|
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Based in part on author Felix's personal experiences as a political
agent in Hungary in the decades after World War II, this work
explains what the rules are for secret operations, why the U. S.
needs them, and how good a job our government and others are doing
in practice. Chapters cover the political and social systems that a
spy must rely on, the personal dilemmas an agent faces, and the
tricks to keeping one's cover. A new afterword features revelations
on Raoul Wallenberg's fate, British turncoat Kim Philby, and more.
Are IQ tests racially and culturally biased? That was the
controversial question in two landmark lawsuits: the California
case of Larry P. v. Riles (1979) and the Chicago case of PASE v.
Hannon (1980). Litigating Intelligence is a detailed analysis and
comparison of these complex cases--the background, evidence,
testimony, arguments, and surprising outcomes. It is also an
important case study of the role of social science testimony in the
courtroom and the role of the courts in setting social policy.
In 1987, former naval intelligence officer Jonathan Jay Pollard was
sentenced to life in prison for passing classified information to
the Israelis-the only person ever to be so severely punished for
spying on behalf of an American ally. Why was his sentence so
harsh? This fascinating, intensively researched book, by
investigative journalist Elliot Goldenberg, finally reveals the
whole story. After numerous interviews with top intelligence
operatives and government insiders, Goldenberg is able to make a
strong case that Pollard's sentence was not due to the severity of
the damage he inflicted on the security of the United States,
contrary to assertions by the Justice Department and the Pentagon.
His greatest crime, Goldenberg insists, was that Pollard
inadvertently stumbled upon and threatened to expose secret
dealings between President Reagan's most-trusted advisors and
Saddam Hussein. Pollard, realizing how much of a threat this might
mean to Israeli security, took it upon himself to pass on vital
information regarding these U.S.-Iraqi dealings to Israeli
security. Pollard's information eventually helped Israel target
Iraqi military establishments for strikes during the Gulf War.
The Hunting Horse (the Israeli code name for Pollard) provides a
rare glimpse into what may be the greatest cover-up in American
history, a world of secret agendas and covert operations that is
too often kept hidden from congressional oversight and public
scrutiny.
A highly valuable resource for students of intelligence studies,
strategy and security, and foreign policy, this volume provides
readers with an accessible and comprehensive exploration of U.S.
espionage activities that addresses both the practical and ethical
implications that attend the art and science of spying. Essentials
of Strategic Intelligence investigates a subject unknown to or
misunderstood by most American citizens: how U.S. foreign and
security policy is derived from the information collection
operations and data analysis by the sixteen major U.S. intelligence
agencies. The essays in this work draw back the curtain on the
hidden side of America's government, explaining the roles of
various intelligence missions, justifying the existence of U.S.
intelligence agencies, and addressing the complex moral questions
that arise in the conduct of secret operations. After an
introductory overview, the book presents accessibly written essays
on the key topics: intelligence collection-and-analysis,
counterintelligence, covert action, and intelligence
accountability. Readers will understand how intelligence directly
informs policymakers and why democracies need secret agencies;
learn how the CIA has become deeply involved in the war-like
assassination operations that target suspected foreign terrorists,
even some individuals who are American citizens; and appreciate how
the existence of-and our reliance on-these intelligence agencies
poses challenges for democratic governance. Provides a
comprehensive, up-to-date examination of all aspects of
intelligence by experts in the field, from collection-and-analysis
and counterintelligence to covert action and accountability Probes
into how the United States' intelligence agencies attempt to
protect the nation from cyberattacks by foreign nations and
terrorist groups-and documents the successes and failures Documents
the involvement of the National Security Agency (NSA) in bulk
"metadata" collection of information on the telephone records and
social media communications of American citizens Examines the
effects that have resulted from major leaks in the U.S. government,
from Wikileaks to the NSA Snowden leaks
The Stasi were among the most successful security and intelligence
services in the Cold War. Behind the Berlin Wall, colleagues,
friends, husbands and wives, informed on each other. Stasi chief,
General Mielke, prided himself on this situation. Under Marcus
Wolf, Stasi agents were spectacularly successful in gaining entry
into the West German Establishment and NATO. Some remain
undiscovered. Now, for the first time in English, two British
experts reveal how the Stasi operated. Based on a wealth of
sources, including interviews with former Stasi officers and their
victims, the book tells a fascinating yet frightening story of
unbridled power, misguided idealism, treachery, widespread
opportunism and lonely courage.
The debate over cyber technology has resulted in new considerations
for national security operations. States find themselves in an
increasingly interconnected world with a diverse threat spectrum
and little understanding of how decisions are made within this
amorphous domain. With The Decision to Attack, Aaron Franklin
Brantly investigates how states decide to employ cyber in military
and intelligence operations against other states and how rational
those decisions are. In his examination, Brantly contextualizes
broader cyber decision-making processes into a systematic expected
utility-rational choice approach to provide a mathematical
understanding of the use of cyber weapons at the state level.
Topics Discussed: The Key Concepts of Cyber The Motivation and
Utility for Covert Action Digital Power Anonymity and Attribution
in Cyberspace Cyber and Conventional Operations: The Dynamics of
Conflict Defining the Role of Intelligence in Cyberspace How actors
decide to use cyber-a rational choice approach Cognitive Processes
and Decision-Making in Cyberspace Finding meaning in the expected
utility of international cyber conflict
This is the story of Reuven Shiloah - the man who established the
Mossad, and laid the foundations for the intelligence community of
the State of Israel. Although he was head of the Mossad for only
two years, from its inception in April 1951 until his resignation
in March 1953, Shiloah was considered an institution in himself,
and through the organization that he created, he left his imprint
on Israeli intelligence, playing a critical role in the complex and
crisis-laden history of the establishment of Israel's formidable
intelligence network. Shiloah manoeuvred his way around the grey
world of undercover negotiations for three decades, from his
induction at the beginning of the 1930s to his untimely death in
1959 at the age of 49. The book is based on private archives, and
interviews with people who worked closely with Shiloah both in
Israel and abroad.
This book gives the true inside picture of the CIA during the Cold
War and how the agency saw the events in which it was involved.
Breckinridge started his career with the CIA as a briefing officer
(and within a year had become White House Briefing Officer) in 1953
and concluded it as Deputy Inspector General in 1979. The issues
Breckinridge reports on--the Bay of Pigs, the Warren Commission
Report, Vietnam, Watergate, Chile, plots against foreign leaders,
the Ramparts controversy, Laos, the Church and Pike committees--are
among the most controversial in the lives of Americans since the
mid-twentieth century. Breckinridge demostrates that the CIA was
not a "rogue elephant" but an agency acting under high level policy
directives, and he reveals a great deal about the internal life of
the CIA.
This is the first detailed study of Britain's open source
intelligence (OSINT) operations during the Second World War,
showing how accurate and influential OSINT could be and ultimately
how those who analysed this intelligence would shape British
post-war policy towards the Soviet Union. Following the Nazi
invasion of the Soviet Union in June 1941, the enemy and neutral
press covering the German occupation of the Baltic states offered
the British government a vital stream of OSINT covering the entire
German East. OSINT was the only form of intelligence available to
the British from the Nazi-occupied Soviet Union, due to the Foreign
Office suspension of all covert intelligence gathering inside the
Soviet Union. The risk of jeopardising the fragile Anglo-Soviet
alliance was considered too great to continue covert intelligence
operations. In this book, Wheatley primarily examines OSINT
acquired by the Stockholm Press Reading Bureau (SPRB) in Sweden and
analysed and despatched to the British government by the Foreign
Research and Press Service (FRPS) Baltic States Section and its
successor, the Foreign Office Research Department (FORD). Shedding
light on a neglected area of Second World War intelligence and
employing useful case studies of the FRPS/FORD Baltic States
Section's Intelligence, British Intelligence and Hitler's Empire in
the Soviet Union, 1941-1945 makes a new and important argument
which will be of great value to students and scholars of British
intelligence history and the Second World War.
The history of modern Israel is a fiercely contested subject. From
the Balfour declaration to the Six-Day War to the recent assault on
Gaza, ideologically-charged narratives and counter-narratives
battle for dominance not just in Israel itself but throughout the
world. In the United States and Israel, the Israeli cause is
treated as the more righteous one, albeit with important qualifiers
and caveats. In Mythologies Without End, Jerome Slater takes stock
of the conflict from its origins to the present day and argues that
US policies in the region are largely a product of mythologies that
are often flatly wrong. For example, the Israelis' treatment of
Palestinians after 1948 undermined its claim that it was a true
democracy, and the argument that Arab states refused to negotiate
with Israel for decades is simply untrue. Because of widespread
acceptance of these myths in both the US and Israel, the
consequences have been devastating to all of the involved parties.
In fact, the actual history is very nearly the converse of the
mythology: it is Israel and the US that have repeatedly lost,
discarded, or even deliberately sabotaged many opportunities to
reach fair compromise settlements of the Arab-Israeli and
Israeli-Palestinian conflicts. As Slater reexamines the entire
history of the conflict from its onset at the end of WWI through
the Netanyahu era, he argues that a refutation of the many
mythologies that is a necessary first step toward solving the
Arab-Israeli conflict. Focusing on both the US role in the conflict
and Israel's actions, this book exposes the self-defeating policies
of both nations — policies which have only served to prolong the
conflict far beyond when it should have been resolved.
Describes how, from 1944 to 1951, three high-level British Embassy
people in Washington spied for the Soviets.
During the Second World War, the United States benefited greatly
from the espionage collaboration between a well-connected
ex-professor of economics, Erwin Respondek, and his contact at the
U.S. embassy in Berlin, Sam Woods. The intelligence gathered by
Respondek and passed on to the U.S. government included the first
detailed and accurate warning about the Germans' plans to invade
the Soviet Union in 1941. It also included valuable information
about German atomic research, military operations, and secret
weapons. This espionage work--here described for the first
time--forms an intriguing chapter in the history of U.S.
intelligence operations during the war and is distinctive for the
personalities of the principal figures, their web of high-level
connections, and the impact of their achievements.
Among the important revelations of this book, which set it apart
from previous, passing references to this espionage collaboration,
are that Erwin Respondek was one of the United States's most
valuable wartime informants in Hitler's Germany, responsible for
the famed Barbarossa warning sent to the State Department; that
Franz Halder, the German army's chief of staff, was a major source
of Respondek's information on the Germans' invasion plan for the
Soviet Union; that Du Pont and the German chemical firm IG Farben
maintained a secret wartime exchange of scientific findings, up
until 1945; that during 1943 and 1944 the German Armaments Ministry
supported research leading toward the construction of a new kind of
cyclotron; that Sam Woods received from Respondek a tip-off on
Japanese war plans in the Pacific; and that Pope Pius XII was
peripherally involved in the resistance activities of Respondek and
his Berlin-based circle. This book should appeal to students and
scholars interested in Nazi Germany and World War II espionage and
to a wider, nonspecialist audience as well.
When HMS Laurentic sank in 1917, few knew what cargo she was
carrying, and the Admiralty wanted to keep it that way. After all,
broadcasting that there were 44 tons of gold off the coast of
Ireland in the middle of a vicious and bloody war was not the best
strategic move. But Britain desperately needed that gold.
Lieutenant Commander Guybon Damant was an expert diver and helped
discover how to prevent decompression sickness ('the bends'). With
a then world record dive of 210ft under his belt and a proven
history of military determination, Damant was the perfect man for a
job that required the utmost secrecy and skill. What followed next
was a tale of incredible feats, set against a backdrop of war and
treacherous storms. Based on thousands of Admiralty pages,
interviews with Damant's family and the unpublished memoirs of the
man himself, The Sunken Gold is a story of war, treasure - and one
man's obsession to find it.
A masterclass in cat-and-mouse espionage suspense - and the last
lost novel - from the iconic Number One bestselling author of A
SONG FOR THE DARK TIMES 'Ian Rankin is a genius' Lee Child It
always starts with a small lie. That's how you stop noticing the
bigger ones. After his friend suspects something strange going on
at the launch facility where they both work - and then goes missing
- Martin Hepton doesn't believe the official line of "long-term
sick leave"... Refusing to stop asking questions, he leaves his old
life behind, aware that someone is shadowing his every move. The
only hope he has is his ex-girlfriend Jill Watson - the only
journalist who will believe his story. But neither of them can
believe the puzzle they're piecing together - or just how shocking
the secret is that everybody wants to stay hidden... A gripping,
page-turning suspense masterclass - experience the brilliance of
the iconic Ian Rankin.
Why do seemingly successful wars never seem to end? The problem
centers on drones, now accumulated in the thousands, the front end
of a spying and killing machine that is disconnected from either
security or safety. Drones, however, are only part of the problem.
William Arkin shows that security is actually undermined by an
impulse to gather as much data as possible, the appetite and the
theory both skewed towards the notion that no amount is too much.
And yet the very endeavor of putting fewer humans in potential
danger in fact places everyone in greater danger. Wars officially
end, but the Data Machine lives on forever.
The Malayan Emergency lasted from 1948 to 1960. During these
tumultuous years, following so soon after the Japanese surrender at
the end of the Second World War, the whole country was once more
turned upside down and the lives of the people changed. The war
against the Communist Party of Malaya's determined efforts to
overthrow the Malayan government involved the whole population in
one form or another. Dr Comber analyses the pivotal role of the
Malayan Police's Special Branch, the government's supreme
intelligence agency, in defeating the communist uprising and
safeguarding the security of the country. He shows for the first
time how the Special Branch was organised and how it worked in
providing the security forces with political and operational
intelligence. His book represents a major contribution to our
understanding of the Emergency and will be of great interest to all
students of Malay(si)a's recent history as well as
counter-guerrilla operations. It can profitably be mined, too, to
see what lessons can be learned for counterinsurgency operations in
other parts of the world.
In today's global culture where the internet has established itself
as a main tool of communication, the global system of economy and
regulations, as well as data and decisions based on data analysis,
have become essential for public actors and institutions.
Governments need to be updated and use the latest technologies to
understand what society's demands are, and user behavioral data,
which can be pulled by intelligent applications, can offer
tremendous insights into this. Application of Artificial
Intelligence in Government Practices and Processes identifies
definitional perspectives of behavioral data science and what its
use by governments means for automation, predictability, and risks
to privacy and free decision making in society. Many governments
can train their algorithms to work with machine learning, leading
to the capacity to interfere in the behavior of society and
potentially achieve a change in societal behavior without society
itself even being aware of it. As such, the use of artificial
intelligence by governments has raised concerns about privacy and
personal security issues. Covering topics such as digital
democracy, data extraction techniques, and political
communications, this book is an essential resource for data
analysts, politicians, journalists, public figures, executives,
researchers, data specialists, communication specialists, digital
marketers, and academicians.
Drawing on recently released documents and private papers, this is
the first book-length study to examine the intimate relationship
between the Attlee government and Britain's intelligence and
security services at the start of the Cold War. Often praised for
the formation of the modern-day 'welfare state', Attlee's
government also played a significant, if little understood, role in
combating communism at home and overseas, often in the face of
vocal, sustained opposition from its own backbenches. This book
tells the story of Attlee's Cold War. From Whitehall vetting to
secret operations in Eastern Europe and the fallout of Soviet
atomic espionage on both sides of the Atlantic, it provides a fresh
interpretation of the Attlee government, making it essential
reading for anyone interested in the Labour Party, intelligence,
security and Britain's foreign and defence policy at the start of
the Cold War. -- .
The Central Intelligence Agency's relative transparency makes it
unique among the world's espionage operations. Over the past few
decades it has released over 31 million pages of previously
classified documents, including, most recently, the so-called
Family Jewels, a special collection of records on a series of
operations from the 1950s to the 1970s that violated the agency's
own legislative charter. Taken together, these papers permit a
partial glimpse inside the CIA's clandestine world: how it
operates; how it views the outside world; how it gets things right;
and, all too often, how it gets them wrong. The documentary
selections assembled here, carefully analyzed for content,
consistency, and context, guide readers through the CIA's shrouded
history and allow readers to sift the evidence for themselves. The
principal theme of this new documentary history of the Central
Intelligence Agency is the dilemma of maintaining a secret
organization in an open society. A democracy rests on
accountability, and accountability requires transparency: the
people cannot hold their government to account if they do not know
what it is doing in their name. At the same time, an intelligence
agency lives in a world of shadows. It cannot function if it is not
able to keep its sources, its methods, and many of its operations
secret. The resulting tension-and the constant temptation to take
advantage of the impunity that secrecy allows-has shaped the CIA's
history from its beginnings. Narrative chapters introducing the
successive periods of CIA history Analytical discussion setting the
individual documents in context and drawing connections among them
Timeline tracing major developments in CIA historyGeneral
bibliography of recommended print and electronic resources for
further study
Despite the mighty invasion force the Americans and British
mustered in England in early 1944, a top Allied general warned: If
the Germans have even a 48-hour advance notice of the time and
place of the Normandy landings, we could suffer a monstrous
catastrophe For his part, Adolf Hitler planned to inflict such a
massive bloodbath on the invaders that the Allies would agree to a
negotiated peace with Nazi Germany.
"Hoodwinking Hitler" is an action-packed, you-are-there account
about a colossal and incredibly intricate deception scheme created
and implemented by ingenious and diabolical minds, machinations
intended to bamboozle the Germans on true Allied invasion plans.
Facets of the global chicanery included electronic spoofing, double
agents, diplomatic deceit, whispering campaigns, femmes fatales,
camouflage, strategic feints, the French underground, murder plots,
phony military installations, misleading bombing raids, sabotage,
propaganda, traps, fake codes, and kidnap schemes. On D-Day, June
6, 1944, the Allies gained total surprise, mostly because of what
Winston Churchill called the greatest hoax in history. But not
until two months later, when the Allies broke out of Normandy, did
the deception scheme pass into history. By that time, ultimate
Allied victory in Europe was assured.
"Kati Marton's True Believer is a true story of intrigue,
treachery, murder, torture, fascism, and an unshakable faith in the
ideals of Communism....A fresh take on espionage activities from a
critical period of history" (Washington Independent Review of
Books). True Believer reveals the life of Noel Field, once a
well-meaning and privileged American who spied for Stalin during
the 1930s and forties. Later, a pawn in Stalin's sinister master
strategy, Field was kidnapped and tortured by the KGB and forced to
testify against his own Communist comrades. How does an Ivy
League-educated, US State Department employee, deeply rooted in
American culture and history, become a hardcore Stalinist? The
1930s, when Noel Field joined the secret underground of the
International Communist Movement, were a time of national collapse.
Communism promised the righting of social and political wrongs and
many in Field's generation were seduced by its siren song. Few,
however, went as far as Noel Field in betraying their own country.
With a reporter's eye for detail, and a historian's grasp of the
cataclysmic events of the twentieth century, Kati Marton, in a
"relevant...fascinating...vividly reconstructed" (The New York
Times Book Review) account, captures Field's riveting quest for a
life of meaning that went horribly wrong. True Believer is
supported by unprecedented access to Field family correspondence,
Soviet Secret Police records, and reporting on key players from
Alger Hiss, CIA Director Allen Dulles, and World War II spy master,
"Wild Bill" Donovan-to the most sinister of all: Josef Stalin.
"Relevant today as a tale of fanaticism and the lengths it can take
one to" (Publishers Weekly), True Believer is "riveting reading"
(USA TODAY), an astonishing real-life spy thriller, filled with
danger, misplaced loyalties, betrayal, treachery, and pure evil,
with a plot twist worthy of John le Carre.
|
|