![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
While much has been disclosed about the CIA's cloak-and-dagger activities during the Cold War, relatively little is known about the origins of this secret organization. David Rudgers, a twenty-two-year CIA veteran, has written the first complete account of its creation, revealing how the idea of a centralized intelligence developed within the government and debunking the myth that former OSS chief William J. Donovan was the prime mover behind the agency's founding. "Creating the Secret State" locates the CIA's origins in government-wide efforts to reorganize national security during the transition from World War II to the Cold War. Rudgers maintains that the creation of the CIA was not merely the brainchild of "Wild Bill" Donovan. Rather, it was the culmination of years of negotiation among numerous policy makers such as James Forrestal and Dean Acheson, each with strong opinions regarding the agency's mission and methods. He shows that Congress, the Departments of State and Justice, the Joint Chiefs, and even the Budget Bureau all had a hand in the establishment of this "secret state" that operates nearly invisibly outside the American political process. Based almost entirely on archival and other primary sources, Rudgers's book describes in detail how the CIA evolved from its original purpose-as a watchdog to guard against a "nuclear Pearl Harbor"-to the role of clandestine warriors countering Soviet subversion, eventually engaging in more forms of intelligence gathering and covert operations than any of its counterparts. It suggests how the agency became a different organization than it might have been without the Communist threat and also shows how it both overexaggerated the dangers of the Cold War and failed to predict its ending. Rudgers has written an accurate and balanced account that brings America's undercover army in from the cold and out from under the cult of personality. An indispensable resource for future studies of the CIA, Creating the Secret State tells the inside story of why and how the agency was called into existence as it stimulates thinking about the future relevance of the CIA in a rapidly changing world.
This collection of essays by leading experts seeks to explore what lessons for the exploitation and management of secret intelligence might be drawn from a variety of case studies ranging from the 1920s to the 'War on Terror'. Long regarded as the 'missing dimension' of international history and politics, public and academic interest in the role of secret intelligence has continued to grow in recent years, not least as a result of controversy surrounding the terrorist attacks on the United States on September 11 2001. Intelligence, Crises and Security addresses a range of themes including: crisis management, covert diplomacy, intelligence tradecraft, counterterrorism, intelligence 'overload', intelligence in relation to neutral states, deception, and signals intelligence. The work breaks new ground in relation to numerous key international episodes and events, not least as a result of fresh disclosures from government archives across the world. This book was previously published as a special issue of Intelligence and National Security and will be essential reading for students of intelligence, intelligence practitioners and general readers alike.
This collection of essays by leading experts seeks to explore what lessons for the exploitation and management of secret intelligence might be drawn from a variety of case studies ranging from the 1920s to the 'War on Terror'. Long regarded as the 'missing dimension' of international history and politics, public and academic interest in the role of secret intelligence has continued to grow in recent years, not least as a result of controversy surrounding the terrorist attacks on the United States on September 11 2001. Intelligence, Crises and Security addresses a range of themes including: crisis management, covert diplomacy, intelligence tradecraft, counterterrorism, intelligence 'overload', intelligence in relation to neutral states, deception, and signals intelligence. The work breaks new ground in relation to numerous key international episodes and events, not least as a result of fresh disclosures from government archives across the world. This book was previously published as a special issue of Intelligence and National Security.
Ever since the publication in 2004 of the 9/11 Commission Report, the U.S. intelligence community has been in the throes of a convulsive movement for reform. In Preventing Surprise Attacks (2005), Richard A. Posner carried the story of the reform movement up to the enactment of the Intelligence Reform and Terrorism Prevention Act of 2004, which produced a defective plan for reorganizing the intelligence system, partly as result of the failure of the 9/11 Commission and Congress to bring historical, comparative, and scholarly perspectives to bear issues. At that time, however, the new structure had not yet been built. Posner's new book brings the story up to date. He argues that the decisions about structure that the Administration has made in implementation of the Act are creating too top-heavy, too centralized, an intelligence system. The book * exposes fallacies in criticisms of the performance of the U.S. intelligence services; * analyzes structures and priorities for directing and coordinating U.S. intelligence in the era of global terrorism; * presents new evidence for the need to create a domestic intelligence agency separate from the FBI, and a detailed blueprint for such an agency; * incorporates a wealth of material based on developments since the first book, including the report of the presidential commission on weapons of mass destruction and the botched response to Hurricane Katrina; * exposes the inadequacy of the national security computer networks; * critically examines Congress's performance in the intelligence field, and raises constitutional issues concerning the respective powers of Congress and the President; * emphasizes the importance of reforms that do not require questionable organizational changes. The book is published in cooperation with the Hoover Institution
Historical Dictionary of Chinese Intelligence, Second Edition covers the history of Chinese Intelligence from 400 B.C. to modern times. The dictionary section has over 400 cross-referenced entries on the agencies and agents, the operations and equipment, the tradecraft and jargon, and many of the countries involved.
'Fascinating analysis' Nigel West; 'Grippingly told, authoritative' Mail on Sunday; 'Meticulously researched...a remarkably good read' John Brennan, former CIA Director; 'Excellent...a detailed, highly professional account' Sir John Scarlett, former MI6 Chief ​ The Special Relationship between America and Britain is feted by politicians on both sides of the Atlantic when it suits their purpose and just as frequently dismissed as a myth, not least by the media, which announces its supposed death on a regular basis. Yet the simple truth is that the two countries are bound together more closely than either is to any other ally. In The Real Special Relationship, Michael Smith reveals how it all began, when a top-secret visit by four American codebreakers to Bletchley Park in February 1941 - ten months before the US entered the Second World War - marked the start of a close collaboration between the two nations that endures to this day. Once the war was over, and the Cold War began, both sides recognised that the way they had worked together to decode German and Japanese ciphers could now be used to counter the Soviet threat. Despite occasional political conflict and public disputes between the two nations, such as during the Suez crisis, behind the scenes intelligence sharing continued uninterrupted, right up to the recent Russian invasion of Ukraine. Smith, the bestselling author of Station X and having himself served in British military intelligence, brings together a fascinating range of characters, from Winston Churchill and Ian Fleming to Kim Philby and Edward Snowden, who have helped shape the security of our two nations. Supported by in-depth interviews and an excellent range of personal contacts, he takes the reader into the mysterious workings of MI6, the CIA and all those who work to keep us safe. Â
While most studies of the FBI focus on the long tenure of Director J. Edgar Hoover (1924-1972), The Dangers of Dissent shifts the ground to the recent past. The book examines FBI practices in the domestic security field through the prism of "political policing." The monitoring of dissent is exposed, as are the Bureau's controversial "counterintelligence" operations designed to disrupt political activity. This book reveals that attacks on civil liberties focus on a wide range of domestic critics on both the Left and the Right. This book traces the evolution of FBI spying from 1965 to the present through the eyes of those under investigation, as well as through numerous FBI documents, never used before in scholarly writing, that were recently declassified using the Freedom of Information Act or released during litigation (Greenberg v. FBI). Ivan Greenberg considers the diverse ways that government spying has crossed the line between legal intelligence-gathering to criminal action. While a number of studies focus on government policies under George W. Bush's "War on Terror," Greenberg is one of the few to situate the primary role of the FBI as it shaped and was reshaped by the historical context of the new American Surveillance Society.
In scenes eerily parallel to the culture of fear inspired by our current War on Terror, A Need to Know explores the clandestine history of a CIA family defined, and ultimately destroyed, by their oath to keep toxic secrets during the Cold War. When Bud Goodallas father mysteriously died, his inheritance consisted of three well-worn books: a Holy Bible, The Great Gatsby, and a diary. But they turned his life upside down. From the diary Goodall learned that his father had been a CIA operative during the height of the Cold War, and the Bible and Gatsby had been his codebooks. Many unexplained facets of Budas childhood came into focus with this revelation.The high living in Rome and London. The blood-stained stiletto in his jewelry case. Bud, as a child, was always told he never had aa need to know.a Or did he? Now, as an adult and a university professor, Goodall attempts to fill in the missing pieces of his Cold War childhood by uncovering a lifetime of family secrets. Who were his parents? What did his father do on those business trips when he was aworking for the government?a What betrayal turned a heroic career of national service into a nightmare of alcoholism, depression, and premature death for both of his parents? Slowly, inexorably, Goodall unearths the chilling secrets of a CIA family in A Need to Know. 2006 Best Book Award, National Communication Association Ethnography Division
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.
The intelligence failures exposed by the events of 9/11 and the missing weapons of mass destruction in Iraq have made one thing perfectly clear: change is needed in how the U.S. intelligence community operates. "Transforming U.S. Intelligence" argues that transforming intelligence requires as much a look to the future as to the past and a focus more on the art and practice of intelligence rather than on its bureaucratic arrangements. In fact, while the recent restructuring, including the creation of the Department of Homeland Security, may solve some problems, it has also created new ones. The authors of this volume agree that transforming policies and practices will be the most effective way to tackle future challenges facing the nation's security. This volume's contributors, who have served in intelligence agencies, the Departments of State or Defense, and the staffs of congressional oversight committees, bring their experience as insiders to bear in thoughtful and thought-provoking essays that address what such an overhaul of the system will require. In the first section, contributors discuss twenty-first-century security challenges and how the intelligence community can successfully defend U.S. national interests. The second section focuses on new technologies and modified policies that can increase the effectiveness of intelligence gathering and analysis. Finally, contributors consider management procedures that ensure the implementation of enhanced capabilities in practice. "Transforming U.S. Intelligence" supports the mandate of the new director of national intelligence by offering both careful analysis of existing strengths and weaknesses in U.S. intelligence and specific recommendations on how to fix its problems without harming its strengths. These recommendations, based on intimate knowledge of the way U.S. intelligence actually works, include suggestions for the creative mixing of technologies with new missions to bring about the transformation of U.S. intelligence without incurring unnecessary harm or expense. The goal is the creation of an intelligence community that can rapidly respond to developments in international politics, such as the emergence of nimble terrorist networks while reconciling national security requirements with the rights and liberties of American citizens.
MASK is the codename for one of the most sensitive, long-term sources ever run by any British intelligence organisation. It concealed the existence of a radio interception programme operated by the Government Code and Cipher School (GC&CS) which succeeded in monitoring, and reading, large quantities of encrypted wireless traffic exchanged between the headquarters of the Comintern in Moscow, and numerous Comintern representatives abroad, in countries as far apart as China, Austria and the United States. The content of these secret messages was of immense use to the very limited group of people who had access to it. Of greatest interest to MI5 and Stanley Baldwin's Cabinet was the material passing to and from the Communist Party of Great Britain (CPGB), which was monitored from a covert intercept station located on Denmark Hill, south London. Its principal target was the daily wireless traffic of a clandestine transmitter based in Wimbledon and operated by a member of the CPGB's underground cell, controlled by a Scot, Bob Stewart. the Secret Intelligence Service (SIS), and for years had supplied the Prime Minister and a handful of Cabinet ministers with summaries of decrypted foreign communications.
"Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping"" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
WALLFLOWERS is the codename given to one of the Security Service's
most treasured possessions, the daily journal dictated from August
1939 to June 1945 by MI5's Director of Counter-Espionage, Guy
Liddell, to his secretary, Margo Huggins. The document was
considered so highly classified that it was retained in the safe of
successive Directors-General, and special permission was required
to read it.
Leonid Eitingon was a KGB killer who dedicated his life to the Soviet regime. He was in China in the early 1920s, in Spain during the Civil War, and, crucially, in Mexico when Trotsky was assassinated. 'As long as I live,' Stalin had said, 'not a hair of his head shall be touched.' It did not work out like that. Max Eitingon was a psychoanalyst: a colleague, friend and protégé of Freud's. He was rich, secretive and - through his friendship with a famous Russian singer - implicated in the abduction of a white Russian general in Paris in 1937. Motty Eitingon was a New York fur dealer whose connections with the Soviet Union made him the largest trader in the world. Imprisoned by the Bolsheviks, and questioned by the FBI in a state of Cold War paranoia: was Motty everybody's friend or everybody's enemy? Mary-Kay Wilmers began exploring the history of her remarkable family twenty years ago. The result is a book of astonishing scope and thrilling originality which throws light into some of the darkest corners of the last century.
This book examines the secret role of British and German Christians in the Cold War, both as non-governmental envoys and as members of covert intelligence operations. Based on archival sources, including those of the Stasi together with interviews with some of those involved, it demonstrates the way in which religion was used as a tool of psychological warfare. During the 1960s, the concept of Christian-Marxist dialogue was espoused by Church leaders and appropriated by politicians. In the GDR, Ulbricht used Christian-Marxist dialogue to quell opposition to his regime; in the West, politicians encouraged a policy of detente which led to the erosion of communist ideology. As the seeds of Ostpolitik were sown, Christians tunnelled their way beneath the ideological barriers of the Cold War in the name of reconciliation while secretly establishing subversive networks. At the same time, they provided political leaders with a hidden channel of communication across the Iron Curtain. This book examines the 1965 Coventry Cathedral project of reconciliation in Dresden, the work of Paul Oestricher, and the activities of the German Christian organisation Aktion Suhnezeichen. In doing so, it reveals the complexity of the Cold War world in which both sides appeared to hold out the hand of friendship while secretly working to eliminate the enemy.
WALLFLOWERS is the codename given to one of the Security Service's
most treasured possessions, the daily journal dictated from August
1939 to June 1945 by MI5's Director of Counter Espionage, Guy
Liddell, to his secretary, Margo Huggins. The document was
considered so highly classified that it was retained in the safe of
successive Directors-General, and special permission was required
to read it.
Intelligence activities have always been an integral part of
statecraft, and the Romans could not have built and protected their
empire without them. In both the Republic and the Empire the Romans
realized that to keep their borders safe, to control their
population, to keep abreast of political developments abroad, and
for the internal security of their own regime, they needed a means
to collect the intelligence which enabled them to make informed
decisions. The Romans certainly did not have our technology nor did
they use our terminology. A search for the Roman equivalent of the
CIA is fruitless; there was no such thing. But this is not to say
that they did not collect intelligence. While no one department of
government was ever trusted with all of Rome's clandestine
activities, there were several organizations that shared the
responsibility of telling the emperor what he wanted to know. Onto
their vast system of roads was grafted an intelligence network
which carried information from all ends of the empire to the
emperor. The men responsible for monitoring that system became, in
effect, a Roman Secret Service.
Since 9/11, the needs of intelligence agencies as well as the missions they conduct have increased in number, size, and complexity. As such, government and private security agencies are recruiting staff to analyze the vast amount of data collected in these missions. This textbook offers a way of gaining the analytic skills essential to undertake intelligence work. It acquaints students and analysts with how intelligence fits into the larger research framework. It covers not only the essentials of applied research, but also the function, structure, and operational methods specifically involved in intelligence work. It looks at how analysts work with classified information in a security conscious environment as well as obtain data via covert methods. Students are left with little doubt about what intelligence is and how it is developed using scientific methods of inquiry. This revised edition of the popular text has been expanded and updated significantly.
This book examines how key developments in international relations in recent years have affected intelligence agencies and their oversight. Since the turn of the millennium, intelligence agencies have been operating in a tense and rapidly changing security environment. This book addresses the impact of three factors on intelligence oversight: the growth of more complex terror threats, such as those caused by the rise of Islamic State; the colder East-West climate following Russia's intervention in Ukraine and annexation of Crimea; and new challenges relating to the large-scale intelligence collection and intrusive surveillance practices revealed by Edward Snowden. This volume evaluates the impact these factors have had on security and intelligence services in a range of countries, together with the challenges that they present for intelligence oversight bodies to adapt in response. With chapters surveying developments in Norway, Romania, the UK, Belgium, France, the USA, Canada and Germany, the coverage is varied, wide and up-to-date. This book will be of much interest to students of intelligence studies, security studies and International Relations.
This book describes and analyzes the history of the Mediterranean "Double-Cross System" of the Second World War, an intelligence operation run primarily by British officers which turned captured German spies into double agents. Through a complex system of coordination, they were utilized from 1941 to the end of the war in 1945 to secure Allied territory through security and counter-intelligence operations, and also to deceive the German military by passing false information about Allied military planning and operations. The primary questions addressed by the book are: how did the double-cross-system come into existence; what effects did it have on the intelligence war and the broader military conflict; and why did it have those effects? The book contains chapters assessing how the system came into being and how it was organized, and also chapters which analyze its performance in security and counter-intelligence operations, and in deception.
In 1992 the massive files of East Germany's infamous Ministry for
State Security, the Stasi, were made publicly available and
thousands of former East Germans began to confront their contents.
Finally it was possible for ordinary citizens to ascertain who had
worked for the Stasi, either on a full-time basis or as an
"unofficial employee," the Stasi's term for an informer. The
revelations from these documents sparked feuds old and new among a
population already struggling through enormous social and political
upheaval. Drawing upon the Stasi files and upon interviews with
one-time informers, this book examines the impact of the Stasi
legacy in united Germany.
Until recent years, the Federal Bureau of Investigation enjoyed an
exalted reputation as America's premier crime-fighting
organization. However, it is now common knowledge that the FBI and
its long-time director, J. Edgar Hoover, were responsible for the
creation of a massive internal security apparatus that undermined
the very principles of freedom and democracy they were sworn to
protect. While no one was above suspicion, Hoover appears to have
held a special disdain for sociologists and placed many of the
profession's most prominent figures under surveillance. In
"Stalking Sociologists," Mike Forrest Keen offers a detailed
account of the FBI's investigations within the context of an
overview of the history of American sociology.
During the late 1940s the newly created CIA, in a loose alliance with anti-communist intellectuals and trade unionists, launched a massive, clandestine effort to win the Cold War allegiance of the European left. Drawing on numerous personal interviews and document collections on both sides of the Atlantic, this book examines in detail the origins of the CIA's covert campaign and assesses it's impact on the US's principal Cold War ally, Britain, focusing particularly on attempts to combat communist penetration of British trade unions, stimulate support within the Labour party for key American strategic aims, such as European union, and influence the politics of Bloomsbury literati. The results of this secret intervention were complex and far-reaching. CIA support for such ventures as the Congress for Cultural Freedom and its London-based magazine, Encounter, subtly transformed the political culture of the British left, making it more Atlanticist and less socialist. In other ways, however, the hidden hand of American intelligence failed to control its British assets, whose behaviour often frustrated their secretive patrons in Washington. For that matter, not even the CIA's agen
This volume investigates the connection between intelligence history, domestic policy, military history and foreign relations in a time of increasing bureaucratization of the modern state. The issues of globalization of foreign relations and the development of modern, electronic means of communication are also discussed. |
You may like...
JMP Essentials - An Illustrated Guide…
Curt Hinrichs, Chuck Boiler, …
Hardcover
R2,063
Discovery Miles 20 630
The Publisher-Public Official - Real or…
Daniel Riffe, Don Sneed
Hardcover
Revolutionizing Business Practices…
Manisha Gupta, Deergha Sharma, …
Hardcover
R6,199
Discovery Miles 61 990
|