![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
In this thoroughly updated and revised edition of Counterintelligence Theory and Practice, Hank Prunckun provides all of the elements required for a successful counterintelligence operation from both an academic and a practitioner's point of view. It offers an advanced understanding of the underlying theory that supports the art and science of the craft, and examines the challenges and practicalities of defensive and offensive counterintelligence. Designed for students in intelligence studies as well as professional training classes, this text explores issues related to national security, military, law enforcement, and corporate as well as private affairs.
Keenie Meenie Services - the most powerful mercenary company you've never heard of - was involved in war crimes around the world from Sri Lanka to Nicaragua for which its shadowy directors have never been held accountable. Like its mysterious name, Keenie Meenie Services escaped definition and to this day has evaded sanctions. Now explosive new evidence - only recently declassified - exposes the extent of these war crimes, and the British government's tacit support for the company's operations. Including testimonies from SAS veterans, spy chiefs and diplomats, we hear from key figures battle-hardened by the Troubles in Northern Ireland and the Iranian Embassy siege. Investigative journalist Phil Miller asks, who were these mercenaries: heroes, terrorists, freedom fighters or war criminals? This book presents the first ever comprehensive case against Keenie Meenie Services, providing long overdue evidence on the crimes of the people who make a killing from killing.
In today's complex international environment, how do the United States, China, and Russia manage the return of great power competition as well as the persistent threat of violent non-state actors? This book explores shaping, a type of military power that relies not on violence and coercion, but on the ability to change the characteristics of or relationships between militaries. Major powers use shaping to attract allies or disrupt adversarial alliances, socialize values in other militaries, or delegate security to partners. This book reveals how shaping becomes a more attractive tool of military statecraft when threats and allies are ambiguous, which is often a result of systemic forces such as the international distribution of power and the consequences of globalization. The logic and increased frequency of shaping is explored through three case studies of major military exercise programs as well as sentiment analysis and statistics of over 1,000 multinational exercises led by all the major powers from 1980-2016. This book helps scholars, policymakers, military practitioners, and interested readers understand the changing character of military power in the current and future international environment.
Terrorism kills far fewer Americans annually than automobile accidents, firearms, or even lightning strikes. Given this minimal risk, why does the U.S. continue expending lives and treasure to fight the global war on terror? In Monsters to Destroy, Navin A. Bapat argues that the war on terror provides the U.S. a cover for its efforts to expand and preserve American control over global energy markets. To gain dominance over these markets, the U.S. offered protection to states critical in the extraction, sale, and transportation of energy from their "terrorist" internal and external enemies. However, since the U.S. was willing to protect these states in perpetuity, the leaders of these regimes had no incentive to disarm their terrorists. This inaction allowed terrorists to transition into more powerful and virulent insurgencies, leading the protected states to chart their own courses and ultimately break with U.S. foreign policy objectives. Bapat provides a sweeping look at show how the loss of influence over these states has accelerated the decline of U.S. economic and military power, locking it into a permanent war for its own economic security.
Cyberwarfare, like the seismic shift of policy with nuclear warfare, is modifying warfare into non-war warfare. A few distinctive characteristics of cyberwar emerge. Cyberwarfare has blurred the distinction between adversary and ally. Cyber probes continuously occur between allies and enemies alike, causing cyberespionage to merge with warfare. Espionage, as old as war itself, has technologically merged with acts of cyberwar as states threaten each other with prepositioned malware in each other's cyberespionage probed infrastructure. These two cyber shifts to warfare are agreed upon and followed by the US, Russia and China. What is not agreed upon in this shifting era of warfare are the policies upon which cyberwarfare is based. This book charts the policies in three key actors and navigates the futures of policy on an international stage.
An in-depth analysis of why COVID-19 warnings failed and how to avert the next disaster Epidemiologists and national security agencies warned for years about the potential for a deadly pandemic, but in the end global surveillance and warning systems were not enough to avert the COVID-19 disaster. In The COVID-19 Intelligence Failure, Erik J. Dahl demonstrates that understanding how intelligence warnings work-and how they fail-shows why the years of predictions were not enough. In the first in-depth analysis of the topic, Dahl examines the roles that both traditional intelligence services and medical intelligence and surveillance systems play in providing advance warning against public health threats-and how these systems must be improved for the future. For intelligence to effectively mitigate threats, specific, tactical-level warnings must be collected and shared in real time with receptive decision makers who will take appropriate action. Dahl shows how a combination of late and insufficient warnings about COVID-19, the Trump administration's political aversion to scientific advice, and decentralized public health systems all exacerbated the pandemic in the United States. Dahl's analysis draws parallels to other warning failures that preceded major catastrophes from Pearl Harbor to 9/11, placing current events in context. The COVID-19 Intelligence Failure is a wake-up call for the United States and the international community to improve their national security, medical, and public health intelligence systems and capabilities.
There’s no such thing as a former KGB man... Agents of Influence reveals the secret history of an intelligence agency gone out of control, accountable to no one but itself and intent on subverting Western politics on a near-inconceivable scale. In 1985, 1,300 KGB officers were stationed in the USA. The FBI only had 350 counter-intelligence officers. Since the early days of the Cold War, the KGB seduced parliamentarians and diplomats, infiltrated the highest echelons of the Civil Service, and planted fake news in papers across the world. More disturbingly, it never stopped. Putin is a KGB man through and through. Journalist Mark Hollingworth reveals how disinformation, kompromat and secret surveillance continue to play key roles in Russia’s war with Ukraine. It seems frighteningly easy to destabilise Western democracy.
While the United States has had some kind of intelligence capability throughout its history, its intelligence apparatus is young, dating only to the period immediately after World War II. Yet, in that short a time, it has undergone enormous changes from the labor-intensive espionage and covert action establishment of the 1950s to a modern enterprise that relies heavily on electronic data, technology, satellites, airborne collection platforms, and unmanned aerial vehicles, to name a few. This second edition covers the history of United States intelligence, and includes several key features: .Chronology .Introductory essay .Appendixes .Bibliography .Over 600 cross-referenced entries on key events, issues, people, operations, laws, regulations This book is an excellent access point for members of the intelligence community; students, scholars, and historians; legal experts; and general readers wanting to know more about the history of U.S. intelligence."
The Pinochet File reveals a record of complicity with atrocity by the U.S. government. The documents, first declassified for the original edition of the book, formed the heart of the campaign to hold Gen. Pinochet accountable for murder, torture and terrorism. The New York Times wrote of the original 2003 edition, 'Thanks to Peter Kornbluh, we have the first complete, almost day-to-day and fully documented record of this sordid chapter in Cold War American History.' With this 40th anniversary edition, the record is even more complete and up-to-date.
Why did the CIA overthrow Iran's democratically elected government? And why has the United States treated Iran as one of its biggest enemies for four decades? Is the Trump administration's "Maximum Pressure" campaign working, or will it precipitate a war with Iran? In The CIA Insider's Guide to Iran: from CIA Coup to the Brink of War, former CIA Officer John C. Kiriakou and investigative journalist and historian Gareth Porter explain how and why the United States and Iran have been either at war or threatening such a war for most of the forty years since Islamic Republic of Iran was established. The authors delve below the surface explanations for the forty-year history of extreme U.S. hostility toward Iran to blow up one official U.S. narrative after another about Iran and U.S. policy. Against the background of Iran's encounters with heavy-handed British and Russian imperialist control over its resources, this book shows how the U.S. began its encounter with Iran by clearly siding with British imperialism against Iranian aspirations for control over its oil in its 1953 overthrow of the Mossadegh government, then proceeded to actively support the Saddam Hussein regime's horrific chemical war against Iran. The book shows how a parade of politically-motivated false narratives have taken U.S. Iran policy progressively farther from reality for three decades and have now brought the United States to the brink of war with Iran. It explains how Donald Trump's trashing of the nuclear deal with Iran and seeking to cut off Iran's oil exports creates a very high risk of such a war, demanding major public debate about changing course. The CIA Insider's Guide to the Iran Crisis also includes appendices with key official documents on U.S. policy toward Iran, with particular emphasis on the major official statements of the Trump administration's "Maximum Pressure" strategy.
This edited volume argues that producers of analysis need to shift from producing static, narrative products to much more dynamic, digitally-based platforms in order to remain competitive and relevant.
A riveting introduction to the complex and evolving field of geospatial intelligence. Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT. Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.
COINTELPRO. An acronym for Counterintelligence Program, this is the code name the FBI gave to the secret operations aimed at five major social and political protest groups--the Communist party, the Socialist Workers Party, the Ku Klux Klan, black nationalist hate groups, and the New Left movement. Spying on America, the first book to chronicle all five of the operations, tells the story of how the FBI, from 1956 until COINTELPRO's exposure in 1971, expanded its domestic surveillance programs and increasingly employed questionable, even unlawful, methods in an effort to disrupt what amounts to virtually our entire social and political protest movement. Violations of citizens' constitutional rights were rampant, and the secret operations actually resulted in a number of deaths. At the time, neither the public nor the news media knew anything about COINTELPRO. In vivid detail, Spying on America demonstrates that the system of checks and balances designed to prevent such occurrences was simply not functioning--until an illegal act uncovered the secret activities. The book opens with the daring raid of a Media, Pennsylvania FBI office by a group that adeptly used its booty--about 1,000 classified documents--to make COINTELPRO operations public. The burglars, who called themselves the Citizen's Commission to Investigate the FBI, used sophisticated methods (the FBI never caught up with them), releasing copies of incriminating documents to the media at carefully timed intervals. Spying on America draws on newspaper and magazine articles, interviews with many of the people involved, and FBI memos to trace the historical beginnings and operating methods of COINTELPRO efforts against each of the five targeted groups. In vivid detail, the author re-creates the reactions of the bureau--including the subsequent policy changes--as well as the response of the news media and the resulting shift in public attitudes toward the FBI. Finally, Davis looks at the possibility of similar operations in the future. In the context of our current, heightened state of socio-political awareness, it is difficult to comprehend how so many unlawful deeds could have been committed without the public's knowledge. Spying on America makes us aware of how easily such activities can occur--and in doing so, helps us prevent them from happening again.
When Joint Special Operations Command deployed Task Force 714 to Iraq in 2003, it faced an adversary unlike any it had previously encountered: al-Qaeda in Iraq (AQI). AQI's organization into multiple, independent networks and its application of Information Age technologies allowed it to wage war across a vast landscape. To meet this unique threat, TF 714 developed the intelligence capacity to operate inside those networks, and in the words of commander Gen. Stanley McChrystal, USA (Ret.) "claw the guts out of AQI." In Transforming US Intelligence for Irregular War, Richard H. Shultz Jr. provides a broad discussion of the role of intelligence in combatting nonstate militants and revisits this moment of innovation during the Iraq War, showing how the defense and intelligence communities can adapt to new and evolving foes. Shultz tells the story of how TF 714 partnered with US intelligence agencies to dismantle AQI's secret networks by eliminating many of its key leaders. He also reveals how TF 714 altered its methods and practices of intelligence collection, intelligence analysis, and covert paramilitary operations to suppress AQI's growing insurgency and, ultimately, destroy its networked infrastructure. TF 714 remains an exemplar of successful organizational learning and adaptation in the midst of modern warfare. By examining its innovations, Shultz makes a compelling case for intelligence leading the way in future campaigns against nonstate armed groups.
This volume discusses the development of governmental proto-bureaucracy, which led to and was influenced by the inclusion of professional agents and spies in the early modern English government. In the government's attempts to control religious practices, wage war, and expand their mercantile reach both east and west, spies and agents became essential figures of empire, but their presence also fundamentally altered the old hierarchies of class and power. The job of the spy or agent required fluidity of role, the adoption of disguise and alias, and education, all elements that contributed to the ideological breakdown of social and class barriers. The volume argues that the inclusion of the lower classes (commoners, merchants, messengers, and couriers) in the machinery of government ultimately contributed to the creation of governmental proto-bureaucracy. The importance and significance of these spies is demonstrated through the use of statistical social network analysis, analyzing social network maps and statistics to discuss the prominence of particular figures within the network and the overall shape and dynamics of the evolving Elizabethan secret service. The Eye of the Crown is a useful resource for students and scholars interested in government, espionage, social hierarchy, and imperial power in Elizabethan England.
Signals Intelligence (SIGINT) encompasses the various disciplines of wireless interception, cryptanalysis, communications intelligence, electronic intelligence, direction-finding, and traffic analysis. It has become the basis upon which all combat operations are undertaken. It is now widely recognized as an absolutely vital dimension to modern warfare and it has proved to be a vital component in the counter-intelligence war fought between the West and Soviet bloc intelligence agencies. The Historical Dictionary of Signals Intelligence covers the history of SIGINT through a chronology, an introductory essay, an appendix, and an extensive bibliography. The dictionary section has over 300 cross-referenced entries on key personnel, SIGINT technology, intelligence operations, and agencies, as well as the tradecraft and jargon. This book is an excellent access point for students, researchers, and anyone wanting to know more about Signals Intelligence.
In Someone Is Out to Get Us, Brian T. Brown explores the delusions, absurdities and best-kept secrets of the Cold War, during which the United States fought an enemy of its own making for over forty years-and nearly scared itself to death in the process. The nation chose to fear a chimera, a rotting communist empire that couldn't even feed itself, only for it to be revealed that what lay behind the Iron Curtain was only a sad Potemkin village. In fact, one of the greatest threats to our national security may have been our closest ally. The most effective spy cell the Soviets ever had was made up of aristocratic Englishmen schooled at Cambridge. Establishing a communist peril but lacking proof, J. Edgar Hoover became our Big Brother and Joseph McCarthy went hunting for witches. Richard Nixon stepped into the spotlight as an opportunistic, ruthless Cold Warrior; his criminal cover-up during a dark presidency was exposed by a Deep Throat in a parking garage. Someone Is Out to Get Us is the true and complete account of a long-misunderstood period of history during which lies, conspiracies and paranoia led Americans into a state of madness and misunderstanding, too distracted by fictions to realise that the real enemy was looking back at them in the mirror the whole time.
As the horror of Nazism tightened its grip on Germany, Jews found themselves trapped and desperate. For many, their only hope of salvation came in the form of a small, bespectacled British man: Frank Foley. Working as a Berlin Passport Control Officer, Foley helped thousands of Jews to flee the country with visas and false passports, personally entering the camps to get Jews out, and sheltering those on the run from the Gestapo in his own apartment. Described by a Jewish leader as 'the Pimpernel of the Jews', Foley was an unsung hero of the Holocaust.But why is this extraordinary man virtually unknown, even in Britain? The reason is simple: Foley was MI6 head of station in Berlin, bound to secrecy by the code of his profession.Michael Smith's work uncovering the remarkable truth led to the recognition of Frank Foley as Righteous Among Nations, the highest honour the Jewish state can bestow upon a Gentile. Foley is a story of courage and quiet heroism in the face of great evil - a reminder of the impact that one brave individual can have on the lives of many.
Aisin Gioro Xianyu (1907-1948) was the fourteenth daughter of a Manchu prince and a legendary figure in China's bloody struggle with Japan. After the fall of the Manchu dynasty in 1912, Xianyu's father gave his daughter to a Japanese friend who was sympathetic to his efforts to reclaim power. This man raised Xianyu, now known as Kawashima Yoshiko, to restore the Manchus to their former glory. Her fearsome dedication to this cause ultimately got her killed. Yoshiko had a fiery personality and loved the limelight. She shocked Japanese society by dressing in men's clothes and rose to prominence as Commander Jin, touted in Japan's media as a new Joan of Arc. Boasting a short, handsome haircut and a genuine military uniform, Commander Jin was credited with many daring exploits, among them riding horseback as leader of her own army during the Japanese occupation of China. While trying to promote the Manchus, Yoshiko supported the puppet Manchu state established by the Japanese in 1932-one reason she was executed for treason after Japan's 1945 defeat. The truth of Yoshiko's life is still a source of contention between China and Japan: some believe she was exploited by powerful men, others claim she relished her role as political provocateur. China holds her responsible for unspeakable crimes, while Japan has forgiven her transgressions. This biography presents the richest and most accurate portrait to date of the controversial princess spy, recognizing her truly novel role in conflicts that transformed East Asia.
This book, first published in 1991, examines the changes to security and intelligence agencies envisioned in the uncertain world at the end of the Cold War. While the central focus is on the Canadian Security Intelligence Service, its history, function and future, there are also comparative studies of the British, Soviet, American and Australian systems.
British Intelligence is the oldest, most experienced organization of its kind in the world, the unseen hand behind so many world events, and glamorized by James Bond. Despite the change in role, from a global power controlling an Empire that covered much of the world, to a mere partner in the North Atlantic Treaty Organization (NATO) and the European Union, the country's famed security and intelligence apparatus continues largely intact, and recognized as "punching above its weight." Feared by the Soviets, admired and trusted by the Central Intelligence Agency (CIA), British Intelligence has provided the hidden dimension to the conduct of domestic and foreign policy, with the added mystique of Whitehall secrecy, a shroud that for years protected the identities of the shadowy figures who recruited the sources, broke the codes, and caught the spies. This second edition of Historical Dictionary of the British Intelligence covers the history through a chronology, an introductory essay, appendixes, and an extensive bibliography. The dictionary section has over 1,000 cross-referenced entries on specific operations, spies and their handlers, the moles and defectors, top leaders, and main organizations. This book is an excellent access point for students, researchers, and anyone wanting to know more about the British Intelligence. |
You may like...
Rethinking American Grand Strategy
Elizabeth Borgwardt, Christopher McKnight Nichols, …
Hardcover
R2,460
Discovery Miles 24 600
Spying And The Crown - The Secret…
Richard J. Aldrich, Rory Cormac
Paperback
R358
Discovery Miles 3 580
Ready To Fire - How India and I Survived…
Nambi Narayanan, Arun Ram
Hardcover
R1,089
Discovery Miles 10 890
|