![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Widely known as the "Family Jewels," this document consists of almost 700 pages of responses from CIA employees to a 1973 directive from Director of Central Intelligence James Schlesinger asking them to report activities they thought might be inconsistent with the Agency's charter.The reports describe numerous activities conducted by the CIA during the 1950s to 1970s that violated its charter. According to a briefing provided by CIA Director William Colby to the Justice Department on December 31, 1974, these included 18 issues which were of legal concern: Confinement of a KGB defector, Yuri Ivanovich Nosenko, that "might be regarded as a violation of the kidnapping laws." Wiretapping of two syndicated columnists, Robert Allen and Paul Scott, approved by US Attorney General Robert Kennedy and Secretary of Defense Robert McNamara (see also Project Mockingbird). Physical surveillance of investigative journalist and muckraker Jack Anderson and his associates, including Les Whitten of the Washington Post and future Fox News Channel anchor and managing editor Brit Hume. Jack Anderson had written two articles on CIA-backed assassination attempts on Cuban leader Fidel Castro. Physical surveillance of then-Washington Post reporter Michael Getler, who later was an ombudsman for the Washington Post and PBS. Break-in at the home of a former CIA employee. Break-in at the office of a former defector. Warrantless entry into the apartment of a former CIA employee. Opening of mail to and from the Soviet Union from 1953 to 1973 (including letters associated with actress Jane Fonda) (project SRPOINTER/HTLINGUAL at JFK airport). Opening of mail to and from the People's Republic of China from 1969 to 1972 (project SRPOINTER/HTLINGUAL at JFK airport - see also Project SHAMROCK by the NSA). Funding of behavior modification research on unwitting US citizens, including unscientific, non-consensual human experiments. (see also Project MKULTRA concerning LSD experiments). Assassination plots against Cuban President Fidel Castro (authorized by Robert Kennedy) 8]; Congolese leader Patrice Lumumba; President Rafael Trujillo of the Dominican Republic; and Rene Schneider, Commander-in-chief of the Chilean Army. All of these plots were said to be unsuccessful ones. Surveillance of dissident groups between 1967 and 1971 (see Project RESISTANCE, Project MERRIMAC and Operation CHAOS). Surveillance of a particular Latin American female, and of US citizens in Detroit. Surveillance of former CIA officer and Agency critic, Victor Marchetti, author of the book, The CIA and the Cult of Intelligence, published in 1974. Amassing of files on 9,900-plus US citizens related to the antiwar movement (see Project RESISTANCE, Project MERRIMAC and Operation CHAOS). Polygraph experiments with the sheriff of San Mateo County, California. Fake CIA identification documents that might violate state laws. Testing of electronic equipment on US telephone circuits.
Interdisciplinary and multidisciplinary research is slowly yet steadily revolutionizing traditional education. However, multidisciplinary research can and will also improve the extent to which a country can protect its critical and vital assets. Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism is an essential scholarly publication that provides personnel directly working in the fields of intelligence, law enforcement, and science with the opportunity to understand the multidisciplinary nature of intelligence and science in order to improve current intelligence activities and contribute to the protection of the nation. Each chapter of the book discusses various components of science that should be applied to the intelligence arena. Featuring coverage on a range of topics including cybersecurity, economics, and political strategy, this book is ideal for law enforcement, intelligence and security practitioners, students, educators, and researchers.
Six tells the complete story of the service's birth and early years, including the tragic, untold tale of what happened to Britain's extensive networks in Soviet Russia between the wars. It reveals for the first time how the playwright and MI6 agent Harley Granville Barker bribed the Daily News to keep Arthur Ransome in Russia, and the real reason Paul Dukes returned there. It shows development of tradecraftA" and the great personal risk officers and their agents took, far from home and unprotected. In Salonika, for example, Lieutenant Norman Dewhurst realised it was time to leave when he opened his door to find one of his agents hanging dismembered in a sack. This first part of Six takes us up to the eve of the conflict, using hundreds of previously unreleased files and interviews with key players to show how one of the world's most secretive of secret agencies originated and developed into something like the MI6 we know today. The second part, published in Spring 2012, will tell the story from the outbreak of World War Two to the present.
The definitive history of the military's decades-long investigation into mental powers and phenomena, from the author of Pulitzer Prize finalist The Pentagon's Brain and international bestseller Area 51. This is a book about a team of scientists and psychics with top secret clearances. For more than forty years, the U.S. government has researched extrasensory perception, using it in attempts to locate hostages, fugitives, secret bases, and downed fighter jets, to divine other nations' secrets, and even to predict future threats to national security. The intelligence agencies and military services involved include CIA, DIA, NSA, DEA, the Navy, Air Force, and Army-and even the Joint Chiefs of Staff. Now, for the first time, New York Times bestselling author Annie Jacobsen tells the story of these radical, controversial programs, using never before seen declassified documents as well as exclusive interviews with, and unprecedented access to, more than fifty of the individuals involved. Speaking on the record, many for the first time, are former CIA and Defense Department scientists, analysts, and program managers, as well as the government psychics themselves. Who did the U.S. government hire for these top secret programs, and how do they explain their military and intelligence work? How do scientists approach such enigmatic subject matter? What interested the government in these supposed powers and does the research continue? Phenomena is a riveting investigation into how far governments will go in the name of national security.
This book tells a true detective story set mainly in Elizabethan London during the years of cold war just before the Armada of 1588. The mystery is the identity of a spy working in a foreign embassy to frustrate Catholic conspiracy and propaganda aimed at the overthrow of Queen Elizabeth and her government. The suspects in the case are the inmates of the house, an old building in the warren of streets and gardens between Fleet Street and the Thames. These include the ambassador, a civilized Frenchman, his wife, his daughter, his secretary, his clerk and his priest, the tutor, the chef, the butler, and the concierge. They also include a runaway friar, the Neapolitan philosopher, poet, and comedian Giordano Bruno, who wrote masterpieces of Italian literature, who was later burned in Rome for his anti-papal opinions, and who has been revered in Italy for his honorable and heroic resistance to papal authority. Others in the cast are Queen Elizabeth, her formidable secretary of state Sir Francis Walsingham, and King Henry III of France; poets, courtiers, and scholars; statesmen, conspirators, go-betweens, and stool-pigeons. When not in London, the action takes place in Paris and Oxford; a good deal of it happens on the river Thames. The hero or villain, who calls himself Fagot, does his work most effectively, is not found out, and disappears. In the first part of the book these events are narrated. In the second the spy is identified and his story put together. John Bossy's brilliant research, backed by his forensic and literary skills, solves a centuries-old mystery. His book makes a major contribution to the political and intellectual history of the wars of religion in Europe and to the domestic history of Elizabethan England. Not least, it is compelling reading.
After the end of the Cold War, it seemed as if Southeast Asia would remain a geopolitically stable region within the American imperious for the foreseeable future. In the last two decades, however, the re-emergence of China as a major great power has called into question the geopolitical future of the region and raised the specter of renewed of great power competition. As the eminent China scholar David Shambaugh explains in Where Great Powers Meet, the United States and China are engaged in a broad-gauged and global competition for power. While this competition ranges across the entire world, it is centered in Asia, and in this book, Shambaugh focuses the ten countries that comprise Southeast Asia. The United States and China constantly vie for position and influence in this enormously significant region-and the outcome of this contest will do much to determine whether Asia leaves the American orbit after seven decades and falls into a new Chinese sphere of influence. Just as importantly, to the extent that there is a global "power transition" occurring from the US to China, the fate of Southeast Asia will be a good indicator. Presently, both powers bring important assets to bear. The US continues to possess a depth and breadth of security ties, soft power, and direct investment across the region that empirically outweigh China's. For its part, China has more diplomatic influence, much greater trade, and geographic proximity. In assessing the likelihood of a regional power transition, Shambaugh at how ASEAN (the Association of Southeast Asian Nations) and the countries within it maneuver between the United States and China and the degree to which they align with one or the other power. Not simply an analysis of the region's place within an evolving international system, Where Great Powers Meet provides us with a comprehensive strategy that advances the American position while exploiting Chinese weaknesses.
A stunning, exciting story from acclaimed author Dan Smith - author of the Carnegie Medal-nominated Nisha's War. Berlin, 1961. Anja and Monika are best friends - they even share a cat called Otto. When a huge barbed wire fence is built between their apartment blocks, everything changes; their city and family are divided by the Berlin Wall. In the West, Anja is sure it will be taken down, but Monika is afraid. Her world is changing: neighbours keep disappearing, others become spies and shadowy threats lurk around every corner. Then, Anja discovers that Otto has found a way across. And if he can reach Monika, so can she ... An emotional, atmospheric story from Carnegie Medal-nominated author Dan Smith From the author of Nisha's War, My Friend the Enemy and She Wolf A high-stakes adventure, set during the Cold War, centred on two cousins separated when the Berlin Wall is built Perfect for readers aged 9 and up who may be studying the Cold War at school PRAISE FOR DAN SMITH: 'Action, adventure, wolves, snow ... this story has EVERYTHING. I devoured it so quickly I need to read it again.' EMMA CARROLL on She Wolf 'This book grabbed me from page one - highly recommended' HISTORICAL NOVEL SOCIETY on My Friend the Enemy
Exiled Emissary is a biography of the colorful life of George H. Earle, III - a Main Line Philadelphia millionaire, war hero awarded the Navy Cross, Pennsylvania Governor, Ambassador to Austria and Bulgaria, friend and supporter of Franklin Roosevelt, humanitarian, playboy, and spy. Rich in Casablanca-style espionage and intrigue, Farrell's deeply personal study presents FDR and his White House in a new light, especially when they learned in 1943 that high-ranking German officials approached Earle in Istanbul to convey their plot to kidnap Hitler and seek an armistice. When FDR rejected their offer, thereby prolonging World War II, his close relationship with Earle became most inconvenient, resulting in Earle's exile to American Samoa. Earle eventually returned to the United States, renewing his warnings about communism to President Truman, who underestimated the threat as a "bugaboo." Now, over four decades following Earle's death, Farrell has uncovered newly declassified records that give voice to his warnings about a threat we now know should have never been dismissed.
An eye-opening account of the perils of America's techno-spy empire Ever since the earliest days of the Cold War, American intelligence agencies have launched spies in the sky, implanted spies in the ether, burrowed spies underground, sunk spies in the ocean, and even tried to control spies' minds by chemical means. But these weren't human spies. Instead, the United States expanded its reach around the globe through techno-spies. Nothing Is Beyond Our Reach investigates how America's technophiles inadvertently created a global espionage empire: one based on technology, not land. Author Kristie Macrakis shows how in the process of staking out the globe through technology, US intelligence created the ability to collect a massive amount of data. But did it help? Featuring the sites visited during her research and stories of the people who created the techno-spy empire, Macrakis guides the reader from its conception in the 1950s to its global reach in the Cold War and Global War on Terror. In an age of ubiquitous technology, Nothing Is Beyond Our Reach exposes the perils of relying too much on technology while demonstrating how the US carried on the tradition of British imperial espionage. Readers interested in the history of espionage and technology as well as those who work in the intelligence field will find the revelations and insights in Nothing Is Beyond Our Reach fascinating and compelling.
Edward Snowden, the man who risked everything to expose the US government’s system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to collect every single phone call, text message, and email. The result would be an unprecedented system of mass surveillance with the ability to pry into the private lives of every person on earth. Six years later, Snowden reveals for the very first time how he helped to build this system and why he was moved to expose it. Spanning the bucolic Beltway suburbs of his childhood and the clandestine CIA and NSA postings of his adulthood, Permanent Record is the extraordinary account of a bright young man who grew up online – a man who became a spy, a whistleblower, and, in exile, the Internet’s conscience. Written with wit, grace, passion, and an unflinching candor, Permanent Record is a crucial memoir of our digital age and destined to be a classic.
This combination A-Z encyclopedia and primary document collection provides an authoritative and enlightening overview of U.S. anti- and counterterrorism politics, policies, attitudes, and actions related to both foreign and domestic threats, with a special emphasis on post-9/11 events. This book provides a compelling overview of U.S. laws, policies, programs, and actions in the realms of anti- and counterterrorism, as well as comprehensive coverage of the various domestic and foreign terrorist organizations threatening America, including their leaders, ideologies, and practices. These entries are supplemented with a carefully selected collection of primary sources that track the evolution of U.S. anti- and counterterrorism policies and political debate. These documents will not only illuminate major events and turning points in America's fight against terror-both foreign and homegrown-but also help readers understand debates about the effectiveness, morality, and constitutionality of controversial policies that have either been implemented or proposed, from waterboarding to targeted assassination to indefinite incarceration at Guantanamo Bay. In addition, this resource shows how political controversies over anti- and counterterrorism strategies are spilling over into other areas of American life, from debates about privacy rights, government surveillance, and anti-Muslim actions and beliefs to arguments about whether U.S. firearms policies are a boon to terrorists. Wide-ranging encyclopedia section featuring contributions from counterterrorism scholars Primary Document collection that provides additional illumination on major events, laws, policies, and trends Authoritative and evenhanded coverage of counterterrorism threats, issues, events, laws, policies, and organizations Reader's Guide to entries by subject category
This title presents a vivid account of how some citizens actively assist state surveillance by 'informing' on others, such as during the Cold War and the current campaign against terrorism. With "Snitch!", Steve Hewitt provides a thorough study of human informers, i.e., people who secretly supply information to a domestic security agency (a spy provides information to a foreign intelligence service). The work begins with an examination of the rise of the modern security state through the Cold War to today's ongoing 'long war' on terror. Using a unique comparative approach, Hewitt analyzes the practical and political aspects of informing, drawing on past and present examples from the United States, United Kingdom, former Soviet Union, and other countries. He argues that although the scale of the use of informers by domestic security agencies differs from nation to nation, the nature of their use and the impact on those targeted by this form of surveillance do not. An engaging read that combines scholarly research and specific case studies, "Snitch!" will appeal to anyone interested in security and intelligence as well as in issues surrounding the use of informers, especially in democratic societies. |
You may like...
|