![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
James Klugmann appears as a shadowy figure in the legendary history of the Cambridge spies. As both mentor and friend to Donald Maclean, Guy Burgess and others, Klugmann was the man who manipulated promising recruits deemed ripe for conversion to the communist cause. This perception of him was reinforced following the release of his MI5 file and the disclosure of Soviet intelligence files in Moscow, which revealed he played a key part in the recruitment of John Cairncross, the 'fifth man', and had a pivotal war-time role in the Special Operations Executive, helping shift Churchill and the allies to support Tito and the communist partisans in Yugoslavia. In this book, Geoff Andrews reveals Klugmann's story in full for the first time, uncovering the motivations, conflicts and illusions of those drawn into the world of communism - and the sacrifices they made on its behalf.
A Guide to National Security offers an analysis of the threats and
policy responses facing the UK, presented within the framework of
the Government's National Security Strategy and the Strategic
Defence and Security Review. It explores the processes and
developments which have shaped the transformation of national
security over the last three decades, and critically examines the
processes of politicisation and securitisation that have delivered
the new strategic vision.
On 7 March 2004, former SAS soldier and mercenary Simon Mann prepared to take off from Harare International Airport with a plane full of heavy weaponry and guns for hire. Their destination: Equatorial Guinea. Their intention: to remove one of the most brutal dictators in Africa in a privately organised coup d’etat. The plot had the tacit approval of Western intelligence agencies. It had the backing of a European government, and the endorsement of a former Prime Minister. Simon Mann had personally planned, overseen and won two wars in Angola and Sierra Leone. Everything should have gone right. Why, then, did it go so wrong? When Simon Mann was released from five years’ incarceration in some of Africa’s toughest prisons, he made worldwide headlines. Since then, he has spoken to nobody about his experiences. Now he is telling everything, including:
This book examines the full range of counterinsurgency intelligence during the Malayan Emergency. It explores the involvement of the Security Service, the Joint Intelligence Committee (Far East), the Malayan Security Service, Special Branch and wider police service, and military intelligence, to examine how British and Malayan authorities tackled the insurgent challenge posed by the Malayan Communist Party. This study assesses the nature of the intelligence apparatus prior to the declaration of emergency in 1948 and considers how officials attempted to reconstruct the intelligence structures in the Far East after the surrender of the Japanese in 1945. These plans were largely based upon the legacy of the Second World War but quickly ran into difficultly because of ill-defined remits and personality clashes. Nevertheless, officials did provide prescient warning of the existential threat posed by the Malayan Communist Party from the earliest days of British reoccupation of Malaya. Once a state of emergency had been declared, officials struggled to find the right combination of methods, strategy and management structures to eliminate the threat posed by the Communist insurgents. This book argues that the development of an effective counterinsurgency intelligence strategy involved many more organisations than just Special Branch. It was a multifaceted, dynamic effort that took far longer and was more problematic than previous accounts suggest. The Emergency remains central to counterinsurgency theory and thus this wide-ranging analysis sheds crucial light not only on the period, but on contemporary doctrine and security practices today.
In this riveting real-life thriller, Philippe Sands offers a unique account of the daily life of senior Nazi SS Brigadeführer Otto Freiherr von Wächter and his wife, Charlotte. Drawing on a remarkable archive of family letters and diaries, he unveils a fascinating insight into life before and during the war, as a fugitive on the run in the Alps and then in Rome, and into the Cold War. Eventually the door is unlocked to a mystery that haunts Wächter's youngest son, who continues to believe his father was a good man - what happened to Otto Wächter while he was preparing to travel to Argentina on the 'ratline', assisted by a Vatican bishop, and what was the explanation for his sudden and unexpected death?
On 9 November 1939, two unsuspecting British agents of the Special Intelligence Services walked into a trap set by German Spymaster Reinhard Heydrich. Believing that they were meeting a dissident German general for talks about helping German military opposition to bring down Hitler and end the war, they were instead taken captive in the Dutch village of Venlo and whisked away to Germany for interrogation by the Gestapo. The incident was a huge embarrassment for the Dutch government and provided the Germans with significant intelligence about SIS operations throughout Europe. The incident itself was an intelligence catastrophe but it also acts as a prism through which a number of other important narrative strands pass. Fundamental to the subterfuge perpetrated at Venlo were unsubstantiated but insistent rumours of high-ranking Germany generals plotting to overthrow the Nazi regime from within. After the humiliation suffered when Hitler tore up the Munich Agreement, British Prime Minister Neville Chamberlain was anxious to see just how much truth there was in these stories; keen to rehabilitate his reputation through one last effort to find a peaceful rapprochement with Germany. When Franz Fischer, a small-time petty crook and agent provocateur, persuaded British SIS operatives in the Netherlands that he could act as a go-between for the British government with disaffected German generals, the German Security chief Reinhard Heydrich stepped in and quietly took control of the operation. Heydrich's boss, head of the Gestapo Heinrich Himmler, was anxious to explore the possibility of peace negotiations with Britain and saw an opportunity to exploit the situation for his personal benefit. On the day before a crucial meeting of conspirators and British agents on the Dutch-German border, a bomb exploded in the Burgerbraukeller in Munich in the exact spot where Hitler had stood to deliver a speech only minutes earlier. The perpetrator was quickly arrested, and Hitler demanded that Himmler find evidence to show that the two events were intimately connected-the British agents were snatched hours later. While the world was coming to terms with the fearsome power of German military might the British intelligence capability in northern Europe was consigned to the dustbin in the sleepy Dutch town of Venlo. This first full account of the Venlo incident explores the wider context of this German intelligence coup, and its consequences.
Security intelligence continues to be of central importance to the contemporary world: individuals, organizations and states all seek timely and actionable intelligence in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and to what ends? How can we ensure that intelligence is not abused? In this third edition of their classic text, Peter Gill and Mark Phythian set out a comprehensive framework for the study of intelligence, discussing how states organize the collection and analysis of information in order to produce intelligence, how it is acted upon, why it may fail and how the process should be governed in order to uphold democratic rights. Fully revised and updated throughout, the book covers recent developments, including the impact of the Snowden leaks on the role of intelligence agencies in Internet and social media surveillance and in defensive and offensive cyber operations, and the legal and political arrangements for democratic control. The role of intelligence as part of 'hybrid' warfare in the case of Russia and Ukraine is also explored, and the problems facing intelligence in the realm of counterterrorism is considered in the context of the recent wave of attacks in Western Europe. Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of inquiry - one that everyone has an interest in understanding.
Writing and briefing are fundamental to the intelligence profession. The ability to communicate clearly, concisely, and coherently is basic to all intelligence disciplines, even the most technical. Communicating with Intelligence, Third Edition is a handbook on writing and briefing intelligence based on the decades of practical experience of James S. Major. The book is designed primarily for faculty and students pursuing studies in intelligence, national security, and homeland security, who need to learn the art of preparing written products and intelligence briefings. But it also has considerable value for working professionals who simply wish to sharpen their communication skills. The third edition of Communicating with Intelligence provides the expediency, efficiency, and effectiveness instructors and members of the Intelligence Community require for a communication handbook.
Volume One of the Official History of the Joint Intelligence Committee draws upon a range of released and classified papers to produce the first, authoritative account of the way in which intelligence was used to inform policy. For almost 80 years the Joint Intelligence Committee (JIC) has been a central player in the secret machinery of the British Government, providing a co-ordinated intelligence service to policy makers, drawing upon the work of the intelligence agencies and Whitehall departments. Since its creation, reports from the JIC have contributed to almost every key foreign policy decision taken by the British Government. This volume covers the evolution of the JIC since 1936 and culminates with its role in the events of Suez in 1956. This book will be of much interest to students of intelligence studies, British politics, international diplomacy, security studies and International Relations in general. Dr Michael S. Goodman is Reader in Intelligence and International Affairs in the Department of War Studies, King's College London. He is author or editor of five previous books, including the Routledge Companion to Intelligence Studies (2013).
Since the 1990s, private military and security companies (PMSCs) have intervened in civil wars around the globe. International, legally registered corporate actors have assisted governments with a myriad of tasks including combat support, logistics, army and police training, intelligence analysis, and guard services. However, reports that such contractors have been responsible for human rights abuses have spurred the need to evaluate the industry's impact on conflicts. Are these contractors effective in curbing violence or does emphasis on profit and lack of accountability get in the way? And how can governments improve PMSCs' commitment to contractual obligations, including adherence to international humanitarian laws? This book identifies two market forces that impact PMSCs' military effectiveness: local or conflict-level competition and global or industry-level competition. Specifically, Seden Akcinaroglu and Elizabeth Radziszewski challenge the assumption that interventions by profit-driven coporations are likely to destabilize areas engaged in war, and provide data that private contractors do contribute to conflict termination under certain circumstances. They argue that competitive market pressure creates a strong monitoring system and that the company's corporate structure and external competitive environment in a given conflict help to explain the variance in accountability to clients. Including an analysis of data on international PMSCs' interventions in civil wars from 1990-2008, Akcinaroglu and Radziszewski show the impact of competition on companies' contribution to the termination of different types of civil wars.
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response
In From Mandate to Blueprint, Thomas Fingar offers a guide for new federal government appointees faced with the complex task of rebuilding institutions and transitioning to a new administration. Synthesizing his own experience implementing the most comprehensive reforms to the national security establishment since 1947, Fingar provides crucial guidance to newly appointed officials. When Fingar was appointed the first Deputy Director of National Intelligence for Analysis in 2005, he discovered the challenges of establishing a new federal agency and implementing sweeping reforms of intelligence procedure and performance. The mandate required prompt action but provided no guidance on how to achieve required and desirable changes. Fingar describes how he defined and prioritized the tasks involved in building and staffing a new organization, integrating and improving the work of sixteen agencies, and contending with pressure from powerful players. For appointees without the luxury of taking command of fully staffed and well-functioning federal agencies, From Mandate to Blueprint is an informed and practical guide for the challenges ahead.
Many of the most famous escapes in history took place during the Second World War. These daring flights from Nazi-occupied Europe would never have been possible but for the assistance of a hitherto secret British service: MI9. This small, dedicated and endlessly inventive team gave hope to the men who had fallen into enemy hands, and aid to resistance fighters in occupied territory. It sent money, maps, clothes, compasses, even hacksaws - and in return coded letters from the prisoner-of-war camps and provided invaluable news of what was happening in the enemy's homeland. Understaffed and under-resourced, MI9 nonetheless made a terrific contribution to the Allied war effort. First published in 1979, this book tells the full, inside story of an extraordinary organisation.
When the possibility of wiretapping first became known to Americans they were outraged. Now, in our post 9/11 world, it's accepted that corporations are vested with human rights, and government agencies and corporations use computers to monitor our private lives. David H. Price pulls back the curtain to reveal how the FBI and other government agencies have always functioned as the secret police of American capitalism up to today, where they luxuriate in a near-limitless NSA surveillance of all. Price looks through a roster of campaigns by law enforcement, intelligence agencies and corporations to understand how we got here. Starting with J. Edgar Hoover and the early FBI's alignment with business, his access to 15,000 pages of never-before-seen FBI files shines a light on the surveillance of Edward Said, Andre Gunder Frank and Alexander Cockburn, Native American communists and progressive factory owners. Price uncovers patterns of FBI monitoring and harassing of activists and public figures, providing the vital means for us to understanding how these new frightening surveillance operations are weaponised by powerful governmental agencies that remain largely shrouded in secrecy.
In this compelling investigation, author Michael Smith explores the critical moment in a spy's life: that split-second decision to embrace a double life; to cheat and hide and hurt; to risk disgrace - even death - without any guarantee of being rewarded or even recognised. Each chapter centres on a number of different spies, following the path they took that led, finally, to the point of no return. Were they propelled by personal convictions? Blackmailed and left without a choice? Too desperate for money to think about the consequences? Through in-depth insider knowledge, Michael Smith also uncovers new and unknown cases, including a spy inside ISIS, President Trump's links with Russia and Edward Snowden's role as a whistle-blower, to offer compelling psychological portraits of these men and women, homing unerringly on the fault-lines and shady corners of their characters, their weaknesses and their strengths, the lies they tell other people, and the lies they always end up telling themselves.
Stories of plots, sham plots, and the citizen-informers who discovered them are at the center of Rachel Weil's compelling study of the turbulent decade following the Revolution of 1688. Most studies of the Glorious Revolution focus on its causes or long-term effects, but Weil instead zeroes in on the early years when the survival of the new regime was in doubt. By encouraging informers, imposing loyalty oaths, suspending habeas corpus, and delaying the long-promised reform of treason trial procedure, the Williamite regime protected itself from enemies and cemented its bonds with supporters, but also put its own credibility at risk.
In today's complex international environment, how do the United States, China, and Russia manage the return of great power competition as well as the persistent threat of violent non-state actors? This book explores shaping, a type of military power that relies not on violence and coercion, but on the ability to change the characteristics of or relationships between militaries. Major powers use shaping to attract allies or disrupt adversarial alliances, socialize values in other militaries, or delegate security to partners. This book reveals how shaping becomes a more attractive tool of military statecraft when threats and allies are ambiguous, which is often a result of systemic forces such as the international distribution of power and the consequences of globalization. The logic and increased frequency of shaping is explored through three case studies of major military exercise programs as well as sentiment analysis and statistics of over 1,000 multinational exercises led by all the major powers from 1980-2016. This book helps scholars, policymakers, military practitioners, and interested readers understand the changing character of military power in the current and future international environment.
A spy story like no other. Private spies are the invisible force that shapes our modern world: they influence our elections, effect government policies and shape the fortunes of companies. More deviously, they are also peering into our personal lives as never before, using off-the shelf technology to listen to our phone calls, monitor our emails and decide what we see on social media. Spooked takes us on a journey into a secret billion-dollar industry in which information is currency and loyalties are for sale. An industry so tentacular it reaches from Saddam Hussein to an 80s-era Trump, from the Steele dossier written by a British ex-spy to Russian oligarchs sitting pretty in Mayfair mansions, from the devious tactics of Harvey Weinstein to the growing role of corporate spies in politics and the threat to future elections. Spooked reads like the best kind of spy story: a gripping tale packed with twists and turns, uncovering a secret side of our modern world.
Cyberwarfare, like the seismic shift of policy with nuclear warfare, is modifying warfare into non-war warfare. A few distinctive characteristics of cyberwar emerge. Cyberwarfare has blurred the distinction between adversary and ally. Cyber probes continuously occur between allies and enemies alike, causing cyberespionage to merge with warfare. Espionage, as old as war itself, has technologically merged with acts of cyberwar as states threaten each other with prepositioned malware in each other's cyberespionage probed infrastructure. These two cyber shifts to warfare are agreed upon and followed by the US, Russia and China. What is not agreed upon in this shifting era of warfare are the policies upon which cyberwarfare is based. This book charts the policies in three key actors and navigates the futures of policy on an international stage.
Published for the first time, the history of the CIA's clandestine short-wave radio broadcasts to Eastern Europe and the USSR during the early Cold War is covered in-depth. Chapters describe the "gray" broadcasting of Radio Free Europe and Radio Liberty in Munich; clandestine or "black" radio broadcasts from Radio Nacional de Espana in Madrid to Estonia, Latvia, Lithuania and Ukraine; transmissions to Bulgaria, Romania, Albania, Ukraine and the USSR from a secret site near Athens; and broadcasts to Byelorussia and Slovakia. Infiltrated behind the Iron Curtain through dangerous air drops and boat landings, CIA and other intelligence service agents faced counterespionage, kidnapping, assassination, arrest and imprisonment. Excerpts from broadcasts taken from monitoring reports of Eastern Europe intelligence agencies are included.
In this thoroughly updated and revised edition of Counterintelligence Theory and Practice, Hank Prunckun provides all of the elements required for a successful counterintelligence operation from both an academic and a practitioner's point of view. It offers an advanced understanding of the underlying theory that supports the art and science of the craft, and examines the challenges and practicalities of defensive and offensive counterintelligence. Designed for students in intelligence studies as well as professional training classes, this text explores issues related to national security, military, law enforcement, and corporate as well as private affairs.
Cyberwarfare, like the seismic shift of policy with nuclear warfare, is modifying warfare into non-war warfare. A few distinctive characteristics of cyberwar emerge. Cyberwarfare has blurred the distinction between adversary and ally. Cyber probes continuously occur between allies and enemies alike, causing cyberespionage to merge with warfare. Espionage, as old as war itself, has technologically merged with acts of cyberwar as states threaten each other with prepositioned malware in each other's cyberespionage probed infrastructure. These two cyber shifts to warfare are agreed upon and followed by the US, Russia and China. What is not agreed upon in this shifting era of warfare are the policies upon which cyberwarfare is based. This book charts the policies in three key actors and navigates the futures of policy on an international stage.
Most people believe the Federal Bureau of Investigation began under J. Edgar Hoover in the 1920s or 1930s. Many also naturally assume it was developed for the express purpose of fighting crime. However, the reality is very different. The reality is it began years earlier, in 1908, under President Theodore Roosevelt. In The Birth of the FBI: Teddy Roosevelt, the Secret Service, and the Fight Over America's Premier Law Enforcement Agency, Willard Oliver details the political fight that led to the birth of America's premier law enforcement agency. Roosevelt was concerned about conservation and one issue he wanted enforced were the fraudulent land deals being perpetrated by many people, including some members of Congress. When he began using the Secret Service to investigate these crimes, Congress blocked him from doing so. The end result of this political spat was Roosevelt's creation of the FBI, which heightened the political row between the two branches of government in the final year of Roosevelt's presidency. The truth of the matter is, the premier law enforcement agency in the United States was actually created because of a political fight between the executive and legislative branches of government. The Birth of the FBI reveals the true story behind the birth of the FBI and provides some useful insight into an important part of our American history.
This volume discusses the development of governmental proto-bureaucracy, which led to and was influenced by the inclusion of professional agents and spies in the early modern English government. In the government's attempts to control religious practices, wage war, and expand their mercantile reach both east and west, spies and agents became essential figures of empire, but their presence also fundamentally altered the old hierarchies of class and power. The job of the spy or agent required fluidity of role, the adoption of disguise and alias, and education, all elements that contributed to the ideological breakdown of social and class barriers. The volume argues that the inclusion of the lower classes (commoners, merchants, messengers, and couriers) in the machinery of government ultimately contributed to the creation of governmental proto-bureaucracy. The importance and significance of these spies is demonstrated through the use of statistical social network analysis, analyzing social network maps and statistics to discuss the prominence of particular figures within the network and the overall shape and dynamics of the evolving Elizabethan secret service. The Eye of the Crown is a useful resource for students and scholars interested in government, espionage, social hierarchy, and imperial power in Elizabethan England. |
![]() ![]() You may like...
The IoT and the Net Revolutions…
Dinesh Goyal, S. Balamurugan, …
Hardcover
R6,821
Discovery Miles 68 210
STEM Research for Students Volume 1…
Julia H Cothron, Ronald N Giese, …
Hardcover
R2,880
Discovery Miles 28 800
|