![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
In scenes eerily parallel to the culture of fear inspired by our current War on Terror, A Need to Know explores the clandestine history of a CIA family defined, and ultimately destroyed, by their oath to keep toxic secrets during the Cold War. When Bud Goodallas father mysteriously died, his inheritance consisted of three well-worn books: a Holy Bible, The Great Gatsby, and a diary. But they turned his life upside down. From the diary Goodall learned that his father had been a CIA operative during the height of the Cold War, and the Bible and Gatsby had been his codebooks. Many unexplained facets of Budas childhood came into focus with this revelation.The high living in Rome and London. The blood-stained stiletto in his jewelry case. Bud, as a child, was always told he never had aa need to know.a Or did he? Now, as an adult and a university professor, Goodall attempts to fill in the missing pieces of his Cold War childhood by uncovering a lifetime of family secrets. Who were his parents? What did his father do on those business trips when he was aworking for the government?a What betrayal turned a heroic career of national service into a nightmare of alcoholism, depression, and premature death for both of his parents? Slowly, inexorably, Goodall unearths the chilling secrets of a CIA family in A Need to Know. 2006 Best Book Award, National Communication Association Ethnography Division
While most studies of the FBI focus on the long tenure of Director J. Edgar Hoover (1924-1972), The Dangers of Dissent shifts the ground to the recent past. The book examines FBI practices in the domestic security field through the prism of "political policing." The monitoring of dissent is exposed, as are the Bureau's controversial "counterintelligence" operations designed to disrupt political activity. This book reveals that attacks on civil liberties focus on a wide range of domestic critics on both the Left and the Right. This book traces the evolution of FBI spying from 1965 to the present through the eyes of those under investigation, as well as through numerous FBI documents, never used before in scholarly writing, that were recently declassified using the Freedom of Information Act or released during litigation (Greenberg v. FBI). Ivan Greenberg considers the diverse ways that government spying has crossed the line between legal intelligence-gathering to criminal action. While a number of studies focus on government policies under George W. Bush's "War on Terror," Greenberg is one of the few to situate the primary role of the FBI as it shaped and was reshaped by the historical context of the new American Surveillance Society.
MASK is the codename for one of the most sensitive, long-term sources ever run by any British intelligence organisation. It concealed the existence of a radio interception programme operated by the Government Code and Cipher School (GC&CS) which succeeded in monitoring, and reading, large quantities of encrypted wireless traffic exchanged between the headquarters of the Comintern in Moscow, and numerous Comintern representatives abroad, in countries as far apart as China, Austria and the United States. The content of these secret messages was of immense use to the very limited group of people who had access to it. Of greatest interest to MI5 and Stanley Baldwin's Cabinet was the material passing to and from the Communist Party of Great Britain (CPGB), which was monitored from a covert intercept station located on Denmark Hill, south London. Its principal target was the daily wireless traffic of a clandestine transmitter based in Wimbledon and operated by a member of the CPGB's underground cell, controlled by a Scot, Bob Stewart. the Secret Intelligence Service (SIS), and for years had supplied the Prime Minister and a handful of Cabinet ministers with summaries of decrypted foreign communications.
WALLFLOWERS is the codename given to one of the Security Service's
most treasured possessions, the daily journal dictated from August
1939 to June 1945 by MI5's Director of Counter-Espionage, Guy
Liddell, to his secretary, Margo Huggins. The document was
considered so highly classified that it was retained in the safe of
successive Directors-General, and special permission was required
to read it.
The intelligence failures exposed by the events of 9/11 and the missing weapons of mass destruction in Iraq have made one thing perfectly clear: change is needed in how the U.S. intelligence community operates. "Transforming U.S. Intelligence" argues that transforming intelligence requires as much a look to the future as to the past and a focus more on the art and practice of intelligence rather than on its bureaucratic arrangements. In fact, while the recent restructuring, including the creation of the Department of Homeland Security, may solve some problems, it has also created new ones. The authors of this volume agree that transforming policies and practices will be the most effective way to tackle future challenges facing the nation's security. This volume's contributors, who have served in intelligence agencies, the Departments of State or Defense, and the staffs of congressional oversight committees, bring their experience as insiders to bear in thoughtful and thought-provoking essays that address what such an overhaul of the system will require. In the first section, contributors discuss twenty-first-century security challenges and how the intelligence community can successfully defend U.S. national interests. The second section focuses on new technologies and modified policies that can increase the effectiveness of intelligence gathering and analysis. Finally, contributors consider management procedures that ensure the implementation of enhanced capabilities in practice. "Transforming U.S. Intelligence" supports the mandate of the new director of national intelligence by offering both careful analysis of existing strengths and weaknesses in U.S. intelligence and specific recommendations on how to fix its problems without harming its strengths. These recommendations, based on intimate knowledge of the way U.S. intelligence actually works, include suggestions for the creative mixing of technologies with new missions to bring about the transformation of U.S. intelligence without incurring unnecessary harm or expense. The goal is the creation of an intelligence community that can rapidly respond to developments in international politics, such as the emergence of nimble terrorist networks while reconciling national security requirements with the rights and liberties of American citizens.
"Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping"" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
"The history of Civil War espionage is usually mentioned only in passing in general accounts of the war. Lying under a cloud of romanticism, its details have had to be ferreted out in specialized sources. For his complete account of the subject, Markle draws upon just about all the available material and summarizes it with judgment, balance, clarity, and occasional wit. Among the subtopics are technology (photography for mapmaking and Confederate use of a forerunner of microfilm), the value of women spies (less subject to suspicion, they could move with greater freedom than male spies), and the roles of blacks as spies. A good case could be made that this volume is the single most valuable contribution to general Civil War literature so far this year. "--Booklist
WALLFLOWERS is the codename given to one of the Security Service's
most treasured possessions, the daily journal dictated from August
1939 to June 1945 by MI5's Director of Counter Espionage, Guy
Liddell, to his secretary, Margo Huggins. The document was
considered so highly classified that it was retained in the safe of
successive Directors-General, and special permission was required
to read it.
A wide-ranging rethinking of the many factors that comprise the making of American Grand Strategy. What is grand strategy? What does it aim to achieve? And what differentiates it from normal strategic thought-what, in other words, makes it "grand"? In answering these questions, most scholars have focused on diplomacy and warfare, so much so that "grand strategy" has become almost an equivalent of "military history." The traditional attention paid to military affairs is understandable, but in today's world it leaves out much else that could be considered political, and therefore strategic. It is in fact possible to consider, and even reach, a more capacious understanding of grand strategy, one that still includes the battlefield and the negotiating table while expanding beyond them. Just as contemporary world politics is driven by a wide range of non-military issues, the most thorough considerations of grand strategy must consider the bases of peace and security-including gender, race, the environment, and a wide range of cultural, social, political, and economic issues. Rethinking American Grand Strategy assembles a roster of leading historians to examine America's place in the world. Its innovative chapters re-examine familiar figures, such as John Quincy Adams, George Kennan, and Henry Kissinger, while also revealing the forgotten episodes and hidden voices of American grand strategy. They expand the scope of diplomatic and military history by placing the grand strategies of public health, race, gender, humanitarianism, and the law alongside military and diplomatic affairs to reveal hidden strategists as well as strategies.
THE INSTANT NEW YORK TIMES BESTSELLER. American Kompromat unravels the Russian-influenced operations that amassed the dirty little secrets of the richest and most powerful men on earth. American Kompromat is based on extended and exclusive interviews with high-level sources in the KGB, CIA, and FBI, as well as lawyers at white-shoe Washington firms, associates of Jeffrey Epstein, and thousands of pages of FBI reports, police investigations, and news articles in English, Russian, and Ukrainian. A narrative offering jaw-dropping context, and set in Upper East Side mansions and private Caribbean islands, gigantic yachts, and private jets, American Kompromat shows that, from Donald Trump to Jeffrey Epstein, Russian operations transformed the darkest secrets of the most powerful people in the world into potent weapons that served its interests. Among its many revelations, American Kompromat addresses what may be the single most important unanswered question of the entire Trump era - and one that Unger argues is even more important now that Trump is out of office: Was Donald Trump a Russian asset? Just how compromised was he? And how could such an audacious feat have been accomplished? To answer these questions and more, Craig Unger reports, is to understand kompromat - operations that amassed compromising information on the richest and most powerful men on earth, and that leveraged power by appealing to what is, for some, the most prized possession of all: their vanity. This is a story that transcends the end of the Trump administration, illuminating a major underreported aspect of Trump's corruption that has profoundly damaged American democracy.
Since 9/11, the needs of intelligence agencies as well as the missions they conduct have increased in number, size, and complexity. As such, government and private security agencies are recruiting staff to analyze the vast amount of data collected in these missions. This textbook offers a way of gaining the analytic skills essential to undertake intelligence work. It acquaints students and analysts with how intelligence fits into the larger research framework. It covers not only the essentials of applied research, but also the function, structure, and operational methods specifically involved in intelligence work. It looks at how analysts work with classified information in a security conscious environment as well as obtain data via covert methods. Students are left with little doubt about what intelligence is and how it is developed using scientific methods of inquiry. This revised edition of the popular text has been expanded and updated significantly.
This book examines the secret role of British and German Christians in the Cold War, both as non-governmental envoys and as members of covert intelligence operations. Based on archival sources, including those of the Stasi together with interviews with some of those involved, it demonstrates the way in which religion was used as a tool of psychological warfare. During the 1960s, the concept of Christian-Marxist dialogue was espoused by Church leaders and appropriated by politicians. In the GDR, Ulbricht used Christian-Marxist dialogue to quell opposition to his regime; in the West, politicians encouraged a policy of detente which led to the erosion of communist ideology. As the seeds of Ostpolitik were sown, Christians tunnelled their way beneath the ideological barriers of the Cold War in the name of reconciliation while secretly establishing subversive networks. At the same time, they provided political leaders with a hidden channel of communication across the Iron Curtain. This book examines the 1965 Coventry Cathedral project of reconciliation in Dresden, the work of Paul Oestricher, and the activities of the German Christian organisation Aktion Suhnezeichen. In doing so, it reveals the complexity of the Cold War world in which both sides appeared to hold out the hand of friendship while secretly working to eliminate the enemy.
Intelligence activities have always been an integral part of
statecraft, and the Romans could not have built and protected their
empire without them. In both the Republic and the Empire the Romans
realized that to keep their borders safe, to control their
population, to keep abreast of political developments abroad, and
for the internal security of their own regime, they needed a means
to collect the intelligence which enabled them to make informed
decisions. The Romans certainly did not have our technology nor did
they use our terminology. A search for the Roman equivalent of the
CIA is fruitless; there was no such thing. But this is not to say
that they did not collect intelligence. While no one department of
government was ever trusted with all of Rome's clandestine
activities, there were several organizations that shared the
responsibility of telling the emperor what he wanted to know. Onto
their vast system of roads was grafted an intelligence network
which carried information from all ends of the empire to the
emperor. The men responsible for monitoring that system became, in
effect, a Roman Secret Service.
In 1992 the massive files of East Germany's infamous Ministry for
State Security, the Stasi, were made publicly available and
thousands of former East Germans began to confront their contents.
Finally it was possible for ordinary citizens to ascertain who had
worked for the Stasi, either on a full-time basis or as an
"unofficial employee," the Stasi's term for an informer. The
revelations from these documents sparked feuds old and new among a
population already struggling through enormous social and political
upheaval. Drawing upon the Stasi files and upon interviews with
one-time informers, this book examines the impact of the Stasi
legacy in united Germany.
During the late 1940s the newly created CIA, in a loose alliance with anti-communist intellectuals and trade unionists, launched a massive, clandestine effort to win the Cold War allegiance of the European left. Drawing on numerous personal interviews and document collections on both sides of the Atlantic, this book examines in detail the origins of the CIA's covert campaign and assesses it's impact on the US's principal Cold War ally, Britain, focusing particularly on attempts to combat communist penetration of British trade unions, stimulate support within the Labour party for key American strategic aims, such as European union, and influence the politics of Bloomsbury literati. The results of this secret intervention were complex and far-reaching. CIA support for such ventures as the Congress for Cultural Freedom and its London-based magazine, Encounter, subtly transformed the political culture of the British left, making it more Atlanticist and less socialist. In other ways, however, the hidden hand of American intelligence failed to control its British assets, whose behaviour often frustrated their secretive patrons in Washington. For that matter, not even the CIA's agen
Until recent years, the Federal Bureau of Investigation enjoyed an
exalted reputation as America's premier crime-fighting
organization. However, it is now common knowledge that the FBI and
its long-time director, J. Edgar Hoover, were responsible for the
creation of a massive internal security apparatus that undermined
the very principles of freedom and democracy they were sworn to
protect. While no one was above suspicion, Hoover appears to have
held a special disdain for sociologists and placed many of the
profession's most prominent figures under surveillance. In
"Stalking Sociologists," Mike Forrest Keen offers a detailed
account of the FBI's investigations within the context of an
overview of the history of American sociology.
This volume investigates the connection between intelligence history, domestic policy, military history and foreign relations in a time of increasing bureaucratization of the modern state. The issues of globalization of foreign relations and the development of modern, electronic means of communication are also discussed.
This volume investigates the connection between intelligence history, domestic policy, military history and foreign relations in a time of increasing bureaucratization of the modern state. The issues of globalization of foreign relations and the development of modern, electronic means of communication are also discussed.
In the second half of 1991, the Soviet Union collapsed. It was an
event of major historic and global dimensions, yet this strategic
transformation of international relations took the entire world
totally by suprise - despite the fact that the West saw in the
Communist power an ideological foe and a major military
threat.
'Fascinating analysis' Nigel West; 'Grippingly told, authoritative' Mail on Sunday; 'Meticulously researched...a remarkably good read' John Brennan, former CIA Director; 'Excellent...a detailed, highly professional account' Sir John Scarlett, former MI6 Chief ​ The Special Relationship between America and Britain is feted by politicians on both sides of the Atlantic when it suits their purpose and just as frequently dismissed as a myth, not least by the media, which announces its supposed death on a regular basis. Yet the simple truth is that the two countries are bound together more closely than either is to any other ally. In The Real Special Relationship, Michael Smith reveals how it all began, when a top-secret visit by four American codebreakers to Bletchley Park in February 1941 - ten months before the US entered the Second World War - marked the start of a close collaboration between the two nations that endures to this day. Once the war was over, and the Cold War began, both sides recognised that the way they had worked together to decode German and Japanese ciphers could now be used to counter the Soviet threat. Despite occasional political conflict and public disputes between the two nations, such as during the Suez crisis, behind the scenes intelligence sharing continued uninterrupted, right up to the recent Russian invasion of Ukraine. Smith, the bestselling author of Station X and having himself served in British military intelligence, brings together a fascinating range of characters, from Winston Churchill and Ian Fleming to Kim Philby and Edward Snowden, who have helped shape the security of our two nations. Supported by in-depth interviews and an excellent range of personal contacts, he takes the reader into the mysterious workings of MI6, the CIA and all those who work to keep us safe. Â
The definitive and dramatic account of what became known as "Operation Vengeance" -- the targeted kill by U.S. fighter pilots of Japan's larger-than-life military icon, Admiral Isoroku Yamamoto, the naval genius who had devised the devastating attack on Pearl Harbor. "AIR RAID, PEARL HARBOR. THIS IS NO DRILL." At 7:58 a.m. on December 7, 1941, an officer at the Ford Island Command Center typed what would become one of the most famous radio dispatches in history, as the Japanese navy launched a surprise aerial assault on U.S. bases on Hawaii. In a little over two hours, more than 2,400 Americans were dead, propelling the U.S.'s entry into World War II. Dead Reckoning is the epic true story of the high-stakes operation undertaken sixteen months later to avenge that deadly strike - a longshot mission hatched hastily at the U.S. base on Guadalcanal. Expertly crafting this "hunt for Bin Laden"-style WWII story, New York Times bestselling author Dick Lehr recreates the tension-filled events leading up to the climactic clash in the South Pacific skies - frontline moments loaded with xenophobia, spycraft, sacrifice and broken hearts. Lehr goes behind the scenes at Station Hypo on Hawaii, where U.S. Navy code breakers first discovered exactly where and when to find Admiral Yamamoto, on April 18, 1943, and then chronicles in dramatic detail the nerve-wracking mission to kill him. He focuses on Army Air Force Major John W. Mitchell, the ace fighter pilot from the tiny hamlet of Enid, Mississippi who was tasked with conceiving a flight route, literally to the second, for the only U.S. fighter plane on Guadalcanal capable of reaching Yamamoto hundreds of miles away - the new twin-engine P-38 Lightning with its fabled "cone of fire." Given unprecedented access to Mitchell's personal papers and hundreds of private letters, Lehr reveals for the first time the full story of Mitchell's wartime exploits up to the face-off with Yamamoto, along with those of key American pilots Mitchell chose for the momentous mission: Rex Barber, Thomas Lanphier Jr., Besby Holmes, and Ray Hine. The spotlight also shines on their enemy target -Admiral Yamamoto, the enigmatic, charismatic commander in chief of Japan's Combined Fleet, whose complicated feelings about the U.S.-he studied at Harvard-add rich complexity. In this way Dead Reckoning offers at once a fast-paced recounting of a crucial turning point in the Pacific war and keenly drawn portraits of its two main protagonists: Isoroku Yamamoto, the architect of Pearl Harbor, and John Mitchell, the architect of the Yamamoto's demise. Dead Reckoning features black-and-white photos throughout.
The name of Vasily Mitrokhin burst into the public's consciousness in the autumn of 1999, with the publication of The Mitrokhin Archive and the exposure of a grandmother living in South London as a Soviet spy. The resultant enquiry conducted by the Parliamentary Intelligence and Security Committee paid tribute to the unique contribution which Mitrokhin had made to the public's understanding of how the former KGB had operated, and to Mitrokhin's commitment and bravery in accumulating and preparing his archive alone and in secret for 20 years before defecting to the United Kingdom in 1992.
This volume covers European intelligence in the first half of the 20th century. It reveals that the Imperial German Government had a remarkable source at the Russian Embassy in London prior to the outbreak of the World War I; describes in detail Swedish-German cryptanalytical co-operation during the Great War in intercepting and solving Russian diplomatic telegram traffic; adds an intriguing new twist to the murder of the Tsar and his family; provides an authoritative account of Swedish cryptanalytical success against German and Soviet traffic during the World War II; and includes an anecdote suggesting that Allied security surrounding Overlord may have in fact been breached, while at the same time offering a reason as to why this leak led nowhere.
This book is new in every aspect and not only because neither the official history nor an unofficial history of the KGB, and its many predecessors and successors, exists in any language. In this volume, the author deals with the origins of the KGB from the Tsarist Okhrana (the first Russians secret political police) to the OGPU, Joint State Political Directorate, one of the KGB predecessors between 1923 and 1934\. Based on documents from the Russian archives, the author clearly demonstrates that the Cheka and GPU/OPGU were initially created to defend the revolution and not for espionage. The Okhrana operated in both the Russian Empire and abroad against the revolutionaries and most of its operations, presented in this book, are little known. The same is the case with regards to the period after the Cheka was established in December 1917 until ten years later when Trotsky was expelled from the Communist Party and exiled, and Stalin rose to power. For the long period after the Revolution and up to the Second World War (and, indeed, beyond until the death of Stalin) the Cheka's main weapon was terror to create a general climate of fear in a population. In the book, the work of the Cheka and its successors against the enemies of the revolution is paralleled with British and American operations against the Soviets inside and outside of Russia. For the first time the creation of the Communist International (Comintern) is shown as an alternative Soviet espionage organization for wide-scale foreign propaganda and subversion operations based on the new revelations from the Soviet archives Here, the early Soviet intelligence operations in several countries are presented and analysed for the first time, as are raids on the Soviet missions abroad. The Bolshevik smuggling of the Russian imperial treasures is shown based on the latest available archival sources with misinterpretations and sometimes false interpretations in existing literature revised. After the Bolshevik revolution, Mansfield Smith-Cumming, the first chief of SIS, undertook to set up an entirely new Secret Service organization in Russia'. During those first ten years, events would develop as a non-stop struggle between British intelligence, within Russia and abroad, and the Cheka, later GPU/OGPU. Before several show spy trials' in 1927, British intelligence networks successfully operated in Russia later moving to the Baltic capitals, Finland and Sweden while young Soviet intelligence officers moved to London, Paris, Berlin and Constantinople. Many of those operations, from both sides, are presented in the book for the first time in this ground-breaking study of the dark world of the KGB.
The name of Vasily Mitrokhin burst into the public's consciousness in the autumn of 1999, with the publication of The Mitrokhin Archive and the exposure of a grandmother living in South London as a Soviet spy. The resultant enquiry conducted by the Parliamentary Intelligence and Security Committee paid tribute to the unique contribution which Mitrokhin had made to the public's understanding of how the former KGB had operated, and to Mitrokhin's commitment and bravery in accumulating and preparing his archive alone and in secret for 20 years before defecting to the United Kingdom in 1992. |
You may like...
Advances in Insect Control and…
A. Rami Horowitz, Isaac Ishaaya
Hardcover
R4,748
Discovery Miles 47 480
Telecommunications - Law, Regulation…
Walter Sapronov, Walter H. Read
Hardcover
R2,631
Discovery Miles 26 310
Design Thinking Research - Taking…
Hasso Plattner, Christoph Meinel, …
Hardcover
R5,367
Discovery Miles 53 670
Applied Operations Research and…
Andre B. Dorsman, Kazim Baris Atici, …
Hardcover
R3,812
Discovery Miles 38 120
|