![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
'A METICULOUS HISTORY THAT READS LIKE A THRILLER' BEN MACINTYRE, TEN BEST BOOKS TO READ ABOUT WORLD WAR II An astounding story of heroism, spycraft, resistance and personal triumph over shocking adversity. 'A rousing tale of derring-do' THE TIMES * 'Riveting' MICK HERRON * 'Superb' IRISH TIMES THE NEW YORK TIMES BESTSELLER In September 1941, a young American woman strides up the steps of a hotel in Lyon, Vichy France. Her papers say she is a journalist. Her wooden leg is disguised by a determined gait and a distracting beauty. She is there to spark the resistance. By 1942 Virginia Hall was the Gestapo's most urgent target, having infiltrated Vichy command, trained civilians in guerrilla warfare and sprung soldiers from Nazi prison camps. The first woman to go undercover for British SOE, her intelligence changed the course of the war - but her fight was still not over. This is a spy history like no other, telling the story of the hunting accident that disabled her, the discrimination she fought and the secret life that helped her triumph over shocking adversity. 'A cracking story about an extraordinarily brave woman' TELEGRAPH 'Gripping ... superb ... a rounded portrait of a complicated, resourceful, determined and above all brave woman' IRISH TIMES WINNER of the PLUTARCH AWARD FOR BEST BIOGRAPHY
This edited volume brings together a range of essays by individuals who are centrally involved in the debate about the role and utility of theory in intelligence studies. The volume includes both classic essays and new articles that critically analyse some key issues: strategic intelligence, the place of international relations theory, theories of a ~surprisea (TM) and a ~failurea (TM), organisational issues, and contributions from studies of policing and democratisation. It concludes with a chapter that summarises theoretical developments, and maps out an agenda for future research. This volume will be at the forefront of the theoretical debate and will become a key reference point for future research in the area. This book will be of much interest for students of Intelligence Studies, Security Studies and Politics/International Relations in general.
An extraordinarily brave and moving memoir from one of the world's most famous transparency activists and trans women. In 2010, Chelsea Manning was working as an intelligence analyst for the US Army in Iraq. She disclosed 720,000 classified military documents that she had smuggled out via the memory card of her digital camera. By far the largest leak in history, these documents revealed a huge number of diplomatic cables and footage of atrocities. She was sentenced to 35 years in military prison. The day after her conviction, Chelsea declared her gender identity as a woman and began to transition. She was sent to a male prison, spent much of that time in appalling conditions in solitary confinement and attempted suicide multiple times. In 2017, after a lengthy legal challenge and an outpouring of support, President Obama commuted her sentence. README.txt is a story of personal revolt, resilience and survival. Chelsea details the challenges of her childhood and adolescence in Oklahoma and in her mother's native Wales. She writes revealingly and movingly about a period of homelessness in Chicago, living under 'Don't Ask, Don't Tell' in the US Army, and the experience of coming to terms with her gender identity and undergoing hormone therapy in prison. We witness her Kafkaesque trial and heroic quest for release. This powerful, courageous and observant memoir sheds light on the big themes of today - identity, authenticity, technology, the authoritarian state - and will stand as one of the definitive testaments of our digital, information-driven age. 'Chelsea Manning is the biggest hero that ever lived' Vivienne Westwood 'Searing ... uplifting ... redemptive' The New York Times 'Electrifying ... an insider confessional turned inside out for the 21st century' Washington Post
In scenes eerily parallel to the culture of fear inspired by our current War on Terror, A Need to Know explores the clandestine history of a CIA family defined, and ultimately destroyed, by their oath to keep toxic secrets during the Cold War. When Bud Goodall's father mysteriously died, his inheritance consisted of three well-worn books: a Holy Bible, The Great Gatsby, and a diary. But they turned his life upside down. From the diary Goodall learned that his father had been a CIA operative during the height of the Cold War, and the Bible and Gatsby had been his codebooks. Many unexplained facets of Bud's childhood came into focus with this revelation.The high living in Rome and London. The blood-stained stiletto in his jewelry case. Bud, as a child, was always told he never had "a need to know." Or did he? Now, as an adult and a university professor, Goodall attempts to fill in the missing pieces of his Cold War childhood by uncovering a lifetime of family secrets. Who were his parents? What did his father do on those business trips when he was "working for the government?" What betrayal turned a heroic career of national service into a nightmare of alcoholism, depression, and premature death for both of his parents? Slowly, inexorably, Goodall unearths the chilling secrets of a CIA family in A Need to Know. 2006 Best Book Award, National Communication Association Ethnography Division
This collection of essays by leading experts seeks to explore what lessons for the exploitation and management of secret intelligence might be drawn from a variety of case studies ranging from the 1920s to the 'War on Terror'. Long regarded as the 'missing dimension' of international history and politics, public and academic interest in the role of secret intelligence has continued to grow in recent years, not least as a result of controversy surrounding the terrorist attacks on the United States on September 11 2001. Intelligence, Crises and Security addresses a range of themes including: crisis management, covert diplomacy, intelligence tradecraft, counterterrorism, intelligence 'overload', intelligence in relation to neutral states, deception, and signals intelligence. The work breaks new ground in relation to numerous key international episodes and events, not least as a result of fresh disclosures from government archives across the world. This book was previously published as a special issue of Intelligence and National Security and will be essential reading for students of intelligence, intelligence practitioners and general readers alike.
While much has been disclosed about the CIA's cloak-and-dagger activities during the Cold War, relatively little is known about the origins of this secret organization. David Rudgers, a twenty-two-year CIA veteran, has written the first complete account of its creation, revealing how the idea of a centralized intelligence developed within the government and debunking the myth that former OSS chief William J. Donovan was the prime mover behind the agency's founding. "Creating the Secret State" locates the CIA's origins in government-wide efforts to reorganize national security during the transition from World War II to the Cold War. Rudgers maintains that the creation of the CIA was not merely the brainchild of "Wild Bill" Donovan. Rather, it was the culmination of years of negotiation among numerous policy makers such as James Forrestal and Dean Acheson, each with strong opinions regarding the agency's mission and methods. He shows that Congress, the Departments of State and Justice, the Joint Chiefs, and even the Budget Bureau all had a hand in the establishment of this "secret state" that operates nearly invisibly outside the American political process. Based almost entirely on archival and other primary sources, Rudgers's book describes in detail how the CIA evolved from its original purpose-as a watchdog to guard against a "nuclear Pearl Harbor"-to the role of clandestine warriors countering Soviet subversion, eventually engaging in more forms of intelligence gathering and covert operations than any of its counterparts. It suggests how the agency became a different organization than it might have been without the Communist threat and also shows how it both overexaggerated the dangers of the Cold War and failed to predict its ending. Rudgers has written an accurate and balanced account that brings America's undercover army in from the cold and out from under the cult of personality. An indispensable resource for future studies of the CIA, Creating the Secret State tells the inside story of why and how the agency was called into existence as it stimulates thinking about the future relevance of the CIA in a rapidly changing world.
‘Heavily sourced, crisply written and deeply alarming.’ The Times ‘This is a remarkable book with a chilling message.’ Guardian The Chinese Communist Party is determined to reshape the world in its image. Its decades-long infiltration of the West threatens democracy, human rights, privacy, security and free speech. Throughout North America and Europe, political and business elites, Wall Street, Hollywood, think tanks, universities and the Chinese diaspora are being manipulated with money, pressure and privilege. Hidden Hand reveals the myriad ways the CCP is fulfilling its dream of undermining liberal values and controlling the world.
This collection of essays by leading experts seeks to explore what lessons for the exploitation and management of secret intelligence might be drawn from a variety of case studies ranging from the 1920s to the 'War on Terror'. Long regarded as the 'missing dimension' of international history and politics, public and academic interest in the role of secret intelligence has continued to grow in recent years, not least as a result of controversy surrounding the terrorist attacks on the United States on September 11 2001. Intelligence, Crises and Security addresses a range of themes including: crisis management, covert diplomacy, intelligence tradecraft, counterterrorism, intelligence 'overload', intelligence in relation to neutral states, deception, and signals intelligence. The work breaks new ground in relation to numerous key international episodes and events, not least as a result of fresh disclosures from government archives across the world. This book was previously published as a special issue of Intelligence and National Security.
Ever since the publication in 2004 of the 9/11 Commission Report, the U.S. intelligence community has been in the throes of a convulsive movement for reform. In Preventing Surprise Attacks (2005), Richard A. Posner carried the story of the reform movement up to the enactment of the Intelligence Reform and Terrorism Prevention Act of 2004, which produced a defective plan for reorganizing the intelligence system, partly as result of the failure of the 9/11 Commission and Congress to bring historical, comparative, and scholarly perspectives to bear issues. At that time, however, the new structure had not yet been built. Posner's new book brings the story up to date. He argues that the decisions about structure that the Administration has made in implementation of the Act are creating too top-heavy, too centralized, an intelligence system. The book * exposes fallacies in criticisms of the performance of the U.S. intelligence services; * analyzes structures and priorities for directing and coordinating U.S. intelligence in the era of global terrorism; * presents new evidence for the need to create a domestic intelligence agency separate from the FBI, and a detailed blueprint for such an agency; * incorporates a wealth of material based on developments since the first book, including the report of the presidential commission on weapons of mass destruction and the botched response to Hurricane Katrina; * exposes the inadequacy of the national security computer networks; * critically examines Congress's performance in the intelligence field, and raises constitutional issues concerning the respective powers of Congress and the President; * emphasizes the importance of reforms that do not require questionable organizational changes. The book is published in cooperation with the Hoover Institution
Historical Dictionary of Chinese Intelligence, Second Edition covers the history of Chinese Intelligence from 400 B.C. to modern times. The dictionary section has over 400 cross-referenced entries on the agencies and agents, the operations and equipment, the tradecraft and jargon, and many of the countries involved.
While most studies of the FBI focus on the long tenure of Director J. Edgar Hoover (1924-1972), The Dangers of Dissent shifts the ground to the recent past. The book examines FBI practices in the domestic security field through the prism of "political policing." The monitoring of dissent is exposed, as are the Bureau's controversial "counterintelligence" operations designed to disrupt political activity. This book reveals that attacks on civil liberties focus on a wide range of domestic critics on both the Left and the Right. This book traces the evolution of FBI spying from 1965 to the present through the eyes of those under investigation, as well as through numerous FBI documents, never used before in scholarly writing, that were recently declassified using the Freedom of Information Act or released during litigation (Greenberg v. FBI). Ivan Greenberg considers the diverse ways that government spying has crossed the line between legal intelligence-gathering to criminal action. While a number of studies focus on government policies under George W. Bush's "War on Terror," Greenberg is one of the few to situate the primary role of the FBI as it shaped and was reshaped by the historical context of the new American Surveillance Society.
In scenes eerily parallel to the culture of fear inspired by our current War on Terror, A Need to Know explores the clandestine history of a CIA family defined, and ultimately destroyed, by their oath to keep toxic secrets during the Cold War. When Bud Goodallas father mysteriously died, his inheritance consisted of three well-worn books: a Holy Bible, The Great Gatsby, and a diary. But they turned his life upside down. From the diary Goodall learned that his father had been a CIA operative during the height of the Cold War, and the Bible and Gatsby had been his codebooks. Many unexplained facets of Budas childhood came into focus with this revelation.The high living in Rome and London. The blood-stained stiletto in his jewelry case. Bud, as a child, was always told he never had aa need to know.a Or did he? Now, as an adult and a university professor, Goodall attempts to fill in the missing pieces of his Cold War childhood by uncovering a lifetime of family secrets. Who were his parents? What did his father do on those business trips when he was aworking for the government?a What betrayal turned a heroic career of national service into a nightmare of alcoholism, depression, and premature death for both of his parents? Slowly, inexorably, Goodall unearths the chilling secrets of a CIA family in A Need to Know. 2006 Best Book Award, National Communication Association Ethnography Division
Gordon Corera uses declassified documents and extensive original research to tell the story of MI14(d) and the Secret Pigeon Service for the first time. ‘This is an amazing story’ Simon Mayo, BBC Radio 2 Between 1941 and 1944, sixteen thousand plucky homing pigeons were dropped in an arc from Bordeaux to Copenhagen as part of 'Columba' – a secret British operation to bring back intelligence from those living under Nazi occupation. The messages flooded back written on tiny pieces of rice paper tucked into canisters and tied to the legs of the birds. Authentic voices from rural France, the Netherlands and Belgium – they were sometimes comic, often tragic and occasionally invaluable with details of German troop movements and fortifications, new Nazi weapons, radar system or the deployment of the feared V-1 and V-2 rockets that terrorized London. Who were the people who provided this rich seam of intelligence? Many were not trained agents nor, with a few exceptions, people with any experience of spying. At the centre of this book is the ‘Leopold Vindictive’ network – a small group of Belgian villagers prepared to take huge risks. They were led by an extraordinary priest, Joseph Raskin – a man connected to royalty and whose intelligence was so valuable it was shown to Churchill, leading MI6 to parachute agents in to assist him. A powerful and tragic tale of wartime espionage, the book brings together the British and Belgian sides of the Leopold Vindictive’s story and reveals for the first time the wider history of a quirky, quarrelsome band of spy masters and their special wartime operations, as well as how bitter rivalries in London placed the lives of secret agents at risk. It is a book not so much about pigeons as the remarkable people living in occupied Europe who were faced with the choice of how to respond to a call for help, and took the decision to resist.
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.
Leonid Eitingon was a KGB killer who dedicated his life to the Soviet regime. He was in China in the early 1920s, in Spain during the Civil War, and, crucially, in Mexico when Trotsky was assassinated. 'As long as I live,' Stalin had said, 'not a hair of his head shall be touched.' It did not work out like that. Max Eitingon was a psychoanalyst: a colleague, friend and protégé of Freud's. He was rich, secretive and - through his friendship with a famous Russian singer - implicated in the abduction of a white Russian general in Paris in 1937. Motty Eitingon was a New York fur dealer whose connections with the Soviet Union made him the largest trader in the world. Imprisoned by the Bolsheviks, and questioned by the FBI in a state of Cold War paranoia: was Motty everybody's friend or everybody's enemy? Mary-Kay Wilmers began exploring the history of her remarkable family twenty years ago. The result is a book of astonishing scope and thrilling originality which throws light into some of the darkest corners of the last century.
The intelligence failures exposed by the events of 9/11 and the missing weapons of mass destruction in Iraq have made one thing perfectly clear: change is needed in how the U.S. intelligence community operates. "Transforming U.S. Intelligence" argues that transforming intelligence requires as much a look to the future as to the past and a focus more on the art and practice of intelligence rather than on its bureaucratic arrangements. In fact, while the recent restructuring, including the creation of the Department of Homeland Security, may solve some problems, it has also created new ones. The authors of this volume agree that transforming policies and practices will be the most effective way to tackle future challenges facing the nation's security. This volume's contributors, who have served in intelligence agencies, the Departments of State or Defense, and the staffs of congressional oversight committees, bring their experience as insiders to bear in thoughtful and thought-provoking essays that address what such an overhaul of the system will require. In the first section, contributors discuss twenty-first-century security challenges and how the intelligence community can successfully defend U.S. national interests. The second section focuses on new technologies and modified policies that can increase the effectiveness of intelligence gathering and analysis. Finally, contributors consider management procedures that ensure the implementation of enhanced capabilities in practice. "Transforming U.S. Intelligence" supports the mandate of the new director of national intelligence by offering both careful analysis of existing strengths and weaknesses in U.S. intelligence and specific recommendations on how to fix its problems without harming its strengths. These recommendations, based on intimate knowledge of the way U.S. intelligence actually works, include suggestions for the creative mixing of technologies with new missions to bring about the transformation of U.S. intelligence without incurring unnecessary harm or expense. The goal is the creation of an intelligence community that can rapidly respond to developments in international politics, such as the emergence of nimble terrorist networks while reconciling national security requirements with the rights and liberties of American citizens.
MASK is the codename for one of the most sensitive, long-term sources ever run by any British intelligence organisation. It concealed the existence of a radio interception programme operated by the Government Code and Cipher School (GC&CS) which succeeded in monitoring, and reading, large quantities of encrypted wireless traffic exchanged between the headquarters of the Comintern in Moscow, and numerous Comintern representatives abroad, in countries as far apart as China, Austria and the United States. The content of these secret messages was of immense use to the very limited group of people who had access to it. Of greatest interest to MI5 and Stanley Baldwin's Cabinet was the material passing to and from the Communist Party of Great Britain (CPGB), which was monitored from a covert intercept station located on Denmark Hill, south London. Its principal target was the daily wireless traffic of a clandestine transmitter based in Wimbledon and operated by a member of the CPGB's underground cell, controlled by a Scot, Bob Stewart. the Secret Intelligence Service (SIS), and for years had supplied the Prime Minister and a handful of Cabinet ministers with summaries of decrypted foreign communications.
WALLFLOWERS is the codename given to one of the Security Service's
most treasured possessions, the daily journal dictated from August
1939 to June 1945 by MI5's Director of Counter-Espionage, Guy
Liddell, to his secretary, Margo Huggins. The document was
considered so highly classified that it was retained in the safe of
successive Directors-General, and special permission was required
to read it.
This book examines the secret role of British and German Christians in the Cold War, both as non-governmental envoys and as members of covert intelligence operations. Based on archival sources, including those of the Stasi together with interviews with some of those involved, it demonstrates the way in which religion was used as a tool of psychological warfare. During the 1960s, the concept of Christian-Marxist dialogue was espoused by Church leaders and appropriated by politicians. In the GDR, Ulbricht used Christian-Marxist dialogue to quell opposition to his regime; in the West, politicians encouraged a policy of detente which led to the erosion of communist ideology. As the seeds of Ostpolitik were sown, Christians tunnelled their way beneath the ideological barriers of the Cold War in the name of reconciliation while secretly establishing subversive networks. At the same time, they provided political leaders with a hidden channel of communication across the Iron Curtain. This book examines the 1965 Coventry Cathedral project of reconciliation in Dresden, the work of Paul Oestricher, and the activities of the German Christian organisation Aktion Suhnezeichen. In doing so, it reveals the complexity of the Cold War world in which both sides appeared to hold out the hand of friendship while secretly working to eliminate the enemy.
WALLFLOWERS is the codename given to one of the Security Service's
most treasured possessions, the daily journal dictated from August
1939 to June 1945 by MI5's Director of Counter Espionage, Guy
Liddell, to his secretary, Margo Huggins. The document was
considered so highly classified that it was retained in the safe of
successive Directors-General, and special permission was required
to read it.
Intelligence activities have always been an integral part of
statecraft, and the Romans could not have built and protected their
empire without them. In both the Republic and the Empire the Romans
realized that to keep their borders safe, to control their
population, to keep abreast of political developments abroad, and
for the internal security of their own regime, they needed a means
to collect the intelligence which enabled them to make informed
decisions. The Romans certainly did not have our technology nor did
they use our terminology. A search for the Roman equivalent of the
CIA is fruitless; there was no such thing. But this is not to say
that they did not collect intelligence. While no one department of
government was ever trusted with all of Rome's clandestine
activities, there were several organizations that shared the
responsibility of telling the emperor what he wanted to know. Onto
their vast system of roads was grafted an intelligence network
which carried information from all ends of the empire to the
emperor. The men responsible for monitoring that system became, in
effect, a Roman Secret Service.
"The history of Civil War espionage is usually mentioned only in passing in general accounts of the war. Lying under a cloud of romanticism, its details have had to be ferreted out in specialized sources. For his complete account of the subject, Markle draws upon just about all the available material and summarizes it with judgment, balance, clarity, and occasional wit. Among the subtopics are technology (photography for mapmaking and Confederate use of a forerunner of microfilm), the value of women spies (less subject to suspicion, they could move with greater freedom than male spies), and the roles of blacks as spies. A good case could be made that this volume is the single most valuable contribution to general Civil War literature so far this year. "--Booklist
Since 9/11, the needs of intelligence agencies as well as the missions they conduct have increased in number, size, and complexity. As such, government and private security agencies are recruiting staff to analyze the vast amount of data collected in these missions. This textbook offers a way of gaining the analytic skills essential to undertake intelligence work. It acquaints students and analysts with how intelligence fits into the larger research framework. It covers not only the essentials of applied research, but also the function, structure, and operational methods specifically involved in intelligence work. It looks at how analysts work with classified information in a security conscious environment as well as obtain data via covert methods. Students are left with little doubt about what intelligence is and how it is developed using scientific methods of inquiry. This revised edition of the popular text has been expanded and updated significantly.
This book examines how key developments in international relations in recent years have affected intelligence agencies and their oversight. Since the turn of the millennium, intelligence agencies have been operating in a tense and rapidly changing security environment. This book addresses the impact of three factors on intelligence oversight: the growth of more complex terror threats, such as those caused by the rise of Islamic State; the colder East-West climate following Russia's intervention in Ukraine and annexation of Crimea; and new challenges relating to the large-scale intelligence collection and intrusive surveillance practices revealed by Edward Snowden. This volume evaluates the impact these factors have had on security and intelligence services in a range of countries, together with the challenges that they present for intelligence oversight bodies to adapt in response. With chapters surveying developments in Norway, Romania, the UK, Belgium, France, the USA, Canada and Germany, the coverage is varied, wide and up-to-date. This book will be of much interest to students of intelligence studies, security studies and International Relations. |
You may like...
Beaded Wild Animals - Puffy Critters for…
Suzanne McNeill
Staple bound
|