![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
In literature and film the spy chief is an all-knowing, all-powerful figure who masterfully moves spies into action like pieces on a chessboard. How close to reality is that depiction, and what does it really take to be an effective leader in the world of intelligence? This first volume of Spy Chiefs broadens and deepens our understanding of the role of intelligence leaders in foreign affairs and national security in the United States and United Kingdom from the early 1940s to the present. The figures profiled range from famous spy chiefs such as William Donovan, Richard Helms, and Stewart Menzies to little-known figures such as John Grombach, who ran an intelligence organization so secret that not even President Truman knew of it. The volume tries to answer six questions arising from the spy-chief profiles: how do intelligence leaders operate in different national, institutional, and historical contexts? What role have they played in the conduct of international relations and the making of national security policy? How much power do they possess? What qualities make an effective intelligence leader? How secretive and accountable to the public have they been? Finally, does popular culture (including the media) distort or improve our understanding of them? Many of those profiled in the book served at times of turbulent change, were faced with foreign penetrations of their intelligence service, and wrestled with matters of transparency, accountability to democratically elected overseers, and adherence to the rule of law. This book will appeal to both intelligence specialists and general readers with an interest in the intelligence history of the United States and United Kingdom.
An explosive expose of how British military intelligence really
works-from the inside. This book presents the stories of two
undercover agents: Brian Nelson, who worked for the Force Research
Unit (FRU), aiding loyalist terrorists and murderers in their
bloody work; and the man known as Stakeknife, deputy head of the
IRA's infamous "Nutting Squad," the internal security force that
tortured and killed suspected informers.
This book tells the story of the various Allied operations and schemes instigated to keep Spain and Portugal out of WWII, which included the widespread bribery of high ranking Spanish officials and the duplicity of Admiral Wilhelm Canaris, head of the Abwehr. Ian Fleming and Alan Hillgarth were the architects of Operation Golden Eye, the sabotage and disruption scheme that would be put in place had Germany invaded Spain. Fleming visited the Iberian Peninsula and Tangiers several times during the war, arguably his greatest achievement in WWII and the closest he came to being a real secret agent. It was these visits which supplied much of the background material for his fiction - Fleming even called his home on Jamaica where he created 007 'Goldeneye'. The book begins with Hitler's dilemma about which way to move, and his meeting with Francisco Franco at Hendaye in October 1940, a major turning point in the war when an alliance between Germany and Spain seemed possible. Simmons explores the British reaction to this, with Operation Tracer being created by Admiral Godfrey, head of Naval Intelligence. This was a plan to leave a listening and observation post buried in the Rock of Gibraltar should it have fallen to the Germans. A chapter is also devoted to Portugal - the SIS and SOE operations there and the vital Wolfram wars. Operation Golden Eye was eventually put on standby in 1943 as the risk of the Nazis occupying Spain was much reduced. Simmons consulted Foreign Office, SOE, CIA and OKW files when writing this book.
A wide-ranging rethinking of the many factors that comprise the making of American Grand Strategy. What is grand strategy? What does it aim to achieve? And what differentiates it from normal strategic thought-what, in other words, makes it "grand"? In answering these questions, most scholars have focused on diplomacy and warfare, so much so that "grand strategy" has become almost an equivalent of "military history." The traditional attention paid to military affairs is understandable, but in today's world it leaves out much else that could be considered political, and therefore strategic. It is in fact possible to consider, and even reach, a more capacious understanding of grand strategy, one that still includes the battlefield and the negotiating table while expanding beyond them. Just as contemporary world politics is driven by a wide range of non-military issues, the most thorough considerations of grand strategy must consider the bases of peace and security-including gender, race, the environment, and a wide range of cultural, social, political, and economic issues. Rethinking American Grand Strategy assembles a roster of leading historians to examine America's place in the world. Its innovative chapters re-examine familiar figures, such as John Quincy Adams, George Kennan, and Henry Kissinger, while also revealing the forgotten episodes and hidden voices of American grand strategy. They expand the scope of diplomatic and military history by placing the grand strategies of public health, race, gender, humanitarianism, and the law alongside military and diplomatic affairs to reveal hidden strategists as well as strategies.
This collection of essays by leading experts seeks to explore what lessons for the exploitation and management of secret intelligence might be drawn from a variety of case studies ranging from the 1920s to the 'War on Terror'. Long regarded as the 'missing dimension' of international history and politics, public and academic interest in the role of secret intelligence has continued to grow in recent years, not least as a result of controversy surrounding the terrorist attacks on the United States on September 11 2001. Intelligence, Crises and Security addresses a range of themes including: crisis management, covert diplomacy, intelligence tradecraft, counterterrorism, intelligence 'overload', intelligence in relation to neutral states, deception, and signals intelligence. The work breaks new ground in relation to numerous key international episodes and events, not least as a result of fresh disclosures from government archives across the world. This book was previously published as a special issue of Intelligence and National Security and will be essential reading for students of intelligence, intelligence practitioners and general readers alike.
In scenes eerily parallel to the culture of fear inspired by our current War on Terror, A Need to Know explores the clandestine history of a CIA family defined, and ultimately destroyed, by their oath to keep toxic secrets during the Cold War. When Bud Goodall's father mysteriously died, his inheritance consisted of three well-worn books: a Holy Bible, The Great Gatsby, and a diary. But they turned his life upside down. From the diary Goodall learned that his father had been a CIA operative during the height of the Cold War, and the Bible and Gatsby had been his codebooks. Many unexplained facets of Bud's childhood came into focus with this revelation.The high living in Rome and London. The blood-stained stiletto in his jewelry case. Bud, as a child, was always told he never had "a need to know." Or did he? Now, as an adult and a university professor, Goodall attempts to fill in the missing pieces of his Cold War childhood by uncovering a lifetime of family secrets. Who were his parents? What did his father do on those business trips when he was "working for the government?" What betrayal turned a heroic career of national service into a nightmare of alcoholism, depression, and premature death for both of his parents? Slowly, inexorably, Goodall unearths the chilling secrets of a CIA family in A Need to Know. 2006 Best Book Award, National Communication Association Ethnography Division
This book describes and analyzes the history of the Mediterranean "Double-Cross System" of the Second World War, an intelligence operation run primarily by British officers which turned captured German spies into double agents. Through a complex system of coordination, they were utilized from 1941 to the end of the war in 1945 to secure Allied territory through security and counter-intelligence operations, and also to deceive the German military by passing false information about Allied military planning and operations. The primary questions addressed by the book are: how did the double-cross-system come into existence; what effects did it have on the intelligence war and the broader military conflict; and why did it have those effects? The book contains chapters assessing how the system came into being and how it was organized, and also chapters which analyze its performance in security and counter-intelligence operations, and in deception.
Spies, secret messages, and military intelligence have fascinated readers for centuries but never more than today, when terrorists threaten America and society depends so heavily on communications. Much of what was known about communications intelligence came first from David Kahn's pathbreaking book, The Codebreakers. Kahn, considered the dean of intelligence historians, is also the author of Hitler's Spies: German Military Intelligence in World War II and Seizing the Enigma: The Race to Break the German U-Boat Codes, 1939-1943, among other books and articles. Kahn's latest book, How I Discovered World War II's Greatest Spy and Other Stories of Intelligence and Code, provides insights into the dark realm of intelligence and code that will fascinate cryptologists, intelligence personnel, and the millions interested in military history, espionage, and global affairs. It opens with Kahn telling how he discovered the identity of the man who sold key information about Germany's Enigma machine during World War II that enabled Polish and then British codebreakers to read secret messages. Next Kahn addresses the question often asked about Pearl Harbor: since we were breaking Japan's codes, did President Roosevelt know that Japan was going to attack and let it happen to bring a reluctant nation into the war? Kahn looks into why Nazi Germany's totalitarian intelligence was so poor, offers a theory of intelligence, explicates what Clausewitz said about intelligence, tells-on the basis of an interview with a head of Soviet codebreaking-something about Soviet Comint in the Cold War, and reveals how the Allies suppressed the second greatest secret of WWII. Providing an inside look into the efforts to gather and exploit intelligence during the past century, this book presents powerful ideas that can help guide present and future intelligence efforts. Though stories of WWII spying and codebreaking may seem worlds apart from social media security, computer viruses, and Internet surveillance, this book offers timeless lessons that may help today's leaders avoid making the same mistakes that have helped bring at least one global power to its knees. The book includes a Foreword written by Bruce Schneier.
This collection of essays by leading experts seeks to explore what lessons for the exploitation and management of secret intelligence might be drawn from a variety of case studies ranging from the 1920s to the 'War on Terror'. Long regarded as the 'missing dimension' of international history and politics, public and academic interest in the role of secret intelligence has continued to grow in recent years, not least as a result of controversy surrounding the terrorist attacks on the United States on September 11 2001. Intelligence, Crises and Security addresses a range of themes including: crisis management, covert diplomacy, intelligence tradecraft, counterterrorism, intelligence 'overload', intelligence in relation to neutral states, deception, and signals intelligence. The work breaks new ground in relation to numerous key international episodes and events, not least as a result of fresh disclosures from government archives across the world. This book was previously published as a special issue of Intelligence and National Security.
Letty Davenport, the brilliant and tenacious adopted daughter of Lucas Davenport, takes the investigative reins in the newest thriller from #1 bestselling author John Sandford.By twenty-four, Letty Davenport has seen more action than most law enforcement professionals. Working a desk job for US Senator Christopher Colles, she's bored and ready to quit. But when her skills catch Colles' attention, she is offered a lifeline: real investigative work. Texas oil companies are reporting thefts of crude. Rumour has it that a sinister militia is involved. Who is selling the oil? And what are they doing with the profits? Letty is partnered with a Department of Homeland Security investigator, John Kaiser. When the case turns deadly, they know they're onto something big. The militia has an explosive plan... and the clock is ticking down. From the bestselling and unputdownable author of the Prey series, The Investigator is perfect for fans of James Patterson and Lee Child.
Professor Sheldon uses the modern concept of the intelligence cycle to trace intelligence activities in Rome whether they were done by private citizens, the government, or the military. Examining a broad range of activities the book looks at the many types of espionage tradecraft that have left their traces in the ancient sources: * intelligence and counterintelligence gathering * covert action * clandestine operations * the use of codes and ciphers Dispelling the myth that such activities are a modern invention, Professor Sheldon explores how these ancient spy stories have modern echoes as well. What is the role of an intelligence service in a free republic? When do the security needs of the state outweigh the rights of the citizen? If we cannot trust our own security services, how safe can we be? Although protected by the Praetorian Guard, seventy-five percent of Roman emperors died by assassination or under attack by pretenders to his throne. Who was guarding the guardians? For students of Rome, and modern social studies too - this will provide a fascinating read.
This is the first work to engage with intelligence studies through the lens of queer theory. Adding to the literature in critical intelligence studies and critical international relations theory, this work considers the ways in which both the spy, and the activities of espionage can be viewed as queer. Part One argues that the spy plays a role which represents a third path between the hard power of the military and the soft power of diplomacy. Part Two shows how the intelligence community plays a key role in enabling leaders of democracies to conduct covert activities running counter to that mission and ideology, in this way allowing a leader to have two foreign policies-an overt, public policy and a second, closeted, queer foreign policy.
After the September 11 attacks, the 9/11 Commission argued that the United States needed a powerful leader, a "spymaster," to forge the scattered intelligence bureaucracies into a singular enterprise to vanquish America's new enemies: stateless international terrorists. During the 2004 presidential election, Congress and the president remade the post-World War II national security infrastructure in less than five months, creating the Office of the Director of National Intelligence (DNI) and the National Counterterrorism Center (NCTC). Blinking Red illuminates the complicated history of the bureaucratic efforts to reform America's national security after the intelligence failures of 9/11 and Iraq's missing weapons of mass destruction, explaining how the National Security Council (NSC) and Congress shaped the U.S. response to the 9/11 attacks. Michael Allen asserts that the process of creating the DNI position and the NCTC is a case study in power politics and institutional reform. By bringing to light the legislative transactions and political wrangling during the reform of the intelligence community, Allen helps us understand why the effectiveness of these institutional changes is still in question.
Ever since the publication in 2004 of the 9/11 Commission Report, the U.S. intelligence community has been in the throes of a convulsive movement for reform. In Preventing Surprise Attacks (2005), Richard A. Posner carried the story of the reform movement up to the enactment of the Intelligence Reform and Terrorism Prevention Act of 2004, which produced a defective plan for reorganizing the intelligence system, partly as result of the failure of the 9/11 Commission and Congress to bring historical, comparative, and scholarly perspectives to bear issues. At that time, however, the new structure had not yet been built. Posner's new book brings the story up to date. He argues that the decisions about structure that the Administration has made in implementation of the Act are creating too top-heavy, too centralized, an intelligence system. The book * exposes fallacies in criticisms of the performance of the U.S. intelligence services; * analyzes structures and priorities for directing and coordinating U.S. intelligence in the era of global terrorism; * presents new evidence for the need to create a domestic intelligence agency separate from the FBI, and a detailed blueprint for such an agency; * incorporates a wealth of material based on developments since the first book, including the report of the presidential commission on weapons of mass destruction and the botched response to Hurricane Katrina; * exposes the inadequacy of the national security computer networks; * critically examines Congress's performance in the intelligence field, and raises constitutional issues concerning the respective powers of Congress and the President; * emphasizes the importance of reforms that do not require questionable organizational changes. The book is published in cooperation with the Hoover Institution
This book examines how key developments in international relations in recent years have affected intelligence agencies and their oversight. Since the turn of the millennium, intelligence agencies have been operating in a tense and rapidly changing security environment. This book addresses the impact of three factors on intelligence oversight: the growth of more complex terror threats, such as those caused by the rise of Islamic State; the colder East-West climate following Russia's intervention in Ukraine and annexation of Crimea; and new challenges relating to the large-scale intelligence collection and intrusive surveillance practices revealed by Edward Snowden. This volume evaluates the impact these factors have had on security and intelligence services in a range of countries, together with the challenges that they present for intelligence oversight bodies to adapt in response. With chapters surveying developments in Norway, Romania, the UK, Belgium, France, the USA, Canada and Germany, the coverage is varied, wide and up-to-date. This book will be of much interest to students of intelligence studies, security studies and International Relations.
In scenes eerily parallel to the culture of fear inspired by our current War on Terror, A Need to Know explores the clandestine history of a CIA family defined, and ultimately destroyed, by their oath to keep toxic secrets during the Cold War. When Bud Goodallas father mysteriously died, his inheritance consisted of three well-worn books: a Holy Bible, The Great Gatsby, and a diary. But they turned his life upside down. From the diary Goodall learned that his father had been a CIA operative during the height of the Cold War, and the Bible and Gatsby had been his codebooks. Many unexplained facets of Budas childhood came into focus with this revelation.The high living in Rome and London. The blood-stained stiletto in his jewelry case. Bud, as a child, was always told he never had aa need to know.a Or did he? Now, as an adult and a university professor, Goodall attempts to fill in the missing pieces of his Cold War childhood by uncovering a lifetime of family secrets. Who were his parents? What did his father do on those business trips when he was aworking for the government?a What betrayal turned a heroic career of national service into a nightmare of alcoholism, depression, and premature death for both of his parents? Slowly, inexorably, Goodall unearths the chilling secrets of a CIA family in A Need to Know. 2006 Best Book Award, National Communication Association Ethnography Division
While most studies of the FBI focus on the long tenure of Director J. Edgar Hoover (1924-1972), The Dangers of Dissent shifts the ground to the recent past. The book examines FBI practices in the domestic security field through the prism of "political policing." The monitoring of dissent is exposed, as are the Bureau's controversial "counterintelligence" operations designed to disrupt political activity. This book reveals that attacks on civil liberties focus on a wide range of domestic critics on both the Left and the Right. This book traces the evolution of FBI spying from 1965 to the present through the eyes of those under investigation, as well as through numerous FBI documents, never used before in scholarly writing, that were recently declassified using the Freedom of Information Act or released during litigation (Greenberg v. FBI). Ivan Greenberg considers the diverse ways that government spying has crossed the line between legal intelligence-gathering to criminal action. While a number of studies focus on government policies under George W. Bush's "War on Terror," Greenberg is one of the few to situate the primary role of the FBI as it shaped and was reshaped by the historical context of the new American Surveillance Society.
Repeated intelligence failures in Iraq, Libya and across the Middle East and North Africa have left many critics searching for a smoking gun. Amidst questions of who misread - or manipulated - the intel, a fundamental truth goes unaddressed: western intelligence is not designed to understand the world. In fact, it cannot. In The Covert Colour Line, Oliver Kearns shows how the catastrophic mistakes made by British and US intelligence services since 9/11 are underpinned by orientalist worldviews and racist assumptions forged in the crucible of Cold War-era colonial retreat. Understanding this historical context is vital to explaining why anglophone state intelligence is unable to grasp the motives and international solidarities of 'adversaries'. Offering a new way of seeing how intelligence contributes to world inequalities, and drawing on a wealth of recently declassified materials, Kearns argues that intelligence agencies’ imagination of 'non-Western' states and geopolitics fundamentally shaped British intelligence assessments which would underpin the 2003 invasion of Iraq and subsequent interventions.
MASK is the codename for one of the most sensitive, long-term sources ever run by any British intelligence organisation. It concealed the existence of a radio interception programme operated by the Government Code and Cipher School (GC&CS) which succeeded in monitoring, and reading, large quantities of encrypted wireless traffic exchanged between the headquarters of the Comintern in Moscow, and numerous Comintern representatives abroad, in countries as far apart as China, Austria and the United States. The content of these secret messages was of immense use to the very limited group of people who had access to it. Of greatest interest to MI5 and Stanley Baldwin's Cabinet was the material passing to and from the Communist Party of Great Britain (CPGB), which was monitored from a covert intercept station located on Denmark Hill, south London. Its principal target was the daily wireless traffic of a clandestine transmitter based in Wimbledon and operated by a member of the CPGB's underground cell, controlled by a Scot, Bob Stewart. the Secret Intelligence Service (SIS), and for years had supplied the Prime Minister and a handful of Cabinet ministers with summaries of decrypted foreign communications.
WALLFLOWERS is the codename given to one of the Security Service's
most treasured possessions, the daily journal dictated from August
1939 to June 1945 by MI5's Director of Counter-Espionage, Guy
Liddell, to his secretary, Margo Huggins. The document was
considered so highly classified that it was retained in the safe of
successive Directors-General, and special permission was required
to read it.
WALLFLOWERS is the codename given to one of the Security Service's
most treasured possessions, the daily journal dictated from August
1939 to June 1945 by MI5's Director of Counter Espionage, Guy
Liddell, to his secretary, Margo Huggins. The document was
considered so highly classified that it was retained in the safe of
successive Directors-General, and special permission was required
to read it.
Intelligence activities have always been an integral part of
statecraft, and the Romans could not have built and protected their
empire without them. In both the Republic and the Empire the Romans
realized that to keep their borders safe, to control their
population, to keep abreast of political developments abroad, and
for the internal security of their own regime, they needed a means
to collect the intelligence which enabled them to make informed
decisions. The Romans certainly did not have our technology nor did
they use our terminology. A search for the Roman equivalent of the
CIA is fruitless; there was no such thing. But this is not to say
that they did not collect intelligence. While no one department of
government was ever trusted with all of Rome's clandestine
activities, there were several organizations that shared the
responsibility of telling the emperor what he wanted to know. Onto
their vast system of roads was grafted an intelligence network
which carried information from all ends of the empire to the
emperor. The men responsible for monitoring that system became, in
effect, a Roman Secret Service.
Since 9/11, the needs of intelligence agencies as well as the missions they conduct have increased in number, size, and complexity. As such, government and private security agencies are recruiting staff to analyze the vast amount of data collected in these missions. This textbook offers a way of gaining the analytic skills essential to undertake intelligence work. It acquaints students and analysts with how intelligence fits into the larger research framework. It covers not only the essentials of applied research, but also the function, structure, and operational methods specifically involved in intelligence work. It looks at how analysts work with classified information in a security conscious environment as well as obtain data via covert methods. Students are left with little doubt about what intelligence is and how it is developed using scientific methods of inquiry. This revised edition of the popular text has been expanded and updated significantly.
The ethics of changemaking and peacebuilding may appear straightforward: advance dignity, promote well-being, minimize suffering. Sounds simple, right? Actually acting ethically when it really matters is rarely straightforward. If someone engaged in change-oriented work sets out to "do good," how should we prioritize and evaluate whose good counts? And, how ought we act once we have decided whose good counts? Practitioners frequently confront dilemmas where dire situations may demand some form of response, but each of the options may have undesirable consequences of one form or another. Dilemmas are not merely ordinary problems, they are wicked problems: that is to say, they are defined by circumstances that only allow for suboptimal outcomes and are based on profound and sometimes troubling trade-offs. Wicked Problems argues that the field of peacebuilding and conflict transformation needs a stronger and more practical sense of its ethical obligations. For example, it argues against posing false binaries between domestic and international issues and against viewing violence and conflict as equivalents. It holds strategic nonviolence up to critical scrutiny and shows that "do no harm" approaches may in fact do harm. The contributors include scholars, scholar practitioners in the field, and activists on the streets, and the chapters cover the role of violence in conflict; conflict and violence prevention and resolution; humanitarianism; community organizing and racial justice; social movements; human rights advocacy; transitional justice; political reconciliation; and peace education and pedagogy, among other topics. Drawing on the lived experiences and expertise of activists, educators, and researchers, Wicked Problems equips readers to ask-and answer-difficult questions about social change work.
In 1992 the massive files of East Germany's infamous Ministry for
State Security, the Stasi, were made publicly available and
thousands of former East Germans began to confront their contents.
Finally it was possible for ordinary citizens to ascertain who had
worked for the Stasi, either on a full-time basis or as an
"unofficial employee," the Stasi's term for an informer. The
revelations from these documents sparked feuds old and new among a
population already struggling through enormous social and political
upheaval. Drawing upon the Stasi files and upon interviews with
one-time informers, this book examines the impact of the Stasi
legacy in united Germany. |
![]() ![]() You may like...
Handbook of Perioperative and Procedural…
Juan A. Sanchez, Robert S.D. Higgins, …
Paperback
Crafting the Feedback Teachers Need and…
Thomas M. Van Soelen
Hardcover
R2,826
Discovery Miles 28 260
Understanding the World Language edTPA…
Susan A. Hildebrandt, Pete Swanson
Paperback
R2,751
Discovery Miles 27 510
Practical Evaluation for Educators…
Roger Kaufman, Ingrid J. Guerra-Lopez, …
Hardcover
R2,448
Discovery Miles 24 480
Formative Assessment Leadership…
Karen L. Sanzo, Steve Myran, …
Hardcover
R3,567
Discovery Miles 35 670
Comorbidity - Symptoms, Conditions…
Rhonda Brown, Einar Thorsteinsson
Hardcover
R2,884
Discovery Miles 28 840
Promoting Reflective Thinking in…
Germaine L. Taggart, Alfred P. Wilson
Hardcover
R2,461
Discovery Miles 24 610
|