![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
British Intelligence is the oldest, most experienced organization of its kind in the world, the unseen hand behind so many world events, and glamorized by James Bond. Despite the change in role, from a global power controlling an Empire that covered much of the world, to a mere partner in the North Atlantic Treaty Organization (NATO) and the European Union, the country's famed security and intelligence apparatus continues largely intact, and recognized as "punching above its weight." Feared by the Soviets, admired and trusted by the Central Intelligence Agency (CIA), British Intelligence has provided the hidden dimension to the conduct of domestic and foreign policy, with the added mystique of Whitehall secrecy, a shroud that for years protected the identities of the shadowy figures who recruited the sources, broke the codes, and caught the spies. This second edition of Historical Dictionary of the British Intelligence covers the history through a chronology, an introductory essay, appendixes, and an extensive bibliography. The dictionary section has over 1,000 cross-referenced entries on specific operations, spies and their handlers, the moles and defectors, top leaders, and main organizations. This book is an excellent access point for students, researchers, and anyone wanting to know more about the British Intelligence.
Since the 9/11 attacks, the number of intelligence courses and related curricula have soared. Many instructors look for interactive learning tools because they add immeasurable value to the student's understanding of the intelligence enterprise. Such tools, however, take time and effort to develop and are not circulated among faculty. This is the first textbook to offer in one volume original simulations, exercises, and games designed by academics and intelligence professionals from several countries. These innovative methods are meant to enhance the learning experience and provide an international perspective to the topics and approaches discussed in class. Intelligence simulations and games are presented in ready-to run formats, from easy instructions to result recordings matrices, to minimize preparation time for both instructors and students. Exercises, such as cyber attack simulation, information sharing, ethical scenarios and more, expose the student to the many subtle aspects of the intelligence enterprise through active role-playing in simulations and game exercises. The cases cover a wide range of key analytical issues and contexts with an international focus for an innovative text that will suit intelligence training courses at all levels.
In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking their movements and transactions with public and private institutions. The state is becoming like a one-way mirror, where it can see more of what its citizens do and say, while citizens see less and less of what the state does, owing to high levels of secrecy around surveillance. In this book, Jane Duncan assesses the relevance of Snowden’s revelations for South Africa. In doing so she questions the extent to which South Africa is becoming a surveillance society governed by a surveillance state. Duncan challenges members of civil society to be concerned about and to act on the ever-expanding surveillance capacities of the South African state. Is surveillance used for the democratic purpose of making people safer, or is it being used for the repressive purpose of social control, especially of those considered to be politically threatening to ruling interests? She explores the forms of collective action needed to ensure that unaccountable surveillance does not take place and examines what does and does not work when it comes to developing organised responses. This book is aimed at South African citizens, academics as well as the general reader, who care about our democracy and the direction it is taking.
In the post-World War II era, the Soviet Union and the United States wanted to gain the advantage in international security. Both engaged in intelligence gathering. This book provides a comprehensive understanding of the evolution of the espionage game. For more than four decades after World War II, the quest for intelligence drove the Soviet Union and the United States to develop a high-stakes "game" of spying on one another throughout the Cold War. Each nation needed to be aware of and prepared to counter the capabilities of their primary nemesis. Therefore, as the Cold War period developed and technology advanced, the mutual goal to maintain up-to-date intelligence mandated that the process by which the "game" was played encompass an ever-wider range of intelligence gathering means. Covering far more than the United States and Soviet Union's use of human spies, this book examines the advanced technological means by which the two nations' intelligence agencies worked to ensure that they had an accurate understanding of the enemy. The easily accessible narrative covers the Cold War period from 1945 to 1989 as well as the post-Cold War era, enabling readers to gain an understanding of how the spies and elaborate espionage operations fit within the greater context of the national security concerns of the United States and the Soviet Union. Well-known Cold War historian Sean N. Kalic explains the ideological tenets that fueled the distrust and "the need to know" between the two adversarial countries, supplies a complete history of the technological means used to collect intelligence throughout the Cold War and into the more recent post-Cold War years, and documents how a mutual desire to have the upper hand resulted in both sides employing diverse and creative espionage methods. Details how and why the United States and the Soviet Union maintained and evolved their robust spying capabilities from the end of World War II to the present era Highlights how the espionage and spying employed by the United States and Soviet Union involved far more than just people placed to obtain and transmit information Provides a foundation of knowledge to understand the tension between United States and the Soviet Union over current issues such as Georgia, Syria, and Ukraine, as well as the expansion of NATO into Central and Eastern Europe Includes compelling stories in espionage history, including the Manhattan Project, the convicted Rosenberg spy couple, the U-2 incident, and the discovery of Russian "sleeper" cells in the United States in 2010
How can the United States avoid a future surprise attack on the scale of 9/11 or Pearl Harbor, in an era when such devastating attacks can come not only from nation states, but also from terrorist groups or cyber enemies? Intelligence and Surprise Attack examines why surprise attacks often succeed even though, in most cases, warnings had been available beforehand. Erik J. Dahl challenges the conventional wisdom about intelligence failure, which holds that attacks succeed because important warnings get lost amid noise or because intelligence officials lack the imagination and collaboration to "connect the dots" of available information. Comparing cases of intelligence failure with intelligence success, Dahl finds that the key to success is not more imagination or better analysis, but better acquisition of precise, tactical-level intelligence combined with the presence of decision makers who are willing to listen to and act on the warnings they receive from their intelligence staff. The book offers a new understanding of classic cases of conventional and terrorist attacks such as Pearl Harbor, the Battle of Midway, and the bombings of US embassies in Kenya and Tanzania. The book also presents a comprehensive analysis of the intelligence picture before the 9/11 attacks, making use of new information available since the publication of the 9/11 Commission Report and challenging some of that report's findings.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
The "lively and engrossing" (The Wall Street Journal) story of how OSS spymaster Allen Dulles built an underground network determined to take down Hitler and destroy the Third Reich.Agent 110 is Allen Dulles, a newly minted spy from an eminent family. From his townhouse in Bern, Switzerland, and in clandestine meetings in restaurants, back roads, and lovers' bedrooms, Dulles met with and facilitated the plots of Germans during World War II who were trying to destroy the country's leadership. Their underground network exposed Dulles to the political maneuverings of the Soviets, who were already competing for domination of Germany, and all of Europe, in the post-war period. Scott Miller's "absorbing and bracing" (The Seattle Times) Agent 110 explains how leaders of the German Underground wanted assurances from Germany's enemies that they would treat the country humanely after the war. If President Roosevelt backed the resistance, they would overthrow Hitler and shorten the war. But Miller shows how Dulles's negotiations fell short. Eventually he was placed in charge of the CIA in the 1950s, where he helped set the stage for US foreign policy. With his belief that the ends justified the means, Dulles had no qualms about consorting with Nazi leadership or working with resistance groups within other countries to topple governments. Agent 110 is "a doozy of a dossier on Allen Dulles and his early days spying during World War II" (Kirkus Reviews). "Miller skillfully weaves a double narrative of Dulles' machinations and those of the German resistance" (Booklist) to bring to life this exhilarating, and pivotal, period of world history--of desperate renegades in a dark and dangerous world where spies, idealists, and traitors match wits and blows to ensure their vision of a perfect future.
While there have been other books about Aldrich Ames, Circle of Treason is the first account written by CIA agents who were key members of the CIA team that conducted the intense "Ames Mole Hunt." Sandra Grimes and Jeanne Vertefeuille were two of the five principals of the CIA team tasked with hunting one of their own and were directly responsible for identifying Ames as the mole, leading to his arrest and conviction. One of the most destructive traitors in American history, CIA officer Aldrich Ames provided information to the Soviet Union that contributed to the deaths of at least ten Soviet intelligence officers who spied for the United States. In this book, the two CIA officers directly responsible for tracking down Ames chronicle their involvement in the hunt for a mole. Considering it their personal mission, Grimes and Vertefeuille dedicated themselves to identifying the traitor responsible for the execution or imprisonment of the Soviet agents with whom they worked. Their efforts eventually led them to a long-time acquaintance and coworker in the CIA's Soviet-East European division and Counterintelligence Center, Aldrich Ames. Not only is this the first book to be written by the CIA principals involved, but it is also the first to provide details of the operational contact with the agents Ames betrayed. The book covers the political aftermath of Ames's arrest, including the Congressional wrath for not identifying him sooner, the FBI/CIA debriefings following Ames's plea bargain, and a retrospective of Ames the person and Ames the spy. It is also the compelling story of two female agents, who overcame gender barriers and succeeded in bringing Ames to justice in a historically male-oriented organization. Now retired from the CIA, Grimes and Vertefeuille are finally able to tell this inside story of the CIA's most notorious traitor and the men he betrayed.
This book consists of seven stand-alone accounts of individuals who operated as spies during the American Revolutionary War. They were not trained as covert agents, which meant they had to develop their skills and techniques on their own, often while in the midst of the enemy where discovery meant almost certain death for them, and suffering and hardship for their family and friends. Five of them spied for the American cause and two spied for the British. Not all were motivated by patriotism, and not all escaped capture, yet their often painfully gained experience benefited future operatives and operations. They all were daring, intelligent and resourceful, and each had an unusual personality. Their labours resulted in battlefield victories, thwarted enemy plots, and significantly changed the conduct of the war, yet in spite of their efforts and their riveting stories, they and their deeds have remained relatively unknown.
This book, first published in 1991, examines the changes to security and intelligence agencies envisioned in the uncertain world at the end of the Cold War. While the central focus is on the Canadian Security Intelligence Service, its history, function and future, there are also comparative studies of the British, Soviet, American and Australian systems.
Willmoore Kendall was a man against the world, a "maverick," an "iconoclast." His thoughts were profound, his countless enemies powerful, his personal life full of drama. Heaven Can Indeed Fall is the first full-length biography of Kendall and integrates the man with the teacher, thinker, and cold warrior. Once a Marxist, Kendall became a fearsome foe of global communism. He never apologized for supporting Joseph McCarthy. As the co-founder of National Review he helped turn the word liberal into an insult. A "stormy petrel," Kendall was a man "who never lost an argument or kept a friend." Yet he was one of the most effective and sensitive teachers of his age. His ideas shaped Cold War practices of intelligence analysis and psychological warfare. As an academic he became the premier American theorist for conservative populism. The recent reemergence of populist ideas among American conservatives makes understanding Kendall ever more imperative. This book shows how a child prodigy and bucolic boy scout became an ambitious intelligence analyst, razor-tongued polemicist and profound student of American politics. By knowing Kendall one can better understand Cold War America, and contemporary America as well.
This book examines intelligence analysis in the digital age and demonstrates how intelligence has entered a new era. While intelligence is an ancient activity, the digital age is a relatively new phenomenon. This volume uses the concept of the "digital age" to highlight the increased change, complexity, and pace of information that is now circulated, as new technology has reduced the time it takes to spread news to almost nothing. These factors mean that decision-makers face an increasingly challenging threat environment, which in turn increases the demand for timely, relevant, and reliable intelligence to support policymaking. In this context, the book demonstrates that intelligence places greater demands on analysis work, as the traditional intelligence cycle is no longer adequate as a process description. In the digital age, it is not enough to accumulate as much information as possible to gain a better understanding of the world. To meet customers' needs, the intelligence process must be centred around the analysis work - which in turn has increased the demand for analysts. Assessments, not least predictions, are now just as important as revealing someone else's secrets. This volume will be of much interest to students of intelligence studies, security studies, and international relations.
Michal Goleniewski was one of the Cold War's most important spies but has been overlooked in the vast literature on the intelligence battles between the Western Powers and the Soviet Bloc. Renowned investigative journalist Kevin Coogan reveals Goleniewski's extraordinary story for the first time in this biography. Goleniewski rose to be a senior officer in the Polish intelligence service, a position which gave him access to both Polish and Russian secrets. Disillusioned with the Soviet Bloc, he made contact with the CIA, sending them letters containing significant intelligence. He then decided to defect and fled to America in 1961 via an elaborate escape plan in Berlin. His revelations led to the exposure of several important Soviet spies in the West including the Portland spy ring in the UK, the MI6 traitor George Blake, and a spy high up in the West German intelligence service. Despite these hugely important contributions to the Cold War, Goleniewski would later be abandoned by the CIA after he made the outrageous claim that he was actually Tsarevich Alexei Nikolaevich of Russia - the last remaining member of the Romanov Russian royal family and therefore entitled to the lost treasures of the Tsar. Goleniewski's increasingly fantastical claims led to him becoming embroiled in a bizarre demi-monde of Russian exiles, anti-communist fanatics, right-wing extremists and chivalric orders with deep historical roots in America's racist and antisemitic underground. This fascinating and revelatory biography will be of interest to students and researchers of the Cold War, intelligence history and right-wing extremism as well as general readers with an interest in these intriguing subjects.
‘One of our very best writers on France.’ Antony Beevor After publishing an acclaimed biography of Jean Moulin, leader of the French Resistance, Patrick Marnham received an anonymous letter from a person who claimed to have worked for British Intelligence during the war. The ex-spy praised his book but insisted that he had missed the real ‘treasure’. The letter drew Marnham back to the early 1960s when he had been taught French by a mercurial woman – a former Resistance leader, whose SOE network was broken on the same day that Moulin was captured and who endured eighteen months in Ravensbrück concentration camp. Could these two events have been connected? His anonymous correspondent offered a tantalising set of clues that seemed to implicate Churchill and British Intelligence in the catastrophe. Drawing on a deep knowledge of France and original research in British and French archives, War in the Shadows exposes the ruthless double-dealing of the Allied intelligence services and the Gestapo through one of the darkest periods of the Second World War. It is a story worthy of Le Carré, but with this difference – it is not fiction. ‘A melange of Le Grand Meaulnes and The Spy Who Came in from the Cold. It is unforgettable.’ Ferdinand Mount, TLS, Books of the Year ‘A masterly analysis, impeccably presented.’ Allan Mallinson, Spectator ‘Fascinating… Marnham has a vast and scholarly knowledge of this often treacherous world.’ Caroline Moorehead, Literary Review
Timothy Webster, best known for his work as a spy for the Union during the Civil War, began his career as a New York City policeman. In the mid-1850s he left the police department and took a job for Allan Pinkerton with his newly formed detective agency. As an operative for Pinkerton's agency, Webster excelled. His cases included tracking a world famous forger, investigating grave robberies in a Chicago cemetery, and seeking to uncover a plot to destroy the Rock Island Bridge. It was also as a Pinkerton detective that Webster made his greatest contribution to his country when he was part of a small group of operatives that uncovered a plot to assassinate then President-elect Abraham Lincoln in 1861. Webster went on to serve the United States as a spy in the Civil War. He travelled to the Confederate Capital multiple times and made many connections high up in the Confederate military and government. For a time he was the Union's top spy, but his career came to an abrupt end when, in 1862, he was betrayed by fellow spies and became the first spy executed in the Civil War.
Briggens House, near Harlow in Essex, was one of the most important of the establishments requisitioned by the Special Operations Executive (SOE) during the Second World War. Its mission was to accomplish Winston Churchill's directive to 'set Europe ablaze', and, initially, the house was used as a finishing school for the Cichociemni, elite Polish saboteurs, to prepare to parachute into Nazi-occupied Poland. In need of false identity documents to avoid the arrest, interrogation and execution of its agents, SOE gradually built up a printing department on site and Station 14 became the organisation's False Document Section. This is the true story of the house and its highly skilled wartime personnel, including British officers, Polish agents and the women of the First Aid Nursing Yeomanry. For the resident staff it was a relatively safe posting, but tension built as the Poles, fighting their own battle for Polish independence, competed for scarce resources in wartime Britain. SOE historian Des Turner uses first-hand accounts, memoirs and official records to reveal long-forgotten stories of tragedy, humour and frustration, giving long-overdue credit to the men and women of Briggens House who were prevented by the Secrets Act from ever speaking about their wartime work.
In the wake of the September 11 attacks, American citizens within the United States constantly worry about security against future terrorist attacks. But author Gordon Greer delves further into this subject by trying to understand why the general public is so intent on the ramifications of security measures, such as the Patriot Act. The history of warfare might provide an answer. Greer examines domestic security throughout the history of the United States. During a period of war or the aftermath of war, the American government has generally found it necessary to install security measures that may limit a citizen's basic rights or freedoms. Greer discusses these security issues from the earliest history of the United States, beginning with the early American settlers and the Revolutionary War through World War II and the Cold War. Greer points out that ordinary American citizens may chafe under the constraints such wars produce simply because the United States has arguably never been a totalitarian government. "What Price Security?" is a thought-provoking look at a subject that affects us all, offering insight into how America can protect itself against future attacks.
Words of Intelligence: An Intelligence Professional's Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels. The intelligence community has undergone massive changes since it developed after World War II. Intelligence work now involves several different processes, including the planning, collection, analysis, and production of information. It also requires extensive expertise in its terminology. And in the post-9/11 era, the intelligence community has expanded, requiring the transmission of information to state and local public administrators, health officials, and transportation planners in times of a possible domestic attack. The number of people who need to know the specialized terminology of the intelligence community continues to grow. This dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues from both a foreign intelligence perspective and a local perspective for law enforcement officials. The number of terms, abbreviations, and acronyms has more than doubled for this new edition, and it includes a topical index and extensively cross-referenced entries. This book explains terms that relate to intelligence operations, intelligence strategies, security classifications, obscure names of intelligence boards and organizations, and methodologies used to produce intelligence analysis. Both entry-level and experienced intelligence professionals in the domestic and foreign intelligence communities find this book useful. This book is more than just a reference book; it is a book to read and enjoy, and from which to learn the art and science of intelligence analysis.
We are living in an age of conspiracy theories, whether it's
enduring, widely held beliefs such as government involvement in the
Kennedy assassination or alien activity at Roswell, fears of a
powerful infiltrating group such as the Illuminati, Jews,
Catholics, or communists, or modern fringe movements of varying
popularity such as birtherism and trutherism. What is it in
American culture that makes conspiracy theories proliferate? Who is
targeted, and why? Are we in the heyday of the conspiracy theory,
or is it in decline?
The 9/11 attacks and the war in Iraq sprang in no small part from
massive intelligence failures, that much is well understood. How
the CIA got to a point where it could fail so catastrophically is
not.
In addition to being a major area of research within International Relations, peacebuilding and statebuilding is a major policy area within the UN and other international and regional organizations. It is also a concern of international financial institutions, including the World Bank, and a significant factor in the foreign and security policies of many established and emerging democracies. Peacebuilding and statebuilding are among the main approaches for preventing, managing, and mitigating global insecurities; dealing with the humanitarian consequences of civil wars; and expanding democracy and neoliberal economic regimes. Peace formation is a relatively new concept, addressing how local actors work in parallel to international and national projects, and helps shape the legitimacy of peace processes and state reform. The Oxford Handbook of Peacebuilding, Statebuilding, and Peace Formation serves as an essential guide to this vast intellectual and policy landscape. It offers a systematic overview of conceptual foundations, political implications, and tensions at the global, regional, and local levels, as well as key policies, practices, examples, and discourses underlining all segments of peacebuilding and statebuilding praxis. Approaching peacebuilding from disciplinary perspectives across the social sciences, the Handbook is organized around four major thematic sections. Section one explores how peacebuilding, statebuilding, and peace formation is conceived by different disciplines and IR approaches, thus offering an overview of the conceptual bedrock of major theories and approaches. Section two situates these approaches among other major global issues, including globalization, civil society, terrorism, and technology to illustrate their global, regional, and local resonance. Section three looks at key themes in the field, including peace agreements, democratization, security reform, human rights, environment, and culture. Finally, section four looks at key features of everyday and civil society peace formation processes, both in theory and in practice.
'Cyber-War' provides a critical assessment of current debates around the likelihood and impact of cyber warfare. Approaching the subject from a socio-political angle, it argues that destructive cyber war has not yet been seen, but could be a feature of future conflict. |
![]() ![]() You may like...
Hiking Beyond Cape Town - 40 Inspiring…
Nina du Plessis, Willie Olivier
Paperback
Ace That Test - A Student’s Guide to…
Megan Sumeracki, Cynthia Nebel, …
Paperback
R601
Discovery Miles 6 010
Guerilla Radios In Southern Africa…
Sekibakiba Peter Lekgoathi, Tshepo Moloi, …
Paperback
|