|
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
The Strength of the Pack documents previously unknown aspects of
the history of federal drug law enforcement, from the formation of
the Bureau of Narcotics and Dangerous Drugs in 1968 through the
early years of the Drug Enforcement Administration. Picking up
where The Strength of the Wolf left off, the book shows how
successive administrations expanded federal drug law enforcement
operations under the pervasive but hidden influence of the CIA. The
"wolf pack" is a metaphor for the multitude of agencies and their
offshoots that comprise the labyrinth system currently waging the
eternal war on drugs. Once upon a time, the "lone wolf" federal
narcotics agent, last of the noir detectives, hard-boiled and
streetwise, stalked his prey: vicious Mafia drug dealers and their
international connections. But the rise of the American Superpower
and the opium-infused Vietnam War saw the lone wolf replaced by a
dehumanized bureaucratic system more suitable to empire: the wolf
pack, secretly led by the CIA and designed specifically for using
the war on drugs as a covert means of advancing the interests of
the U.S. ruling class at home and abroad. Based largely on
interviews with former federal narcotics agents and CIA officers,
as well as the influential politicians and government bureaucrats
they worked with, The Strength of the Pack focuses on the CIA's
steady infiltration and corruption of federal drug law enforcement
for the purpose of waging political and psychological warfare
against the American public. Many books have focused on the public
policy aspects of federal drug law enforcement, but no book to date
has plumbed as deeply into the secret policies, or taken as
comprehensive a view of them, as this one.
The Strength of the Wolf is the first complete history of the
Federal Bureau of Narcotics (1930-1968). Working undercover around
the globe, the FBN's charismatic "case-making" agents penetrated
the Mafia and its French connection. In the process, however, they
uncovered the national security establishment's ties to organized
crime. Victims of their freewheeling methods and unparalleled
success in hunting down society's predators, the agents were
ultimately targeted for destruction by the FBI and CIA. Based
largely on interviews with case-making agents, The Strength of the
Wolf provides a new, exciting, and revealing chapter in American
history.
This book is a compilation of CRS reports on the intelligence
community. Congresss and the American publics ability to oversee
and understand how intelligence dollars are spent is limited by the
secrecy that surrounds the intelligence budget process. Chapter 1
is designed to shed light on the IC budgetin terms of its programs,
management, and enduring issuesusing unclassified materials
available in the public domain. Chapter 2 focuses on cross-cutting
management issues that affect the Intelligence Communitys (ICs)
ability to counter pervasive and emerging threats to the United
States and balance resources both appropriately and wisely. The
next chapter reports on the use of contractors within the
intelligence community. Chapter 4 provides the names and
appointment provisions for selected Intelligence Community (IC)
senior officials. Chapter 5 summarizes dates and directives for the
establishment of each of the 17 IC component organisations. IC
Directive 116, Intelligence Planning, Programming, Budgeting, and
Evaluation System provides guidance for the IPPBE process. The
IPPBE process applies to all 17 IC components as discussed in
chapter 6. Chapter 7 differentiates clandestine from covert, using
clandestine to signify the tactical concealment of the activity and
covert operations as planned and executed to conceal the identity
of or permit plausible denial by the sponsor. The next chapter
builds on the notification requirements and the different
authorities of the U. S. Code need for covert action and
clandestine activities. Chapter 9 posits a potential framework for
congressional oversight of intelligence-related programs and
activities using the existing committee structure and notification
standards for the most sensitive intelligence activities: covert
action and clandestine intelligence collection. Total intelligence
spending is usually understood as the combination of the National
Intelligence Program (NIP), which supports strategic planning and
policymaking, and the Military Intelligence Program (MIP), which
supports military operational and tactical levels of planning and
operations as reported in chapter 10. Chapter 11 examines
intelligence funding over the past several decades, with an
emphasis on the period from 2007-2016.
Most discussions on electronic media and intellectual forums about
the effects of globalization on national security focus on violent
threats. Notwithstanding the plethora of books, journals and
research papers on national and international security, there is an
iota research work on issue of interconnectedness. The
interconnectedness of violent threats and their mounting effect
pose grave dangers to the aptitude of a state to professionally
secure its territorial integrity. Technological evolution and
aggrandized interlinkage of our world in general, and specifically
information technology, has affected people and society in
different ways. Daily life of every man and woman has become
influenced by these challenges. The twenty first century appeared
with different class of National Security threats. After the first
decade, world leaders, research scholars, journalists, politicians,
and security experts grasped that the world has become the most
dangerous place. The avoidance of war was the primary objective of
superpowers, but with the end of the Cold War, emergence of Takfiri
Jihadism, extremism, and terrorism prompted many unmatched
challenges. Home-grown extremism and radicalization continues to
expose a significant threat to the National Security of the EU and
Britain. The risks from state-based threats have both grown and
diversified. The unmethodical and impulsive use of a military-grade
nerve agent on British soil is the worse unlawful act of
bioterrorists.
A unique theory of what happens when leaders fear a revolution
abroad will spread to their own country and how that affects
international relations. When do leaders fear that a revolution
elsewhere will spread to their own polities, and what are the
international effects of this fear? In Revolutionary Contagion,
Chad E. Nelson develops and tests a theory that explains how states
react to ideological-driven revolutions that have occurred in other
nations. To do this, he analyzes four key revolutionary movements
over two centuries-liberalism, communism, fascism, and Islamism. He
further explains that the key to understanding the response to
revolutions lies in focusing on the extent to which leaders fear
upheaval in their own countries. According to the theory, Nelson
argues, fear of contagion is driven more by the characteristics of
the host rather than the activities of the infecting agents. In
other words, leaders will fear revolutionary contagion when they
have significant revolutionary opposition movements that have an
ideological affinity with the revolutionary state. A powerful
theory of the profound effects revolutions have on international
relations, this book shows why one simply cannot make sense of
international politics-including patterns of alliances and wars-in
certain situations without considering the fear of contagion.
|
|