|
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
An Intelligence failure can be defined where there was intelligence
available about a particular event, but either it was not collected
or was mishandled later in the assessment cycle, as opposed to the
failure of an intelligence operation. The Historical Dictionary of
Intelligence Failures covers the history of intelligence failures
through a chronology, an introductory essay, an extensive
bibliography, and over 100 cross-referenced dictionary entries on
the Ardennes Offensive, the Six Day War, and the Cuban Missile
Crisis, the Prague Spring, the Arab Spring, 9/11. This book is an
excellent access point for students, researchers, and anyone
wanting to know more about the intelligence industry.
On 9 November 1939, two unsuspecting British agents of the Special
Intelligence Services walked into a trap set by German Spymaster
Reinhard Heydrich. Believing that they were meeting a dissident
German general for talks about helping German military opposition
to bring down Hitler and end the war, they were instead taken
captive in the Dutch village of Venlo and whisked away to Germany
for interrogation by the Gestapo. The incident was a huge
embarrassment for the Dutch government and provided the Germans
with significant intelligence about SIS operations throughout
Europe. The incident itself was an intelligence catastrophe but it
also acts as a prism through which a number of other important
narrative strands pass. Fundamental to the subterfuge perpetrated
at Venlo were unsubstantiated but insistent rumours of high-ranking
Germany generals plotting to overthrow the Nazi regime from within.
After the humiliation suffered when Hitler tore up the Munich
Agreement, British Prime Minister Neville Chamberlain was anxious
to see just how much truth there was in these stories; keen to
rehabilitate his reputation through one last effort to find a
peaceful rapprochement with Germany. When Franz Fischer, a
small-time petty crook and agent provocateur, persuaded British SIS
operatives in the Netherlands that he could act as a go-between for
the British government with disaffected German generals, the German
Security chief Reinhard Heydrich stepped in and quietly took
control of the operation. Heydrich's boss, head of the Gestapo
Heinrich Himmler, was anxious to explore the possibility of peace
negotiations with Britain and saw an opportunity to exploit the
situation for his personal benefit. On the day before a crucial
meeting of conspirators and British agents on the Dutch-German
border, a bomb exploded in the Burgerbraukeller in Munich in the
exact spot where Hitler had stood to deliver a speech only minutes
earlier. The perpetrator was quickly arrested, and Hitler demanded
that Himmler find evidence to show that the two events were
intimately connected-the British agents were snatched hours later.
While the world was coming to terms with the fearsome power of
German military might the British intelligence capability in
northern Europe was consigned to the dustbin in the sleepy Dutch
town of Venlo. This first full account of the Venlo incident
explores the wider context of this German intelligence coup, and
its consequences.
This book delves into the secret histories of the CIA, the FBI, and
British and Italian intelligence to study how policymakers can
control intelligence agencies and when these agencies will try to
remove their own government. For every government they serve,
intelligence agencies are both a threat and a necessity. They often
provide vital information for national security, but the secrets
they possess can also be used against their own masters. This book
introduces subversion paradox theory to provide a social scientific
explanation of the unequal power dynamic resulting from an often
fraught relationship between agencies and their 'masters'. The
author also makes a case for the existence of 'deep state'
conspiracies, including in highly developed democracies, and
cautions those who denounce their existence that trying to control
intelligence by politicizing it is likely to backfire. An important
intervention in the field of intelligence studies, this book will
be indispensable for intelligence professionals and policymakers in
understanding and bridging the cultural divide between these two
groups. It will also make for a fascinating and informative read to
scholars and researchers of diplomacy, foreign policy,
international relations, strategic and defence studies, security
studies, political studies, policymaking and comparative politics.
This book delves into the secret histories of the CIA, the FBI, and
British and Italian intelligence to study how policymakers can
control intelligence agencies and when these agencies will try to
remove their own government. For every government they serve,
intelligence agencies are both a threat and a necessity. They often
provide vital information for national security, but the secrets
they possess can also be used against their own masters. This book
introduces subversion paradox theory to provide a social scientific
explanation of the unequal power dynamic resulting from an often
fraught relationship between agencies and their 'masters'. The
author also makes a case for the existence of 'deep state'
conspiracies, including in highly developed democracies, and
cautions those who denounce their existence that trying to control
intelligence by politicizing it is likely to backfire. An important
intervention in the field of intelligence studies, this book will
be indispensable for intelligence professionals and policymakers in
understanding and bridging the cultural divide between these two
groups. It will also make for a fascinating and informative read to
scholars and researchers of diplomacy, foreign policy,
international relations, strategic and defence studies, security
studies, political studies, policymaking and comparative politics.
Professor Sheldon uses the modern concept of the intelligence cycle
to trace intelligence activities in Rome whether they were done by
private citizens, the government, or the military. Examining a
broad range of activities the book looks at the many types of
espionage tradecraft that have left their traces in the ancient
sources: * intelligence and counterintelligence gathering * covert
action * clandestine operations * the use of codes and ciphers
Dispelling the myth that such activities are a modern invention,
Professor Sheldon explores how these ancient spy stories have
modern echoes as well. What is the role of an intelligence service
in a free republic? When do the security needs of the state
outweigh the rights of the citizen? If we cannot trust our own
security services, how safe can we be? Although protected by the
Praetorian Guard, seventy-five percent of Roman emperors died by
assassination or under attack by pretenders to his throne. Who was
guarding the guardians? For students of Rome, and modern social
studies too - this will provide a fascinating read.
We have witnessed a digital revolution that affects the dynamics of
existing traditional social, economic, political and legal systems.
This revolution has transformed espionage and its features, such as
its purpose and targets, methods and means, and actors and
incidents, which paves the way for the emergence of the term
cyberespionage. This book seeks to address domestic and
international legal tools appropriate to adopt in cases of
cyberespionage incidents. Cyberespionage operations of state or
non-state actors are a kind of cyber attack, which violates certain
principles of international law but also constitute wrongful
acquisition and misappropriation of the data. Therefore, from the
use of force to state responsibility, international law offers a
wide array of solutions; likewise, domestic regulations through
either specialized laws or general principles stipulate civil and
criminal remedies against cyberespionage. Confronting
Cyberespionage Under International Law examines how espionage and
its applications have transformed since World War II and how
domestic and international legal mechanisms can provide effective
legal solutions to this change, hindering the economic development
and well-being of individuals, companies and states to the
detriment of others. It shows the latest state of knowledge on the
topic and will be of interest to researchers, academics, legal
practitioners, legal advisors and students in the fields of
international law, information technology law and intellectual
property law.
Written by the undisputed dean of U.S. denial and deception
experts, Practise to Deceive is the most in-depth look at deception
as a military strategy. Barton Whaley knew the history of denial
and deception across time, disciplines, and culture. He was the
foremost authority on the intricacies of denial and deception
strategy and tactics. For Whaley, deception was a mind-game,
requiring imagination, deep critical thought, a profound
understanding of the enemy as well as one's self (a variation of
Sun Tzu), and patience and fortitude. This book presents 88 vividly
descriptive case studies to serve as a handbook for intelligence
and military professionals. In Whaley's analysis, variations in
guilefulness between opposing individuals or groups can be crucial
in deciding who achieves victory in combat.
This book is new in every aspect and not only because neither the
official history nor an unofficial history of the KGB, and its many
predecessors and successors, exists in any language. In this
volume, the author deals with the origins of the KGB from the
Tsarist Okhrana (the first Russians secret political police) to the
OGPU, Joint State Political Directorate, one of the KGB
predecessors between 1923 and 1934\. Based on documents from the
Russian archives, the author clearly demonstrates that the Cheka
and GPU/OPGU were initially created to defend the revolution and
not for espionage. The Okhrana operated in both the Russian Empire
and abroad against the revolutionaries and most of its operations,
presented in this book, are little known. The same is the case with
regards to the period after the Cheka was established in December
1917 until ten years later when Trotsky was expelled from the
Communist Party and exiled, and Stalin rose to power. For the long
period after the Revolution and up to the Second World War (and,
indeed, beyond until the death of Stalin) the Cheka's main weapon
was terror to create a general climate of fear in a population. In
the book, the work of the Cheka and its successors against the
enemies of the revolution is paralleled with British and American
operations against the Soviets inside and outside of Russia. For
the first time the creation of the Communist International
(Comintern) is shown as an alternative Soviet espionage
organization for wide-scale foreign propaganda and subversion
operations based on the new revelations from the Soviet archives
Here, the early Soviet intelligence operations in several countries
are presented and analysed for the first time, as are raids on the
Soviet missions abroad. The Bolshevik smuggling of the Russian
imperial treasures is shown based on the latest available archival
sources with misinterpretations and sometimes false interpretations
in existing literature revised. After the Bolshevik revolution,
Mansfield Smith-Cumming, the first chief of SIS, undertook to set
up an entirely new Secret Service organization in Russia'. During
those first ten years, events would develop as a non-stop struggle
between British intelligence, within Russia and abroad, and the
Cheka, later GPU/OGPU. Before several show spy trials' in 1927,
British intelligence networks successfully operated in Russia later
moving to the Baltic capitals, Finland and Sweden while young
Soviet intelligence officers moved to London, Paris, Berlin and
Constantinople. Many of those operations, from both sides, are
presented in the book for the first time in this ground-breaking
study of the dark world of the KGB.
Why are we still at 'war' with terror 16 years after 9/11? This
book will discuss what we have collectively done well, what we have
done poorly, what we have yet to try and how we get to the point
where terrorism does not dominate public discourse and cause
disproportionate fear around the world. This book looks at a
variety of approaches and responses to international Islamist
extremism, ranging from military and security/law enforcement
action to government policies, community measures and religious
efforts, with a goal to determining what has worked and what has
not. The examples are drawn largely from the West but the book's
scope is global. Key features: Written in a clear, non-academic
styleUses recent events to explain terrorismIs wide-ranging and
'ex-practitioner' based
Interrogation, Intelligence and Security examines the origins and
effects of a group of interrogation techniques known as the 'five
techniques'. Through its in-depth analysis the book reveals how
British forces came to use these controversial methods. Focusing on
the British colony of Aden (1963-67), the height of 'the troubles'
in Northern Ireland (1971), and the conflict in Iraq (2003), the
book explores the use of hooding to restrict vision, white noise,
stress positions, limited sleep and a limited diet. There are clear
parallels between these three case studies and the use of
controversial interrogation techniques today. Readers will be able
to make informed judgements about whether, on the basis of the
results of these cases, interrogation techniques that might be
described as torture can be justified. This book will be of
particular interest to security professionals, academics and
members of the public interested in the torture debate,
intelligence, the military, counter-insurgency, counter-terrorism,
foreign policy and law enforcement. -- .
The defection of Igor Gouzenko in September 1945, more so than any
other single event, alerted the West to the nature and scale of the
Soviet espionage offensive being waged by the Kremlin. Apart from
the dozen or so defendants convicted of spying, Gouzenko wrecked an
organization that had taken years to develop, exposed the
penetration of the Manhattan atomic weapons project, and
demonstrated the very close relationship between the Canadian
Communist Party and Moscow. Many credit this event as sparking the
bitter but secretive struggle fought between the intelligence
agencies of the East and West for nearly half a century. The
Historical Dictionary of Cold War Counterintelligence tells the
story of both sides' fierce efforts to penetrate and subvert the
opponent while desperately trying to avoid a similar fate. Through
a chronology, an introduction, appendixes, a bibliography, and
hundreds of cross-referenced dictionary entries on the
organizations, operations, events, and personalities that
influenced counterintelligence during the Cold War, the world of
double agents, spies, and moles is explained in the most
comprehensive reference currently available.
This book is an in-depth examination of the relations between
Ireland and the former East Germany between the end of the Second
World War and the fall of the Berlin Wall. It explores political,
diplomatic, economic, media and cultural issues. The long and
tortuous process of establishing diplomatic relations is unique in
the annals of diplomatic history. Central in this study are the
activities of the Stasi. They show how and where East German
intelligence obtained information on Ireland and Northern Ireland
and also what kind of information was gathered. A particularly
interesting aspect of the book is the monitoring of the activities
of the Irish Republican Army and the Irish National Liberation Army
and their campaigns against the British army in West Germany. The
Stasi had infiltrated West German security services and knew about
Irish suspects and their contacts with West German terrorist
groups. East German Intelligence and Ireland, 1949-90 makes an
original contribution to diplomatic, intelligence, terrorist and
Cold War studies. -- .
In literature and film the spy chief is an all-knowing,
all-powerful figure who masterfully moves spies into action like
pieces on a chessboard. How close to reality is that depiction, and
what does it really take to be an effective leader in the world of
intelligence? This first volume of Spy Chiefs broadens and deepens
our understanding of the role of intelligence leaders in foreign
affairs and national security in the United States and United
Kingdom from the early 1940s to the present. The figures profiled
range from famous spy chiefs such as William Donovan, Richard
Helms, and Stewart Menzies to little-known figures such as John
Grombach, who ran an intelligence organization so secret that not
even President Truman knew of it. The volume tries to answer six
questions arising from the spy-chief profiles: how do intelligence
leaders operate in different national, institutional, and
historical contexts? What role have they played in the conduct of
international relations and the making of national security policy?
How much power do they possess? What qualities make an effective
intelligence leader? How secretive and accountable to the public
have they been? Finally, does popular culture (including the media)
distort or improve our understanding of them? Many of those
profiled in the book served at times of turbulent change, were
faced with foreign penetrations of their intelligence service, and
wrestled with matters of transparency, accountability to
democratically elected overseers, and adherence to the rule of law.
This book will appeal to both intelligence specialists and general
readers with an interest in the intelligence history of the United
States and United Kingdom.
For almost half a century, the hottest front in the Cold War was
right across Berlin. From summer 1945 until 1990, the secret
services of NATO and the Warsaw Pact fought an ongoing duel in the
dark. Throughout the Cold War, espionage was part of everyday life
in both East and West Berlin, with German spies playing a crucial
part of operations on both sides: Erich Mielke's Stasi and Reinhard
Gehlen's Federal Intelligence Service, for example. The
construction of the wall in 1961 changed the political situation
and the environment for espionage - the invisible front was now
concreted and unmistakable. but the fundamentals had not changed:
Berlin was and would remain the capital of spies until the fall of
the Berlin Wall, a fact which makes it all the more surprising that
there are hardly any books about the work of the secret services in
Berlin during the Cold War. Journalist Sven Felix Kellerhoff and
historian Bernd von Kostka describe the spectacular successes and
failures of the various secret services based in the city.
This is an unusual book, telling a story which has hitherto
remained hidden from history: the surveillance by the British
security service MI5 of anti-Nazi refugees who came to Britain
fleeing political persecution in Germany and Austria. Based on the
personal and organisational files that MI5 kept on political
refugees during the 1930s and 1940s - which have only recently been
released into the public domain - this study also fills a
considerable gap in historical research. Telling a story of
absorbing interest, which at times reads more like spy fiction, it
is both a study of MI5 and of the political refugees themselves.
The book will interest academics in the fields of history,
politics, intelligence studies, Jewish studies, German studies and
migration studies; but it is also accessible to the general reader
interested in Britain before, during and after the Second World
War. -- .
American Spies presents the stunning histories of more than forty
Americans who spied against their country during the past six
decades, offering insight into America's vulnerability to espionage
along the way. Now available in paperback, with a new preface that
brings the conversation up to the present, American Spies is as
relevant as ever.
Why are some multiethnic countries more prone to civil violence
than others? This book examines the occurrence and forms of
conflict in multiethnic states. It presents a theory that explains
not only why ethnic groups rebel but also how they rebel. It shows
that in extremely unequal societies, conflict typically occurs in
non-violent forms because marginalized groups lack both the
resources and the opportunities for violent revolt. In contrast, in
more equal, but segmented multiethnic societies, violent conflict
is more likely. The book traces the origins of these different
types of multiethnic states to distinct experiences of colonial
rule. Settler colonialism produced persistent stratification and
far-reaching cultural and economic integration of the conquered
groups, as, for example, in Guatemala, the United States, or
Bolivia. By contrast, in decolonized states, such as Iraq,
Pakistan, or Sri Lanka, in which independence led to indigenous
self-rule, the colonizersa adivide and rulea policies resulted in
deeply segmented post-colonial societies. Combining statistical
analyses with case studies based on original field research in four
different countries in Sub-Saharan Africa and Latin America, Vogt
analyzes why and how colonial legacies have led to peaceful or
violent ethnic movements.
This groundbreaking book explores the treatment of the millions of
refugees and tens of thousands of spies that flooded Germany after
World War II. Drawing on newly declassified espionage files, Keith
R. Allen uncovers long-hidden interrogation systems that were
developed by Germany's western occupiers to protect internal
security and gather intelligence about the Soviet Union. He shows
how vetting in the name of public order brought foreign
intelligence officials into practically every venue, from train
stations to corporate boardrooms to private dwellings, in postwar
West Germany. At the heart of efforts to extract insights were
extensive, personalized efforts by law enforcement and security
officials to manipulate desires and emotions involving dearest
family members, closest friends, and trusted colleagues. Linking
personal narratives of those interrogated to the international
context of postwar politics, Allen reveals a compelling world
inhabited by spies and refugees. Allen's study illuminates the
places, personalities, and practices of refugee interrogation in
one of Europe's most successful postwar states. As calls for
intense scrutiny of refugees have grown dramatically, Allen
illustrates how decisions to shortchange the rights of migrants in
periods of heightened ideological and military tension may
contribute to long-term threats to personal liberties and the rule
of law.
This book describes and analyzes the history of the Mediterranean
"Double-Cross System" of the Second World War, an intelligence
operation run primarily by British officers which turned captured
German spies into double agents. Through a complex system of
coordination, they were utilized from 1941 to the end of the war in
1945 to secure Allied territory through security and
counter-intelligence operations, and also to deceive the German
military by passing false information about Allied military
planning and operations. The primary questions addressed by the
book are: how did the double-cross-system come into existence; what
effects did it have on the intelligence war and the broader
military conflict; and why did it have those effects? The book
contains chapters assessing how the system came into being and how
it was organized, and also chapters which analyze its performance
in security and counter-intelligence operations, and in deception.
Given the rivalries and suspicions prevailing in the Middle East,
it is not surprising that most of these states are very concerned
about espionage and infiltration. With the additional threat of
terrorism, nuclear weapons, a large U.S. military presence, and the
Arab-Israeli conflict, the result is an impressively busy
intelligence industry, proportionately larger and more extensive
than in most other regions. The Historical Dictionary of Middle
East Intelligence addresses intelligence issues in the region from
ancient history and the Middle Ages through modern times, covering
the decline of the Ottoman Empire, intelligence activity in the
Middle East during and between the two world wars, and the
interplay between colonial and local intelligence and
counterintelligence agencies of the period. It also presents the
relatively new fundamentalist terrorist organizations that have had
a significant impact on international relations and on the
structure and deployment of intelligence, counterintelligence, and
other security organs in the Middle East today. With a chronology,
an introductory essay, and over 300 cross-referenced dictionary
entries on important events and key organizations involved in all
aspects of intelligence gathering and analysis, as well as the
biographies of key players, this is an important reference on the
current situation in the Middle East.
Anthony Blunt, aesthete, communist, homosexual, MI5 agent and Soviet mole, was Surveyor of the King's Pictures and Director of the Courtauld Institute. Betrayed in 1963, he voted for Margaret Thatcher in 1979. Late that year, she was to expose his treachery and strip him of his knighthood. While the other Cambridge spies (Philby, Burgess and Maclean) subordinated their lives and careers to espionage, Blunt had a separate passionate existence. His reputation as an art historian was second to none: he made an enormous contribution to the establishment of art history as an academic discipline; his volumes on Poussin, French and Italian art and old master drawings are still in print and some are still set texts. At the Courtauld he trained a whole generation of world-class academics and curators.
|
|