Beaumont, Frederick F. "On Balloon Reconnaissance as Practiced by the American Army." Papers of the Royal Engineer Corps 12 New Series (1963): 71-86. [Petersen]
Beaumont, Roger A. "The Flawed Soothsayer: Willoughby -- General MacArthur's G-2." Espionage 1, no. 4 (1985): 20-37.
Beaumont, Roger. Special Operations and Elite Units, 1939-1988: A Research Guide. Westport, CT: Greenwood, 1988.
From publisher: "Beaumont provides the most comprehensive survey available of modern special operations literature. His wide-ranging introduction sets the subject in its historical, typological, and national contexts, offering an illuminating overview of the use of special operations and elite units from World War II to the present. The bibliographic entries describe a broad sampling of materials."
Beavan, Colin. Operation Jedburgh: D-Day and Americas First Shadow War. New York: Penguin, 2006.
According to Peake, Studies 50.3 (Sep. 2006) and Intelligencer 15.2 (Fall-Winter 2006-2007), the author "includes a brief epilogue and a lengthy preface that digresses into gratuitous attacks on the CIA for its postwar covert action programs and the War on Terror. The preface also pays tribute to his grandfather, an OSS officer who worked with the Jeds but was not part of the Jedburgh teams. Beavan's claim that his grandfather was later the head of all CIA clandestine operations is incorrect."
Beavan, Stanley. Aegean Masquerade: A Royal Air Force Odyssey. Studley, UK: Brewin Books, 1994.
Surveillant 3.6 notes that Aegean Masquerade concerns "RAF wireless operations in the Mediterranean ... and RAF covert operations in Turkey and Greece. It is based on the author's first-hand experiences and RAF service."
Beaver, William. Under Every Leaf: How Britain Played the Greater Game from Afghanistan to Africa. London: Biteback Publishing, 2012.
Peake, Studies 57.3 (Sep 2013), and Intelligencer 20.2 (Fall-Winter 2013): "Working with new material found in the British National Archives," the author "provides the first complete account" of the British War Department's Intelligence Department (ID). The ID was created to provide intelligence "in finished form, unprejudiced by military biases."
Bebber, Robert [LT/USN]. "Cryptology at the Crossroads." U.S. Naval Institute Proceedings 141, no. 3 (Mar. 2015): 30-35.
"At a time when the EM-cyber environment has grown more complex and competitive and we have rebalanced to the largest region on Earth, we conduct the maritime cryptological mission with fewer resources."
Beck, Alfred M. Hitler's Ambivalent Attaché: Lt. Gen. Friedrich von Boetticher in America, 1933-1941. Dulles, VA: Potomac, 2005.
Campbell, IJI&C 20.2 (Summer 2007), sees this work as "a careful presentation of Boetticher's ability and achievements in this very difficult environment." However, although the author "tell[s] exhaustively what General Boetticher did, the volume does not explain why he performed certain primary activities throughout his life."
For Bendersky, Army History 64 (Summer 2007), this is a "well-written, detached, and balanced biography, though one which leaves open key questions.... Beck portrays Boetticher ... as a man whose cosmopolitan heritage and education made him the kind of culturally versatile observer well suited to attaché duties in a critical time and place.... But the reader is still left with a sense of unease about whether he really understands Boetticher and his motives, particularly regarding the more controversial aspects of his relationship to Nazism and anti-Semitism and how this relationship may have affected his perspectives on America and how he interpreted the U.S. situation to Berlin."
Beck, Melvin. Secret Contenders: The Myth of Cold-War Counter-Intelligence. New York: Sheridan Square, 1984.
Petersen: "Attack on U.S. counterintelligence agencies."
Beck, Neil J. "Espionage and the Law of War." American Intelligence Journal 29, no. 1 (2011): 126-136.
"This article suggests that jurists should reconsider how the law of war treats espionage. After tracing the development of IHL's [international humanitarian law] treatment of war spies, it will argue that the principal justifications for denying prisoner-of-war status to them are unfounded, and that the current rules and norms undermine broader goals of IHL."
Becket, Henry S.A. See Joseph C. Goulden.
Beckett, Ian F.W. Encyclopedia of Guerrilla Warfare. Santa Barbara, CA: ABC-CLIO, 1999. New York: Facts on File, 2001.
A Terrorism Bookshelf Review [http://www.terrorismcentral.com] notes that "[t]he entries in this well written and easy-to-understand guide cover guerrilla warfare from the late 18th century to the present day.... The entries cover the countries, wars, revolts, conflicts, movements, leaders, strategies, and concepts related to this type of military tactic.... The book also provides an extensive bibliography and a comprehensive historical time line of guerrilla warfare."
Beckett, Ian F.W. Modern Insurgencies and Counter-Insurgencies: Guerrillas and Their Opponents Since 1750. London: Routledge, 2001.
According to Berger, et al, I&NS 22.6 (Dec. 2007), the author "provides a long-term historical overview of insurgencies and counterinsurgencies." Beckett stresses "the historical and contemporary habit of Great Powers to take a relative lack of interest in counterinsurgency."
Beckett, Ian F.W. The Roots of Counter-Insurgency: Armies and Guerrilla Warfare, 1900-1945. London: Blandford, 1988.
Beckett, Ian F.W., and John Pumlot. Armed Forces and Modern Counter-Insurgency. New York: St. Martin's, 1985.
Return to B Table of Contents
Return to Alphabetical Table of Contents