![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
In the wake of the September 11 attacks, American citizens within the United States constantly worry about security against future terrorist attacks. But author Gordon Greer delves further into this subject by trying to understand why the general public is so intent on the ramifications of security measures, such as the Patriot Act. The history of warfare might provide an answer. Greer examines domestic security throughout the history of the United States. During a period of war or the aftermath of war, the American government has generally found it necessary to install security measures that may limit a citizen's basic rights or freedoms. Greer discusses these security issues from the earliest history of the United States, beginning with the early American settlers and the Revolutionary War through World War II and the Cold War. Greer points out that ordinary American citizens may chafe under the constraints such wars produce simply because the United States has arguably never been a totalitarian government. "What Price Security?" is a thought-provoking look at a subject that affects us all, offering insight into how America can protect itself against future attacks.
The United States' ignominious exit from Afghanistan in 2021 topped two decades of failure and devastation wrought by the war on terror. A long-running "fight against migration" has stoked chaos and rights abuses while pushing migrants onto more dangerous routes. For its part, the war on drugs has failed to dampen narcotics demand while fueling atrocities from Mexico to the Philippines. Why do such "failing" policies persist for so long? And why do politicians keep feeding the very crises they say they are combating? In Wreckonomics, Ruben Andersson and David Keen analyze why disastrous policies live on even when it has become apparent that they do not work. The perverse outcomes of the fights against terror, migration, and drugs are more than a blip or an anomaly. Rather, the proliferation of pseudo-wars has become a dangerous political habit and an endless source of political advantage and profit. From combating crime to the war on drugs, from civil wars to global wars and even "covid wars," chronic failure has been harnessed to the appearance of success. Over a wide variety of spheres, problems have persisted and worsened not so much despite the "wars" and "fights" waged against them as thanks to these floundering endeavors. Covering a range of cases around the world, Wreckonomics exposes and interrogates the incentive systems that allow destructive policies to flourish in the face of systemic failure - while offering strategies for dismantling the addiction to waging war on everything.
Stalin's Singing Spy follows the remarkable life of Nadezhda Plevitskaya, a Russian peasant girl who achieved fame as one of Tsar Nicholas II's favorite singers and infamy as one of Stalin's agents. Pamela A. Jordan traces Plevitskaya's life from her childhood in an isolated village to national stardom. She always declared that she was foremost an artist who sang for all people, regardless of their ideological leanings or socioeconomic background. She claimed throughout her career to be fundamentally apolitical, yet decades later in Europe, Plevitskaya was unmasked as one of Joseph Stalin's secret agents along with her husband, White Russian General Nikolai Skoblin. Their experiences in exile shed light on Stalin's covert operations and the hardships Russian emigres faced in interwar Europe, an era of great political and economic turmoil. In addition, this book uncovers the roles that the couple played in one of the Soviets' major intelligence coups-the 1937 kidnapping of White Russian General Evgeny Miller in Paris. Jordan recreates Plevitskaya's sensationalized 1938 criminal trial in the Palace of Justice, where she was accused of conspiring to kidnap Miller and portrayed as a Red femme fatale. The first Western biography of Plevitskaya and the first to reconstruct her dramatic trial, this book provides a fascinating window into Soviet-era espionage in interwar Europe.
This book tracks post 9/11 developments in national security and policing intelligence and their relevance to new emerging areas of intelligence practice such as: corrections, biosecurity, private industry and regulatory environments. Developments are explored thematically across three broad sections: applying intelligence understanding structures developing a discipline. Issues explored include: understanding intelligence models; the strategic management challenges of intelligence; intelligence capacity building; and the ethical dimensions of intelligence practice. Using case studies collected from wide-ranging interviews with leaders, managers and intelligence practitioners from a range of practice areas in Australia, Canada, New Zealand, the UK and US, the book indentifies examples of good practice across countries and agencies that may be relevant to other settings. Uniquely bringing together significant theoretical and practical developments in a sample of traditional and emerging areas of intelligence, this book provides readers with a more holistic and inter-disciplinary perspective on the evolving intelligence field across several different practice contexts. Intelligence and Intelligence Analysis will be relevant to a broad audience including intelligence practitioners and managers working across all fields of intelligence (national security, policing, private industry and emerging areas) as well as students taking courses in policing and intelligence analysis.
The 9/11 attacks and the war in Iraq sprang in no small part from
massive intelligence failures, that much is well understood. How
the CIA got to a point where it could fail so catastrophically is
not.
The Soviet military concept of operational art and the associated theories such as war of annihilations, deep battle, and deep operations have been observed by the West since World War II. The Soviet government hid their military-theoretical work behind a veil of secrecy. Here, the Soviet theories are revealed in the words of those who created them in peacetime and applied them in war.
Winner of 2018 National Jewish Book Award. Rise and Kill First is the definitive book to read on Israel's military history. From the very beginning of its statehood in 1948, the instinct to take every measure to defend the Jewish people has been hardwired into Israel''s DNA. This is the riveting inside account of the targeted assassinations that have been used countless times, on enemies large and small, sometimes in response to attacks against the Israeli people and sometimes pre-emptively. Rise and Kill First counts their successes, failures and the moral and political price exacted on those who carried out the missions which have shaped the Israeli nation, the Middle East and the entire world.
Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.
A fresh perspective on statecraft in the cyber domain The idea of “cyber war” has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war? In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies. Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.
We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.
Reflecting on a career that spanned twenty-five years and four continents, Special Agent I.C. Smith gives you the inside story of the Bureau's greatest takedowns and biggest screw-ups. This intrepid G-man has seen it all. From China to the South Pacific, from East Berlin to Arkansas, I.C. Smith is one of the FBI's most storied figures. In this riveting new book about the Bureau, Smith brings a fresh, insider's perspective on the FBI's most well known triumphs and failures of the past three decades. Robert Hannsen. Morris and Eva childs. Larry Wu-Tai Chin. Aldrich Ames. Smith offers unique insights into how these monumental investigations were handled, or often mishandled, in alarming detail. He also confronts head-on the string of errors inside the FBI―in management and in the field―that directly led to the attacks of September 11th. Filled with startling new information, including more than seventy never-before-published findings, Smith tracks his incredible rise from street agent in St. Louis to special agent in charge of Arkansas―where he took on the corrupt political system that produced President Bill Clinton.
Intelligence continues to undergo significant changes at a remarkable pace, notably developments related to "Big Data," surveillance, and cyber. Intelligence today involves multiagency, multinational, multidisciplinary, multidomain information sharing and sense-making, conducted by commerce, academic, government, civil society, media, law enforcement, military, and nongovernmental/nonprofit organizations. Increasingly complex systems, including interrelated technical dimensions, are central to modern defense systems. Intelligence Engineering: Operating Beyond the Conventional provides a new framework for generating analysis, exploring how systems to system-of-systems can be harnessed both for and into the future. Intelligence engineering (IE) involves the use of scientific and technical knowledge to artfully create, operate, maintain, and dismantle complex devices, machines, structures, systems, and processes that support and/or disrupt human endeavor occurring in the intelligence context. Spanning both human and technical intelligence realms, IE includes the collection and analysis of information that is of military and/or political value, and that relates to international relations, defense, and national security. Strategic Futures, risk management across to resilience concerns, are similarly engaged.
Few countries can claim to have endured such a difficult and tortuous history as that of Iraq. Its varied peoples have had to contend with externally imposed state-building at the end of the First World War, through to the rise of authoritarian military regimes, to the all-encompassing power of Saddam Hussein's dictatorship. They have endured destructive wars, internationally-imposed sanctions, and a further bout of destabilizing regime change and subsequent state-building from 2003. The recent rise of the Islamic State, the consolidation of the Kurdistan Region, and the response of the Shi'i populace have brought the country to a de facto partition that may bring about Iraq's final demise. The second edition of Iraq: People, History, Politics provides a comprehensive analysis of the political, societal, and economic dynamics that have governed Iraq's modern development. Situating recent events within a longer historical timeframe, this book is a must-read for anyone wanting to understand the deep histories that underpin the contemporary politics of this war-torn and troubled state.
This book delves into the secret histories of the CIA, the FBI, and British and Italian intelligence to study how policymakers can control intelligence agencies and when these agencies will try to remove their own government. For every government they serve, intelligence agencies are both a threat and a necessity. They often provide vital information for national security, but the secrets they possess can also be used against their own masters. This book introduces subversion paradox theory to provide a social scientific explanation of the unequal power dynamic resulting from an often fraught relationship between agencies and their 'masters'. The author also makes a case for the existence of 'deep state' conspiracies, including in highly developed democracies, and cautions those who denounce their existence that trying to control intelligence by politicizing it is likely to backfire. An important intervention in the field of intelligence studies, this book will be indispensable for intelligence professionals and policymakers in understanding and bridging the cultural divide between these two groups. It will also make for a fascinating and informative read to scholars and researchers of diplomacy, foreign policy, international relations, strategic and defence studies, security studies, political studies, policymaking and comparative politics.
This book delves into the secret histories of the CIA, the FBI, and British and Italian intelligence to study how policymakers can control intelligence agencies and when these agencies will try to remove their own government. For every government they serve, intelligence agencies are both a threat and a necessity. They often provide vital information for national security, but the secrets they possess can also be used against their own masters. This book introduces subversion paradox theory to provide a social scientific explanation of the unequal power dynamic resulting from an often fraught relationship between agencies and their 'masters'. The author also makes a case for the existence of 'deep state' conspiracies, including in highly developed democracies, and cautions those who denounce their existence that trying to control intelligence by politicizing it is likely to backfire. An important intervention in the field of intelligence studies, this book will be indispensable for intelligence professionals and policymakers in understanding and bridging the cultural divide between these two groups. It will also make for a fascinating and informative read to scholars and researchers of diplomacy, foreign policy, international relations, strategic and defence studies, security studies, political studies, policymaking and comparative politics.
When Gail Harris was assigned by the U.S. Navy to a combat intelligence job in 1973, she became the first African American female to hold such a position. Her 28-year career included hands on leadership in the intelligence community during every major conflict from the Cold War to Desert Storm to Kosovo, and most recently at the forefront of one of the Department of Defense's newest challenges: Cyber Warfare. At her retirement, she was the highest ranking African American female in the Navy. A Woman's War: The Professional and Personal Journey of the Navy's First African American Female Intelligence Officer is an inspirational memoir that follows Gail Harris's career as a naval intelligence officer, sharing her unique experience and perspective as she completed the complex task of providing intelligence support to military operations while also battling the status quo, office bullies, and politics. This book also looks at the way intelligence is used and misused in these perilous times.
Why are we still at 'war' with terror 16 years after 9/11? This book will discuss what we have collectively done well, what we have done poorly, what we have yet to try and how we get to the point where terrorism does not dominate public discourse and cause disproportionate fear around the world. This book looks at a variety of approaches and responses to international Islamist extremism, ranging from military and security/law enforcement action to government policies, community measures and religious efforts, with a goal to determining what has worked and what has not. The examples are drawn largely from the West but the book's scope is global. Key features: Written in a clear, non-academic styleUses recent events to explain terrorismIs wide-ranging and 'ex-practitioner' based
Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online - a man who became a spy, a whistleblower, and, in exile, the Internet's conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
The methods developed by British intelligence in the early twentieth century continue to resonate today. Much like now, the intelligence activity of the British in the pre-Second World War era focused on immediate threats posed by subversive, clandestine networks against a backdrop of shifting great power politics. Even though the First World War had ended, the battle against Britain's enemies continued unabated during the period of the 1920s and 1930s. Buffeted by political interference and often fighting for their very survival, Britain's intelligence services turned to fight a new, clandestine war against rising powers Soviet Russia and Nazi Germany. Using recently declassified files of the British Security Service (MI5), The Secret War Between the Wars details the operations and tradecraft of British intelligence to thwart Communist revolutionaries, Soviet agents, and Nazi sympathizers during the interwar period. This new study charts the development of British intelligence methods and policies in the early twentieth century and illuminates the fraught path of intelligence leading to the Second World War. An analysis of Britain's most riveting interwar espionage cases tells the story of Britain's transition between peace and war. The methods developed by British intelligence in the early twentieth century continue to resonate today. Much like now, the intelligence activity of the British in the pre-Second World War era focused on immediate threats posed by subversive, clandestine networks against a backdrop of shifting great power politics. As Western countries continue to face the challenge of terrorism, and in an era of geopolitical change heralded by the rise of China and the resurgence of Russia, a return to the past may provide context for a better understanding of the future. Kevin Quinlan received his PhD in History from the University of Cambridge. He works in Washington, DC.
Christopher Marlowe: Poet & Spy is the most thorough and detailed life of Marlowe since John Bakeless's in 1942. It has new material on Marlowe in relation to Canterbury, also on his home life, schooling, and six and a half years at Corpus Christi College, Cambridge, and includes fresh data on his reading, teachers, and early achievements, including a new letter with a new date for the famous 'putative portrait' of Marlowe at Cambridge. The biography uses for the first time the Latin writings of his friend Thomas Watson to illuminate Marlowe's life in London and his career as a spy (that is, as a courier and agent for the Elizabethan Privy Council). There are new accounts of him on the continent, particularly at Flushing or Vlissingen, where he was arrested. The book also more fully explains Marlowe's relations with his chief patron, Thomas Walsingham, than ever before. This is also the first biography to explore in detail Marlowe's relations with fellow playwrights such as Kyd and Shakespeare, and to show how Marlowe's relations with Shakespeare evolved from 1590 to 1593. With closer views of him in relation to the Elizabethan stage than have appeared in any biography, the book examines in detail his aims, mind, and techniques as exhibited in all of his plays, from Dido, the Tamburlaine dramas, and Doctor Faustus through to The Jew of Malta and Edward II. It offers new treatments of his evolving versions of 'The Passionate Shepherd', and displays circumstances, influences, and the bearings of Shakespeare's 'Venus and Adonis' in relation to Marlowe's 'Hero and Leander' Throughout, there is a strong emphasis on Marlowe's friendships and so-called 'homosexuality'. Fresh information is brought to bear on his seductive use of blasphemy, his street fights, his methods of preparing himself for writing, and his atheism and religious interests. The book also explores his attraction to scientists and mathematicians such as Thomas Harriot and others in the Ralegh-Northumberland set of thinkers and experimenters. Finally, there is new data on spies and business agents such as Robert Poley, Nicholas Skeres, and Ingram Frizer, and a more exact account of the circumstances that led up to Marlowe's murder.
The defection of Igor Gouzenko in September 1945, more so than any other single event, alerted the West to the nature and scale of the Soviet espionage offensive being waged by the Kremlin. Apart from the dozen or so defendants convicted of spying, Gouzenko wrecked an organization that had taken years to develop, exposed the penetration of the Manhattan atomic weapons project, and demonstrated the very close relationship between the Canadian Communist Party and Moscow. Many credit this event as sparking the bitter but secretive struggle fought between the intelligence agencies of the East and West for nearly half a century. The Historical Dictionary of Cold War Counterintelligence tells the story of both sides' fierce efforts to penetrate and subvert the opponent while desperately trying to avoid a similar fate. Through a chronology, an introduction, appendixes, a bibliography, and hundreds of cross-referenced dictionary entries on the organizations, operations, events, and personalities that influenced counterintelligence during the Cold War, the world of double agents, spies, and moles is explained in the most comprehensive reference currently available. |
![]() ![]() You may like...
Rural Housing: Competition and Choice
Michael Dunn, Marilyn Rawson, …
Hardcover
R3,292
Discovery Miles 32 920
The New Politics of Home - Housing…
Eleanor Jupp, Sophie Bowlby, …
Hardcover
R1,283
Discovery Miles 12 830
|