![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
The "lively and engrossing" (The Wall Street Journal) story of how OSS spymaster Allen Dulles built an underground network determined to take down Hitler and destroy the Third Reich.Agent 110 is Allen Dulles, a newly minted spy from an eminent family. From his townhouse in Bern, Switzerland, and in clandestine meetings in restaurants, back roads, and lovers' bedrooms, Dulles met with and facilitated the plots of Germans during World War II who were trying to destroy the country's leadership. Their underground network exposed Dulles to the political maneuverings of the Soviets, who were already competing for domination of Germany, and all of Europe, in the post-war period. Scott Miller's "absorbing and bracing" (The Seattle Times) Agent 110 explains how leaders of the German Underground wanted assurances from Germany's enemies that they would treat the country humanely after the war. If President Roosevelt backed the resistance, they would overthrow Hitler and shorten the war. But Miller shows how Dulles's negotiations fell short. Eventually he was placed in charge of the CIA in the 1950s, where he helped set the stage for US foreign policy. With his belief that the ends justified the means, Dulles had no qualms about consorting with Nazi leadership or working with resistance groups within other countries to topple governments. Agent 110 is "a doozy of a dossier on Allen Dulles and his early days spying during World War II" (Kirkus Reviews). "Miller skillfully weaves a double narrative of Dulles' machinations and those of the German resistance" (Booklist) to bring to life this exhilarating, and pivotal, period of world history--of desperate renegades in a dark and dangerous world where spies, idealists, and traitors match wits and blows to ensure their vision of a perfect future.
This work considers, for the first time, the intelligence relationship between three important North Atlantic powers in the Twenty-first century, from WWII to post-Cold War. As demonstrated in the case studies in this volume, World War II cemented loose and often informal inter-allied agreements on security intelligence that had preceded it, and created new and important areas of close and formal co-operation in such areas as codebreaking and foreign intelligence.
Asia represented the "hottest" theatre of the Cold War, with several declared and undeclared wars always in progress. Examining the Asian dimension of this struggle, this volume describes and analyzes a range of clandestine activities from intelligence and propaganda to special operations and security support. It draws on documents declassified after the end of the Cold War.
In 1992, the files of East Germany's infamous Ministry for State Security, the Stasi, were made publicly available and thousands of former East Germans began to confront their contents. Finally, it was possible for ordinary citizens to ascertain who had worked for the Stasi, either on a full-time basis or as an 'unofficial employee' or informer. The revelations from these 178 km of documents sparked feuds old and new among a population already struggling through massive social and political upheaval. Drawing upon the Stasi files and upon interviews with one-time informers, this book examines the impact of the Stasi legacy in united Germany. Barbara Miller examines such aspects of the informer's experience as: the recruitment procedure daily life and work motivation and justification She next considers the dealings of politicians and the courts with the Stasi and its employees. Her analysis then turns to the way in which this aspect of recent German history has been remembered, and the phenomenal impact of the opening of the files on such perceptions of the past. Narratives of Guilt and Compliance in Unified Germany offers important new perspectives on the nature of individual and c
This is a history of the secret activities of the British
government in response to threats to the nation's well-being and
stability during the twentieth century. It is based on intensive
and widespread research in private and public archives and on
documents many of which have only recently come to light or been
made available.
This is a history of the Norwegian Intelligence Service (NIS) during the Cold War, based on its secret archives. The author presents detailed descriptions of the build-up of a network of Norwegian signals intelligence stations in the north; border crossings by clandestine agents; the reporting of Norwegian merchant mariners from ports behind the Iron Curtain; the intimate co-operation between the NIS and the secret services of the United States and other countries; as well as the establishment of a stay behind network.
The disintegration of the Soviet Union, the fall of the Berlin Wall, attempts to solve military confrontation by peaceful means and the Middle East peace process have all given rise to the discussion about the role of intelligence in times of peace.
Spies and Lies by Alex Joske is a groundbreaking expose of elite influence operations by China's little-known Ministry of State Security. Revealing for the first time how the Chinese Communist Party has tasked its spies to deceive the world, it challenges the conventional account of China's past, present and future. Mere years ago, Western governments chose to cooperate with China in the hope that it would liberalise, setting aside concerns about human rights abuses, expansionism and espionage. But the axiom of China's 'peaceful rise' has been fundamentally challenged by the Chinese Communist Party's authoritarian behaviour under Xi Jinping. How did we get it wrong for so long? Spies and Lies pierces the Ministry of State Security's walls of secrecy and reveals how agents of the Chinese Communist Party have spent nearly 40 years manipulating Western leaders' attitudes - from an Australian prime minister to the US Congress, prominent think tanks and the FBI - about China's rise. Through interviews with defectors and intelligence officers, classified Chinese intelligence documents and original investigations, the book unmasks dozens of active Chinese intelligence officers along with global MSS fronts including travel agencies, writers associations, publishing houses, alumni associations, newspapers, Buddhist retreats, a record company and charities. Spies and Lies is an extraordinary insight into the most successful influence operation in history, one which has fooled the West for years, and indispensable reading.
The United States' national security depends on a secure, reliable and resilient cyberspace. The inclusion of digital systems into every aspect of US national security has been underway since World War II and has increased with the proliferation of Internet enabled devices. There is an increasing need to develop a robust deterrence framework within which the US and its allies can dissuade would be adversaries from engaging in various cyber activities. Yet despite a desire to deter adversaries, the problems associated with dissuasion remain complex, multifaceted, poorly understood and imprecisely specified. Challenges including, credibility, attribution, escalation and conflict management to name but a few remain ever present and challenge the US in its efforts to foster security in cyberspace. These challenges need to be addressed in a deliberate and multidisciplinary approach that combines political and technical realities to provide a robust set of policy options to decision makers. The Cyber Deterrence Problem brings together a multi-disciplinary team of scholars from multiple institutions with expertise in computer science, deterrence theory, cognitive psychology, intelligence studies, and conflict management to analyze and develop a robust assessment of the necessary requirements and attributes for achieving deterrence in cyberspace. Beyond simply addressing the base challenges associated with deterrence many of the chapters also propose strategies and tactics to enhance deterrence in cyberspace and emphasize conceptualizing how the US deters adversaries.
THE TIMES THRILLER OF THE MONTH CHOICE MAGAZINE HARDBACK OF THE MONTH 'A thoroughly gripping spy thriller... Captures the high stakes paranoia of the era brilliantly.' Adam Hamdy, author of Black 13 'Intelligent, involving and gripping.' Choice 'Considered and entertaining, I was drawn in from page one.' Charlotte Philby, author of Part of the Family Duty or honour. Which would you betray? It's 1966. London is swinging, and the Cold War is spiralling. Clear cut lines have faded to grey areas. Whispers of conspiracies are everywhere. Spies on both sides of the iron curtain are running in circles, chasing constant plots and counterplots. And MI5 agent Richard Knox is tired of all of it. But when Abey Bennett, his CIA comrade in arms, appears in London with a ghost from Knox's past and a terrifying warning that could change the balance of power in the Cold War for good, he has to fight to save the future.
Little attention has been paid to the murky, ultra-business of gathering intelligence among and forming estimates about friendly powers, and friendly or allied military forces. How rarely have scholars troubled to discover when states entered into coalitions or alliances mainly and explicitly because their intelligence evaluation of the potential partner concluded that making the alliance was, from the originator's national security interest, the best game in town. The twentieth century has been chosen to enhance the coherence of and connections between, the subject matter of this under-explored part of intelligence studies.
Little attention has been paid to the murky, ultra-business of gathering intelligence among and forming estimates about friendly powers, and friendly or allied military forces. How rarely have scholars troubled to discover when states entered into coalitions or alliances mainly and explicitly because their intelligence evaluation of the potential partner concluded that making the alliance was, from the originator's national security interest, the best game in town. The twentieth century has been chosen to enhance the coherence of and connections between, the subject matter of this under-explored part of intelligence studies.
The security services have played a central--and often mysterious--role at key turning points in Russia during the tumultuous years following the Soviet collapse: from the Moscow apartment house bombings and theater siege, to the war in Chechnya and the Beslan school massacre. In this riveting investigation, two intrepid journalists penetrate the secret world of the FSB and illustrate how the security services have evolved into a ruthless, violently powerful force that is inextricably woven into modern Russia's fundamental makeup, and has become more shadowy than its predecessor, the Soviet KGB.
The visionary chemist Sidney Gottlieb was the CIA's master magician and gentle hearted torturer - the agency's "poisoner in chief." As head of the MK-ULTRA mind control project, he directed brutal experiments at secret prisons on three continents. He made pills, powders, and potions that could kill or maim without a trace, and he secretly dosed unsuspecting American citizens with mind-altering drugs. His experiments spread LSD across the United States, making him a hidden godfather of the 1960s counterculture, and he was also the chief supplier of spy tools used by CIA officers around the world. Stephen Kinzer, the author of groundbreaking books about U.S. clandestine operations, draws on new documentary research and original interviews to bring to life one of the most powerful unknown Americans of the twentieth century. And in a new afterword, he brings to light newly revealed stories about Gottlieb's astonishing career at the intersection of extreme science and covert action.
In this fascinating, exhaustively researched reexamination of the 'Pueblo Incident,' Robert Liston comes to a remarkable conclusion: the Pueblo was purposely surrendered in a secret mission planned by the National Security Agency. The operation was the subject of a total cover-up-from the White House, the Pentagon, Congress, and the American public. Liston states that: The Pueblo was controlled by NSA operatives planted aboard the ship without the knowledge of the Navy; and the Chinese and the Soviets were after information they were led to believe was on board the Pueblo-information that was vital to both for intelligence purposes But what was this deadly information? It was part of an NSA operation, in which a rigged U.S. code machine was secretly planted aboard the Pueblo to induce the North Koreans to capture and use the rigged code machine, thus permitting the U.S. to break the Soviet system of codes. The North Koreans used the machine to radio Vladivostok for instructions. The Soviet codes were broken almost immediately. Liston maintains the Pueblo surrender was the greatest intelligence coup of modern times, preventing a major U.S. defeat in the Tet Offensive in Vietnam, foiling Soviet plans to invade China in a potentially nuclear conflict, and leading directly to the rapprochement between China and the U.S. Because the Soviets knew their codes were broken, the KGB began a massive overhaul of their entire intelligence operation. To gain time for that, the Kremlin launched its policy of detente with the West. Liston masterfully organizes his material to expose the many inconsistencies in all previous accounts of the surrender, and carefully details the roles of the major players. Drawing on published accounts and interviews with crewmen and informants, Liston logically compiles the facts and details to reach a devastating conclusion. What emerges is not only an eye-opening revelation of the risks taken by the NSA in the power play of espionage, but a chilling portrait of an unimpeachable intelligence apparatus that threatens the very foundations of American democracy.
This prize-winning book, first published in 1991, provides a detailed legal account of the development of the UK Official Secrets Acts 1911-1989. In particular, the Espionage section (s.1) of this criminal law is analysed carefully, illustrated by leading cases of UK spies prosecuted under this section, particularly during the 1980's - including MI5 officer Michael Bettaney and Geoffrey Prime who worked at GCHQ. The author also examines problems of evidence in espionage prosecutions, and the consent of the Attorney-General in cases under the Official Secrets Acts. This book remains the definitive treatise on the UK Official Secrets Acts, especially concerning the espionage provisions.
The Soviet military concept of operational art and the associated theories such as "war of annihilations," "deep battle," and "deep operations" have been observed by the West since World War II. The Soviet government hid their military-theoretical work behind a veil of secrecy. Here, the Soviet theories are revealed in the words of those who created them in peacetime and applied them in war.
A remarkable insight into the training and techniques of Allied agents operating behind enemy lines during the Second World War. Most wars have had some element of espionage and subterfuge, but few have included as much as the Second World War, where the all-embracing nature of the conflict, new technology, and the battle of ideologies conspired to make almost everywhere a war zone. The occupation of much of Europe in particular left huge areas that could be exploited. Partisans, spies and saboteurs risked everything in a limbo where the normal rules of war were usually suspended. Concealment of oneself, one's weapons and equipment, was vital, and so were the new methods and hardware which were constantly evolving in a bid to stay ahead of the Gestapo and security services. Silent killing, disguise, covert communications and the arts of guerrilla warfare were all advanced as the war progressed. With the embodiment and expansion of organisations such as the British SOE and the American OSS, and the supply of special forces units which operated behind enemy lines, clandestine warfare became a permanent part of the modern military and political scene. Perhaps surprisingly many of these hitherto secret techniques and pieces of equipment were put into print at the time and many examples are now becoming available. This manual brings together a selection of these dark arts and extraordinary objects and techniques in their original form, under one cover to build up an authentic picture of the Allied spy.
This book traces the history of Australia's highly secret Intelligence Security Organisation. Established in the early days of the Cold War, like most intelligence organisations working under covert conditions, it exceeded the vague powers entrusted to it. It has been the subject of two Royal Commissions in Australia and in recent times several acts of Parliament have been passed in order to make it more accountable to Australia's government and its citizens.
Numerous allegations of abuse of power have been made against the domestic security intelligence agencies in the United Kingdom - police special branches and MI5. These include the improper surveillance of trade unionists and peace activists, campaigns of disinformation against elected politicians and, most serious of all, the summary shooting of people believed to be engaged in political violence. Although in recent years far-reaching inquiries have been conducted into similar agencies in other liberal democracies, and the end of the Cold War has brought dramatic change to security agencies in Eastern Europe, the UK agencies have remained aloof from anything more than marginal organisational change. Drawing on extensive foreign material and making use of the social science concepts of information, power and law, this book develops a framework for the comparative analysis of these agencies. This provides, first, a systematic discussion of what is known about the operations of security intelligence agencies in liberal democracies and, second, an agenda for research into the UK agencies, including: the ambiguous nature of their mandate regarding 'national security', 'subversion' and 'terrorism'; the ways in which the agencies penetrate society and what they do with the information they gather; internal organisational questions such as recruitment and culture; the extent to which the agencies are controlled by ministers; and how the agencies' activities might be overseen by outside political bodies such as parliamentary committees, and by citizens in general. Concluding that not enough is known about how these agencies operate in the UK, the book argues the need for a thorough inquiry toinvestigate the disturbing allegations that have been made, and to make proposals for a more democratic system of security intelligence.
Numerous allegations of abuse of power have been made against the domestic security intelligence agencies in the UK - police special branches and MI5. These include the improper surveillance of trades unionists and peace activists, campaigns of disinformation against elected politicians and the summary shooting of people believed to be engaged in political violence. Although far-reaching enquiries have been conducted into similar agencies in other liberal democracies, and the end of the Cold War has brought dramatic change to security agencies in Eastern Europe, the UK agencies have remained aloof from anything more than marginal organizational change.
This volume offers an account of some key activities of the Allied secret services and their German counterparts in Sweden during World War II. It also describes in some detail Swedish wartime legislation and Swedish organizations concerned with internal security and intelligence. |
![]() ![]() You may like...
Village Housing - Constraints and…
Nick Gallent, Iqbal Hamiduddin, …
Paperback
R769
Discovery Miles 7 690
The Economic and Opportunity Gap - How…
Anni K. Reinking, Theresa M. Bouley
Hardcover
R1,654
Discovery Miles 16 540
|