![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.
The history of recruiting citizens to spy on each other in the United States. Ever since the revelations of whistleblower Edward Snowden, we think about surveillance as the data-tracking digital technologies used by the likes of Google, the National Security Administration, and the military. But in reality, the state and allied institutions have a much longer history of using everyday citizens to spy and inform on their peers. Citizen Spies shows how "If You See Something, Say Something" is more than just a new homeland security program; it has been an essential civic responsibility throughout the history of the United States. From the town crier of Colonial America to the recruitment of youth through "junior police," to the rise of Neighborhood Watch, AMBER Alerts, and Emergency 9-1-1, Joshua Reeves explores how ordinary citizens have been taught to carry out surveillance on their peers. Emphasizing the role humans play as "seeing" and "saying" subjects, he demonstrates how American society has continuously fostered cultures of vigilance, suspicion, meddling, snooping, and snitching. Tracing the evolution of police crowd-sourcing from "Hue and Cry" posters and America's Most Wanted to police-affiliated social media, as well as the U.S.'s recurrent anxieties about political dissidents and ethnic minorities from the Red Scare to the War on Terror, Reeves teases outhow vigilance toward neighbors has long been aligned with American ideals of patriotic and moral duty. Taking the long view of the history of the citizen spy, this book offers a much-needed perspective for those interested in how we arrived at our current moment in surveillance culture and contextualizes contemporary trends in policing.
Six tells the complete story of the service's birth and early years, including the tragic, untold tale of what happened to Britain's extensive networks in Soviet Russia between the wars. It reveals for the first time how the playwright and MI6 agent Harley Granville Barker bribed the Daily News to keep Arthur Ransome in Russia, and the real reason Paul Dukes returned there. It shows development of tradecraftA" and the great personal risk officers and their agents took, far from home and unprotected. In Salonika, for example, Lieutenant Norman Dewhurst realised it was time to leave when he opened his door to find one of his agents hanging dismembered in a sack. This first part of Six takes us up to the eve of the conflict, using hundreds of previously unreleased files and interviews with key players to show how one of the world's most secretive of secret agencies originated and developed into something like the MI6 we know today. The second part, published in Spring 2012, will tell the story from the outbreak of World War Two to the present.
The definitive history of the military's decades-long investigation into mental powers and phenomena, from the author of Pulitzer Prize finalist The Pentagon's Brain and international bestseller Area 51. This is a book about a team of scientists and psychics with top secret clearances. For more than forty years, the U.S. government has researched extrasensory perception, using it in attempts to locate hostages, fugitives, secret bases, and downed fighter jets, to divine other nations' secrets, and even to predict future threats to national security. The intelligence agencies and military services involved include CIA, DIA, NSA, DEA, the Navy, Air Force, and Army-and even the Joint Chiefs of Staff. Now, for the first time, New York Times bestselling author Annie Jacobsen tells the story of these radical, controversial programs, using never before seen declassified documents as well as exclusive interviews with, and unprecedented access to, more than fifty of the individuals involved. Speaking on the record, many for the first time, are former CIA and Defense Department scientists, analysts, and program managers, as well as the government psychics themselves. Who did the U.S. government hire for these top secret programs, and how do they explain their military and intelligence work? How do scientists approach such enigmatic subject matter? What interested the government in these supposed powers and does the research continue? Phenomena is a riveting investigation into how far governments will go in the name of national security.
After the end of the Cold War, it seemed as if Southeast Asia would remain a geopolitically stable region within the American imperious for the foreseeable future. In the last two decades, however, the re-emergence of China as a major great power has called into question the geopolitical future of the region and raised the specter of renewed of great power competition. As the eminent China scholar David Shambaugh explains in Where Great Powers Meet, the United States and China are engaged in a broad-gauged and global competition for power. While this competition ranges across the entire world, it is centered in Asia, and in this book, Shambaugh focuses the ten countries that comprise Southeast Asia. The United States and China constantly vie for position and influence in this enormously significant region-and the outcome of this contest will do much to determine whether Asia leaves the American orbit after seven decades and falls into a new Chinese sphere of influence. Just as importantly, to the extent that there is a global "power transition" occurring from the US to China, the fate of Southeast Asia will be a good indicator. Presently, both powers bring important assets to bear. The US continues to possess a depth and breadth of security ties, soft power, and direct investment across the region that empirically outweigh China's. For its part, China has more diplomatic influence, much greater trade, and geographic proximity. In assessing the likelihood of a regional power transition, Shambaugh at how ASEAN (the Association of Southeast Asian Nations) and the countries within it maneuver between the United States and China and the degree to which they align with one or the other power. Not simply an analysis of the region's place within an evolving international system, Where Great Powers Meet provides us with a comprehensive strategy that advances the American position while exploiting Chinese weaknesses.
Widely known as the "Family Jewels," this document consists of almost 700 pages of responses from CIA employees to a 1973 directive from Director of Central Intelligence James Schlesinger asking them to report activities they thought might be inconsistent with the Agency's charter.The reports describe numerous activities conducted by the CIA during the 1950s to 1970s that violated its charter. According to a briefing provided by CIA Director William Colby to the Justice Department on December 31, 1974, these included 18 issues which were of legal concern: Confinement of a KGB defector, Yuri Ivanovich Nosenko, that "might be regarded as a violation of the kidnapping laws." Wiretapping of two syndicated columnists, Robert Allen and Paul Scott, approved by US Attorney General Robert Kennedy and Secretary of Defense Robert McNamara (see also Project Mockingbird). Physical surveillance of investigative journalist and muckraker Jack Anderson and his associates, including Les Whitten of the Washington Post and future Fox News Channel anchor and managing editor Brit Hume. Jack Anderson had written two articles on CIA-backed assassination attempts on Cuban leader Fidel Castro. Physical surveillance of then-Washington Post reporter Michael Getler, who later was an ombudsman for the Washington Post and PBS. Break-in at the home of a former CIA employee. Break-in at the office of a former defector. Warrantless entry into the apartment of a former CIA employee. Opening of mail to and from the Soviet Union from 1953 to 1973 (including letters associated with actress Jane Fonda) (project SRPOINTER/HTLINGUAL at JFK airport). Opening of mail to and from the People's Republic of China from 1969 to 1972 (project SRPOINTER/HTLINGUAL at JFK airport - see also Project SHAMROCK by the NSA). Funding of behavior modification research on unwitting US citizens, including unscientific, non-consensual human experiments. (see also Project MKULTRA concerning LSD experiments). Assassination plots against Cuban President Fidel Castro (authorized by Robert Kennedy) 8]; Congolese leader Patrice Lumumba; President Rafael Trujillo of the Dominican Republic; and Rene Schneider, Commander-in-chief of the Chilean Army. All of these plots were said to be unsuccessful ones. Surveillance of dissident groups between 1967 and 1971 (see Project RESISTANCE, Project MERRIMAC and Operation CHAOS). Surveillance of a particular Latin American female, and of US citizens in Detroit. Surveillance of former CIA officer and Agency critic, Victor Marchetti, author of the book, The CIA and the Cult of Intelligence, published in 1974. Amassing of files on 9,900-plus US citizens related to the antiwar movement (see Project RESISTANCE, Project MERRIMAC and Operation CHAOS). Polygraph experiments with the sheriff of San Mateo County, California. Fake CIA identification documents that might violate state laws. Testing of electronic equipment on US telephone circuits.
Exiled Emissary is a biography of the colorful life of George H. Earle, III - a Main Line Philadelphia millionaire, war hero awarded the Navy Cross, Pennsylvania Governor, Ambassador to Austria and Bulgaria, friend and supporter of Franklin Roosevelt, humanitarian, playboy, and spy. Rich in Casablanca-style espionage and intrigue, Farrell's deeply personal study presents FDR and his White House in a new light, especially when they learned in 1943 that high-ranking German officials approached Earle in Istanbul to convey their plot to kidnap Hitler and seek an armistice. When FDR rejected their offer, thereby prolonging World War II, his close relationship with Earle became most inconvenient, resulting in Earle's exile to American Samoa. Earle eventually returned to the United States, renewing his warnings about communism to President Truman, who underestimated the threat as a "bugaboo." Now, over four decades following Earle's death, Farrell has uncovered newly declassified records that give voice to his warnings about a threat we now know should have never been dismissed.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
This combination A-Z encyclopedia and primary document collection provides an authoritative and enlightening overview of U.S. anti- and counterterrorism politics, policies, attitudes, and actions related to both foreign and domestic threats, with a special emphasis on post-9/11 events. This book provides a compelling overview of U.S. laws, policies, programs, and actions in the realms of anti- and counterterrorism, as well as comprehensive coverage of the various domestic and foreign terrorist organizations threatening America, including their leaders, ideologies, and practices. These entries are supplemented with a carefully selected collection of primary sources that track the evolution of U.S. anti- and counterterrorism policies and political debate. These documents will not only illuminate major events and turning points in America's fight against terror-both foreign and homegrown-but also help readers understand debates about the effectiveness, morality, and constitutionality of controversial policies that have either been implemented or proposed, from waterboarding to targeted assassination to indefinite incarceration at Guantanamo Bay. In addition, this resource shows how political controversies over anti- and counterterrorism strategies are spilling over into other areas of American life, from debates about privacy rights, government surveillance, and anti-Muslim actions and beliefs to arguments about whether U.S. firearms policies are a boon to terrorists. Wide-ranging encyclopedia section featuring contributions from counterterrorism scholars Primary Document collection that provides additional illumination on major events, laws, policies, and trends Authoritative and evenhanded coverage of counterterrorism threats, issues, events, laws, policies, and organizations Reader's Guide to entries by subject category
This title presents a vivid account of how some citizens actively assist state surveillance by 'informing' on others, such as during the Cold War and the current campaign against terrorism. With "Snitch!", Steve Hewitt provides a thorough study of human informers, i.e., people who secretly supply information to a domestic security agency (a spy provides information to a foreign intelligence service). The work begins with an examination of the rise of the modern security state through the Cold War to today's ongoing 'long war' on terror. Using a unique comparative approach, Hewitt analyzes the practical and political aspects of informing, drawing on past and present examples from the United States, United Kingdom, former Soviet Union, and other countries. He argues that although the scale of the use of informers by domestic security agencies differs from nation to nation, the nature of their use and the impact on those targeted by this form of surveillance do not. An engaging read that combines scholarly research and specific case studies, "Snitch!" will appeal to anyone interested in security and intelligence as well as in issues surrounding the use of informers, especially in democratic societies.
For almost a decade, Col. Ryszard Kuklinski betrayed the Communist leadership of Poland, cooperating with the CIA in one of the most extraordinary human intelligence operations of the Cold War. But even after freedom came to Poland a riddle remained - was Kuklinski a patriot or a traitor? In August 1972, Ryszard Kuklinski, a highly respected colonel in the Polish Army, embarked on what would become one of the most extraordinary human intelligence operations of the Cold War. Despite the extreme risk to himself and his family, he contacted the American Embassy in Bonn, and arranged a secret meeting. From the very start, he made clear that he deplored the Soviet domination of Poland, and believed his country was on the wrong side of the Cold War. Over the next nine years, Kuklinski rose quickly in the Polish defense ministry, acting as a liaison to Moscow, and helping to prepare for a hot war with the West. But he also lived a life of subterfuge - of dead drops, messages written in invisible ink, miniature cameras, and secret transmitters. In 1981, he gave the CIA the secret plans to crush Solidarity. the West. He still lives in hiding in America. Kuklinski's story is a harrowing personal drama about one man's decision to betray the Communist leadership in order to save the country he loves. Through extensive interviews and access to the CIA's secret archives on the case, Benjamin Weiser offers an unprecedented and richly detailed look at this secret history of the Cold War.
An eye-opening account of the perils of America's techno-spy empire Ever since the earliest days of the Cold War, American intelligence agencies have launched spies in the sky, implanted spies in the ether, burrowed spies underground, sunk spies in the ocean, and even tried to control spies' minds by chemical means. But these weren't human spies. Instead, the United States expanded its reach around the globe through techno-spies. Nothing Is Beyond Our Reach investigates how America's technophiles inadvertently created a global espionage empire: one based on technology, not land. Author Kristie Macrakis shows how in the process of staking out the globe through technology, US intelligence created the ability to collect a massive amount of data. But did it help? Featuring the sites visited during her research and stories of the people who created the techno-spy empire, Macrakis guides the reader from its conception in the 1950s to its global reach in the Cold War and Global War on Terror. In an age of ubiquitous technology, Nothing Is Beyond Our Reach exposes the perils of relying too much on technology while demonstrating how the US carried on the tradition of British imperial espionage. Readers interested in the history of espionage and technology as well as those who work in the intelligence field will find the revelations and insights in Nothing Is Beyond Our Reach fascinating and compelling.
Since the 1990s, private military and security companies (PMSCs) have intervened in civil wars around the globe. International, legally registered corporate actors have assisted governments with a myriad of tasks including combat support, logistics, army and police training, intelligence analysis, and guard services. However, reports that such contractors have been responsible for human rights abuses have spurred the need to evaluate the industry's impact on conflicts. Are these contractors effective in curbing violence or does emphasis on profit and lack of accountability get in the way? And how can governments improve PMSCs' commitment to contractual obligations, including adherence to international humanitarian laws? This book identifies two market forces that impact PMSCs' military effectiveness: local or conflict-level competition and global or industry-level competition. Specifically, Seden Akcinaroglu and Elizabeth Radziszewski challenge the assumption that interventions by profit-driven coporations are likely to destabilize areas engaged in war, and provide data that private contractors do contribute to conflict termination under certain circumstances. They argue that competitive market pressure creates a strong monitoring system and that the company's corporate structure and external competitive environment in a given conflict help to explain the variance in accountability to clients. Including an analysis of data on international PMSCs' interventions in civil wars from 1990-2008, Akcinaroglu and Radziszewski show the impact of competition on companies' contribution to the termination of different types of civil wars.
As technology continues to advance, the threats imposed on these innovations also continue to grow and evolve. As such, law enforcement specialists diligently work to counteract these threat, promote national safety, and defend the individual rights on citizens. National Security and Counterintelligence in the Era of Cyber Espionage highlights technological advancements in intelligence systems and law enforcement in relation to cybercrime and reconnaissance issues. Focusing on current and emergent threats to national security, as well as the technological advancements being adopted within the intelligence field, this book is an exhaustive reference source for government officials, researchers, graduate-level students, and intelligence and enforcement specialists interested in novel measures in being implemented in the prevention of cybercrime and terrorism.
|
You may like...
|