Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
In April of 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization's computer servers. In the days and weeks that followed, they discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails. It was the modern-day equivalent of the Watergate scandal, but this time, the culprit was Russia's spy service, and their method was a new hybrid cyber warfare: Kompromat. But why would Vladimir Putin want to tip the scales of an American election? New York Times bestseller Malcolm Nance follows the curious real life spy story through a labyrinth of cyber espionage, the history of Russia's spy services, and Vladimir Putin's rise through the KGB from junior officer to Spy-in-Chief. He also details Donald Trump's many disturbing personal associations with Putin and Russia's oligarchy and Trump's loose affiliation of advisors nicknamed the Kremlin Crew. We also learn how technicians discovered that Russia's spy agency was responsible for the hack; how the Russians have devastated individuals, political groups, and entire nations with their cyber crimes; and how they may have cultivated Donald Trump as an unwitting asset to facilitate their ultimate foreign policy goals: disband NATO, dominate eastern Europe, and replace America as the world s superpower.
MI5's dramatic interception of secret signals to Moscow from a hidden base in Wimbledon uncovered the true extent of Soviet espionage in Britain. Intelligence expert Nigel West reveals how MASK, the codename for one of the most secretive sources ever run by British intelligence, enabled Stanley Baldwin and his cabinet to monitor the activities of the Communist Party of Great Britain and track wireless traffic between the Soviet Union and its Comintern representatives abroad, in countries as far apart as the United States, China and Austria. The Government Code and Cipher School was one of the most secret branches of Whitehall, under the command of the Secret Intelligence Service, and used its covert intercept station in Denmark Hill, South London to make vital advances in the intelligence war. This gripping account exposes for the first time how the Communist Party of Great Britain was infiltrated and the actual contents of its communications with the Soviets.
While most studies of the FBI focus on the long tenure of Director J. Edgar Hoover (1924-1972), The Dangers of Dissent shifts the ground to the recent past. The book examines FBI practices in the domestic security field through the prism of 'political policing.' The monitoring of dissent is exposed, as are the Bureau's controversial 'counterintelligence' operations designed to disrupt political activity. This book reveals that attacks on civil liberties focus on a wide range of domestic critics on both the Left and the Right. This book traces the evolution of FBI spying from 1965 to the present through the eyes of those under investigation, as well as through numerous FBI documents, never used before in scholarly writing, that were recently declassified using the Freedom of Information Act or released during litigation (Greenberg v. FBI). Ivan Greenberg considers the diverse ways that government spying has crossed the line between legal intelligence-gathering to criminal action. While a number of studies focus on government policies under George W. Bush's 'War on Terror, ' Greenberg is one of the few to situate the primary role of the FBI as it shaped and was reshaped by the historical context of the new American Surveillance Society
Based on previously classified documents and on interviews with former secret police officers and ordinary citizens, The Firm is the first comprehensive history of East Germany's secret police, the Stasi, at the grassroots level. Focusing on Gransee and Perleberg, two East German districts located north of Berlin, Gary Bruce reveals how the Stasi monitored small-town East Germany. He paints an eminently human portrait of those involved with this repressive arm of the government, featuring interviews with former officers that uncover a wide array of personalities, from devoted ideologues to reluctant opportunists, most of whom talked frankly about East Germany's obsession with surveillance. Their paths after the collapse of Communism are gripping stories of resurrection and despair, of renewal and demise, of remorse and continued adherence to the movement. The book also sheds much light on the role of the informant, the Stasi's most important tool in these out-of-the-way areas. Providing on-the-ground empirical evidence of how the Stasi operated on a day-to-day basis with ordinary people, this remarkable volume offers an unparalleled picture of life in a totalitarian state.
The United States is not a police state, but Congress is subject to special interests lobbying in pursuit of abusive commercial practices that leave a lot to be desired for transparency and accountability. It is illegal to data-mine personal files held by government agencies, schools and universities, or medical facilities. It is illegal to collect and publish defamatory gossip and hearsay about private citizens. But it is legal to oblige Americans to "waive" their rights to privacy and their right to sue for invasion of privacy for defamation by anonymous third-parties in order to receive essential services or apply for employment. Americans are obliged to "waive" their rights in essentially all applications for employment, credit, housing, public utilities, telephone or mobile phone service, internet access, and even cable TV connection. The law requires "notice and consent" whenever such waivers are included in employment applications, but consumer reporting agencies have learned to use deceptive methods to avoid drawing the attention of applicants to the meaning and consequence of such language. Recent law dispenses with "notice and consent" for private-eye quasi-criminal investigations of "suspected misconduct" by an employee altogether. In effect, this bypasses "probable cause," "innocent until proven guilty," the "right to know the nature of an accusation," the "right to confront witnesses," the "rule against double jeopardy," and the "right to sue for defamation, and/or interference with employment." Orlan Lee questions the validity of any such "waivers," and seeks to alert Americans to the need to protect their fundamental rights.
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
Repeated intelligence failures in Iraq, Libya and across the Middle East and North Africa have left many critics searching for a smoking gun. Amidst questions of who misread - or manipulated - the intel, a fundamental truth goes unaddressed: western intelligence is not designed to understand the world. In fact, it cannot. In The Covert Colour Line, Oliver Kearns shows how the catastrophic mistakes made by British and US intelligence services since 9/11 are underpinned by orientalist worldviews and racist assumptions forged in the crucible of Cold War-era colonial retreat. Understanding this historical context is vital to explaining why anglophone state intelligence is unable to grasp the motives and international solidarities of 'adversaries'. Offering a new way of seeing how intelligence contributes to world inequalities, and drawing on a wealth of recently declassified materials, Kearns argues that intelligence agencies’ imagination of 'non-Western' states and geopolitics fundamentally shaped British intelligence assessments which would underpin the 2003 invasion of Iraq and subsequent interventions.
This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers.
Nazi Germany's efforts to weaken the United States by subversion
failed miserably. Bungling spies were captured and half-hearted
efforts at sabotage came to nothing. Yet anyone who lived through
WWII remembers the chilling posters warning Americans that "Enemy
Agents Have Big Ears" and "Loose Lips Sink Ships." Even Superman
joined the struggle against these insidious foes. In 1940, polls
showed that 71% of Americans believed a Nazi Fifth Column had
penetrated the country. Almost half were convinced that spies,
saboteurs, dupes, and rumor-mongers lurked in their own
neighborhoods and work-places. These fears extended to the White
House and Congress.
Words of Intelligence: An Intelligence Professional's Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels. The intelligence community has undergone massive changes since it developed after World War II. Intelligence work now involves several different processes, including the planning, collection, analysis, and production of information. It also requires extensive expertise in its terminology. And in the post-9/11 era, the intelligence community has expanded, requiring the transmission of information to state and local public administrators, health officials, and transportation planners in times of a possible domestic attack. The number of people who need to know the specialized terminology of the intelligence community continues to grow. This dictionary is an invaluable tool for those requiring a working knowledge of intelligence-related issues from both a foreign intelligence perspective and a local perspective for law enforcement officials. The number of terms, abbreviations, and acronyms has more than doubled for this new edition, and it includes a topical index and extensively cross-referenced entries. This book explains terms that relate to intelligence operations, intelligence strategies, security classifications, obscure names of intelligence boards and organizations, and methodologies used to produce intelligence analysis. Both entry-level and experienced intelligence professionals in the domestic and foreign intelligence communities find this book useful. This book is more than just a reference book; it is a book to read and enjoy, and from which to learn the art and science of intelligence analysis.
This book analyzes how the Egyptian intelligence community has adapted to shifting national security threats since its inception 100 years ago. Starting in 1910, when the modern Egyptian intelligence system was created to deal with militant nationalists and Islamists, the book shows how the security services were subsequently reorganized, augmented and centralized to meet an increasingly sophisticated array of challenges, including fascism, communism, army unrest, Israel, France, the United Kingdom, conservative Arab states, the Muslim Brotherhood and others. The book argues that studying Egypt's intelligence community is integral to our understanding of that country's modern history, regime stability and human rights record. Intelligence studies have been described as the 'missing dimension' of international relations. It is clear that intelligence agencies are pivotal to understanding the nature of many Arab regimes and their decision-making processes, and there is no published history of modern Egyptian intelligence in either a European language or in Arabic, though Egypt has the largest and arguably most effective intelligence community in the Arab world. This book will fill a clear gap in the intelligence literature and will be of much interest to students of intelligence studies, Middle Eastern politics, international security and IR in general.
This book tracks post 9/11 developments in national security and policing intelligence and their relevance to new emerging areas of intelligence practice such as: corrections, biosecurity, private industry and regulatory environments. Developments are explored thematically across three broad sections:
Issues explored include: understanding intelligence models; the strategic management challenges of intelligence; intelligence capacity building; and the ethical dimensions of intelligence practice. Using case studies collected from wide-ranging interviews with leaders, managers and intelligence practitioners from a range of practice areas in Australia, Canada, New Zealand, the UK and US, the book indentifies examples of good practice across countries and agencies that may be relevant to other settings. Uniquely bringing together significant theoretical and practical developments in a sample of traditional and emerging areas of intelligence, this book provides readers with a more holistic and inter-disciplinary perspective on the evolving intelligence field across several different practice contexts. Intelligence and Intelligence Analysis will be relevant to a broad audience including intelligence practitioners and managers working across all fields of intelligence (national security, policing, private industry and emerging areas) as well as students taking courses in policing and intelligence analysis.
Gwen Terasaki's Bridge to the Sun, an idealized memoir of her marriage in the 1930s and 1940s to a Japanese diplomat, Terasaki Hidenari, is still widely read as an inspiring tale of a 'bridge' between two cultures that waged savage war against each other from 1941 to 1945. However, neither this memoir nor charges that Terasaki was a master spy and a double agent are the whole historical truth. In Terasaki Hidenari, Pearl Harbor, and Occupied Japan, Roger B. Jeans reassesses Terasaki Hidenari's story, using the FBI's voluminous dossier on Terasaki, decoded Japanese Foreign Ministry cables (MAGIC), and the papers of an isolationist, a pacifist, and an FBI agent and chief investigator at the Tokyo war crimes trial. Jeans reveals that far from being simply a saint or villain, Terasaki, despite his opposition to an American-Japanese war, served as a Foreign Ministry intelligence officer, propaganda chief, and liaison with American isolationists and pacifists in 1941, while using all means to protect Hirohito during the postwar occupation.
In the 1920s, many in the British establishment became convinced that their way of life was being threatened by the new Soviet state. The British government launched vast spying operations in response, carrying out surveillance on not only suspect Russians, but British aristocrats, Bloomsbury artists, ordinary workers and even MPs. What they discovered had profound ramifications for the whole of British society, dividing the nation and laying the foundations for the later Cold War. Drawing on a wealth of recently declassified archives, The Secret Twenties tells the story of the first Soviet spies and the double agents in their midst, all of it set against the sparkling backdrop of cocktail-era London.
This book examines how international intelligence cooperation has come to prominence post-9/11 and introduces the main accountability, legal and human rights challenges that it poses. Since the end of the Cold War, the threats that intelligence services are tasked with confronting have become increasingly transnational in nature -- organised crime, the proliferation of weapons of mass destruction and terrorism. The growth of these threats has impelled intelligence services to cooperate with contemporaries in other states to meet these challenges. While cooperation between certain Western states in some areas of intelligence operations (such as signals intelligence) is longstanding, since 9/11 there has been an exponential increase in both their scope and scale. This edited volume explores not only the challenges to accountability presented by international intelligence cooperation but also possible solutions for strengthening accountability for activities that are likely to remain fundamental to the work of intelligence services. The book will be of much interest to students of intelligence studies, security studies, international law, global governance and IR in general.
While most studies of the FBI focus on the long tenure of Director J. Edgar Hoover (1924-1972), The Dangers of Dissent shifts the ground to the recent past. The book examines FBI practices in the domestic security field through the prism of "political policing." The monitoring of dissent is exposed, as are the Bureau's controversial "counterintelligence" operations designed to disrupt political activity. This book reveals that attacks on civil liberties focus on a wide range of domestic critics on both the Left and the Right. This book traces the evolution of FBI spying from 1965 to the present through the eyes of those under investigation, as well as through numerous FBI documents, never used before in scholarly writing, that were recently declassified using the Freedom of Information Act or released during litigation (Greenberg v. FBI). Ivan Greenberg considers the diverse ways that government spying has crossed the line between legal intelligence-gathering to criminal action. While a number of studies focus on government policies under George W. Bush's "War on Terror," Greenberg is one of the few to situate the primary role of the FBI as it shaped and was reshaped by the historical context of the new American Surveillance Society.
A wide-ranging rethinking of the many factors that comprise the making of American Grand Strategy. What is grand strategy? What does it aim to achieve? And what differentiates it from normal strategic thought-what, in other words, makes it "grand"? In answering these questions, most scholars have focused on diplomacy and warfare, so much so that "grand strategy" has become almost an equivalent of "military history." The traditional attention paid to military affairs is understandable, but in today's world it leaves out much else that could be considered political, and therefore strategic. It is in fact possible to consider, and even reach, a more capacious understanding of grand strategy, one that still includes the battlefield and the negotiating table while expanding beyond them. Just as contemporary world politics is driven by a wide range of non-military issues, the most thorough considerations of grand strategy must consider the bases of peace and security-including gender, race, the environment, and a wide range of cultural, social, political, and economic issues. Rethinking American Grand Strategy assembles a roster of leading historians to examine America's place in the world. Its innovative chapters re-examine familiar figures, such as John Quincy Adams, George Kennan, and Henry Kissinger, while also revealing the forgotten episodes and hidden voices of American grand strategy. They expand the scope of diplomatic and military history by placing the grand strategies of public health, race, gender, humanitarianism, and the law alongside military and diplomatic affairs to reveal hidden strategists as well as strategies.
Leaving the chaos of postwar Germany for an uncertain future, 17-year-old Gerhardt Thamm arrived in America in 1948 with little more than his American birth certificate. With minimal command of English and little formal education, he enlisted in the Army and quickly found himself assigned to operations where his German language abilities were put to use. With the Soviet Union's emergence as a potential adversary, Thamm was recruited into the Army's clandestine services, where he operated as a secret agent in Germany, under multiple identities. This richly detailed personal narrative tells Thamm's incredible story and is supplemented by more than two dozen of the author's personal photographs and sketches.
This book analyzes how the Egyptian intelligence community has adapted to shifting national security threats since its inception 100 years ago. Starting in 1910, when the modern Egyptian intelligence system was created to deal with militant nationalists and Islamists, the book shows how the security services were subsequently reorganized, augmented and centralized to meet an increasingly sophisticated array of challenges, including fascism, communism, army unrest, Israel, France, the United Kingdom, conservative Arab states, the Muslim Brotherhood and others. The book argues that studying Egypt's intelligence community is integral to our understanding of that country's modern history, regime stability and human rights record. Intelligence studies have been described as the ?missing dimension? of international relations. It is clear that intelligence agencies are pivotal to understanding the nature of many Arab regimes and their decision-making processes, and there is no published history of modern Egyptian intelligence in either a European language or in Arabic, though Egypt has the largest and arguably most effective intelligence community in the Arab world. This book will fill a clear gap in the intelligence literature
and will be of much interest to students of intelligence studies,
Middle Eastern politics, international security and IR in
general.
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.
When Gail Harris was assigned by the U.S. Navy to a combat intelligence job in 1973, she became the first African American female to hold such a position. Her 28-year career included hands on leadership in the intelligence community during every major conflict from the Cold War to Desert Storm to Kosovo, and most recently at the forefront of one of the Department of Defense's newest challenges: Cyber Warfare. At her retirement, she was the highest ranking African American female in the Navy. A Woman's War: The Professional and Personal Journey of the Navy's First African American Female Intelligence Officer is an inspirational memoir that follows Gail Harris's career as a naval intelligence officer, sharing her unique experience and perspective as she completed the complex task of providing intelligence support to military operations while also battling the status quo, office bullies, and politics. This book also looks at the way intelligence is used and misused in these perilous times.
The A to Z of British Intelligence offers insight into the history and operations of British Intelligence through its more than 1,800 entries, covering a vast and varied cast of characters: the spies and their handlers, the moles and defectors, the political leaders, the top brass, the techniques and jargon, and the many different offices and organizations. Covered also are the agencies; leading individuals and prominent personalities; operations, including double agent and deception campaigns; and events, using the most up-to-date declassified material, but written in a style for the professional and general reader alike. This text features 16 black-and-white photographs, an extensive chronology, and a comprehensive bibliography.
This compendium of over 500 entries on the most important and relevant personalities, programs, activities, and agencies of U.S. intelligence, beginning with the Sons of Liberty before the onset of the Revolutionary War until the most recent reorganization of the U.S. intelligence community, covers the myriad pieces of legislation that have governed the activities of U.S. intelligence, from the National Security Act of 1947, which still constitutes the fundamental law setting up modern U.S. intelligence, to the Intelligence Reform and Terrorism Prevention Act of 2004, which established the new position of the Director of National Intelligence. Each entry is cross-referenced for easy navigation and provides a definition as well as a brief but complete historical evaluation of the subject. The A to Z of United States Intelligence traces more than two centuries of history in the chronology. The introduction explains just what intelligence is and does, showing how U.S. intelligence operations have evolved. Appendixes list Directors and Deputy Directors of Central Intelligence. The bibliography provides the most relevant and important sources for those interested in further reading. |
You may like...
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von
Paperback
R768
Discovery Miles 7 680
Ready To Fire - How India and I Survived…
Nambi Narayanan, Arun Ram
Hardcover
R1,064
Discovery Miles 10 640
A Research Agenda for Intelligence…
Robert Dover, Huw Dylan, …
Hardcover
R2,873
Discovery Miles 28 730
The President's Daily Brief Fifty Years…
Central Intelligence Agency
Hardcover
R718
Discovery Miles 7 180
Wicked Problems - The Ethics of Action…
Austin Choi-Fitzpatrick, Douglas Irvin-Erickson, …
Hardcover
R2,472
Discovery Miles 24 720
Personnel Management in Secret Service…
Barbara Czarniawska, Sabina Siebert, …
Hardcover
R2,178
Discovery Miles 21 780
|