Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    gbv_686272307
    Format: Online-Ressource (xxvii, 317 p) , ill., maps , 25 cm
    Edition: Online-Ausg. 2009 Electronic reproduction; Available via World Wide Web
    ISBN: 0714654809
    Series Statement: Studies in Intelligence
    Content: Intelligence activities have always been an integral part of statecraft, and this book looks at how the Romans used intelligence to maintain their empire's security
    Note: Includes bibliographical references (p. [290]-309) and index , Contents; Maps and illustrations; Maps; Illustrations; Foreword; Preface; Acknowledgments; About the author; Chronology; Abbreviations; Part I The Republic; Introduction: intelligence ancient and modern; Notes; 1 Trust in the gods, but verify; Intelligence and religion; Scouting and reconnaissance; Sources: prisoners, traitors, deserters, and exiles; Spies; Diversion, deception, and disinformation; Rome in transition; Notes; 2 Rome conquers Italy: methods and motives; Military intelligence 509-264 BC; Spies and scouts; Transmission; New institutions; Colonies and intelligence , Strategic intelligence and foreign policyDeception, stratagem, deceit, subterfuge; The early and middle Republic; Notes; 3 Hannibal's spies; Hannibal's war; Intelligence and psychological warfare; The road to defeat; The war moves to Africa; Winning the battles but losing the war67; Notes; 4 Diplomat, trader, messenger, client, spy: Rome's eyes and ears in the East; Diplomats; Traders; Messengers; Clientelae; Rome's eyes and ears; Notes; 5 The high price of failure: Crassus and the Parthians; The peaceful Parthians; The Roman invasion; The Battle of Carrhae; Notes; 6 Caesar goes to Britain1 , The targetPlanning considerations; Clearing the English Channel; Embarkation; The arrival; The invasion, 54 BC; The pursuit; Success or failure?; Notes; 7 Julius Caesar and the end of the Roman Republic; Scouts and reconnaissance; Spies and espionage; Traitors, prisoners of war, and deserters; Nonmilitary sources: ambassadors, diplomats, merchants, and aristocrats; Communications security: codes, ciphers, secret messages, and transmission; Defensive counterintelligence: Installation security; Operations security and censorship; Offensive counterintelligence: Deception , Psychological operationsSpeed; Learning tradecraft; Caesar and the end of the Republic; Notes; Part II The Empire; 8 The Augustan revolution: communications and internal security; The cursus publicus; Geographical intelligence; Internal security; Private spies: the delatores; The vigiles; The army as police; Security in the provinces; Censorship; The Augustan system and the loss of liberty; Notes; 9 Roman military intelligence; Speculatores; Exploratores; Allies as intelligence sources; Notes; 10 Intelligence systems failure: the slaughter of Varus in the Teutoburgerwald1 , Publius Quinctilius VarusArminius: Hermann the German; The setting; The location31; The evidence; The reconstructed narrative; Miscalculations; The results; Notes; 11 Transmission and signaling; Messages by courier; Fire and smoke signals; Codes; Semaphore; Hadrian's wall: the stanegate phase; Hadrian's wall: the wall fort phase; Hadrian's wall: the outpost forts; Cumberland coast defenses; Stainmore Pass; Gask ridge system; Antonine wall; Intelligence on the British frontier; Wetterau Limes; Northern Zone; Southern Zone; Upper German-Raetian border; Ongoing research; Roman SIGINT; Notes , 12 The Roman secret service , Electronic reproduction; Available via World Wide Web
    Additional Edition: ISBN 9780203005569
    Additional Edition: ISBN 9780714654805
    Additional Edition: Erscheint auch als Druck-Ausgabe Intelligence Activities in Ancient Rome : Trust in the Gods But Verify
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages