Geo - Get


Gephart, Ronald M. Revolutionary America, 1763-1789: A Bibliography. 2 vols. Washington, DC: Library of Congress, 1984.

Petersen: "Section in vol. 2 on Secret Service and Psychological Warfare."


Geraghty, Tony.

Gerard, Philip. Secret Soldiers: The Story of World War II's Heroic Army of Deception. New York: Dutton, 2002.

From publisher: "The men of the 23rd Headquarters Special Troops were recruited to become phantom warriors in a ghost army to help win the Battle of Europe." Their "mission was ... to deceive the German Army into believing that the Allies possessed more troops and material than they actually did and ... to draw enemy fire on their position to allow other units to advance free of lethal resistance.... From the use of inflatable rubber tanks and howitzers to elaborate sound effects, fake radio transmissions, special effects artillery, and other elements of stagecraft, these shadow soldiers put their lives on the line for their brother soldiers and for their country -- only to disappear from history and memory."


Gerecht, Reuel Marc -- also wrote under Edward G. Shirley

[Gerhard, William D.] "Special Issue: USS Liberty." Cryptolog 17, no. 3 (Jun. 1996): 2-5, 8-11.

"William D. Gerhard, National Security Agency, wrote a factual account of the outrage, using the sources at his command. The report was released as a special history report SRH-259. CRYPTOLOG printed this report in a special issue, July 1984, shortly after it became available. We reprint this document now, in memory of our fallen comrades."


Gerolymatos, André.

Gerson, Lennard D. The Secret Police in Lenin's Russia. Philadelphia, PA: Temple University Press, 1976.

Rocca and Dziak: This book "deals with the origins, evolution, and operational characteristics of Soviet state security in its first half decade. A solid piece of research and exposition."


Gerson, N.C. "SIGINT in Space." Studies in Intelligence 28, no. 2 (Spring 1984): 41-48. [Richelson, Wizards (2002)]

[GenPostwar/Issues/S&T; NSA/Sigint]

Gerstein, Daniel M.

1. Securing America's Future: Naitonal Strategy in the Information Age. Westport, CT: Praeger, 2005.

Chapman, IJI&C 19.3 (Fall 2006), finds that the core argument here "is that the world is leaving the Industrial Age and entering the Information Age, which requires that nations ... change and adapt their military and foreign policies to the new era." The reviewer finds it difficult to comprehend "what kind of information will bring people together across the globe." Gerstein "places great stock in globalization to change the world..., but it's debateable whether globalization" is actually such a force.

2. Leading at the Speed of Light: New Strategies for U.S. Security in the Information Age. Washington, DC: Potomac, 2006.

Baltrusaitis, JFQ 48 (1st Quarter 2008), says that the author's "attempt to reformulate the U.S. approach to strategic leadership falls short of hitting the mark by attempting to accomplish too much with too little." Gerstein's change to the U.S. security apparatus is based on an assumption of systemic failure. Yet, he fails to "convince[] the reader that he has identified the endemic problem." In addition, he "offers no solution on how to restructure government for the information age other than ordering a congressional review for reorganization."


Gerth, Jeff [New York Times].

Gertz, Bill [Washington Times]

Gertler, Jeremiah. U.S. Unmanned Aerial Systems. Washington, DC: Congressional Research Service, Library of Congress, 3 Jan. 2012. Available at:

From "Summary": "Congressional considerations include the proper pace, scope, and management of DOD UAS procurement; appropriate investment priorities for UAS versus manned aircraft; UAS future roles and applications; legal issues arising from the use of UAS; issues of operational control and data management; personnel issues; industrial base issues; and technology proliferation."


Gervasi, Tom. The Myth of Soviet Military Supremacy. New York: Harper & Row 1986.

Twining, I&NS 4.1, dismisses this work as "an unsophisticated attempt to apply a Marxist-Leninist interpretation to the military reality of superpower rivalry."


Geschwind, C. N. "The Tale of Hushai the Archite." Studies in Intelligence 13, no. 2 (Spring 1969): 21-24.

The author revisits II Samuel, 15-18, for the story of Hushai the Archite, King David's "agent of influence" with insurrectionist son Absalom.


Geschwind, C. N. "Wanted: An Integrated Counter-intelligence." Studies in Intelligence 7, no. 3 (Summer 1963): 15-37.

U.S. counterintelligence "forces are so compartmented that they do not register their aggregate inability to deal with the world-wide coordinated enemy attack." The author uses the "German theater" to make his points. He concludes that "[t]he primary cause of our infirmity is governmental inattention to the course, significance, and necessities of the covert war." As a solution, Geschwind proposes "the separation of intelligence and covert war functions and the establishment of a covert war organization."


Gettleman, Jeffrey. "In Vast Jungle, U.S. Troops Aid in Search for Kony." New York Times, 29 Apr. 2012. []

"One hundred of America's elite Special Operations troops, aided by night vision scopes and satellite imagery," are in the Central African Republic assisting in the hunt for rebel commander Joseph Kony. "Ken Wright, a Navy SEAL captain and the commander of the joint American detachment," emphasizes that the Americans "have no interest in participating in actual combat -- 'This is strictly an advise and assist role,' Captain Wright said." For some years now, the American government has been "running a semicovert logistics and intelligence operation to extend the Ugandan army's reach so it could chase Mr. Kony across the region."


Gettleman, Jeffrey, and Eric Schmitt. "U.S. Kills Top Qaeda Leader in Southern Somalia." New York Times, 15 Sep. 2009. []

According to American and Somali officials, U.S. Special Operations Forces operating from helicopters on 14 September 2009 killed Islamic militant Saleh Ali Saleh Nabhan and other Shabab leaders in a daylight raid in southern Somalia. "Shabab leaders said that six foreign fighters," including Nabhan, were "killed, along with three Somali Shabab."

[MI/SpecOps/00s; Terrorism/00s/09]

Getty, J. Arch, and Oleg V. Naumov. Yezhov: The Rise of Stalin's "Iron Fist." New Haven, CT: Yale University Press, 2008.

For Peake, Studies 52.4 (Dec. 2008) and Intelligencer 17.1 (Winter-Spring 2009), the focus of this work is on "how Yezhov attained and then lost power under Stalin." The authors "barely mention" Yezhov's administration of Stalin's Great Terror. What is covered is well-documented "from Soviet archival sources," but the work leaves "half the story untold." Similarly, Rendle, I&NS 24.6 (Dec. 2009), finds that this "book is excellent on the structures of power within the party." However, the authors "say relatively little about Yezhov's period as head of the NKVD and his downfall.... The omission leaves the book unbalanced."

Legvold, FA 87.6 (Nov.-Dec. 2008), notes that the authors are an American historian and a Russian historian. They offer the "truly chilling proposition" that the NKVD head from 1936 to 1938 "believed what he said and believed in what he did." See also, Joseph Goulden's review in the Washington Times, 24 Aug. 2008. For another take on Yezhov, see Marc Jansen and Nikita PetrovStalin's Loyal Executioner:  People's Commissar Nikolai Ezhov 1895-1940 (Stanford, CA:  Hoover Institution Press, 2002). 


Getz, Arlene. "Dangerous Missions." Newsweek Weekend Edition, 9-10 Jan. 1999. [http://]

The central finding of the Accountability Review Board investigation into security at U.S. embassies is that "years of poor planning and low security priorities have left American missions vulnerable to terror attacks.... 'There was a collective failure by several administrations and Congresses over the past decade to invest adequate efforts and resources to reduce the vulnerability of U.S. diplomatic missions,' said review board chairman [Adm.] William Crowe."


Return to G Table of Contents

Return to Alphabetical Table of Contents