![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
In the wake of World War II, the United States and its allies developed a new type of security arrangement in which a state could maintain a long-term, peacetime military presence on the territory of another equally sovereign state that, unlike earlier practice, was not tied to occupational regimes or colonial rule. The impact of this development on international politics is hard to overstate, and it has become a constitutive feature of contemporary security dynamics. Despite its significance, the origins of this basing practice have remained largely understudied and unexplained. In Armed Guests, Sebastian Schmidt develops a theory to explain the emergence of this phenomenon, which he calls "sovereign basing," and in doing so, shows how its development fundamentally transformed state sovereignty and the very nature of security politics. He applies concepts derived from pragmatist thought to a historical study of the relations between the United States and its wartime allies to explain how sovereign basing originated through the efforts of policymakers to come to grips with the unique security environment of the postwar era. As he argues, the tools offered by pragmatism provide needed analytical leverage over the emergence of novelty and offer valuable insight into the dynamics of stability and change. Armed Guests is a wide-ranging account of the development of sovereign basing practices in the years before and after World War II. It is a book with significant implications for our understanding of contemporary security politics and the future of basing strategies as well as for broader issues in IR, including the sociological foundations of security strategies, the nature of norms, and the practice of sovereignty.
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.
The history of recruiting citizens to spy on each other in the United States. Ever since the revelations of whistleblower Edward Snowden, we think about surveillance as the data-tracking digital technologies used by the likes of Google, the National Security Administration, and the military. But in reality, the state and allied institutions have a much longer history of using everyday citizens to spy and inform on their peers. Citizen Spies shows how "If You See Something, Say Something" is more than just a new homeland security program; it has been an essential civic responsibility throughout the history of the United States. From the town crier of Colonial America to the recruitment of youth through "junior police," to the rise of Neighborhood Watch, AMBER Alerts, and Emergency 9-1-1, Joshua Reeves explores how ordinary citizens have been taught to carry out surveillance on their peers. Emphasizing the role humans play as "seeing" and "saying" subjects, he demonstrates how American society has continuously fostered cultures of vigilance, suspicion, meddling, snooping, and snitching. Tracing the evolution of police crowd-sourcing from "Hue and Cry" posters and America's Most Wanted to police-affiliated social media, as well as the U.S.'s recurrent anxieties about political dissidents and ethnic minorities from the Red Scare to the War on Terror, Reeves teases outhow vigilance toward neighbors has long been aligned with American ideals of patriotic and moral duty. Taking the long view of the history of the citizen spy, this book offers a much-needed perspective for those interested in how we arrived at our current moment in surveillance culture and contextualizes contemporary trends in policing.
The winner of the 2013 Longman-History Today Book Prize is the gripping and largely untold story of the role of the intelligence services in Britain's retreat from empire. Against the background of the Cold War, and the looming spectre of Soviet-sponsored subversion in Britain's dwindling colonial possessions, the imperial intelligence service MI5 played a crucial but top secret role in passing power to newly independent national states across the globe. Mining recently declassified intelligence records, Calder Walton reveals this 'missing link' in Britain's post-war history. He sheds new light on everything from violent counter-insurgencies fought by British forces in the jungles of Malaya and Kenya, to urban warfare campaigns conducted in Palestine and the Arabian Peninsula. Drawing on a wealth of previously classified documents, as well as hitherto overlooked personal papers, this is also the first book to draw on records from the Foreign Office's secret archive at Hanslope Park, which contains some of the darkest and most shameful secrets from the last days of Britain's empire. Packed with incidents straight out of a John le Carre novel, Empire of Secrets is an exhilarating read by an exciting new voice in intelligence history.
Six tells the complete story of the service's birth and early years, including the tragic, untold tale of what happened to Britain's extensive networks in Soviet Russia between the wars. It reveals for the first time how the playwright and MI6 agent Harley Granville Barker bribed the Daily News to keep Arthur Ransome in Russia, and the real reason Paul Dukes returned there. It shows development of tradecraftA" and the great personal risk officers and their agents took, far from home and unprotected. In Salonika, for example, Lieutenant Norman Dewhurst realised it was time to leave when he opened his door to find one of his agents hanging dismembered in a sack. This first part of Six takes us up to the eve of the conflict, using hundreds of previously unreleased files and interviews with key players to show how one of the world's most secretive of secret agencies originated and developed into something like the MI6 we know today. The second part, published in Spring 2012, will tell the story from the outbreak of World War Two to the present.
The definitive history of the military's decades-long investigation into mental powers and phenomena, from the author of Pulitzer Prize finalist The Pentagon's Brain and international bestseller Area 51. This is a book about a team of scientists and psychics with top secret clearances. For more than forty years, the U.S. government has researched extrasensory perception, using it in attempts to locate hostages, fugitives, secret bases, and downed fighter jets, to divine other nations' secrets, and even to predict future threats to national security. The intelligence agencies and military services involved include CIA, DIA, NSA, DEA, the Navy, Air Force, and Army-and even the Joint Chiefs of Staff. Now, for the first time, New York Times bestselling author Annie Jacobsen tells the story of these radical, controversial programs, using never before seen declassified documents as well as exclusive interviews with, and unprecedented access to, more than fifty of the individuals involved. Speaking on the record, many for the first time, are former CIA and Defense Department scientists, analysts, and program managers, as well as the government psychics themselves. Who did the U.S. government hire for these top secret programs, and how do they explain their military and intelligence work? How do scientists approach such enigmatic subject matter? What interested the government in these supposed powers and does the research continue? Phenomena is a riveting investigation into how far governments will go in the name of national security.
Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.
Defiance against Chinese oppression has been a defining
characteristic of Tibetan life for more than four decades,
symbolized most visibly by the much revered Dalai Lama. But the
story of Tibetan resistance weaves a far richer tapestry than
anyone might have imagined. The CIA's Secret War in Tibet takes readers from training camps in the Colorado Rockies to the scene of clandestine operations in the Himalayas, chronicling the agency's help in securing the Dalai Lama's safe passage to India and subsequent initiation of one of the most remote covert campaigns of the Cold War. Establishing a rebel army in the northern Nepali kingdom of Mustang and a para-commando force in India designed to operate behind Chinese lines, Conboy and Morrison provide previously unreported details about secret missions undertaken in extraordinarily harsh conditions. Their book greatly expands on previous memoirs by CIA officials by putting virtually every major agency participant on record with details of clandestine operations. It also calls as witnesses the people who managed and fought in the program-including Tibetan and Nepalese agents, Indian intelligence officers, and even mission aircrews. Conboy and Morrison take pains to tell the story from all perspectives, particularly that of the former Tibetan guerrillas, many of whom have gone on record here for the first time. The authors also tell how Tibet led America and India to become secret partners over the course of several presidential administrations and cite dozens of Indian and Tibetan intelligence documents directly related to these covert operations. Ultimately, they are persuasive that the Himalayan operations were far more successful as a proving ground for CIA agents who were later reassigned to southeast Asia than as a staging ground for armed rebellion. As the movement for Tibetan liberation continues to attract international support, Tibet's status remains a contentious issue in both Washington and Beijing. This book takes readers inside a covert war fought with Tibetan blood and U. S. sponsorship and allows us to better understand the true nature of that controversy.
After the end of the Cold War, it seemed as if Southeast Asia would remain a geopolitically stable region within the American imperious for the foreseeable future. In the last two decades, however, the re-emergence of China as a major great power has called into question the geopolitical future of the region and raised the specter of renewed of great power competition. As the eminent China scholar David Shambaugh explains in Where Great Powers Meet, the United States and China are engaged in a broad-gauged and global competition for power. While this competition ranges across the entire world, it is centered in Asia, and in this book, Shambaugh focuses the ten countries that comprise Southeast Asia. The United States and China constantly vie for position and influence in this enormously significant region-and the outcome of this contest will do much to determine whether Asia leaves the American orbit after seven decades and falls into a new Chinese sphere of influence. Just as importantly, to the extent that there is a global "power transition" occurring from the US to China, the fate of Southeast Asia will be a good indicator. Presently, both powers bring important assets to bear. The US continues to possess a depth and breadth of security ties, soft power, and direct investment across the region that empirically outweigh China's. For its part, China has more diplomatic influence, much greater trade, and geographic proximity. In assessing the likelihood of a regional power transition, Shambaugh at how ASEAN (the Association of Southeast Asian Nations) and the countries within it maneuver between the United States and China and the degree to which they align with one or the other power. Not simply an analysis of the region's place within an evolving international system, Where Great Powers Meet provides us with a comprehensive strategy that advances the American position while exploiting Chinese weaknesses.
An Intelligence Studies Anthology: Foundational Concepts and Case Studies for the 21st Century is designed to provide undergraduate students with an introduction to the U.S. government's collection and use of intelligence. Through a carefully curated selection of readings, students gain an understanding of the history of the intelligence process and the agencies involved in it. They also learn about the intelligence cycle, types of intelligence products, best practices for writing and briefing intelligence, covert operations, counterintelligence, technical tools and legal concepts, and the ways in which law enforcement collects and uses intelligence. The anthology provides students with a novel collection of information discussing the ways the intelligence process can be used to stop health crises, including pandemics, and includes the editor's original article discussing the creation of a new department in the U.S. government devoted to fighting future pandemics. Illuminating and insightful, An Intelligence Studies Anthology is an exemplary resource for introductory courses in intelligence, criminal justice, criminology, government, and health/public health.
Widely known as the "Family Jewels," this document consists of almost 700 pages of responses from CIA employees to a 1973 directive from Director of Central Intelligence James Schlesinger asking them to report activities they thought might be inconsistent with the Agency's charter.The reports describe numerous activities conducted by the CIA during the 1950s to 1970s that violated its charter. According to a briefing provided by CIA Director William Colby to the Justice Department on December 31, 1974, these included 18 issues which were of legal concern: Confinement of a KGB defector, Yuri Ivanovich Nosenko, that "might be regarded as a violation of the kidnapping laws." Wiretapping of two syndicated columnists, Robert Allen and Paul Scott, approved by US Attorney General Robert Kennedy and Secretary of Defense Robert McNamara (see also Project Mockingbird). Physical surveillance of investigative journalist and muckraker Jack Anderson and his associates, including Les Whitten of the Washington Post and future Fox News Channel anchor and managing editor Brit Hume. Jack Anderson had written two articles on CIA-backed assassination attempts on Cuban leader Fidel Castro. Physical surveillance of then-Washington Post reporter Michael Getler, who later was an ombudsman for the Washington Post and PBS. Break-in at the home of a former CIA employee. Break-in at the office of a former defector. Warrantless entry into the apartment of a former CIA employee. Opening of mail to and from the Soviet Union from 1953 to 1973 (including letters associated with actress Jane Fonda) (project SRPOINTER/HTLINGUAL at JFK airport). Opening of mail to and from the People's Republic of China from 1969 to 1972 (project SRPOINTER/HTLINGUAL at JFK airport - see also Project SHAMROCK by the NSA). Funding of behavior modification research on unwitting US citizens, including unscientific, non-consensual human experiments. (see also Project MKULTRA concerning LSD experiments). Assassination plots against Cuban President Fidel Castro (authorized by Robert Kennedy) 8]; Congolese leader Patrice Lumumba; President Rafael Trujillo of the Dominican Republic; and Rene Schneider, Commander-in-chief of the Chilean Army. All of these plots were said to be unsuccessful ones. Surveillance of dissident groups between 1967 and 1971 (see Project RESISTANCE, Project MERRIMAC and Operation CHAOS). Surveillance of a particular Latin American female, and of US citizens in Detroit. Surveillance of former CIA officer and Agency critic, Victor Marchetti, author of the book, The CIA and the Cult of Intelligence, published in 1974. Amassing of files on 9,900-plus US citizens related to the antiwar movement (see Project RESISTANCE, Project MERRIMAC and Operation CHAOS). Polygraph experiments with the sheriff of San Mateo County, California. Fake CIA identification documents that might violate state laws. Testing of electronic equipment on US telephone circuits.
Exiled Emissary is a biography of the colorful life of George H. Earle, III - a Main Line Philadelphia millionaire, war hero awarded the Navy Cross, Pennsylvania Governor, Ambassador to Austria and Bulgaria, friend and supporter of Franklin Roosevelt, humanitarian, playboy, and spy. Rich in Casablanca-style espionage and intrigue, Farrell's deeply personal study presents FDR and his White House in a new light, especially when they learned in 1943 that high-ranking German officials approached Earle in Istanbul to convey their plot to kidnap Hitler and seek an armistice. When FDR rejected their offer, thereby prolonging World War II, his close relationship with Earle became most inconvenient, resulting in Earle's exile to American Samoa. Earle eventually returned to the United States, renewing his warnings about communism to President Truman, who underestimated the threat as a "bugaboo." Now, over four decades following Earle's death, Farrell has uncovered newly declassified records that give voice to his warnings about a threat we now know should have never been dismissed.
|
You may like...
Fresh Water in International Law
Laurence Boisson De Chazournes
Hardcover
R3,934
Discovery Miles 39 340
Litigating Rights - Perspectives from…
Grant Huscroft, Paul Rishworth
Hardcover
R3,195
Discovery Miles 31 950
Netherlands Yearbook Of International…
T.M.C.Asser Instituut
Hardcover
R3,916
Discovery Miles 39 160
|