Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
This compendium of over 500 entries on the most important and relevant personalities, programs, activities, and agencies of U.S. intelligence, beginning with the Sons of Liberty before the onset of the Revolutionary War until the most recent reorganization of the U.S. intelligence community, covers the myriad pieces of legislation that have governed the activities of U.S. intelligence, from the National Security Act of 1947, which still constitutes the fundamental law setting up modern U.S. intelligence, to the Intelligence Reform and Terrorism Prevention Act of 2004, which established the new position of the Director of National Intelligence. Each entry is cross-referenced for easy navigation and provides a definition as well as a brief but complete historical evaluation of the subject. The A to Z of United States Intelligence traces more than two centuries of history in the chronology. The introduction explains just what intelligence is and does, showing how U.S. intelligence operations have evolved. Appendixes list Directors and Deputy Directors of Central Intelligence. The bibliography provides the most relevant and important sources for those interested in further reading.
This is the first volume of Nigel West's acclaimed presentation of these fascinating diaries from the heart of Britain's Second World War intelligence operations. 'No intelligence buff can be without this volume and anyone interested in British twentieth century history needs it too.' M.R.D. Foot, The Spectator 'Regarded by historians as the most important military intelligence documents from the whole of the Second World War.' Irish Independent ' A] unique insight into the espionage secrets of the Second World War. Its historical importance is enhanced by the editing of Nigel West who, apart from decoding several obscure references to the secret war, persuaded the Security Service to break their rule of maintaining an agent's anonymity.' BBC History Magazine WALLFLOWERS is the codename given to one of the Security
Service's most treasured possessions, the daily journal dictated
from August 1939 to June 1945 by MI5's Director of Counter
Espionage, Guy Liddell, to his secretary, Margo Huggins. The
document was considered so highly classified that it was retained
in the safe of successive Directors General, and special permission
was required to read it.
WALLFLOWERS is the codename given to one of the Security Service s most treasured possessions, the daily journal dictated from August 1939 to June 1945 by MI5 s Director of Counter-Espionage, Guy Liddell, to his secretary, Margo Huggins. The document was considered so highly classified that it was retained in the safe of successive Directors-General, and special permission was required to read it. Liddell was one of three brothers who all won the Military Cross during the First World War and subsequently joined MI5. He initially first served in the Metropolitan Police Special Branch at Scotland Yard, dealing primarily with cases of Soviet espionage, until he was transferred to MI5 in 1931. His social connections proved important because in 1940 he employed Anthony Blunt as his personal assistant and became a close friend of both Guy Burgess and Victor Rothschild, and was acquainted with Kim Philby. Despite these links, when Liddell retired from the Security Service in 1952 he was appointed security adviser to the Atomic Energy Commission, an extremely sensitive post following the conviction of the physicist Klaus Fuchs two years earlier. No other member of the Security Service is known to have maintained a diary and the twelve volumes of this journal represents a unique record of the events and personalities of the period, a veritable tour d horizon of the entire subject. As Director, B Division, Liddell supervised all the major pre-war and wartime espionage investigations, maintained a watch on suspected pro-Nazis and laid the foundations of the famous double cross system of enemy double agents. He was unquestionably one of the most reclusive and remarkable men of his generation, and a legend within his own organisation.
In a surprising number of espionage cases sex has played a significant role often only in the background possibly as a reason why a particular individual has lived beyond his means and is in desperate need of cash. FBI agent Earl Pitts sold secrets to the Soviets to ease his financial burdens, which came from his habitually heavy use of male and female prostitutes. Yuri Nosenko collaborated with the CIA after having misappropriated KGB funds to entertain expensive women while on official duties in Geneva, and Aleksandr Ogorodnik of the Soviet foreign ministry was persuaded to become a spy by his pregnant Spanish lover, an agent recruited by the CIA. In the realm of human behavior, sex can be the catalyst for risky or reckless conduct. The A to Z of Sexspionage explores this behavior through a chronology, an introduction, a bibliography, and hundreds of cross-referenced dictionary entries on the secret agencies, operations, and events. From Delilah's seduction of Samson in 1161 BC to State Department official Donald Keyser's conviction of passing secrets to Isabelle Cheng, a Taiwanese intelligence officer, in 2007, Nigel West recounts the history of sexspionage."
Given the rivalries and suspicions prevailing in the Middle East, it is not surprising that most of these states are very concerned about espionage and infiltration. With the additional threat of terrorism, nuclear weapons, a large U.S. military presence, and the Arab-Israeli conflict, the result is an impressively busy intelligence industry, proportionately larger and more extensive than in most other regions. The A to Z of Middle East Intelligence addresses intelligence issues in the region from ancient history and the Middle Ages through modern times, covering the decline of the Ottoman Empire, intelligence activity in the Middle East during and between the two world wars, and the interplay between colonial and local intelligence and counterintelligence agencies of the period. It also presents the relatively new fundamentalist terrorist organizations that have had a significant impact on international relations and on the structure and deployment of intelligence, counterintelligence, and other security organs in the Middle East today. With a chronology, an introductory essay, and over 300 cross-referenced dictionary entries on important events and key organizations involved in all aspects of intelligence gathering and analysis, as well as the biographies of key players, this is an important reference on the current situation in the Middle East.
This book shows how specific historical events and societal forces within Nigeria transcend the choices its political leaders have made to influence the course of the state's political development. Kalu N. Kalu describes a variety of factors that have contributed to the challenges facing state-building and political institutions in Nigeria. Chief among them are the nature of interest aggregation, the dynamics of conflict, and the patterns of state intervention in matters dealing with secularism, distributive politics, economy, security, and autonomy. Kalu succeeds in constructing a more organic concept of political development in Nigeria by creating a model based on rentier politics that captures the critical relationship between state power and economy. By doing so, he goes beyond current scholarship about Nigeria and demonstrates the need for a restructuring of its institutions, offering insight into an enduring narrative that continues to shape Nigerian politics.
Gwen Terasaki's Bridge to the Sun, an idealized memoir of her marriage in the 1930s and 1940s to a Japanese diplomat, Terasaki Hidenari, is still widely read as an inspiring tale of a "bridge" between two cultures that waged savage war against each other from 1941 to 1945. However, neither this memoir nor charges that Terasaki was a master spy and a double agent are the whole historical truth. In Terasaki Hidenari, Pearl Harbor, and Occupied Japan, Roger B. Jeans reassesses Terasaki Hidenari's story, using the FBI's voluminous dossier on Terasaki, decoded Japanese Foreign Ministry cables (MAGIC), and the papers of an isolationist, a pacifist, and an FBI agent and chief investigator at the Tokyo war crimes trial. Jeans reveals that far from being simply a saint or villain, Terasaki, despite his opposition to an American-Japanese war, served as a Foreign Ministry intelligence officer, propaganda chief, and liaison with American isolationists and pacifists in 1941, while using all means to protect Hirohito during the postwar occupation.
A biography of William Wickham (1761-1840), Britain's master spy on the Continent for more than five years during the French Revolutionary wars. It follows Wickham's career to narrate the rise and fall of his secret service community.
A frank and refreshing evaluation of several Chief Executives, their Directors of Central Intelligence, and even some lover in the hierarchy, Executive Secrets shines light on the development and execution of foreign policy through the understanding of the tools available, of which covert action may be least known and understood. This book is a great tool for the press, the public, and many political appointees in the National Security System. A History Book Club Selection with a foreword by Mark Bowden, author of Black Hawk Down.
This book examines how key developments in international relations in recent years have affected intelligence agencies and their oversight. Since the turn of the millennium, intelligence agencies have been operating in a tense and rapidly changing security environment. This book addresses the impact of three factors on intelligence oversight: the growth of more complex terror threats, such as those caused by the rise of Islamic State; the colder East-West climate following Russia's intervention in Ukraine and annexation of Crimea; and new challenges relating to the large-scale intelligence collection and intrusive surveillance practices revealed by Edward Snowden. This volume evaluates the impact these factors have had on security and intelligence services in a range of countries, together with the challenges that they present for intelligence oversight bodies to adapt in response. With chapters surveying developments in Norway, Romania, the UK, Belgium, France, the USA, Canada and Germany, the coverage is varied, wide and up-to-date. This book will be of much interest to students of intelligence studies, security studies and International Relations.
This is the first work to engage with intelligence studies through the lens of queer theory. Adding to the literature in critical intelligence studies and critical international relations theory, this work considers the ways in which both the spy, and the activities of espionage can be viewed as queer. Part One argues that the spy plays a role which represents a third path between the hard power of the military and the soft power of diplomacy. Part Two shows how the intelligence community plays a key role in enabling leaders of democracies to conduct covert activities running counter to that mission and ideology, in this way allowing a leader to have two foreign policies-an overt, public policy and a second, closeted, queer foreign policy.
This edited volume brings together a range of essays by individuals who are centrally involved in the debate about the role and utility of theory in intelligence studies. The volume includes both classic essays and new articles that critically analyse some key issues: strategic intelligence, the place of international relations theory, theories of a ~surprisea (TM) and a ~failurea (TM), organisational issues, and contributions from studies of policing and democratisation. It concludes with a chapter that summarises theoretical developments, and maps out an agenda for future research. This volume will be at the forefront of the theoretical debate and will become a key reference point for future research in the area. This book will be of much interest for students of Intelligence Studies, Security Studies and Politics/International Relations in general.
An Austro-Hungarian with a dark streak, Victor Lustig was a man of athletic good looks, with a taste for larceny and foreign intrigue. He spoke six languages and went under nearly as many aliases in the course of a continent-hopping life that also saw him act as a double (or possibly triple) agent. Along the way, he found time to dupe an impressive variety of banks and hotels on both sides of the Atlantic; to escape from no fewer than three supposedly impregnable prisons; and to swindle Al Capone out of thousands of dollars, while living to tell the tale. Undoubtedly the greatest of his hoaxes was the sale, to a wealthy but gullible Parisian scrap-metal dealer, of the Eiffel Tower in 1925. In a narrative that thrills like a crime caper, best-selling biographer Christopher Sandford tells the whole story of the greatest conman of the twentieth century.
This book shows how specific historical events and societal forces within Nigeria transcend the choices its political leaders have made to influence the course of the state's political development. Kalu N. Kalu describes a variety of factors that have contributed to the challenges facing state-building and political institutions in Nigeria. Chief among them are the nature of interest aggregation, the dynamics of conflict, and the patterns of state intervention in matters dealing with secularism, distributive politics, economy, security, and autonomy. Kalu succeeds in constructing a more organic concept of political development in Nigeria by creating a model based on rentier politics that captures the critical relationship between state power and economy. By doing so, he goes beyond current scholarship about Nigeria and demonstrates the need for a restructuring of its institutions, offering insight into an enduring narrative that continues to shape Nigerian politics.
In his bestselling Station X, Michael Smith brought us the astonishing true story of the breaking of the Enigma Code. In The Emperor's Codes, he continues the tale as he examines how Japan's codes were broken and explores the consequences for the Second World War. The Emperor's Codes tells the stories of John Tiltman, the eccentric British soldier turned codebreaker who made many of the early breaks into Japanese diplomatic and military codes; Eric Nave, the Australian sailor recruited to work for the British who pioneered breakthroughs in Japanese naval codes; and Hiroshi Oshima, the hard-drinking Japanese ambassador to Berlin whose candid reports to Tokyo of his conversations with Hitler and other high-ranking Nazis were a major source of intelligence in the war against Germany. Many of these revelations have been made possible only thanks to recently declassified British files, privileged access to Australian secret official histories and interviews with an unprecedented number of British, American and Australian codebreakers.
In scenes eerily parallel to the culture of fear inspired by our current War on Terror, A Need to Know explores the clandestine history of a CIA family defined, and ultimately destroyed, by their oath to keep toxic secrets during the Cold War. When Bud Goodall's father mysteriously died, his inheritance consisted of three well-worn books: a Holy Bible, The Great Gatsby, and a diary. But they turned his life upside down. From the diary Goodall learned that his father had been a CIA operative during the height of the Cold War, and the Bible and Gatsby had been his codebooks. Many unexplained facets of Bud's childhood came into focus with this revelation.The high living in Rome and London. The blood-stained stiletto in his jewelry case. Bud, as a child, was always told he never had "a need to know." Or did he? Now, as an adult and a university professor, Goodall attempts to fill in the missing pieces of his Cold War childhood by uncovering a lifetime of family secrets. Who were his parents? What did his father do on those business trips when he was "working for the government?" What betrayal turned a heroic career of national service into a nightmare of alcoholism, depression, and premature death for both of his parents? Slowly, inexorably, Goodall unearths the chilling secrets of a CIA family in A Need to Know. 2006 Best Book Award, National Communication Association Ethnography Division
This collection of essays by leading experts seeks to explore what lessons for the exploitation and management of secret intelligence might be drawn from a variety of case studies ranging from the 1920s to the 'War on Terror'. Long regarded as the 'missing dimension' of international history and politics, public and academic interest in the role of secret intelligence has continued to grow in recent years, not least as a result of controversy surrounding the terrorist attacks on the United States on September 11 2001. Intelligence, Crises and Security addresses a range of themes including: crisis management, covert diplomacy, intelligence tradecraft, counterterrorism, intelligence 'overload', intelligence in relation to neutral states, deception, and signals intelligence. The work breaks new ground in relation to numerous key international episodes and events, not least as a result of fresh disclosures from government archives across the world. This book was previously published as a special issue of Intelligence and National Security and will be essential reading for students of intelligence, intelligence practitioners and general readers alike.
This collection of essays by leading experts seeks to explore what lessons for the exploitation and management of secret intelligence might be drawn from a variety of case studies ranging from the 1920s to the 'War on Terror'. Long regarded as the 'missing dimension' of international history and politics, public and academic interest in the role of secret intelligence has continued to grow in recent years, not least as a result of controversy surrounding the terrorist attacks on the United States on September 11 2001. Intelligence, Crises and Security addresses a range of themes including: crisis management, covert diplomacy, intelligence tradecraft, counterterrorism, intelligence 'overload', intelligence in relation to neutral states, deception, and signals intelligence. The work breaks new ground in relation to numerous key international episodes and events, not least as a result of fresh disclosures from government archives across the world. This book was previously published as a special issue of Intelligence and National Security.
While much has been disclosed about the CIA's cloak-and-dagger activities during the Cold War, relatively little is known about the origins of this secret organization. David Rudgers, a twenty-two-year CIA veteran, has written the first complete account of its creation, revealing how the idea of a centralized intelligence developed within the government and debunking the myth that former OSS chief William J. Donovan was the prime mover behind the agency's founding. "Creating the Secret State" locates the CIA's origins in government-wide efforts to reorganize national security during the transition from World War II to the Cold War. Rudgers maintains that the creation of the CIA was not merely the brainchild of "Wild Bill" Donovan. Rather, it was the culmination of years of negotiation among numerous policy makers such as James Forrestal and Dean Acheson, each with strong opinions regarding the agency's mission and methods. He shows that Congress, the Departments of State and Justice, the Joint Chiefs, and even the Budget Bureau all had a hand in the establishment of this "secret state" that operates nearly invisibly outside the American political process. Based almost entirely on archival and other primary sources, Rudgers's book describes in detail how the CIA evolved from its original purpose-as a watchdog to guard against a "nuclear Pearl Harbor"-to the role of clandestine warriors countering Soviet subversion, eventually engaging in more forms of intelligence gathering and covert operations than any of its counterparts. It suggests how the agency became a different organization than it might have been without the Communist threat and also shows how it both overexaggerated the dangers of the Cold War and failed to predict its ending. Rudgers has written an accurate and balanced account that brings America's undercover army in from the cold and out from under the cult of personality. An indispensable resource for future studies of the CIA, Creating the Secret State tells the inside story of why and how the agency was called into existence as it stimulates thinking about the future relevance of the CIA in a rapidly changing world.
Professor Sheldon uses the modern concept of the intelligence cycle to trace intelligence activities in Rome whether they were done by private citizens, the government, or the military. Examining a broad range of activities the book looks at the many types of espionage tradecraft that have left their traces in the ancient sources: * intelligence and counterintelligence gathering * covert action * clandestine operations * the use of codes and ciphers Dispelling the myth that such activities are a modern invention, Professor Sheldon explores how these ancient spy stories have modern echoes as well. What is the role of an intelligence service in a free republic? When do the security needs of the state outweigh the rights of the citizen? If we cannot trust our own security services, how safe can we be? Although protected by the Praetorian Guard, seventy-five percent of Roman emperors died by assassination or under attack by pretenders to his throne. Who was guarding the guardians? For students of Rome, and modern social studies too - this will provide a fascinating read.
In scenes eerily parallel to the culture of fear inspired by our current War on Terror, A Need to Know explores the clandestine history of a CIA family defined, and ultimately destroyed, by their oath to keep toxic secrets during the Cold War. When Bud Goodallas father mysteriously died, his inheritance consisted of three well-worn books: a Holy Bible, The Great Gatsby, and a diary. But they turned his life upside down. From the diary Goodall learned that his father had been a CIA operative during the height of the Cold War, and the Bible and Gatsby had been his codebooks. Many unexplained facets of Budas childhood came into focus with this revelation.The high living in Rome and London. The blood-stained stiletto in his jewelry case. Bud, as a child, was always told he never had aa need to know.a Or did he? Now, as an adult and a university professor, Goodall attempts to fill in the missing pieces of his Cold War childhood by uncovering a lifetime of family secrets. Who were his parents? What did his father do on those business trips when he was aworking for the government?a What betrayal turned a heroic career of national service into a nightmare of alcoholism, depression, and premature death for both of his parents? Slowly, inexorably, Goodall unearths the chilling secrets of a CIA family in A Need to Know. 2006 Best Book Award, National Communication Association Ethnography Division
The first book to tell the full story of American isolationism, from the founding era through the Trump presidency. In his Farewell Address of 1796, President George Washington admonished the young nation "to steer clear of permanent alliances with any portion of the foreign world." Isolationism thereafter became one of the most influential political trends in American history. From the founding era until the Japanese attack on Pearl Harbor, the United States shunned strategic commitments abroad, making only brief detours during the Spanish-American War and World War I. Amid World War II and the Cold War, Americans abandoned isolationism; they tried to run the world rather than run away from it. But isolationism is making a comeback as Americans tire of foreign entanglement. In this definitive and magisterial analysis-the first book to tell the fascinating story of isolationism across the arc of American history-Charles Kupchan explores the enduring connection between the isolationist impulse and the American experience. He also refurbishes isolationism's reputation, arguing that it constituted dangerous delusion during the 1930s, but afforded the nation clear strategic advantages during its ascent. Kupchan traces isolationism's staying power to the ideology of American exceptionalism. Strategic detachment from the outside world was to protect the nation's unique experiment in liberty, which America would then share with others through the power of example. Since 1941, the United States has taken a much more interventionist approach to changing the world. But it has overreached, prompting Americans to rediscover the allure of nonentanglement and an America First foreign policy. The United States is hardly destined to return to isolationism, yet a strategic pullback is inevitable. Americans now need to find the middle ground between doing too much and doing too little.
The intelligence failures exposed by the events of 9/11 and the missing weapons of mass destruction in Iraq have made one thing perfectly clear: change is needed in how the U.S. intelligence community operates. "Transforming U.S. Intelligence" argues that transforming intelligence requires as much a look to the future as to the past and a focus more on the art and practice of intelligence rather than on its bureaucratic arrangements. In fact, while the recent restructuring, including the creation of the Department of Homeland Security, may solve some problems, it has also created new ones. The authors of this volume agree that transforming policies and practices will be the most effective way to tackle future challenges facing the nation's security. This volume's contributors, who have served in intelligence agencies, the Departments of State or Defense, and the staffs of congressional oversight committees, bring their experience as insiders to bear in thoughtful and thought-provoking essays that address what such an overhaul of the system will require. In the first section, contributors discuss twenty-first-century security challenges and how the intelligence community can successfully defend U.S. national interests. The second section focuses on new technologies and modified policies that can increase the effectiveness of intelligence gathering and analysis. Finally, contributors consider management procedures that ensure the implementation of enhanced capabilities in practice. "Transforming U.S. Intelligence" supports the mandate of the new director of national intelligence by offering both careful analysis of existing strengths and weaknesses in U.S. intelligence and specific recommendations on how to fix its problems without harming its strengths. These recommendations, based on intimate knowledge of the way U.S. intelligence actually works, include suggestions for the creative mixing of technologies with new missions to bring about the transformation of U.S. intelligence without incurring unnecessary harm or expense. The goal is the creation of an intelligence community that can rapidly respond to developments in international politics, such as the emergence of nimble terrorist networks while reconciling national security requirements with the rights and liberties of American citizens.
MASK is the codename for one of the most sensitive, long-term sources ever run by any British intelligence organisation. It concealed the existence of a radio interception programme operated by the Government Code and Cipher School (GC&CS) which succeeded in monitoring, and reading, large quantities of encrypted wireless traffic exchanged between the headquarters of the Comintern in Moscow, and numerous Comintern representatives abroad, in countries as far apart as China, Austria and the United States. The content of these secret messages was of immense use to the very limited group of people who had access to it. Of greatest interest to MI5 and Stanley Baldwin's Cabinet was the material passing to and from the Communist Party of Great Britain (CPGB), which was monitored from a covert intercept station located on Denmark Hill, south London. Its principal target was the daily wireless traffic of a clandestine transmitter based in Wimbledon and operated by a member of the CPGB's underground cell, controlled by a Scot, Bob Stewart. the Secret Intelligence Service (SIS), and for years had supplied the Prime Minister and a handful of Cabinet ministers with summaries of decrypted foreign communications.
In addition to being a major area of research within International Relations, peacebuilding and statebuilding is a major policy area within the UN and other international and regional organizations. It is also a concern of international financial institutions, including the World Bank, and a significant factor in the foreign and security policies of many established and emerging democracies. Peacebuilding and statebuilding are among the main approaches for preventing, managing, and mitigating global insecurities; dealing with the humanitarian consequences of civil wars; and expanding democracy and neoliberal economic regimes. Peace formation is a relatively new concept, addressing how local actors work in parallel to international and national projects, and helps shape the legitimacy of peace processes and state reform. The Oxford Handbook of Peacebuilding, Statebuilding, and Peace Formation serves as an essential guide to this vast intellectual and policy landscape. It offers a systematic overview of conceptual foundations, political implications, and tensions at the global, regional, and local levels, as well as key policies, practices, examples, and discourses underlining all segments of peacebuilding and statebuilding praxis. Approaching peacebuilding from disciplinary perspectives across the social sciences, the Handbook is organized around four major thematic sections. Section one explores how peacebuilding, statebuilding, and peace formation is conceived by different disciplines and IR approaches, thus offering an overview of the conceptual bedrock of major theories and approaches. Section two situates these approaches among other major global issues, including globalization, civil society, terrorism, and technology to illustrate their global, regional, and local resonance. Section three looks at key themes in the field, including peace agreements, democratization, security reform, human rights, environment, and culture. Finally, section four looks at key features of everyday and civil society peace formation processes, both in theory and in practice. |
You may like...
Wicked Problems - The Ethics of Action…
Austin Choi-Fitzpatrick, Douglas Irvin-Erickson, …
Hardcover
R2,472
Discovery Miles 24 720
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von
Paperback
R768
Discovery Miles 7 680
Spying And The Crown - The Secret…
Richard J. Aldrich, Rory Cormac
Paperback
R328
Discovery Miles 3 280
|