![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
For the ordinary people of Nazi Germany, resistance rarely took the
form of active political or economically disruptive activity. But a
great many people expressed their disgust through jokes and humor.
In "Underground Humour in Nazi Germany: 1933-1945," F. K. M.
Hillenbrand compiles a collection of jokes, stories and cartoons
representing covert popular opposition which took humorous form.
Even this was dangerous, as an ill-judged moment of wit could lead
to the camps; but the Nazis themselves recognized the impossibility
of stopping anti-Nazi jokes.
During the critical summer months of 1943, Noor Inayat Khan was the only wireless operator transmitting secret messages from Nazi-occupied France to the Special Operations Executive in Britain. As the daughter of an Indian mystic, brought up in a household devoted to peaceful reflection on the outskirts of Paris, Khan did not seem destined for wartime heroism. Yet, faced with the evils of Nazism, she volunteered to help the British; was trained in espionage, sabotage and reconnaissance; and returned to France with a new identity. Khan transmitted details crucial to the Allies' success on D-Day, until she was captured and imprisoned by the Gestapo. She attempted two escapes before being sent to Germany. Three months after the Allied invasion of France, she was executed at Dachau. Her last word was "liberte".
This book traces the history of Australia's highly secret Intelligence Security Organisation. Established in the early days of the Cold War, like most intelligence organisations working under covert conditions, it exceeded the vague powers entrusted to it. It has been the subject of two Royal Commissions in Australia and in recent times several acts of Parliament have been passed in order to make it more accountable to Australia's government and its citizens.
During the decade that preceded Mikhail Gorbachev's era of glasnost
and perestroika, the KGB headquarters in Moscow was putting out a
constant stream of instructions to its Residencies abroad. These
top secret documents were principally concerned with agent
recruitment, infiltration of key foreign organizations,
intelligence collection and interpretation, and influence
operations, while endeavouring at all times to promote and protect
the interests of the Soviet Union against countries seen as
enemies.
States seldom resort to war to overthrow their adversaries. They are more likely to attempt to covertly change the opposing regime, by assassinating a foreign leader, sponsoring a coup d'etat, meddling in a democratic election, or secretly aiding foreign dissident groups. In Covert Regime Change, Lindsey A. O'Rourke shows us how states really act when trying to overthrow another state. She argues that conventional focus on overt cases misses the basic causes of regime change. O'Rourke provides substantive evidence of types of security interests that drive states to intervene. Offensive operations aim to overthrow a current military rival or break up a rival alliance. Preventive operations seek to stop a state from taking certain actions, such as joining a rival alliance, that may make them a future security threat. Hegemonic operations try to maintain a hierarchical relationship between the intervening state and the target government. Despite the prevalence of covert attempts at regime change, most operations fail to remain covert and spark blowback in unanticipated ways. Covert Regime Change assembles an original dataset of all American regime change operations during the Cold War. This fund of information shows the United States was ten times more likely to try covert rather than overt regime change during the Cold War. Her dataset allows O'Rourke to address three foundational questions: What motivates states to attempt foreign regime change? Why do states prefer to conduct these operations covertly rather than overtly? How successful are such missions in achieving their foreign policy goals? -- Cornell University Press
Acclaimed historian Michael Burleigh examines assassination as a special category of political violence and asks whether, like a contagious disease, it can be catching. Focusing chiefly on the last century and a half, Burleigh takes readers from Europe, Russia, Israel and the United States to the Congo, India, Iran, Laos, Rwanda, South Africa and Vietnam. And, as we travel, we revisit notable assassinations, among them Leon Trotsky, Hendrik Verwoerd, Juvénal Habyarimana, Indira Gandhi, Yitzhak Rabin and Jamal Khashoggi. Combining human drama, questions of political morality and the sheer randomness of events, Day of the Assassins is a riveting insight into the politics of violence.
Behind the celebrated code-breaking at Bletchley Park lies another secret...The men and women of the ' Y' (for Wireless' ) Service were sent out across the world to run listening stations from Gibraltar to Cairo, intercepting the German military's encrypted messages for decoding back at the now-famous Bletchley Park mansion. Such wartime postings were life-changing adventures - travel out by flying boat or Indian railways, snakes in filing cabinets and heat so intense the perspiration ran into your shoes - but many of the secret listeners found lifelong romance in their far-flung corner of the world. Now, drawing on dozens of interviews with surviving veterans, Sinclair McKay tells their remarkable story at last.
National intelligence cultures are shaped by their country's history and environment. Featuring 32 countries (such as Albania, Belgium, Croatia, Norway, Latvia, Montenegro), the work provides insight into a number of rarely discussed national intelligence agencies to allow for comparative study, offering hard to find information into one volume. In their chapters, the contributors, who are all experts from the countries discussed, address the intelligence community rather than focus on a single agency. They examine the environment in which an organization operates, its actors, and cultural and ideological climate, to cover both the external and internal factors that influence a nation's intelligence community. The result is an exhaustive, unique survey of European intelligence communities rarely discussed.
In literature and film the spy chief is an all-knowing, all-powerful figure who masterfully moves spies into action like pieces on a chessboard. How close to reality is that depiction, and what does it really take to be an effective leader in the world of intelligence? This first volume of Spy Chiefs broadens and deepens our understanding of the role of intelligence leaders in foreign affairs and national security in the United States and United Kingdom from the early 1940s to the present. The figures profiled range from famous spy chiefs such as William Donovan, Richard Helms, and Stewart Menzies to little-known figures such as John Grombach, who ran an intelligence organization so secret that not even President Truman knew of it. The volume tries to answer six questions arising from the spy-chief profiles: how do intelligence leaders operate in different national, institutional, and historical contexts? What role have they played in the conduct of international relations and the making of national security policy? How much power do they possess? What qualities make an effective intelligence leader? How secretive and accountable to the public have they been? Finally, does popular culture (including the media) distort or improve our understanding of them? Many of those profiled in the book served at times of turbulent change, were faced with foreign penetrations of their intelligence service, and wrestled with matters of transparency, accountability to democratically elected overseers, and adherence to the rule of law. This book will appeal to both intelligence specialists and general readers with an interest in the intelligence history of the United States and United Kingdom.
A fresh examination of the life and crimes of the highest-ranking federal official ever tried for treason and espionage American Traitor examines the career of the notorious Gen. James Wilkinson, whose corruption and espionage exposed the United States to grave dangers during the early years of the republic. Wilkinson is largely forgotten today, which is unfortunate because his sordid story is a cautionary tale about unscrupulous actors who would take advantage of gaps in the law, oversight, and accountability for self-dealing. Wilkinson’s military career began during the Revolutionary War and continued through the War of 1812. As he rose to the rank of commanding general of the US Army, Wilkinson betrayed virtually everyone he worked with to advance his career and finances. He was a spy for Spain, plotted to have western territories split from the United States, and accepted kickbacks from contractors. His negligence and greed also caused the largest peacetime disaster in the history of the US Army. Howard W. Cox picks apart Wilkinson’s misdeeds with the eye of an experienced investigator. American Traitor offers the most in-depth analysis of Wilkinson’s court-martial trials and how he evaded efforts to hold him accountable. This astounding history of villainy in the early republic will fascinate anyone with an interest in the period as well as readers of espionage history.
In his bestselling Station X, Michael Smith brought us the astonishing true story of the breaking of the Enigma Code. In The Emperor's Codes, he continues the tale as he examines how Japan's codes were broken and explores the consequences for the Second World War. The Emperor's Codes tells the stories of John Tiltman, the eccentric British soldier turned codebreaker who made many of the early breaks into Japanese diplomatic and military codes; Eric Nave, the Australian sailor recruited to work for the British who pioneered breakthroughs in Japanese naval codes; and Hiroshi Oshima, the hard-drinking Japanese ambassador to Berlin whose candid reports to Tokyo of his conversations with Hitler and other high-ranking Nazis were a major source of intelligence in the war against Germany. Many of these revelations have been made possible only thanks to recently declassified British files, privileged access to Australian secret official histories and interviews with an unprecedented number of British, American and Australian codebreakers.
This book is the first account of the personal lives of the nearly 1,000 long-term political prisoners arrested under various sedition laws for their opposition to World War I, their trade union activities, or their unpopular political or religious beliefs. Based on the author's exclusive access to the uncensored prison files of many of these prisoners, and information obtained under the federal Freedom of Information Act, Kohn relays the powerful prison experiences of some of America's most famous and colorful labor, socialist, and peace leaders. With over ten years of research, and access to tens of thousands of pages of never-before released U.S. Department of Justice records, Stephen Kohn has been able to recreate the actual prison experiences of these political prisoners.
Identifying "lessons learned" is not new -- the military has been doing it for decades. However, members of the worldwide intelligence community have been slow to extract wider lessons gathered from the past and apply them to contemporary challenges. "Learning from the Secret Past" is a collection of ten carefully selected cases from post-World War II British intelligence history. Some of the cases include the Malayan Emergency, the Cuban Missile Crisis, Northern Ireland, and the lead up to the Iraq War. Each case acommpanied by authentic documents, illuminates important lessons that today's intelligence officers and policymakers -- in Britain and elsewhere -- should heed. Written by former and current intelligence officers, high-ranking government officials, and scholars, the case studies in this book detail intelligence successes and failures, discuss effective structuring of the intelligence community, examine the effective use of intelligence in counterinsurgency, explore the ethical dilemmas and practical gains of interrogation, and highlight the value of human intelligence and the dangers of the politicization of intelligence. The lessons learned from this book stress the value of past experience and point the way toward running effective intelligence agencies in a democratic society. Scholars and professionals worldwide who specialize in intelligence, defense and security studies, and international relations will find this book to be extremely valuable.
A critical look at how the world is responding to China's rise, and what this means for America and the world. China is advancing its own interests with increasing aggression. From its Belt and Road Initiative linking Asia and Europe, to its "Made in China 2025" strategy to dominate high-tech industries, to its significant economic reach into Africa and Latin America, the regime is rapidly expanding its influence around the globe. Many fear that China's economic clout, tech innovations, and military power will allow it to remake the world in its own authoritarian image. But despite all these strengths, a future with China in charge is far from certain. Rich and poor, big and small, countries around the world are recognizing that engaging China produces new strategic vulnerabilities to their independence and competitiveness. How China Loses tells the story of China's struggles to overcome new risks and endure the global backlash against its assertive reach. Combining on-the-ground reportage with incisive analysis, Luke Patey argues that China's predatory economic agenda, headstrong diplomacy, and military expansion undermine its global ambitions to dominate the global economy and world affairs. In travels to Africa, Latin America, East Asia and Europe, his encounters with activists, business managers, diplomats, and thinkers reveal the challenges threatening to ground China's rising power. At a time when views are fixated on the strategic competition between China and the United States, Patey's work shows how the rest of the world will shape the twenty-first century in pushing back against China's overreach and domineering behavior. Even before the COVID-19 pandemic, many countries began to confront their political differences and economic and security challenges with China and realize the diversity and possibility for cooperation in the world today.
From Spain to Syria, the thrilling, untold history of Nazi fugitives turned postwar agents-for America, the Soviets, the Third World, or themselves. After the Second World War, the Allies vowed to hunt Nazi war criminals "to the ends of the earth." Yet many slipped away-or were shielded by the West, in exchange for cooperation in the unfolding confrontation with Communism. Reinhard Gehlen, founder of West German foreign intelligence, welcomed SS operatives into the fold, overestimating their supposed capabilities. This shortsighted decision nearly brought down his cherished service, as the KGB found his Nazi operatives easy to turn or expose. However, Gehlen was hardly alone in this cynical strategy; the American, Soviet, French and Israeli secret services-and nationalist organisations and independence movements-all used former Nazi operatives in the early Cold War. Nazi fugitives became freelance arms traffickers, spies, and assassins, playing crucial roles in the clandestine contest between the superpowers. From posh German restaurants, smuggler-infested Yugoslav ports, and fascist holdouts in Franco's Spain to Damascene safehouses and Egyptian country clubs, these spies created a busy network of influence and information, a uniquely combustible ingredient in the covert struggles of the postwar decades. Unearthing newly declassified revelations from Mossad and other archives, historian Danny Orbach reveals this long-forgotten arena of the Cold War, and its colourful cast of characters. Shrouded in official secrecy, clouded by myth and propaganda, the extraordinary tale of these Nazi agents has never been properly told-until now.
'Literally impossible to put down' New York Times Book Review Gordon Thomas has a grasp of history... this is one of the few books to have captured the true nature of the Israeli Government and the thorough process of the Israeli power elite. Ari Ben-Menashe, Former Adviser on Intelligence to the Israeli Government Created in 1951 to ensure an embattled Israel' s future, the Mossad has been responsible for the most audacious and thrilling feats of espionage, counterterrorism and assassination ever ventured. Gideon' s Spies has been created from closed-door interviews with Mossad agents, informants and spymasters, and drawing from classified documentsand top-secret sources, revealing previously untold truths about the Israeli intelligence agency. Bang-up-to-date, this new paperback edition of this best-selling book includes startling new information on subjects ranging from Weapons of Mass Destruction, international terrorism, North Korea' s bird-flu war games and ' ethnic bombs' . The riveting text is supported by glossaries, appendices and shows a Mossad as it has historically been: brilliant, ruthless, flawed but ultimately fascinating.
In 2013, Edward Snowden revealed that the NSA and its partners had been engaging in warrantless mass surveillance, using the internet and cellphone data, and driven by fear of terrorism under the sign of security . In this compelling account, surveillance expert David Lyon guides the reader through Snowden s ongoing disclosures: the technological shifts involved, the steady rise of invisible monitoring of innocent citizens, the collusion of government agencies and for-profit companies and the implications for how we conceive of privacy in a democratic society infused by the lure of big data. Lyon discusses the distinct global reactions to Snowden and shows why some basic issues must be faced: how we frame surveillance, and the place of the human in a digital world. Surveillance after Snowden is crucial reading for anyone interested in politics, technology and society.
This book describes the design, manufacture, covert shipment and use of the many ingenious evasion and escape devices provided to Allied troops during WWII. Following the fall of mainland Europe, hostile Allied actions against land-based Axis forces were generally limited to air attacks. However, as the numbers of those attacks increased, the number of aircraft and crews failing to return grew alarmingly: something needed to be done to provide these air crews with aids to enable them to evade to safe territory or escape captivity, or losses of irreplaceable crews would become critical. Britain's MI-9 and U.S. MIS-X organizations were formed solely to support evaders and prisoners of war in occupied territories. They developed a wide variety of evasion and escape devices that were given to Allied Forces prior to operations in hostile territory or delivered clandestinely to POWs. It worked: the aids facilitated the return of thousands of men to their units.
After the Cold War, its history must be reassessed as the opening of Soviet archives allows a much fuller understanding of the Russian dimension. These essays on the classic period of the Cold War (1945-53) use Soviet and Western sources to shed new light on Stalin's aims, objectives and actions; on Moscow's relations with both the Soviet Bloc and the West European Communist Parties; and on the diplomatic relations of Britain, France and Italy with the USSR. The contributors are prominent European, Russian and American specialists.
The disciplines of strategic intelligence at the governmental level and competitive business intelligence constitute accepted methods of decision-supporting to prevent mistakes and strategic surprise. This research discovered that many researchers in the intelligence field feel that intelligence methodology in both contexts has reached a "glass ceiling." Thus far, research has focused separately on national intelligence and intelligence in business, without any attempt to benchmark from one field to the other. This book shows that it is possible to use experience gained in the business field to improve intelligence practices in national security, and vice versa through mutual learning. The book's main innovation is its proposition that mutual learning can be employed in the context of a model distinguishes between concentrated and diffused surprises to provide a breakthrough in the intelligence field, thereby facilitating better prediction of the surprise development. We Never Expected That: A Comparative Study of Failures in National and Business Intelligence focuses on a comparison between how states, through their intelligence organizations, cope with strategic surprises and how business organizations deal with unexpected movement in their field. Based on this comparison, the author proposes a new model which can better address the challenge of avoiding strategic surprises. This book can contribute significantly to the study of intelligence, which will become more influential in the coming years.
National intelligence agencies have long adjusted to the opportunities and threats from new technologies. From spy planes and satellites to the internet, they have created structures, concepts, and practices to best apply these new capabilities. But recent technological developments are different in kind. Increasingly affordable to non-governmental actors, they are powerful enough to overwhelm and marginalize much of what agencies do. So far, the large intelligence agencies have been too slow to recognize the need for transformation. They believe they can work emerging technologies into the current paradigm just as they have with other advances. This book argues that only with a new paradigm can they take up this fundamentally new technological challenge. The book explores this fast-developing world for intelligence agencies and offers a path for maintaining their effectiveness and centrality. Along the way it analyzes the emerging technologies and explains how these will likely affect intelligence work. The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities draws on a broad review of the academic literature, a deep familiarity with the relevant technologies, and extensive interviews and surveys with both intelligence practitioners and technology entrepreneurs. It lays out the principles for agency leaders to consider as they work on this essential transformation. |
![]() ![]() You may like...
|