![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
In 1963, a frustrated President Kennedy turned to the Pentagon for help in carrying out subversive operations against North Vietnam- a job the CIA had not managed to handle effectively. Thus was born the Pentagon's Special Operations Group(SOG). Under the cover name"Studies and Observation Group," SOG would, over the next eight years, dispatch numerous spies to North Vietnam, create a triple-cross deception program, wage psychological warfare by manipulating North Vietnamese POW's and kidnapped citizens, and stage deadly assaults on enemy soldiers traveling the Ho Chi Minh Trail. Written by the country's leading expert on SOG, here is the story of that covert war-one that would have both spectacular and disastrous results.
This book tells a true detective story set mainly in Elizabethan London during the years of cold war just before the Armada of 1588. The mystery is the identity of a spy working in a foreign embassy to frustrate Catholic conspiracy and propaganda aimed at the overthrow of Queen Elizabeth and her government. The suspects in the case are the inmates of the house, an old building in the warren of streets and gardens between Fleet Street and the Thames. These include the ambassador, a civilized Frenchman, his wife, his daughter, his secretary, his clerk and his priest, the tutor, the chef, the butler, and the concierge. They also include a runaway friar, the Neapolitan philosopher, poet, and comedian Giordano Bruno, who wrote masterpieces of Italian literature, who was later burned in Rome for his anti-papal opinions, and who has been revered in Italy for his honorable and heroic resistance to papal authority. Others in the cast are Queen Elizabeth, her formidable secretary of state Sir Francis Walsingham, and King Henry III of France; poets, courtiers, and scholars; statesmen, conspirators, go-betweens, and stool-pigeons. When not in London, the action takes place in Paris and Oxford; a good deal of it happens on the river Thames. The hero or villain, who calls himself Fagot, does his work most effectively, is not found out, and disappears. In the first part of the book these events are narrated. In the second the spy is identified and his story put together. John Bossy's brilliant research, backed by his forensic and literary skills, solves a centuries-old mystery. His book makes a major contribution to the political and intellectual history of the wars of religion in Europe and to the domestic history of Elizabethan England. Not least, it is compelling reading.
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.
Today more than ever, the line between national security and cyber security is becoming increasingly erased. As recent attacks on US infrastructure show (for example, the oil pipeline hack of 2021), nontraditional threats ranging from hacking for the purposes of extracting ransom to terrorist communications online are emerging as central to national threat assessment. In an innovative fashion that allows for the comparison of approaches to this nexus in the developed and developing countries his volume brings together European and African experts offering an in-depth analysis of the relationship between national and cyber security. The individual chapters theorize the current and future implications of global digitalization; a cogent discussion of the threats French military and security forces face in terms of cyber security failures from within; and an exploration of the relationship between cyber security and national security in the volatile Nigerian context.
A TIME TO BETRAY
Six tells the complete story of the service's birth and early years, including the tragic, untold tale of what happened to Britain's extensive networks in Soviet Russia between the wars. It reveals for the first time how the playwright and MI6 agent Harley Granville Barker bribed the Daily News to keep Arthur Ransome in Russia, and the real reason Paul Dukes returned there. It shows development of tradecraftA" and the great personal risk officers and their agents took, far from home and unprotected. In Salonika, for example, Lieutenant Norman Dewhurst realised it was time to leave when he opened his door to find one of his agents hanging dismembered in a sack. This first part of Six takes us up to the eve of the conflict, using hundreds of previously unreleased files and interviews with key players to show how one of the world's most secretive of secret agencies originated and developed into something like the MI6 we know today. The second part, published in Spring 2012, will tell the story from the outbreak of World War Two to the present.
This is beautifully slipcased presented collector' s edition of the best selling title, The Lost World of Bletchley Park, a comprehensive illustrated history of this remarkable place, from its prewar heyday as a country estate, its wartime requisition and how it became the place where modern computing was invented and the German Enigma code was cracked, to its post-war dereliction and then rescue towards the end of the twentieth century as a museum. Removable memorabilia includes: 1938 recruiting memo with a big tick against Turing' s name Churchill' s ' Action this day' letter giving code breakers extra resources Handwritten Turing memos Top Secret Engima decryptions, about the sinking of the Bismark, German High Command' s assessment of D-Day threat and the message announcing Hitler' s suicide A wealth of everyday items such as call-up papers, security notices and propoganda posters Newly redesigned interiors with 25% new content, high end slipcase package featuring removable facsimile documents, this is an essential purchase for everyone interested and wanting to experience the place where code-breaking helped to win the war.
In 1920s Shanghai, Zhou Enlai founded the first Chinese communist spy network, operating in the shadows against nationalists, Western powers and the Japanese. The story of Chinese spies has been a global one from the start. Unearthing previously unseen papers and interviewing countless insiders, Roger Faligot's astonishing account reveals nothing less than a century of world events shaped by Chinese spies. Working as scientists, journalists, diplomats, foreign students and businessmen, they've been everywhere, from Stalin's purges to 9/11 to Biden's withdrawal from Afghanistan. This murky world has swept up Ho Chi Minh, the Clintons and everyone in between, with the action moving from Cambodia to Cambridge, and from the Australian outback to the centres of Western power. This fascinating narrative exposes the sprawling tentacles of the world's largest intelligence service, from the very birth of communist China to Xi Jinping's absolute rule today.
Widely known as the "Family Jewels," this document consists of almost 700 pages of responses from CIA employees to a 1973 directive from Director of Central Intelligence James Schlesinger asking them to report activities they thought might be inconsistent with the Agency's charter.The reports describe numerous activities conducted by the CIA during the 1950s to 1970s that violated its charter. According to a briefing provided by CIA Director William Colby to the Justice Department on December 31, 1974, these included 18 issues which were of legal concern: Confinement of a KGB defector, Yuri Ivanovich Nosenko, that "might be regarded as a violation of the kidnapping laws." Wiretapping of two syndicated columnists, Robert Allen and Paul Scott, approved by US Attorney General Robert Kennedy and Secretary of Defense Robert McNamara (see also Project Mockingbird). Physical surveillance of investigative journalist and muckraker Jack Anderson and his associates, including Les Whitten of the Washington Post and future Fox News Channel anchor and managing editor Brit Hume. Jack Anderson had written two articles on CIA-backed assassination attempts on Cuban leader Fidel Castro. Physical surveillance of then-Washington Post reporter Michael Getler, who later was an ombudsman for the Washington Post and PBS. Break-in at the home of a former CIA employee. Break-in at the office of a former defector. Warrantless entry into the apartment of a former CIA employee. Opening of mail to and from the Soviet Union from 1953 to 1973 (including letters associated with actress Jane Fonda) (project SRPOINTER/HTLINGUAL at JFK airport). Opening of mail to and from the People's Republic of China from 1969 to 1972 (project SRPOINTER/HTLINGUAL at JFK airport - see also Project SHAMROCK by the NSA). Funding of behavior modification research on unwitting US citizens, including unscientific, non-consensual human experiments. (see also Project MKULTRA concerning LSD experiments). Assassination plots against Cuban President Fidel Castro (authorized by Robert Kennedy) 8]; Congolese leader Patrice Lumumba; President Rafael Trujillo of the Dominican Republic; and Rene Schneider, Commander-in-chief of the Chilean Army. All of these plots were said to be unsuccessful ones. Surveillance of dissident groups between 1967 and 1971 (see Project RESISTANCE, Project MERRIMAC and Operation CHAOS). Surveillance of a particular Latin American female, and of US citizens in Detroit. Surveillance of former CIA officer and Agency critic, Victor Marchetti, author of the book, The CIA and the Cult of Intelligence, published in 1974. Amassing of files on 9,900-plus US citizens related to the antiwar movement (see Project RESISTANCE, Project MERRIMAC and Operation CHAOS). Polygraph experiments with the sheriff of San Mateo County, California. Fake CIA identification documents that might violate state laws. Testing of electronic equipment on US telephone circuits.
Exiled Emissary is a biography of the colorful life of George H. Earle, III - a Main Line Philadelphia millionaire, war hero awarded the Navy Cross, Pennsylvania Governor, Ambassador to Austria and Bulgaria, friend and supporter of Franklin Roosevelt, humanitarian, playboy, and spy. Rich in Casablanca-style espionage and intrigue, Farrell's deeply personal study presents FDR and his White House in a new light, especially when they learned in 1943 that high-ranking German officials approached Earle in Istanbul to convey their plot to kidnap Hitler and seek an armistice. When FDR rejected their offer, thereby prolonging World War II, his close relationship with Earle became most inconvenient, resulting in Earle's exile to American Samoa. Earle eventually returned to the United States, renewing his warnings about communism to President Truman, who underestimated the threat as a "bugaboo." Now, over four decades following Earle's death, Farrell has uncovered newly declassified records that give voice to his warnings about a threat we now know should have never been dismissed.
In recent years, it has become increasingly clear to many observers that the Department of Defense must better communicate to the officers at the tactical end of the nuclear mission a rationale for nuclear weapons and deterrence, the critical role that they play in the post-Cold War strategy of the United States, and the value of nuclear weapons to the security of the American people. This report tracks the changing conceptual and political landscape of U.S. nuclear deterrence to illuminate the gap in prioritizing the nuclear arsenal and to build a compelling rationale for tactical personnel explaining the role and value of U.S. nuclear weapons.
Spanning decades and continents, from the battlefields of the Balkans to secret nuclear research labs in Iran and embassy grounds in North Korea, this saga begins in 1990. As the United States cobbles together a coalition to undo Saddam Hussein's invasion of Kuwait, six US officers are trapped in Iraq with intelligence that could ruin Operation Desert Storm if it is obtained by the brutal Iraqi dictator. Desperate, the CIA asks Poland, a longtime Cold War foe famed for its excellent spies, for help. Just months after the Polish people voted in their first democratic election since the 1930s, the young Solidarity government in Warsaw sends a veteran ex-Communist spy who'd battled the West for decades to rescue the six Americans. John Pomfret's gripping account of the 1990 cliffhanger in Iraq is just the beginning of the tale about intelligence cooperation between Poland and the United States, cooperation that one CIA director would later describe as "one of the two foremost intelligence relationships that the United States has ever had." Pomfret uncovers new details about the CIA's black site program that held suspected terrorists in Poland after 9/11 as well as the role of Polish spies in the hunt for Osama bin Laden. In the tradition of the most memorable works on espionage, Pomfret's book tells a distressing and disquieting tale of moral ambiguity in which right and wrong, black and white, are not conveniently distinguishable. As the United States teeters on the edge of a new cold war with Russia and China, Pomfret explores how these little-known events serve as a reminder of the importance of alliances in a dangerous world.
|
![]() ![]() You may like...
Smart Manufacturing - Integrating…
Scott , M. Shemwell, Hebab A. Quazi
Hardcover
R2,306
Discovery Miles 23 060
|