Perdue, Robert E., Jr. Behind the Lines in Greece: The Story of Operational Group II. Bethesda, MD: Self-Published, n.d. [http://www.robertperdue.com]
From author: This book tells "the story of twenty-two enlisted men and two officers of [OSS] Operational Group [OG] II..., who served in German-occupied Greece in 1944." It "is based primarily on documents in the U. S. National Archives, including the official history of OG II. Other Archives sources include a record of the debriefing of the first leader of OG II, Lt. John Giannaris,... the diary of Robert Moyers, the OSS dentist serving as a physician..., the recently released 'consolidated 201 files' of the men of OG II, and material from interviews with Giannaris and Nicholas Pappas (second leader of OG II)."
[Pereira, John.] "Remarks by John Pereira, Director for Support, CIRA Luncheon, 5 October 2011." CIRA Quarterly 36, no. 4 (Winter 2011): 3-7.
In discussing his directorate, the speaker stated, "Our first challenge is that we have built a lifestyle that we can no longer afford." He continues to outline and discuss four additional challenges.
Perez, Evan, and Alkman Granitsas. "U.S. Seeks to Keep Spy Suspects in Jail; Cypriot Police Hunt for Man Who Fled." Wall Street Journal, 1 Jul. 2010. [http://online.wsj.com]
"Christopher Metsos, the alleged moneyman in the [Russian] spy ring, was arrested this week" in Cyprus, but "[a] judge granted him bail, with the agreement that he surrender his passport and report regularly to a police station. 'Within 24 hours of being bailed, Metsos simply disappeared,' prosecutors said."
Pérez-Grueso, María Dolores Elizalde. "Los Servicios de Información Británicos en España durante la I Guerra Mundial." Revista de historia militar, Suppl. 3 (2005): 227-259.
Peritz, Aki, and Eric Rosenbach. Find, Fix, Finish: Inside the Counterterrorism Campaigns That Killed Bin Laden and Devastated al Qaeda. New York: Public Affairs, 2012.
According to Daniels, Proceedings 139.1 (Jan. 2013), the authors argue that the "decade-long transition from a Cold War focus on nations and conventional military power to the current emphasis on individuals and small terrorist cells has been one of the most radical and underappreciated transformations in U.S. military history." This work "provides a useful broad history of the first decade of efforts against global terrorism." Peake, Studies 57.1 (Mar. 2013), and Intelligencer 20.1 (Spring/Summer 2013), finds that this work "is documented by well-known, mostly secondary sources, so there is little new in it. Still, the insights and context the authors provide make this a thoughtful, worthwhile contribution."
Perkins, David D. [LTC/USA] "Counterintelligence and Human Intelligence Operations in Bosnia." Defense Intelligence Journal 6, no. 1 (Spring 1997): 33-61. Ed. version. American Intelligence Journal 18, no. 1/2 (1998): 33-42.
This article is heavy on organizational detail and light on supporting examples for field activities. Nonetheless, it succeeds in giving a taste of how military CI and HUMINT activities are proceeding in the field in contingency operations. The author stresses the increasing importance to commanders of hand-held digital imagery, but notes that "database storage and retrieval of this information is still an unfulfillable requirement."
Perkins, Jacob R. Trails, Rails and the War: The Life of General Grenville M. Dodge. Indianapolis, IN: Bobbs-Merrill, 1929.
Petersen identifies Dodge as a "Union general in the west skillful in intelligence and counterintelligence operations" and an "[i]mportant Union intelligence figure in the west." See "Grenville M. Dodge: Grant's Intelligence Chief in the West" at the Huachuca History Program under "Masters of the Intelligence Art": http://www.huachuca.army.mil/sites/History/PDFS/MDODGE.PDF. See also, Stanley P. Hirshon, Grenville M. Dodge: Soldier, Politician, Railroad Pioneer (Bloomington, IN: Indiana University Press, 1967).
Perkus, Cathy, ed. Cointelpro: The FBI's Secret War on Political Freedom. New York: Monad, 1975.
Perl, Matthew. "Comparing US and UK Intelligence Assessment in the Early Cold War: NSC-68, April 1950." Intelligence and National Security 18, no. 1 (Spring 2003): 119-154.
The author compares NSC-68 (April 1950) with JIC (51) 6 (January 1951). The Americans and British utilized "dissimilar assumptions and interpretive approaches" in their intelligence assessments of the Soviet Union. It was on the "subjective questions -- the 'mysteries' -- that US and UK analysts disagreed throughout the early years of the Cold War, America's view of Communist doctrine leading them to ascribe aggressive intentions to the USSR long before Britain was prepared to do so."
[Analysis/Sov; GenPostwar/CW; UK/PostWWII]
Perl, Peter. "Chin's 'Good Fortune' Debated." Washington Post, 25 Nov. 1985, A16.
Perl, Peter. "The Spy Who's Been Left In the Cold." Washington Post Magazine, 5 Jul. 1998, W9 ff. [http://www.washingtonpost.com]
This article is more balanced than the Pollard-as-victim claptrap that has appeared much too frequently in recent years. The author takes the time to state clearly the position of the opposition to Pollard's release: "Key officials in the Defense and Justice departments and various intelligence agencies today remain as opposed to Jonathan Pollard's release as they were on March 4, 1987, when a federal judge sentenced him to life imprisonment for espionage.... These officials still consider Pollard a dangerous traitor whose release would send a terrible message that it's okay to spy for a friendly nation or to help an ethnic or religious homeland. And they portray Pollard as an arrogant, greedy and sometimes delusional young man who sold out his country for $50,000 in cash, jewelry and lavish trips abroad."
Perl, Raphael. Terrorism, the Future, and U.S. Foreign Policy. Washington, DC: Congressional Research Service, Library of Congress, Updated 11 Apr. 2003. Available at: http://www.fas.org/irp/crs/IB95112.pdf.
Perl, Raphael F. Terrorism and National Security: Issues and Trends. Washington, DC: Congressional Research Service, Library of Congress, 9 Mar. 2006. Available at http://www.fas.org/sgp/crs/terror/IB10119.pdf.
"As terrorism is a global phenomenon, a major challenge facing policy makers is how to maximize international cooperation and support, without unduly compromising important U.S. national security interests."
Perles, Alfred, ed. Great True Spy Adventures. London: Arco, 1957.
Wilcox identifies this as a "[p]opular account of various espionage events."
Perlez, Jane (New York Times)
Perlmutter, Amos. "Why the CIA Is Still Needed." Washington Times, 25 Sep. 1997, A17.
Perlmutter, Amos, and John Gooch. Military Deception and Strategic Surprise. London: Cass, 1982.
The items included here first appeared in vol. 5, no. 1 (1982) of the Journal of Strategic Studies.
Perlroth, Nicole, Jeff Larson, and Scott Shane. "N.S.A. Able to Foil Basic Safeguards of Privacy on Web." New York Times, 5 Sep. 2013. [http://www.nytimes.com]
According to documents provided by Edward J. Snowden, the former NSA contractor, NSA "has circumvented or cracked much of the encryption ... that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world."
Return to P Table of Contents
Return to Alphabetical Table of Contents