare campaign to unsettle Iran."
Baker, Russell. "The Other Mr. Dulles--Of the CIA." New York Times Magazine, 6 Mar. 1958, 17, 96-97. [Petersen]
Baker, Stewart. "Should Spies Be Cops?" Foreign Policy 97 (Winter 1994-1995): 36-52.
ProQuest: The BNL affair "centered on charges that the Justice Department and the CIA covered up the Bush administration's channeling of prewar military assistance to Iraq. Whether the CIA should expand its traditional beat to become cops is discussed."
Baker, Stewart. Skating on Stilts: Why We Aren't Stopping Tomorrow's Terrorism. Stanford, CA: Hoover Institution Press, 2010.
Peake, Studies 55.1 (Mar 2011), notes that this work "is the story of Baker's four-year tenure [with DHS] working to develop policies on border security, airline travel, cybersecurity, and ways to counter bioterrorism." The book "is a serious treatment of the conflict between the need for improved security and the privacy and other concerns that oppose making better use of available technology to provide that greater security."
Baker, Stewart A., and Paul R. Hurst. The Limits of Trust: Cryptography, Governments, and Electronic Commerce. Cambridge, MA: Kluwer Law International, 1998.
Kruh, Cryptologia 23.3, finds that this work will "provide an invaluable reference book for lawyers, business people, technologists, and others interested in being up-to-date on the crypto policy debate, international initiatives, and encryption regulations around the world."
Return to Bah-Bala