|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
When the Cold War ended, the spying that marked the era did not. An
incredible true story from the Pulitzer Prize-nominated "New York
Times" bestselling author of "Crazy."
Between 1995 and 2000, "Comrade J" was the go-to man for SVR (the
successor to the KGB) intelligence in New York City, overseeing all
covert operations against the U.S. and its allies in the United
Nations. He personally handled every intelligence officer in New
York. He knew the names of foreign diplomats spying for Russia. He
was the man who kept the secrets.
But there was one more secret he was keeping. For three years,
"Comrade J" was working for U.S. intelligence, stealing secrets
from the Russian Mission he was supposed to be serving. Since he
defected, his role as a spy for the U.S. was kept under wraps-until
now. This is the gripping, untold story of Sergei Tretyakov, more
commonly known as "Comrade J."
The end of the Cold War presented a paradoxical dilemma for the
Intelligence Community (IC). The demise of the Soviet Union brought
about a significant downsizing of the nation's intelligence
apparatus while concurrently necessitating a major reallocation of
intelligence resources to cover a more complex array of
trans-national threats such as counter-proliferation, terrorism,
organized crime, drug trafficking, and ethnopolitical conflict. The
combination of shrinking budgets and expanding analytical
requirements placed enormous demands on the Community. Among the
most pressing challenges was the need for an on-demand, surged
intelligence capability for coverage over a diverse range of
operational requirements. A key recommendation of a 1996 House
Permanent Select Committee investigation of the nation's
intelligence capabilities called for the creation of a dynamic
surge capacity for crisis response. The Committee concluded that
such resources "need not be self-contained within the IC," but must
be quickly marshaled "without undue concerns about who owns the
assets." Several other independent reform studies at the time
proposed initiatives to satisfy surged collection demands by
leveraging nongovernmental resources. Despite these
recommendations, during the 1990s there was little effort to create
such a surge capacity. Bureaucratic inertia and lack of clear
consensus on an intelligence reform agenda made major initiatives
impossible. With the enormous intelligence demands of the Global
War on Terrorism (GWOT) the issue of surge capacity has reemerged
as a critical issue for community leaders. Collection management,
remote sensing, linguistic support, document exploitation,
interrogation, and technical analysis are just some intelligence
support functions currently being performed by private contractors.
This ad hoc response to meet the intelligence requirements of GWOT
operations has produced mixed results. One report strongly
recommended the permanent integration of commercial imagery
products into the conventional collection management cycle for
operational commanders. Conversely, a key fi nding of the Army
Inspector General's report on OIF detainee operations in Iraq
clearly identifi ed poor training and misuse of contract
interrogators as a contributing factor in detainee abuse. These
examples speak to both the promise and the liability of utilizing
commercial augmentation for intelligence surge capacity. Given the
current mismatch between operational requirements and intelligence
force structure, there will be continuing reliance on commercial
augmentation. As critical intelligence requirements are
increasingly resourced through commercial augmentation, IC leaders
must determine the appropriate roles for private sector firms and
provide effective plans for legal oversight, operational
integration, and management of contracted support. To date, few
studies have adequately considered the policy implications of
integrating non-governmental providers into the operational
intelligence cycle. GWOT operations have required significant
reliance on private sector resources for intelligence collection
and analysis but have done so without sufficient measures for
effective acquisition, management and accountability over
commercial providers. This study assesses the value of current
commercial activities used within DoD elements of the Intelligence
Community, particularly dealing with operational functions such as
analysis, collection management, document exploitation,
interrogation, production, and linguistic support. These functions
were selected due to the extensive use of commercial augmentation
in these areas during recent GWOT operations.
In recent years, it has become increasingly clear to many observers
that the Department of Defense must better communicate to the
officers at the tactical end of the nuclear mission a rationale for
nuclear weapons and deterrence, the critical role that they play in
the post-Cold War strategy of the United States, and the value of
nuclear weapons to the security of the American people. This report
tracks the changing conceptual and political landscape of U.S.
nuclear deterrence to illuminate the gap in prioritizing the
nuclear arsenal and to build a compelling rationale for tactical
personnel explaining the role and value of U.S. nuclear weapons.
National intelligence cultures are shaped by their country's
history and environment. Featuring 32 countries (such as Albania,
Belgium, Croatia, Norway, Latvia, Montenegro), the work provides
insight into a number of rarely discussed national intelligence
agencies to allow for comparative study, offering hard to find
information into one volume. In their chapters, the contributors,
who are all experts from the countries discussed, address the
intelligence community rather than focus on a single agency. They
examine the environment in which an organization operates, its
actors, and cultural and ideological climate, to cover both the
external and internal factors that influence a nation's
intelligence community. The result is an exhaustive, unique survey
of European intelligence communities rarely discussed.
The Soviet invasion of Afghanistan, in support of a
Marxist-Leninist government, and the subsequent nine-year conflict
with the indigenous Afghan Mujahedeen was one of the bloodiest
conflicts of the Cold War. Key details of the circumstances
surrounding the invasion and its ultimate conclusion only months
before the fall of the Berlin Wall in November 1989 have long
remained unclear; it is a confidential narrative of clandestine
correspondence, covert operations and failed intelligence. The
Secret War in Afghanistan undertakes a full analysis of recently
declassified intelligence archives in order to asses Anglo-American
secret intelligence and diplomacy relating to the invasion of
Afghanistan and unveil the Cold War realities behind the rhetoric.
Rooted at every turn in close examination of the primary evidence,
it outlines the secret operations of the CIA, MI6 and the KGB, and
the full extent of the aid and intelligence from the West which
armed and trained the Afghan fighters. Drawing from US, UK and
Russian archives, Panagiotis Dimitrakis analyses the Chinese arms
deals with the CIA, the multiple recorded intelligence failures of
KGB intelligence and secret letters from the office of Margaret
Thatcher to Jimmy Carter. In so doing, this study brings a new
scholarly perspective to some of the most controversial events of
Cold War history. Dimitrakis also outlines the full extent of
China's involvement in arming the Mujahedeen, which led to the PRC
effectively fighting the Soviet Union by proxy. This will be
essential reading for scholars and students of the Cold War,
American History and the Modern Middle East.
Presently, U.S. border security endeavors are compartmentalized,
fragmented, and poorly coordinated. Moreover, international
collaborations are extremely limited; success hinges on effective
international cooperation. This book addresses U.S. border security
management using complexity theory and a systems approach,
incorporating both borders and all associated border security
institutions simultaneously. Border security research has rarely
viewed all stakeholders as a holistic unit up to this point, nor
has border security been thoroughly examined using a systems
approach. The research in this book scrutinizes the current U.S.
border security paradigm in an attempt to determine the systemic
reasons why the system is ineffective in securing U.S. borders.
Additionally, the research investigates the current level of
international cooperation between the United States, Canada, and
Mexico. This book increases awareness and will possibly create
dissent among established agencies, which is the first step in
instituting needed changes that will ultimately increase North
American security. The book contends that the establishment of a
tri-national-United States, Canadian, and Mexican-border security
agency, in addition to legalizing drugs and reestablishing a guest
worker program, will be more effective and cost-efficient in
securing North American borders.
The book aims to educate officials as well as students about the
vicissitudes that accompany the development and execution of the
government intelligence function. The authors demonstrate that
national, strategic intelligence in any country of the Hemisphere
can experience episodes of devolution as well as positive
evolution, at the same time that the culturally modulated practices
of government professionals can oscillate between periods of
repression and democratic observance.
|
|