Huband, Mark. Trading Secrets: Spies and Intelligence in an Age of Terror. London: I. B. Tauris, 2013.
Peake, Studies 57.3 (Sep 2013), and Intelligencer 20.2 (Fall-Winter 2013), finds that the auhtor's "suggestions point to the conclusion that he has not acquired sufficient understanding of the intelligence profession to be regarded as an expert."
Hubbard, Anthony, and Nicky Hager.
1. "Citizens Targeted by SIS." Sunday Star-Times (Auckland), 21 Nov. 2004. [http://www.sundaystartimes.co.nz]
The New Zealand Secret Intelligence Service (NZSIS) "has been involved in a widespread and probably unlawful campaign to infiltrate and bug Maori organisations, three spies have told the Sunday Star-Times. They provided a detailed description of a top-secret programme called Operation Leaf, a major SIS campaign targeting a variety of Maori organisations and individuals over several years."
2. "Spies Blow Whistle on Operation Leaf." Star-Times (Auckland), 21 Nov. 2004. [http://www.sundaystartimes.co.nz]
"A group of dissident spies has launched an unprecedented attack on the SIS, saying it has misused its powers by bugging law-abiding Maori for political intelligence. The SIS's Operation Leaf, they say, has been used to find 'dirt' on individuals, and intelligence about iwi divisions, finances and Treaty claims."
Hubbard, Douglass H., Jr. Special Agent, Vietnam: A Naval Intelligence Memoir. Washington, DC: Potomac, 2006.
According to Sulick, Studies 51.2 (2007), the author "chronicles the demanding counterintelligence and criminal investigation missions of the NIS [Naval Investigative Service (now Naval Criminal Investigative Service or NCIS] through detailed vignettes of cases drawn from his own experience and interviews with colleagues." However, the work "provides more insight into NIS criminal investigations than its counterintelligence operations.... Special Agent, Vietnam brims with atmospherics that only someone with first-hand experience like Hubbard could provide."
Prout, DIJ 16.1 (2007), comments that "[w]hile this book has merit, it holds little value to an intelligence professional seeking to learn about the U.S. Navy's intelligence or counterintelligence activities during the Vietnam era. The bulk of the cases are criminal in nature, and those few intelligence cases sadly lack any meaningful detail." Ochiai, I&NS 23.4 (Aug. 2008), also notes that most of the stories here "are about investigations of crimes committed by US servicemen."
Hubbard, Robert L. "Another Response to Terrorism: Reconstituting Intelligence Analysis for 21st Century Requirements." Defense Intelligence Journal 11, no. 1 (Winter 2002): 71-80.
The Intelligence Community needs to "return to requirements-based resourcing and develop realistic force level planning and acquisition based on the requirements that are being laid upon it."
Hubert, Ron, and James Keeley. A View from Above: Commercial Satellite Imagery, United Nations Peacekeeping and Canadian Security. Aldershot : Ashgate, 2004.
Hubest, Alfred. "Audiosurveillance." Studies in Intelligence 4, no. 3 (Summer 1960): 39-46.
"During the past 10 years there has been a great new surge in the use of audiosurveillance by intelligence services. This phenomenon can be attributed in large part to the development of improved listening, transmitting, and recording devices, new installation tools and techniques, a systematized operational approach to making audio installations, and advances in rapid processing and full exploitation of the take."
Huchthausen, Peter A., and Alexandre Sheldon-Duplaix. Hide and Seek: The Untold Story of Cold War Naval Espionage. Hoboken, NJ: Wiley, 2009.
Brooks, NIPQ 25.2 (Apr. 2009), comments that this "collection of stories makes good reading for the uninitiated, [but] few of the vignettes in the book are truly 'untold..' ... There are a few assertions ... which would be open to debate and one or two stories that simply don't correlate well with fact." For Burke, NWCR 63.1 (Winter 2010), "[a]lthough there are numerous references to archival historical material, books, and personal correspondence," the authors "largely rely on anecdotes..., loosely strung together, and offer few conclusions." This book is "an interesting and entertaining read," but it "does not add much to the body of knowledge about naval espionage."
Huckabey, Jessica M., and Mark E. Stout. "Al Quida's Views of Authoritarian Intelligence Services in the Middle East." Intelligence and National Security 25, no. 3 (Jun. 2010): 327-349.
"The jihadists perceive that operations of any significant scale against their home countries will lead to rounds of arrests, torture, and eventually, even the most battle-hardened veterans learned they could not wage any kind of war against regimes having a functioning security apparatus."
Hudec, James G. "Commentary: Unlucky SHAMROCK -- The View from the Other Side." Studies in Intelligence 10 (Winter-Spring 2001): 85-94. [https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/csi-studies/studies/winter_spring01/article12.pdf]
This commentary is a response to L. Britt Snider, "Recollections from the Church Committee's Investigation of NSA," Studies in Intelligence (Winter 1999-2000). Hudec was an attorney in NSA's Office of General Counsel during the 1974-1975 timeframe.
Hudson, Audrey. "DHS Picks New Chief for Intelligence Office." Washington Times, 24 Apr. 2009. [http://washingtontimes.com]
Homeland Security Secretary Janet Napolitano announced on 23 April 2009 that the White House will "nominate Phillip Mudd as undersecretary for Intelligence and Analysis." Mudd currently is the FBI's associate executive assistant director of the national security branch. Mudd replaces Roger Mackin, who will move to the cybersecurity section in the Office of the Director of National Intelligence (ODNI). Napolitano also said that "she will appoint Bart R. Johnson as the principal deputy undersecretary." Johnson is currently serving as "director of homeland security and law enforcement" at the ODNI.
Peter Finn and Walter Pincus, "Nominee Pulls Out as Role at CIA Is Studied: Interrogations of Suspects Are Cited," Washington Post, 6 Jun. 2009, report that on 5 June 2009, Mudd, a former deputy director at both the CIA's Office of Terrorism Analysis and the National Counterterrorism Center, withdrew from consideration for the DHS position. His action came "after it became apparent that senators examining his nomination planned to scrutinize his role in the agency's interrogation of terrorism suspects."
Hudson, Audrey. "Hill Eyes Change to Guard Nuke Secrets." Washington Times, 23 June 1999. Washington Times National Weekly Edition, 28 Jun.-4 Jul. 1999, 15.
In a hearing on 22 June 1999, Senate Republicans and Democrats said that "fundamental change" in the way in which the nation handles its nuclear secrets "is necessary."
Hudson, Audrey. "Homeland Security Revives Supersnoop." Washington Times, 8 Mar. 2007. [http://www.washingtontimes.com]
"Homeland Security officials are testing a supersnoop computer system [called ADVISE -- Analysis, Dissemination, Visualization, Insight and Semantic Enhancement] that sifts through personal information on U.S. citizens to detect possible terrorist attacks, prompting concerns from lawmakers who have called for investigations. The system uses the same data-mining process that was developed by the Pentagon's Total Information Awareness (TIA) project that was banned by Congress in 2003 because of vast privacy violations."
Hudson, Rex A. The Sociology and Psychology of Terrorism: Who Becomes a Terrorist and Why? Washington, DC: Library of Congress, Federal Research Division, 1999.
Hudson, Sydney [LTCOL]. Undercover Operator: An SOE Agent's Experiences in France and the Far East. Barnsley, UK: Pen and Sword, 2003. Oxford: Isis, 2006.
From publisher: "Memoirs of SOE agents have always been rare.... But Sydney Hudson's story ... is just about as dramatic and thrilling as any to have appeared. The author was captured and escaped into Spain, to return to fight with the Marquis."
Hue, André, and Ewen Southby-Tailyour. The Next Moon: The Remarkable True Story of a British Agent Behind the Lines in Wartime France. New York: Viking, 2004. New York: Penguin Global, 2005. [pb]
Kieffer, RUSI Journal, Jun. 2004, finds that this book "provides the lively anecdotal support of so much that has been written on SOE by eminent historians." The book has been "[e]ssentially written" by Southby-Tailyour, and "is based on extensive contemporary notes made by André Hue on his return to England in August 1944." The focus of the book is "the sixty or so days in the life of the author, from being parachuted into the Breton maquis on 5 June 1944, as part of the D-Day preparations, until 10 August.... [It] is a rattling good yarn and deserves to rank with the best books about SOE."
Huffman, Stephen. "The Navajo Code Talkers: A Cryptologic and Linguistic Perspective." Cryptologia 24, no. 4 (Oct. 2000): 289-320.
The security of the code used by the Navajo code talkers lay "in the profound difference between the phonetic systems of Navajo and Japanese. This difference effectively prevented the Japanese intercept operators from producing the consistent transcriptions of coded messages that were essential to cryptanalytic attack."
Hugon, Alain. Au Service du roi catholique: "Honorables ambassadeurs" et "Divins espions": Représentation diplomatique et service secret dans les relations hispano-françaises de 1598 a 1635. [In the Service of the Catholic King: "Honorable Ambassadors" and "Divine Spies": Diplomatic Representation and Secret Service in Hispano-French Relations from 1598 to 1635] Madrid: Casa de Velazquez, 2004.
According to Kahn, I&NS 23.2 (Apr. 2008), "[a]mong the many excellencies of this work are its data base of information about 240 spies and informers, with summaries of what is known about their persons and work."
Return to H Table of Contents
Return to Alphabetical Table of Contents