![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
The intelligence failures exposed by the events of 9/11 and the missing weapons of mass destruction in Iraq have made one thing perfectly clear: change is needed in how the U.S. intelligence community operates. "Transforming U.S. Intelligence" argues that transforming intelligence requires as much a look to the future as to the past and a focus more on the art and practice of intelligence rather than on its bureaucratic arrangements. In fact, while the recent restructuring, including the creation of the Department of Homeland Security, may solve some problems, it has also created new ones. The authors of this volume agree that transforming policies and practices will be the most effective way to tackle future challenges facing the nation's security. This volume's contributors, who have served in intelligence agencies, the Departments of State or Defense, and the staffs of congressional oversight committees, bring their experience as insiders to bear in thoughtful and thought-provoking essays that address what such an overhaul of the system will require. In the first section, contributors discuss twenty-first-century security challenges and how the intelligence community can successfully defend U.S. national interests. The second section focuses on new technologies and modified policies that can increase the effectiveness of intelligence gathering and analysis. Finally, contributors consider management procedures that ensure the implementation of enhanced capabilities in practice. "Transforming U.S. Intelligence" supports the mandate of the new director of national intelligence by offering both careful analysis of existing strengths and weaknesses in U.S. intelligence and specific recommendations on how to fix its problems without harming its strengths. These recommendations, based on intimate knowledge of the way U.S. intelligence actually works, include suggestions for the creative mixing of technologies with new missions to bring about the transformation of U.S. intelligence without incurring unnecessary harm or expense. The goal is the creation of an intelligence community that can rapidly respond to developments in international politics, such as the emergence of nimble terrorist networks while reconciling national security requirements with the rights and liberties of American citizens.
There’s no such thing as a former KGB man... Agents of Influence reveals the secret history of an intelligence agency gone out of control, accountable to no one but itself and intent on subverting Western politics on a near-inconceivable scale. In 1985, 1,300 KGB officers were stationed in the USA. The FBI only had 350 counter-intelligence officers. Since the early days of the Cold War, the KGB seduced parliamentarians and diplomats, infiltrated the highest echelons of the Civil Service, and planted fake news in papers across the world. More disturbingly, it never stopped. Putin is a KGB man through and through. Journalist Mark Hollingworth reveals how disinformation, kompromat and secret surveillance continue to play key roles in Russia’s war with Ukraine. It seems frighteningly easy to destabilise Western democracy.
A biography of William Wickham (1761-1840), Britain's master spy on the Continent for more than five years during the French Revolutionary wars. It follows Wickham's career to narrate the rise and fall of his secret service community.
Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (SNA) method. Written in an accessible manner, it provides an introduction to SNA, presenting tools and concepts, and showing how SNA can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks.
'A brilliant page-turner by one of Holland's finest investigative journalists' Rutger Bregman, author of Humankind 'Essential . . . What's revealed are networks of spies and criminals fighting an invisible war that involves us all' Eliot Higgins, bestselling author of We Are Bellingcat Summer 2017: computer screens go blank in 150 countries. The NHS is so affected that hospitals can only take in patients for A&E. Ambulances are grounded. Computer screens turn on spontaneously and warnings appear. Employees who desperately pull the plugs are too late. Restarting is pointless; the computers are locked. And now the attackers ask each victim for money. This is hijack software. It is just one example of how vulnerable the digital world has made us. Based on the cases he investigated over a period of six years, award-winning Dutch journalist Huib Modderkolk takes the reader on a tour of the corridors and back doors of the globalised digital world. He reconstructs British-American espionage operations and reveals how the power relationships between countries enable intelligence services to share and withhold data from each other. Looking at key players including Edward Snowden, Russian hackers Cozy Bear and Evgeniy Bogachev, 'the Pablo Escobar of the digital era', Modderkolk opens our eyes to the dark underbelly of the digital world with the narrative drive of a thriller.
When Edward Snowden began leaking NSA documents in June 2013, his actions sparked impassioned debates about electronic surveillance, national security, and privacy in the digital age. The Snowden Reader looks at Snowden's disclosures and their aftermath. Critical analyses by experts discuss the historical, political, legal, and ethical issues raised by the disclosures. Over forty key documents related to the case are included, with introductory notes explaining their significance: documents leaked by Snowden; responses from the NSA, the Obama administration, and Congress; statements by foreign leaders, their governments, and international organizations; judicial rulings; findings of review committees; and Snowden's own statements. This book provides a valuable introduction and overview for anyone who wants to go beyond the headlines to understand this historic episode.
An extraordinarily brave and moving memoir from one of the world's most famous transparency activists and trans women. In 2010, Chelsea Manning was working as an intelligence analyst for the US Army in Iraq. She disclosed 720,000 classified military documents that she had smuggled out via the memory card of her digital camera. By far the largest leak in history, these documents revealed a huge number of diplomatic cables and footage of atrocities. She was sentenced to 35 years in military prison. The day after her conviction, Chelsea declared her gender identity as a woman and began to transition. She was sent to a male prison, spent much of that time in appalling conditions in solitary confinement and attempted suicide multiple times. In 2017, after a lengthy legal challenge and an outpouring of support, President Obama commuted her sentence. README.txt is a story of personal revolt, resilience and survival. Chelsea details the challenges of her childhood and adolescence in Oklahoma and in her mother's native Wales. She writes revealingly and movingly about a period of homelessness in Chicago, living under 'Don't Ask, Don't Tell' in the US Army, and the experience of coming to terms with her gender identity and undergoing hormone therapy in prison. We witness her Kafkaesque trial and heroic quest for release. This powerful, courageous and observant memoir sheds light on the big themes of today - identity, authenticity, technology, the authoritarian state - and will stand as one of the definitive testaments of our digital, information-driven age. 'Chelsea Manning is the biggest hero that ever lived' Vivienne Westwood 'Searing ... uplifting ... redemptive' The New York Times 'Electrifying ... an insider confessional turned inside out for the 21st century' Washington Post
Dark networks are the illegal and covert networks (e.g, insurgents, jihadi groups, or drug cartels) that security and intelligence analysts must track and identify to be able to disrupt and dismantle them. This text explains how this can be done by using the Social Network Analysis (SNA) method. Written in an accessible manner, it provides an introduction to SNA, presenting tools and concepts, and showing how SNA can inform the crafting of a wide array of strategies for the tracking and disrupting of dark networks.
A joint biography of John Foster Dulles and Allen Dulles, who led the United States into an unseen war that decisively shaped today's worldDuring the 1950s, when the Cold War was at its peak, two immensely powerful brothers led the United States into a series of foreign adventures whose effects are still shaking the world.John Foster Dulles was secretary of state while his brother, Allen Dulles, was director of the Central Intelligence Agency. In this book, Stephen Kinzer places their extraordinary lives against the background of American culture and history. He uses the framework of biography to ask: Why does the United States behave as it does in the world?The Brothers explores hidden forces that shape the national psyche, from religious piety to Western movies--many of which are about a noble gunman who cleans up a lawless town by killing bad guys. This is how the Dulles brothers saw themselves, and how many Americans still see their country's role in the world.Propelled by a quintessentially American set of fears and delusions, the Dulles brothers launched violent campaigns against foreign leaders they saw as threats to the United States. These campaigns helped push countries from Guatemala to the Congo into long spirals of violence, led the United States into the Vietnam War, and laid the foundation for decades of hostility between the United States and countries from Cuba to Iran.The story of the Dulles brothers is the story of America. It illuminates and helps explain the modern history of the United States and the world.
This in-depth analysis shows how the high stakes contest surrounding open source information is forcing significant reform within the U.S. intelligence community, the homeland security sector, and among citizen activists. Since 9/11, U.S. intelligence organizations have grappled with the use of "open source" information derived from unclassified material, including international newspapers, television, radio, and websites. They have struggled as well with the idea of sharing information with international and domestic law enforcement partners. The apparent conflict between this openness and the secrecy inherent in intelligence provides an opportunity to reconsider what intelligence is, how it is used, and how citizens and their government interact in the interests of national security. That is the goal of No More Secrets: Open Source Information and the Reshaping of U.S. Intelligence. To write this thought-provoking book, the author drew on his own direct participation in the institutionalization of open source within the U.S. government from 2001 to 2005, seeking to explain how these developments influence the nature of intelligence and relate to the deliberative principles of a democratic society. By analyzing how open source policies and practices are developed, maintained, and transformed, this study enhances public understanding of both intelligence and national security affairs. Critique and commentary from intelligence officials and analysts regarding open source reforms within the intelligence community and homeland security sector Three interrelated case studies through which post-9/11 U.S. intelligence reform is analyzed and critiqued Examples of collateral, including official and unofficial photos, from the 2007 and 2008 Open Source Conferences sponsored by the Director of National Intelligence A timeline of key open source developments, including the establishment of associated commissions and changes in organizational structures, policies, and cultures Appendices containing excerpts of key open source legislation and policy documents A bibliography of open source-related scholarship and commentary
Britain's secret state exists to protect her from 'enemies within'. It has always aroused controversy; on the one hand it is credited with preventing wars, revolutions and terrorism and on the other it is accused of subverting democratically elected governments and luring innocents to death. What is the true story? The book, first published in 1992, delves beneath the myths and deceptions surrounding the secret service to reveal the true nature and significance of covert political policing in Britain, from the 'spies and bloodites' of the eighteenth century to today's MI5. This title will be of interest to students of modern history and politics.
This book won the Canadian Crime Writers' Arthur Ellis Award for the Best Genre Criticism/Reference book of 1991. This collection of essays is an attempt to explore the history of spy fiction and spy films and investigate the significance of the ideas they contain. The volume offers new insights into the development and symbolism of British spy fiction.
With the rise of religiously motivated violence and terrorism, governments around the world need to develop their religious and ideological capabilities in parallel with strengthening their law enforcement, military and intelligence capabilities. Terrorist Rehabilitation: A New Frontier in Counter-terrorism aims to provide an understanding of the importance of the approach and strategy of terrorist rehabilitation in countering this threat.Comprising of nine chapters, this book provides case study assessments of terrorist rehabilitation practices set against the backdrop of their unique operational and geopolitical milieu in countries such as Saudi Arabia, Singapore, Indonesia and Sri Lanka. This will help the reader to form a foundational understanding of the concept of terrorist rehabilitation by combining the insights, successes and experience of senior government officials and counter-terrorism experts. In addition, the contributors provide discussions on religious concepts that have been manipulated by violent Islamists as a background to understanding religiously or ideologically motivated terrorism and the avenues open for countering it.
Given the rivalries and suspicions prevailing in the Middle East, it is not surprising that most of these states are very concerned about espionage and infiltration. With the additional threat of terrorism, nuclear weapons, a large U.S. military presence, and the Arab-Israeli conflict, the result is an impressively busy intelligence industry, proportionately larger and more extensive than in most other regions. The A to Z of Middle East Intelligence addresses intelligence issues in the region from ancient history and the Middle Ages through modern times, covering the decline of the Ottoman Empire, intelligence activity in the Middle East during and between the two world wars, and the interplay between colonial and local intelligence and counterintelligence agencies of the period. It also presents the relatively new fundamentalist terrorist organizations that have had a significant impact on international relations and on the structure and deployment of intelligence, counterintelligence, and other security organs in the Middle East today. With a chronology, an introductory essay, and over 300 cross-referenced dictionary entries on important events and key organizations involved in all aspects of intelligence gathering and analysis, as well as the biographies of key players, this is an important reference on the current situation in the Middle East.
This book shows how specific historical events and societal forces within Nigeria transcend the choices its political leaders have made to influence the course of the state's political development. Kalu N. Kalu describes a variety of factors that have contributed to the challenges facing state-building and political institutions in Nigeria. Chief among them are the nature of interest aggregation, the dynamics of conflict, and the patterns of state intervention in matters dealing with secularism, distributive politics, economy, security, and autonomy. Kalu succeeds in constructing a more organic concept of political development in Nigeria by creating a model based on rentier politics that captures the critical relationship between state power and economy. By doing so, he goes beyond current scholarship about Nigeria and demonstrates the need for a restructuring of its institutions, offering insight into an enduring narrative that continues to shape Nigerian politics.
Strategic Intelligence in the Cold War and Beyond looks at the many events, personalities, and controversies in the field of intelligence and espionage since the end of World War II. A crucial but often neglected topic, strategic intelligence took on added significance during the protracted struggle of the Cold War. In this accessible volume, Jefferson Adams places these important developments in their historical context, taking a global approach to themes including various undertakings from both sides in the Cold War, with emphasis on covert action and deception operations controversial episodes involving Cuba, Chile, Nicaragua, Vietnam, Poland, and Afghanistan as well as numerous lesser known occurrences. three Cold War spy profiles which explore the role of human psychology in intelligence work the technological dimension spies in fiction, film and television developments in the intelligence organizations of both sides in the decade following the fall of the Berlin wall Supplemented by suggestions for further reading, a glossary of key terms, and a timeline of important events, this is an essential read for all those interested in the modern history of espionage.
Strategic Intelligence in the Cold War and Beyond looks at the many events, personalities, and controversies in the field of intelligence and espionage since the end of World War II. A crucial but often neglected topic, strategic intelligence took on added significance during the protracted struggle of the Cold War. In this accessible volume, Jefferson Adams places these important developments in their historical context, taking a global approach to themes including various undertakings from both sides in the Cold War, with emphasis on covert action and deception operations controversial episodes involving Cuba, Chile, Nicaragua, Vietnam, Poland, and Afghanistan as well as numerous lesser known occurrences. three Cold War spy profiles which explore the role of human psychology in intelligence work the technological dimension spies in fiction, film and television developments in the intelligence organizations of both sides in the decade following the fall of the Berlin wall Supplemented by suggestions for further reading, a glossary of key terms, and a timeline of important events, this is an essential read for all those interested in the modern history of espionage.
Leaving the chaos of postwar Germany for an uncertain future, 17-year-old Gerhardt Thamm arrived in America in 1948 with little more than his American birth certificate. With minimal command of English and little formal education, he enlisted in the Army and quickly found himself assigned to operations where his German language abilities were put to use. With the Soviet Union's emergence as a potential adversary, Thamm was recruited into the Army's clandestine services, where he operated as a secret agent in Germany, under multiple identities. This richly detailed personal narrative tells Thamm's incredible story and is supplemented by more than two dozen of the author's personal photographs and sketches.
Based on OSS records only recently released to US National Archives, and on evidence from British archival sources, this is a thoroughly researched study of the Office of Strategic Services in London. The OSS was a critical liaison and operational outpost for American intelligence during World War II. Dr MacPherson puts the activities of the OSS into the larger context of the Anglo-American relationship and the various aspects of intelligence theory, while examining how a modern American intelligence capability evolved.
From the 1930s to the 1950s a large number of left-wing men and women in the USA, Britain, Europe, Australia and Canada were recruited to the Soviet intelligence services. They were amateurs and the reason for their success is intriguing. Using Soviet archives, this work explores these successes.
This volume discusses the challenges the future holds for different aspects of the intelligence process and for organisations working in the field. The main focus of Western intelligence services is no longer on the intentions and capabilities of the Soviet Union and its allies. Instead, at present, there is a plethora of threats and problems that deserve attention. Some of these problems are short-term and potentially acute, such as terrorism. Others, such as the exhaustion of natural resources, are longer-term and by nature often more difficult to foresee in their implications. This book analyses the different activities that make up the intelligence process, or the 'intelligence cycle', with a focus on changes brought about by external developments in the international arena, such as technology and security threats. Drawing together a range of key thinkers in the field, "The Future of Intelligence" examines possible scenarios for future developments, including estimations about their plausibility, and the possible consequences for the functioning of intelligence and security services. This book will be of much interest to students of intelligence studies, strategic studies, foreign policy, security studies and IR in general.
The Man Who Rode the Tiger is the dramatic story of the biggest investigation of political corruption in American municipal history. The "Seabury Investigation" became a model for federal, state, and city investigations of major officeholders and minor rascals. Samuel Seabury was a patrician New Yorker who was called upon to ride the Tammany Tiger, longtime symbol of crooked politics and influence-peddling. Seabury and his staff of tough young lawyers toppled Mayor Jimmy Walker - the popular Beau James; struck a near-death blow to Tammany Hall; were directly responsible for selecting and electing Fiorello H. LaGuardia as the most popular Mayor in New York history; and helped Governor Franklin D. Roosevelt in his campaign for the presidency of the United States. The final confrontation between Judge Seabury and Jimmy Walker was before Governor Roosevelt in Albany. FDR surprised those who thought he was a lightweight - and Tammany instrument - by handling himself beautifully, disengaging himself from Tammany's grip, and gaining national attention.
Kim Philby is perhaps the most notorious traitor in British History and the archetypal spy: ingenious, charming and deceitful. The reluctance of the British and Russian governments to reveal full details of his career meant that for many years a shortage of evidence fuelled controversy. Was Philby an ideological spy, working for the Soviet Union out of Communist conviction, or was he prompted by a personality defect to choose a life of treachery? Was Philby the perfect agent, the 'KGB masterspy', or just plain lucky? In this new biography, Edward Harrison re-examines the crucial early years of Philby's work as a Soviet agent and British intelligence officer using documents from the United Kingdom National Archives, and private papers. He shows how Philby established an early pattern of deceit and betrayed his father St John Philby. But the book also demonstrates how in all the major decisions Philby slavishly sought to emulate his father. This contradicts the myth of independence Philby sought to propagate in 'My Silent War' (his memoirs), along with other deceptions. Later chapters offer the first detailed study of Philby's work as a counter-espionage officer during the Second World War, examining his rapid promotion and providing a substantial explanation of why he was appointed head of the anti-Soviet section of the British Secret Intelligence Service. Harrison also explains that Philby was never wholly trusted by the Soviet secret service.
MI5's dramatic interception of secret signals to Moscow from a hidden base in Wimbledon uncovered the true extent of Soviet espionage in Britain. Intelligence expert Nigel West reveals how MASK, the codename for one of the most secretive sources ever run by British intelligence, enabled Stanley Baldwin and his cabinet to monitor the activities of the Communist Party of Great Britain and track wireless traffic between the Soviet Union and its Comintern representatives abroad, in countries as far apart as the United States, China and Austria. The Government Code and Cipher School was one of the most secret branches of Whitehall, under the command of the Secret Intelligence Service, and used its covert intercept station in Denmark Hill, South London to make vital advances in the intelligence war. This gripping account exposes for the first time how the Communist Party of Great Britain was infiltrated and the actual contents of its communications with the Soviets.
Intelligence was a major part of the Cold War, waged by both sides with an almost warlike intensity. Yet the question 'What difference did it all make?' remains unanswered. Did it help to contain the Cold War, or fuel it and keep it going? Did it make it hotter or colder? Did these large intelligence bureaucracies tell truth to power, or give their governments what they expected to hear? These questions have not previously been addressed systematically, and seven writers tackle them here on Cold War aspects that include intelligence as warning, threat assessment, assessing military balances, Third World activities, and providing reassurance. Their conclusions are as relevant to understanding what governments can expect from their big, secret organizations today as they are to those of historians analysing the Cold War motivations of East and West. This book is valuable not only for intelligence, international relations and Cold War specialists but also for all those concerned with intelligence's modern cost-effectiveness and accountability. This book was published as a special issue of Intelligence and National Security. |
![]() ![]() You may like...
|