![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
On 9 November 1939, two unsuspecting British agents of the Special Intelligence Services walked into a trap set by German Spymaster Reinhard Heydrich. Believing that they were meeting a dissident German general for talks about helping German military opposition to bring down Hitler and end the war, they were instead taken captive in the Dutch village of Venlo and whisked away to Germany for interrogation by the Gestapo. The incident was a huge embarrassment for the Dutch government and provided the Germans with significant intelligence about SIS operations throughout Europe. The incident itself was an intelligence catastrophe but it also acts as a prism through which a number of other important narrative strands pass. Fundamental to the subterfuge perpetrated at Venlo were unsubstantiated but insistent rumours of high-ranking Germany generals plotting to overthrow the Nazi regime from within. After the humiliation suffered when Hitler tore up the Munich Agreement, British Prime Minister Neville Chamberlain was anxious to see just how much truth there was in these stories; keen to rehabilitate his reputation through one last effort to find a peaceful rapprochement with Germany. When Franz Fischer, a small-time petty crook and agent provocateur, persuaded British SIS operatives in the Netherlands that he could act as a go-between for the British government with disaffected German generals, the German Security chief Reinhard Heydrich stepped in and quietly took control of the operation. Heydrich's boss, head of the Gestapo Heinrich Himmler, was anxious to explore the possibility of peace negotiations with Britain and saw an opportunity to exploit the situation for his personal benefit. On the day before a crucial meeting of conspirators and British agents on the Dutch-German border, a bomb exploded in the Burgerbraukeller in Munich in the exact spot where Hitler had stood to deliver a speech only minutes earlier. The perpetrator was quickly arrested, and Hitler demanded that Himmler find evidence to show that the two events were intimately connected-the British agents were snatched hours later. While the world was coming to terms with the fearsome power of German military might the British intelligence capability in northern Europe was consigned to the dustbin in the sleepy Dutch town of Venlo. This first full account of the Venlo incident explores the wider context of this German intelligence coup, and its consequences.
Security intelligence continues to be of central importance to the contemporary world: individuals, organizations and states all seek timely and actionable intelligence in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and to what ends? How can we ensure that intelligence is not abused? In this third edition of their classic text, Peter Gill and Mark Phythian set out a comprehensive framework for the study of intelligence, discussing how states organize the collection and analysis of information in order to produce intelligence, how it is acted upon, why it may fail and how the process should be governed in order to uphold democratic rights. Fully revised and updated throughout, the book covers recent developments, including the impact of the Snowden leaks on the role of intelligence agencies in Internet and social media surveillance and in defensive and offensive cyber operations, and the legal and political arrangements for democratic control. The role of intelligence as part of 'hybrid' warfare in the case of Russia and Ukraine is also explored, and the problems facing intelligence in the realm of counterterrorism is considered in the context of the recent wave of attacks in Western Europe. Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of inquiry - one that everyone has an interest in understanding.
Writing and briefing are fundamental to the intelligence profession. The ability to communicate clearly, concisely, and coherently is basic to all intelligence disciplines, even the most technical. Communicating with Intelligence, Third Edition is a handbook on writing and briefing intelligence based on the decades of practical experience of James S. Major. The book is designed primarily for faculty and students pursuing studies in intelligence, national security, and homeland security, who need to learn the art of preparing written products and intelligence briefings. But it also has considerable value for working professionals who simply wish to sharpen their communication skills. The third edition of Communicating with Intelligence provides the expediency, efficiency, and effectiveness instructors and members of the Intelligence Community require for a communication handbook.
Volume One of the Official History of the Joint Intelligence Committee draws upon a range of released and classified papers to produce the first, authoritative account of the way in which intelligence was used to inform policy. For almost 80 years the Joint Intelligence Committee (JIC) has been a central player in the secret machinery of the British Government, providing a co-ordinated intelligence service to policy makers, drawing upon the work of the intelligence agencies and Whitehall departments. Since its creation, reports from the JIC have contributed to almost every key foreign policy decision taken by the British Government. This volume covers the evolution of the JIC since 1936 and culminates with its role in the events of Suez in 1956. This book will be of much interest to students of intelligence studies, British politics, international diplomacy, security studies and International Relations in general. Dr Michael S. Goodman is Reader in Intelligence and International Affairs in the Department of War Studies, King's College London. He is author or editor of five previous books, including the Routledge Companion to Intelligence Studies (2013).
The United States' national security depends on a secure, reliable and resilient cyberspace. The inclusion of digital systems into every aspect of US national security has been underway since World War II and has increased with the proliferation of Internet enabled devices. There is an increasing need to develop a robust deterrence framework within which the US and its allies can dissuade would be adversaries from engaging in various cyber activities. Yet despite a desire to deter adversaries, the problems associated with dissuasion remain complex, multifaceted, poorly understood and imprecisely specified. Challenges including, credibility, attribution, escalation and conflict management to name but a few remain ever present and challenge the US in its efforts to foster security in cyberspace. These challenges need to be addressed in a deliberate and multidisciplinary approach that combines political and technical realities to provide a robust set of policy options to decision makers. The Cyber Deterrence Problem brings together a multi-disciplinary team of scholars from multiple institutions with expertise in computer science, deterrence theory, cognitive psychology, intelligence studies, and conflict management to analyze and develop a robust assessment of the necessary requirements and attributes for achieving deterrence in cyberspace. Beyond simply addressing the base challenges associated with deterrence many of the chapters also propose strategies and tactics to enhance deterrence in cyberspace and emphasize conceptualizing how the US deters adversaries.
Since the 1990s, private military and security companies (PMSCs) have intervened in civil wars around the globe. International, legally registered corporate actors have assisted governments with a myriad of tasks including combat support, logistics, army and police training, intelligence analysis, and guard services. However, reports that such contractors have been responsible for human rights abuses have spurred the need to evaluate the industry's impact on conflicts. Are these contractors effective in curbing violence or does emphasis on profit and lack of accountability get in the way? And how can governments improve PMSCs' commitment to contractual obligations, including adherence to international humanitarian laws? This book identifies two market forces that impact PMSCs' military effectiveness: local or conflict-level competition and global or industry-level competition. Specifically, Seden Akcinaroglu and Elizabeth Radziszewski challenge the assumption that interventions by profit-driven coporations are likely to destabilize areas engaged in war, and provide data that private contractors do contribute to conflict termination under certain circumstances. They argue that competitive market pressure creates a strong monitoring system and that the company's corporate structure and external competitive environment in a given conflict help to explain the variance in accountability to clients. Including an analysis of data on international PMSCs' interventions in civil wars from 1990-2008, Akcinaroglu and Radziszewski show the impact of competition on companies' contribution to the termination of different types of civil wars.
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response
In From Mandate to Blueprint, Thomas Fingar offers a guide for new federal government appointees faced with the complex task of rebuilding institutions and transitioning to a new administration. Synthesizing his own experience implementing the most comprehensive reforms to the national security establishment since 1947, Fingar provides crucial guidance to newly appointed officials. When Fingar was appointed the first Deputy Director of National Intelligence for Analysis in 2005, he discovered the challenges of establishing a new federal agency and implementing sweeping reforms of intelligence procedure and performance. The mandate required prompt action but provided no guidance on how to achieve required and desirable changes. Fingar describes how he defined and prioritized the tasks involved in building and staffing a new organization, integrating and improving the work of sixteen agencies, and contending with pressure from powerful players. For appointees without the luxury of taking command of fully staffed and well-functioning federal agencies, From Mandate to Blueprint is an informed and practical guide for the challenges ahead.
Many of the most famous escapes in history took place during the Second World War. These daring flights from Nazi-occupied Europe would never have been possible but for the assistance of a hitherto secret British service: MI9. This small, dedicated and endlessly inventive team gave hope to the men who had fallen into enemy hands, and aid to resistance fighters in occupied territory. It sent money, maps, clothes, compasses, even hacksaws - and in return coded letters from the prisoner-of-war camps and provided invaluable news of what was happening in the enemy's homeland. Understaffed and under-resourced, MI9 nonetheless made a terrific contribution to the Allied war effort. First published in 1979, this book tells the full, inside story of an extraordinary organisation.
When the possibility of wiretapping first became known to Americans they were outraged. Now, in our post 9/11 world, it's accepted that corporations are vested with human rights, and government agencies and corporations use computers to monitor our private lives. David H. Price pulls back the curtain to reveal how the FBI and other government agencies have always functioned as the secret police of American capitalism up to today, where they luxuriate in a near-limitless NSA surveillance of all. Price looks through a roster of campaigns by law enforcement, intelligence agencies and corporations to understand how we got here. Starting with J. Edgar Hoover and the early FBI's alignment with business, his access to 15,000 pages of never-before-seen FBI files shines a light on the surveillance of Edward Said, Andre Gunder Frank and Alexander Cockburn, Native American communists and progressive factory owners. Price uncovers patterns of FBI monitoring and harassing of activists and public figures, providing the vital means for us to understanding how these new frightening surveillance operations are weaponised by powerful governmental agencies that remain largely shrouded in secrecy.
In this compelling investigation, author Michael Smith explores the critical moment in a spy's life: that split-second decision to embrace a double life; to cheat and hide and hurt; to risk disgrace - even death - without any guarantee of being rewarded or even recognised. Each chapter centres on a number of different spies, following the path they took that led, finally, to the point of no return. Were they propelled by personal convictions? Blackmailed and left without a choice? Too desperate for money to think about the consequences? Through in-depth insider knowledge, Michael Smith also uncovers new and unknown cases, including a spy inside ISIS, President Trump's links with Russia and Edward Snowden's role as a whistle-blower, to offer compelling psychological portraits of these men and women, homing unerringly on the fault-lines and shady corners of their characters, their weaknesses and their strengths, the lies they tell other people, and the lies they always end up telling themselves.
Stories of plots, sham plots, and the citizen-informers who discovered them are at the center of Rachel Weil's compelling study of the turbulent decade following the Revolution of 1688. Most studies of the Glorious Revolution focus on its causes or long-term effects, but Weil instead zeroes in on the early years when the survival of the new regime was in doubt. By encouraging informers, imposing loyalty oaths, suspending habeas corpus, and delaying the long-promised reform of treason trial procedure, the Williamite regime protected itself from enemies and cemented its bonds with supporters, but also put its own credibility at risk.
In today's complex international environment, how do the United States, China, and Russia manage the return of great power competition as well as the persistent threat of violent non-state actors? This book explores shaping, a type of military power that relies not on violence and coercion, but on the ability to change the characteristics of or relationships between militaries. Major powers use shaping to attract allies or disrupt adversarial alliances, socialize values in other militaries, or delegate security to partners. This book reveals how shaping becomes a more attractive tool of military statecraft when threats and allies are ambiguous, which is often a result of systemic forces such as the international distribution of power and the consequences of globalization. The logic and increased frequency of shaping is explored through three case studies of major military exercise programs as well as sentiment analysis and statistics of over 1,000 multinational exercises led by all the major powers from 1980-2016. This book helps scholars, policymakers, military practitioners, and interested readers understand the changing character of military power in the current and future international environment.
Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation explores a number of wrenching ethical issues and challenges faced by military and intelligence personnel. It provides a robust and practical approach to analyzing ethical issues in war and intelligence operations, and applies careful reasoning to issues of vital importance today, not only for soldiers, intelligence professionals, and policy makers, but also for the citizens they serve and protect. This new edition has been updated throughout and includes new contents, to deal with critical issues such as torturing detainees, using espionage to penetrate terrorist cells, mounting covert actions to undermine hostile regimes, practicing euthanasia on the battlefield as mercy-killing, or using targeted killings as a means to fight insurgencies. Partly Cloudy provides an excellent introduction to the field for students, instructors, and practitioners who are interested in the ethical challenges faced by public servants.
A spy story like no other. Private spies are the invisible force that shapes our modern world: they influence our elections, effect government policies and shape the fortunes of companies. More deviously, they are also peering into our personal lives as never before, using off-the shelf technology to listen to our phone calls, monitor our emails and decide what we see on social media. Spooked takes us on a journey into a secret billion-dollar industry in which information is currency and loyalties are for sale. An industry so tentacular it reaches from Saddam Hussein to an 80s-era Trump, from the Steele dossier written by a British ex-spy to Russian oligarchs sitting pretty in Mayfair mansions, from the devious tactics of Harvey Weinstein to the growing role of corporate spies in politics and the threat to future elections. Spooked reads like the best kind of spy story: a gripping tale packed with twists and turns, uncovering a secret side of our modern world.
Published for the first time, the history of the CIA's clandestine short-wave radio broadcasts to Eastern Europe and the USSR during the early Cold War is covered in-depth. Chapters describe the "gray" broadcasting of Radio Free Europe and Radio Liberty in Munich; clandestine or "black" radio broadcasts from Radio Nacional de Espana in Madrid to Estonia, Latvia, Lithuania and Ukraine; transmissions to Bulgaria, Romania, Albania, Ukraine and the USSR from a secret site near Athens; and broadcasts to Byelorussia and Slovakia. Infiltrated behind the Iron Curtain through dangerous air drops and boat landings, CIA and other intelligence service agents faced counterespionage, kidnapping, assassination, arrest and imprisonment. Excerpts from broadcasts taken from monitoring reports of Eastern Europe intelligence agencies are included.
In this newly revised and updated edition of his essential work, John Prados adds his concluding findings on U.S. covert operations in Angola, Afghanistan, Nicaragua, and the Persian Gulf. Acclaimed as a landmark book about U.S. intelligence agencies in the postwar era, Presidents' Secret Wars describes the secret warfare mounted by the president, the CIA, and the Pentagon operations aimed at altering the destinies of nations and the course of global politics. Mr. Prados uses many newly declassified documents to open a vital window on this most secret aspect of American foreign policy. "A worthy and informative book" Washington Post. "An important book....Prados's recounting of the often neglected early days of the C.I.A. and its covert activities is especially enlightening." New York Times Book Review. For those concerned with the study of intelligence, Presidents' Secret Wars will be highly useful because Dr. Prados has done serious archival research....This volume moves the study of covert operations to a higher and more sophisticated plane" Intelligence and National Security.
This volume discusses the development of governmental proto-bureaucracy, which led to and was influenced by the inclusion of professional agents and spies in the early modern English government. In the government's attempts to control religious practices, wage war, and expand their mercantile reach both east and west, spies and agents became essential figures of empire, but their presence also fundamentally altered the old hierarchies of class and power. The job of the spy or agent required fluidity of role, the adoption of disguise and alias, and education, all elements that contributed to the ideological breakdown of social and class barriers. The volume argues that the inclusion of the lower classes (commoners, merchants, messengers, and couriers) in the machinery of government ultimately contributed to the creation of governmental proto-bureaucracy. The importance and significance of these spies is demonstrated through the use of statistical social network analysis, analyzing social network maps and statistics to discuss the prominence of particular figures within the network and the overall shape and dynamics of the evolving Elizabethan secret service. The Eye of the Crown is a useful resource for students and scholars interested in government, espionage, social hierarchy, and imperial power in Elizabethan England.
'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind 'Essential . . . What's revealed are networks of spies and criminals fighting an invisible war that involves us all' Eliot Higgins, bestselling author of We Are Bellingcat Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us. Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other. Looking at key players including Edward Snowden, Russian hackers Cozy Bear and Evgeniy Bogachev, 'the Pablo Escobar of the digital era', Modderkolk opens our eyes to the dark underbelly of the digital world with the narrative drive of a thriller.
A deeply researched international history and exemplary study (New York Times Book Review) of how a divided world ended and our present world was fashioned, as the world drifts toward another great time of choosing. Two of America's leading scholar-diplomats, Philip Zelikow and Condoleezza Rice, have combed sources in several languages, interviewed leading figures, and drawn on their own firsthand experience to bring to life the choices that molded the contemporary world. Zeroing in on the key moments of decision, the might-have-beens, and the human beings working through them, they explore both what happened and what could have happened, to show how one world ended and another took form. Beginning in the late 1970s and carrying into the present, they focus on the momentous period between 1988 and 1992, when an entire world system changed, states broke apart, and societies were transformed. Such periods have always been accompanied by terrible wars -- but not this time. This is also a story of individuals coping with uncertainty. They voice their hopes and fears. They try out desperate improvisations and careful designs. These were leaders who grew up in a postwar world, who tried to fashion something better, more peaceful, more prosperous, than the damaged, divided world in which they had come of age. New problems are putting their choices, and the world they made, back on the operating table. It is time to recall not only why they made their choices, but also just how great nations can step up to great challenges. Timed for the thirtieth anniversary of the fall of the Berlin Wall, To Build a Better World is an authoritative depiction of contemporary statecraft. It lets readers in on the strategies and negotiations, nerve-racking risks, last-minute decisions, and deep deliberations behind the dramas that changed the face of Europe -- and the world -- forever.
A well-balanced and detailed look at the East German Ministry for State Security, the secret police force more commonly known as the Stasi. "This is an excellent book, full of careful, balanced judgements and a wealth of concisely-communicated knowledge. It is also well written. Indeed, it is the best book yet published on the MfS."-German History The Stasi stood for Stalinist oppression and all-encompassing surveillance. The "shield and sword of the party," it secured the rule of the Communist Party for more than forty years, and by the 1980s it had become the largest secret-police apparatus in the world, per capita. Jens Gieseke tells the story of the Stasi, a feared secret-police force and a highly professional intelligence service. He inquires into the mechanisms of dictatorship and the day-to-day effects of surveillance and suspicion. Masterful and thorough at once, he takes the reader through this dark chapter of German postwar history, supplying key information on perpetrators, informers, and victims. In an assessment of post-communist memory politics, he critically discusses the consequences of opening the files and the outcomes of the Stasi debate in reunified Germany. A major guide for research on communist secret-police forces, this book is considered the standard reference work on the Stasi.
Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation explores a number of wrenching ethical issues and challenges faced by military and intelligence personnel. It provides a robust and practical approach to analyzing ethical issues in war and intelligence operations, and applies careful reasoning to issues of vital importance today, not only for soldiers, intelligence professionals, and policy makers, but also for the citizens they serve and protect. This new edition has been updated throughout and includes new contents, to deal with critical issues such as torturing detainees, using espionage to penetrate terrorist cells, mounting covert actions to undermine hostile regimes, practicing euthanasia on the battlefield as mercy-killing, or using targeted killings as a means to fight insurgencies. Partly Cloudy provides an excellent introduction to the field for students, instructors, and practitioners who are interested in the ethical challenges faced by public servants. |
![]() ![]() You may like...
Spying And The Crown - The Secret…
Richard J. Aldrich, Rory Cormac
Paperback
R380
Discovery Miles 3 800
Ready To Fire - How India and I Survived…
Nambi Narayanan, Arun Ram
Hardcover
R1,153
Discovery Miles 11 530
Wicked Problems - The Ethics of Action…
Austin Choi-Fitzpatrick, Douglas Irvin-Erickson, …
Hardcover
R2,662
Discovery Miles 26 620
|