Moore, Alan, and Bill Sienkewicz. Brought to Light. Forestville, CA: Eclipse, 1989.
Chambers rightly dismisses this book as "Christic Institute nonsense."
Moore, Bob, ed. Resistance in Western Europe. Oxford and New York: Berg, 2000,.
Foot, I&NS 16.1, finds this work to be a "useful summary of the state of research into resistance to Nazism" in Belgium, the Channel Islands, Denmark, France, Italy, the Netherlands, and Norway. The author has written the introductory and concluding chapters. He sides with those who argue that the "resistance was not of a great deal of use."
[WWII/Eur/Resistance/Gen, Fr, Italy, Other]
Moore, Dan T., and Martha Waller. Cloak and Cipher. Indianapolis, IN: Bobbs-Merrill, 1962. London: Harrap, 1965.
Constantinides: This is an "introduction to cryptography and cryptanalysis," but also includes material on secret writing and other concealment forms. The authors give "historical examples and anecdotes that illustrate uses, misuses, successes, and failures of cryptology." The book suffers from being pre-Ultra.
Moore, David T.
1. Critical Thinking and Intelligence Analysis. Washington, DC: NDIC Press, 2007. Occasional Paper No. 14. 2d ed. Available at: http://www.ni-u.edu/ni_press/pdf/Critical_Thinking.pdf.
Wheaton, AIJ 30.1 (2012), comments that "while Moore more than adequately defends critical thinking skills for intelligence analysis, he provides little practical guidance for analysts seeking to improve their critical thinking skills with specific techniques."
2. "Species of Competencies for Intelligence Analysis." Defense Intelligence Journal 11, no. 2 (Summer 2002): 97-119. American Intelligence Journal 23 (2005): 29-43.
3. and Lisa Krizan. "Core Competencies for Intelligence Analysis at the National Security Agency." In Bringing Intelligence About: Practitioners Reflect on Best Practices, ed. Russell Swenson, 105-123. Washington, DC: Joint Military Intelligence College, 2002.
4. and Lisa Krizan. "Intelligence Analysis: Does NSA Have What It Takes?" Cryptologic Quarterly 20, no. 2 (Summer-Fall 2001): 8-25. [cited p. 218/fn. 2 below]
5. Lisa Krizan, and Elizabeth J. Moore. "Evaluating Intelligence: A Competency-Based Model." International Journal of Intelligence and Counterintelligence 18, no. 2 (Summer 2005): 204-220.
Moore, David T. Sensemaking: A Structure for an Intelligence Revolution. Washington, DC, NDIC Press, 2011. Available at: http://www.ni-u.edu/ni_press/pdf/Sensemaking.pdf.
Wheaton, AIJ 30.1 (2012), notes that the author "argues for not just an improvement but a fundamental change in the way analysis is done." This work is "high theory," and consequently is "tough sledding. Moore pulls no punches as he bobs and weaves his way from topics as difficult and as different as complexity theory and non-state actors."
Moore, J. Daniel. "CIA Support to Operation Enduring Freedom" Military Intelligence (Jul.-Sep. 2002).
Moore. Jeffrey M.
1. "JICPOA: Joint Intelligence During WWII." Military Intelligence 21, no. 3 (Jul.-Sep. 1995): 35-39.
The author surveys the creation and organizational structure of the Joint Intelligence Center Pacific Ocean Area (JICPOA), which emerged during the war "because of the constant expansion and merging of other intelligence agencies." The JICPOA provided the Pacific Fleet operational intelligence support.
2. Spies for Nimitz: Joint Military Intelligence in the Pacific War. Annapolis, MD: Naval Institute Press, 2004.
See author's Website at: http://www.milintelligence.com/.
Ennis, AFIO WIN 5-04 (24 Feb. 2004), finds that the author "profiles the history and operations of America's first effective, all-source, joint military intelligence agency known as JICPOA [Joint Intelligence Center, Pacific Ocean Areas]. JICPOA is credited with providing Adm. Nimitz with intelligence needed to win the Pacific war."
For Darron, NIPQ 20.3 [reprinted from Marine Corps Gazette 89.2 (Feb 2005)], this work "is a bit tough to read" given the author's lack of military experience and lack of fluency in the military's language. However, it "should be required reading in every intelligence schoolhouse." Moore "has done extensive research into intelligence structure and process in the Pacific war and his footnotes reference many JICPOA (and its immediate forerunners) reports as primary sources."
Peake, Studies 48.4, refers to Spies for Nimitz as "the first full examination of how this group of all-source analysts [JICPOA] functioned and contributed to the war." The author evaluates "the sources, the quality of intelligence that JICPOA produced -- terrain, aerial, and cryptographic data, interrogation reports, and order of battle -- and the importance of the intelligence to the outcome for each of the major Pacific battles." This is a "valuable and very interesting book."
To Wirtz, NWCR 58.4 (Autumn 2005), this book is about "what is referred to in today's parlance as 'intelligence preparation of the battlefield.'" The author "links the intelligence provided [by JICPOA] to planners ... to the outcome of the major amphibious assaults against Japanese-occupied islands.... When intelligence analysts provided accurate pictures of the battlefield, operations generally went smoothly and U.S. casualties were light. When they underestimated enemy strength, failed to warn the assault of strange topographic conditions, or failed to anticipate shifts in enemy strategy, the outcome was a grinding attritional battle that generated high losses."
Moore, Jeffrey M. "Pacific Island Intelligence: The Assault on Tinian." American Intelligence Journal 18, no. 1/2 (1998): 81-86.
The campaign for Tinian began on 24 July 1944 and ended nine days later, with relatively light U.S. casualties. The author attributes the success of the campaign to "near perfect intelligence on Tinian's hydrography, geography, and Japanese order of battle."
Moore, John Norton. The Secret War in Central America: The Sandinista Assault on World Order. Frederick, MD: University Press of America, 1987. [Chambers]
Moore, John Norton, Frederick S. Tipson, and Robert F. Turner, eds. National Security Law. Durham, NC: Carolina Academic Press, 1990. Moore, John Norton, and Robert F. Turner, eds. National Security Law. 2d ed. Durham, NC: Carolina Academic Press, 2005.
Commenting on the second edition of this work, Henseler, NWCR 59.1 (Winter 2006), finds that the editors "have gone to great lengths to create ... an up-to-date casebook that covers not only the fundamentals of national security law but also new areas in the law that are burgeoning as we enter the twenty-first century.... Most notably, they place a clear emphasis on national security issues that have arisen in the postCold War era.... Moore and Turner have succeeded in producing a comprehensive, well organized, extremely well written casebook filled with seminal cases, insightful commentary, and stimulating questions for discussion."
Moore, John Norton, Guy B. Roberts, and Robert F. Turner, eds. National Security Law Documents. 2d ed. Durham, NC: Carolina Academic Press, 2005.
From publisher: This "companion volume to the casebook National Security Law ... brings together a wealth of documents ranging from ... George Washington's Farewell Address and George Kennan's Long Telegram to important international conventions, domestic laws, executive orders, and departmental regulations on such matters as FBI counter-terrorism investigations and State Department treaty procedures."
Moore, Molly. "Report Gives Details on CIA Prisons: NATO Pacts Exploited, European Probe Finds." Washington Post, 9 Jun. 2007, A1. [http://www.washingtonpost.com]
According to an investigative report completed for the Council of Europe and released in Paris on 8 June 2007, "[t]he CIA exploited NATO military agreements to help it run secret prisons in Poland and Romania where alleged terrorists were held in solitary confinement for months, shackled and subjected to other mental and physical torture.... Officials speaking on behalf of the CIA, NATO, Poland and Romania ... criticized the report's findings."
[CIA/00s/07; OtherCountries/Poland/PostCW & Romania]
Moore, Molly. "Spy Network Stuns Mexicans: Raid Opens Door to Exposure of Government Snooping." Washington Post, 13 Apr. 1998, A1. [http://www. washingtonpost.com]
A Mexican senator has exposed a large government electronic eavesdropping operation in the southern Mexican city of Campeche. The bugging was directed against Mexican citizens, political foes of the government, and prominent business leaders. "In recent weeks, more than a dozen other alleged examples of government [internal] espionage have been uncovered across the country."
Moore, Robin. The Hunt for Bin Laden: Task Force Dagger. New York: Random House, 2003.
Stein, Washington Post, 16 Mar. 2003, says that this book "is fast-paced and immensely entertaining, in a ... cartoon-strippy way. Page after page, Moore's prose reads like a defiant country-and-western anthem.... (It should be noted ...that ... Moore was hardly 'on the ground with the Special Forces in Afghanistan,' except in the loosest sense of the phrase. This is the barroom version of the war, as told by their balladeer.) Nevertheless, it often rings true.... Moore does reach a kind of ground truth in his narrative of Special Forces at war: the dangerous, sometimes thrilling but unpredictable nature of combat."
For Clemens, MI 30.4 (Oct.-Dec. 2004), this "book's strength is the chapters on operations with the NA [Northern Alliance], based on interviews with SF soldiers." However, "some chapters are more fully developed and better written than others." Moore's "analysis is unquestionably subjective.... This book is strictly a heroic portrayal of a military victory." In addition, the "sections covering operations after December 2001 relied on ... a source [who] proved dubious" and whose "fraudulent past casts doubt on parts of the book."
[MI/Ops/Afghanistan/Books & SpecOps]
Moore, William K. "MASINT: New Eyes in the Battlespace." Military Intelligence 29 (Jan.-Mar. 2003): 31-34ff.
The author deals with such matters as the importance of MASINT in identifying battlespace entities; the nature of tactical MASINT; and the benefits of MASINT to the field commander.
Return to M Table of Contents
Return to Alphabetical Table of Contents