![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Joining the ranks of Hidden Figures and In the Garden of Beasts, the incredible true story of the greatest codebreaking duo that ever lived, an American woman and her husband who invented the modern science of cryptology together and used it to confront the evils of their time, solving puzzles that unmasked Nazi spies and helped win World War II. In 1916, at the height of World War I, brilliant Shakespeare expert Elizebeth Smith went to work for an eccentric tycoon on his estate outside Chicago. The tycoon had close ties to the U.S. government, and he soon asked Elizebeth to apply her language skills to an exciting new venture: code-breaking. There she met the man who would become her husband, groundbreaking cryptologist William Friedman. Though she and Friedman are in many ways the "Adam and Eve" of the NSA, Elizebeth’s story, incredibly, has never been told. In The Woman Who Smashed Codes, Jason Fagone chronicles the life of this extraordinary woman, who played an integral role in our nation’s history for forty years. After World War I, Smith used her talents to catch gangsters and smugglers during Prohibition, then accepted a covert mission to discover and expose Nazi spy rings that were spreading like wildfire across South America, advancing ever closer to the United States. As World War II raged, Elizebeth fought a highly classified battle of wits against Hitler’s Reich, cracking multiple versions of the Enigma machine used by German spies. Meanwhile, inside an Army vault in Washington, William worked furiously to break Purple, the Japanese version of Enigma—and eventually succeeded, at a terrible cost to his personal life. Fagone unveils America’s code-breaking history through the prism of Smith’s life, bringing into focus the unforgettable events and colorful personalities that would help shape modern intelligence. Blending the lively pace and compelling detail that are the hallmarks of Erik Larson’s bestsellers with the atmosphere and intensity of The Imitation Game, The Woman Who Smashed Codes is page-turning popular history at its finest.
Building on Goldman's Words of Intelligence and Maret's On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms pertain to federal procedures, policies, and practices involving the information life cycle, national security controls over information, and collection and analysis of intelligence information. This work is intended for intelligence students and professionals at all levels, as well as information science students dealing with such issues as the Freedom of Information Act.
The CIA and Mind Control: The Secret History of the Behavioral Sciences "The CIA exposé to end all CIA exposés." New York "A comprehensive, detailed and thoroughly readable account of the CIA safehouses, the brainwashing experiments, the involvement of the universities." Washington Monthly "Perhaps the most compelling, well-researched, organized and well-written account of CIA operations ever." Progressive "A serious effort to recontruct carefully the details of intelligence agency experiments with 'mind control.'" American Political Science Review "One of the most important books of the year. . . . We see the CIA on the cutting edge of inquiry into hypnosis, drugs, brainwashing, personality assessment, psychosurgery, electric and radio stimulations of the brain, the creation of involuntary amnesia, terminal shock therapy." Playboy "Fascinating reading." Washington Post "A wonderful piece of investigative reporting. The best account we'll ever get of one of the seamiest episodes of American intelligence." Seymour Hersh
1st November 2006: Alexander Litvinenko is brazenly poisoned in central London. Twenty-two days later he dies, killed from the inside by Polonium - a rare, lethal and highly radioactive substance. His crime? He had made some powerful enemies in Russia. This is the inside story of the life and death of Litvinenko and of Russia's new cold war with the west. Harding traces the journey of the nuclear poison across London, from hotel room to nightclub, assassin to victim. It's a deadly trail that leads back to Vladimir Putin, and to a regime exposed by the Panama Papers. Luke Harding's investigation into the death of Alexander Litvinenko, A Very Expensive Poison, may also help us shed light on the poisoning of Sergei Skripal and his daughter in Salisbury. From the author of the No.1 New York Times bestseller Collusion.
'A scrupulous piece of reporting, necessary, timely and very sobering'
John Le Carr
Capital punishment for murder was suspended in Great Britain in 1965, an Act finally made permanent in 1969, but remained as the punishment for treason until as recently as 1998, demonstrating how seriously we take the crime of betraying your country. But even with the threat of the noose hanging over them, many still chose the path of treachery during the cataclysmic events of last century. British Traitors examines the lives and motivations of a number of the perpetrators of this most heinous of crimes, following the footsteps of Fascist traitors such as William Joyce (Lord Haw-Haw) and John Amery to the gallows, investigating what drove men such as Wilfred Macartney and John Herbert King to betray their country during the war to end all wars and delving into the mysterious web of espionage and subterfuge surrounding the Cambridge Spy Ring that spied for the Soviet Union from the nineteen-thirties until the early nineteen-fifties. People commit treason for many reasons - some seek adventure, some seek reward, some are motivated by political philosophy, while others are sucked into it by their own foolishness. British Traitors provides a fascinating look at the lives and impulses of those who chose to betray their country.
Sinclair McKay's Bletchley Park Brainteasers was the runaway quiz book bestseller of 2017, now it's time to pit your wits against the secret heroes of MI5 and MI6 and find out if YOU have what it takes to be a spy! If you cracked the GCHQ Puzzle Book and followed the Ordnance Survey Puzzle Book, you MUST show off your James Bond credentials with Secret Service Brainteasers ... Whether you have linguistic flair, an instinct for technology or good old common sense, pit your wits against some of the greatest minds of our time with ingenious brainteasers including secret languages, sabotage themed brain bogglers, deadly countdowns and hidden codes. Weaving astonishing stories of the men and women who operate from the shadows, the secret heroes and heroines of MI5 and MI6 who have faced extraordinary and terrifying challenges and a wide range of mind twisting puzzles, Secret Service Brainteasers will test your mental agility to discover: Do YOU have what it takes to be a spy?
A critical look at how the US military is weaponizing technology and data for new kinds of warfare-and why we must resist. War Virtually is the story of how scientists, programmers, and engineers are racing to develop data-driven technologies for fighting virtual wars, both at home and abroad. In this landmark book, Roberto J. Gonzalez gives us a lucid and gripping account of what lies behind the autonomous weapons, robotic systems, predictive modeling software, advanced surveillance programs, and psyops techniques that are transforming the nature of military conflict. Gonzalez, a cultural anthropologist, takes a critical approach to the techno-utopian view of these advancements and their dubious promise of a less deadly and more efficient warfare. With clear, accessible prose, this book exposes the high-tech underpinnings of contemporary military operations-and the cultural assumptions they're built on. Chapters cover automated battlefield robotics; social scientists' involvement in experimental defense research; the blurred line between political consulting and propaganda in the internet era; and the military's use of big data to craft new counterinsurgency methods based on predicting conflict. Gonzalez also lays bare the processes by which the Pentagon and US intelligence agencies have quietly joined forces with Big Tech, raising an alarming prospect: that someday Google, Amazon, and other Silicon Valley firms might merge with some of the world's biggest defense contractors. War Virtually takes an unflinching look at an algorithmic future-where new military technologies threaten democratic governance and human survival.
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts. China combines financial firepower-currently the world's second largest economy-with a clear intent of fielding a modern military capable of competing not only in the physical environments of land, sea, air, and outer space, but especially in the electromagnetic and cyber domains. This book makes extensive use of Chinese-language sources to provide policy-relevant insight into how the Chinese view the evolving relationship between information and future warfare as well as issues such as computer network warfare and electronic warfare. Written by an expert on Chinese military and security developments, this work taps materials the Chinese military uses to educate its own officers to explain the bigger-picture thinking that motivates Chinese cyber warfare. Readers will be able to place the key role of Chinese cyber operations in the overall context of how the Chinese military thinks future wars will be fought and grasp how Chinese computer network operations, including various hacking incidents, are part of a larger, different approach to warfare. The book's explanations of how the Chinese view information's growing role in warfare will benefit U.S. policymakers, while students in cyber security and Chinese studies will better understand how cyber and information threats work and the seriousness of the threat posed by China specifically. Provides a detailed overview and thorough analysis of Chinese cyber activities Makes extensive use of Chinese-language materials, much of which has not been utilized in the existing Western literature on the subject Enables a better understanding of Chinese computer espionage by placing it in the context of broader Chinese information warfare activities Analyzes Chinese military modernization efforts, providing a context for the ongoing expansion in China's military spending and reorganization Offers readers policy-relevant insight into Chinese military thinking while maintaining academic-level rigor in analysis and source selection
The IEEE International Conference on Intelligence and Security Informatics (ISI) and Pacific Asia Workshop on Intelligence and Security Informatics (PAISI) conference series (http: //www. isiconference. org) have drawn significant attention in the recent years. Intelligence and Security Informatics is concerned with the study of the dev- opment and use of advanced information technologies and systems for national, int- national, and societal security-related applications. The ISI conference series have brought together academic researchers, law enforcement and intelligence experts, - formation technology consultant and practitioners to discuss their research and pr- tice related to various ISI topics including ISI data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, - ber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, information assurance, among others. In this book, we collect the work of the most active researchers in the area. Topics include data and text mining in terr- ism, information sharing, social network analysis, Web-based intelligence monitoring and analysis, crime data analysis, infrastructure protection, deception and intent det- tion and more. Scope and Organization The book is organized in four major areas. The first unit focuses on the terrorism - formatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The forth unit presents surveillance and emergency response
The extraordinary untold story of Ernest Hemingway's dangerous secret life in espionage A NEW YORK TIMES BESTSELLER * A finalist for the William E. Colby Military Writers' Award "IMPORTANT" (Wall Street Journal) * "FASCINATING" (New York Review of Books) * "CAPTIVATING" (Missourian) A riveting international cloak-and-dagger epic ranging from the Spanish Civil War to the liberation of Western Europe, wartime China, the Red Scare of Cold War America, and the Cuban Revolution, Writer, Sailor, Soldier, Spy reveals for the first time Ernest Hemingway's secret adventures in espionage and intelligence during the 1930s and 1940s (including his role as a Soviet agent code-named "Argo"), a hidden chapter that fueled both his art and his undoing. While he was the historian at the esteemed CIA Museum, Nicholas Reynolds, a longtime American intelligence officer, former U.S. Marine colonel, and Oxford-trained historian, began to uncover clues suggesting Nobel Prize-winning novelist Ernest Hemingway was deeply involved in mid-twentieth-century spycraft -- a mysterious and shocking relationship that was far more complex, sustained, and fraught with risks than has ever been previously supposed. Now Reynolds's meticulously researched and captivating narrative "looks among the shadows and finds a Hemingway not seen before" (London Review of Books), revealing for the first time the whole story of this hidden side of Hemingway's life: his troubling recruitment by Soviet spies to work with the NKVD, the forerunner to the KGB, followed in short order by a complex set of secret relationships with American agencies. Starting with Hemingway's sympathy to antifascist forces during the 1930s, Reynolds illuminates Hemingway's immersion in the life-and-death world of the revolutionary left, from his passionate commitment to the Spanish Republic; his successful pursuit by Soviet NKVD agents, who valued Hemingway's influence, access, and mobility; his wartime meeting in East Asia with communist leader Chou En-Lai, the future premier of the People's Republic of China; and finally to his undercover involvement with Cuban rebels in the late 1950s and his sympathy for Fidel Castro. Reynolds equally explores Hemingway's participation in various roles as an agent for the United States government, including hunting Nazi submarines with ONI-supplied munitions in the Caribbean on his boat, Pilar; his command of an informant ring in Cuba called the "Crook Factory" that reported to the American embassy in Havana; and his on-the-ground role in Europe, where he helped OSS gain key tactical intelligence for the liberation of Paris and fought alongside the U.S. infantry in the bloody endgame of World War II. As he examines the links between Hemingway's work as an operative and as an author, Reynolds reveals how Hemingway's secret adventures influenced his literary output and contributed to the writer's block and mental decline (including paranoia) that plagued him during the postwar years -- a period marked by the Red Scare and McCarthy hearings. Reynolds also illuminates how those same experiences played a role in some of Hemingway's greatest works, including For Whom the Bell Tolls and The Old Man and the Sea, while also adding to the burden that he carried at the end of his life and perhaps contributing to his suicide. A literary biography with the soul of an espionage thriller, Writer, Sailor, Soldier, Spy is an essential contribution to our understanding of the life, work, and fate of one of America's most legendary authors.
The Aspin-Brown Commission of 1995-1996, led by former U.S. Defense
Secretaries Les Aspin and Harold Brown, was a landmark inquiry into
the activities of America's secret agencies. The purpose of the
commission was to help the Central Intelligence Agency and other
organizations in the U.S. intelligence community adapt to the quite
different world that had emerged after the end of the Cold War in
1991.
Using German and previously closed or underutilized Soviet archives, this work brings to date the historiography of one of the most important aspects of twentieth-century international relations: the steps by which Germany and Soviet Russia, the two pariah states of the First World War, would find common ground and establish a relationship whose impact would be felt through the Second World War. It focuses especially on the earliest secret contacts between the German military and the fledgling Soviet regime.
'Fascinating analysis' Nigel West; 'Grippingly told, authoritative' Mail on Sunday; 'Meticulously researched...a remarkably good read' John Brennan, former CIA Director; 'Excellent...a detailed, highly professional account' Sir John Scarlett, former MI6 Chief The Special Relationship between America and Britain is feted by politicians on both sides of the Atlantic when it suits their purpose and just as frequently dismissed as a myth, not least by the media, which announces its supposed death on a regular basis. Yet the simple truth is that the two countries are bound together more closely than either is to any other ally. In The Real Special Relationship, Michael Smith reveals how it all began, when a top-secret visit by four American codebreakers to Bletchley Park in February 1941 - ten months before the US entered the Second World War - marked the start of a close collaboration between the two nations that endures to this day. Once the war was over, and the Cold War began, both sides recognised that the way they had worked together to decode German and Japanese ciphers could now be used to counter the Soviet threat. Despite occasional political conflict and public disputes between the two nations, such as during the Suez crisis, behind the scenes intelligence sharing continued uninterrupted, right up to the recent Russian invasion of Ukraine. Smith, the bestselling author of Station X and having himself served in British military intelligence, brings together a fascinating range of characters, from Winston Churchill and Ian Fleming to Kim Philby and Edward Snowden, who have helped shape the security of our two nations. Supported by in-depth interviews and an excellent range of personal contacts, he takes the reader into the mysterious workings of MI6, the CIA and all those who work to keep us safe.
Would the Islamic State ever renounce violence? In the current political climate, the question seems preposterous. Yet, at the height of a terrorist campaign against tourists in Egypt during the 1990s, nobody expected that the group behind the attacks would issue and adhere to a nonviolence initiative. What drives groups to shift between nonviolence and violence? When do opposition groups move away from armed action, and why do some organizations renounce violence permanently, whereas others refrain temporarily? In The Violence Pendulum, Ioana Emy Matesan offers a theory of tactical change that explains both escalation and de-escalation in order to answer these questions. Matesan's analysis traces the historical evolution of four Islamist groups: the Muslim Brotherhood and al-Gama'a al-Islamiyya in Egypt, and Darul Islam and Jemaah Islamiyah in Indonesia. Drawing from archival materials, interviews, and reports, she focuses on turning points in each organization. Ultimately, she finds that Islamist groups alter their tactics in response to the perceived need for activism, shifts in the cost of violent versus nonviolent resistance, and internal or external pressures on the organization. Groups turn to violence when grievances escalate, violent resistance is feasible and publicly tolerated, and there are internal or external pressures to act. In turn, groups renounce armed action when violence costs them too much, disillusionment eclipses the perceived need for continued activism, and leaders are willing to rethink the tactics and strategies of the group. By uncovering the reasons for escalation and de-escalation across a range of political environments, The Violence Pendulum reshapes our understanding of how decisions are made-and how nonviolence can be achieved-in armed groups.
This book presents a comprehensive source document on intelligence and security oversight and review. It compares the oversight arrangements found in nine countries-New Zealand, Australia, Canada, United States, United Kingdom, Germany, Netherlands, Norway and South Africa. This is done through an analysis of a wide range of areas including statutory basis, agencies overseen, membership, tenure, appointment/dismissal, mandate, powers, access to classified information, complaints function, reporting and, in the case of parliamentary committees, the frequency of meetings. Within an annotated bibliography section Richardson and Gilmour also provide detailed summaries of other relevant research and commentary aligned with oversight and review practices. Intelligence and Security Oversight: An Annotated Bibliography and Comparative Analysis comprehensively demonstrates the powers and limitations placed with, and on, oversight bodies, appealing to academics, researchers and practitioners in the intelligence and security environment.
"There is a lack of quiet in Sylvia that craves for action.... She knows that she is special and that she possesses unusual and varied abilities." -- From the Mossad's psychological evaluation of Sylvia Rafael When Moti Kfir, head of the Academy for Special Operations of the Mossad, first interviewed Sylvia Rafael in a coffee shop, he knew she would make a great combatant for Israel's intelligence agency. She was outgoing, resourceful, brilliant, and had a talent for bonding with others. When Kfir warned her that the mysterious job they'd met to discuss could be dangerous, she simply sat back comfortably in her chair and smiled. Sylvia Rafael is the page-turning account of a young, dedicated agent as told by the man who trained her. Drawing on extensive research and interviews, authors Ram Oren and Moti Kfir tell the story of Rafael's rise to prominence within the Mossad and her intelligence work trying to locate Ali Hassan Salameh -- the leader of Palestine's Black September organization and the mastermind behind the murder of eleven Israeli athletes at the 1972 Munich Olympic Games. Her team's misidentification of their mark would eventually lead to her arrest and imprisonment for murder and espionage. Now available in English for the first time, Sylvia Rafael offers new insight into the Israeli-Palestinian conflict, its history, and its human cost. It is a gripping, authentic spy story about a fearless defender of the Jewish people.
During the Cold War, the Central Intelligence Agency's biggest and longest paramilitary operation was in the tiny kingdom of Laos. Hundreds of advisors and support personnel trained and led guerrilla formations across the mountainous Laotian countryside, as well as running smaller road-watch and agent teams that stretched from the Ho Chi Minh Trail to the Chinese frontier. Added to this number were hundreds of contract personnel providing covert aviation services. It was dangerous work. On the Memorial Wall at the CIA headquarters in Langley, Virginia, nine stars are dedicated to officers who perished in Laos. On top of this are more than one hundred from propriety airlines killed in aviation mishaps between 1961 and 1973. Combined, this grim casualty figure is orders of magnitude larger than any other CIA paramilitary operation. But for the Foreign Intelligence officers at Langley, Laos was more than a paramilitary battleground. Because of its geographic location as a buffer state, as well as its trifurcated political structure, Laos was a unique Cold War melting pot. All three of the Lao political factions, including the communist Pathet Lao, had representation in Vientiane. The Soviet Union had an extremely active embassy in the capital, while the People's Republic of China - though in the throes of the Cultural Revolution - had multiple diplomatic outposts across the kingdom. So, too, did both North and South Vietnam. All of this made Laos fertile ground for clandestine operations. This book comprehensively details the cloak-and-dagger side of the war in Laos for the first time, from agent recruitments to servicing dead-drops in Vientiane.
"The best book about America's first modern secret service." --Washington Post Book World In the months before World War II, FDR prepared the country for conflict with Germany and Japan by reshuffling various government agencies to create the Office of Strategic Services--America's first intelligence agency and the direct precursor to the CIA. When he charged William ("Wild Bill") Donovan, a successful Wall Street lawyer and Wilkie Republican, to head up the office, the stage was set for some of the most fantastic and fascinating operations the U.S. government has ever conducted. Author Richard Harris Smith, himself an ex-CIA hand, documents the controversial agency from its conception as a spin-off of the Office of the Coordinator for Information to its demise under Harry Truman and reconfiguration as the CIA. During his tenure, Donovan oversaw a chaotic cast of some ten thousand agents drawn from the most conservative financial scions to the country's most idealistic New Deal true believers. Together they usurped the roles of government agencies both foreign and domestic, concocted unbelievably complicated conspiracies, and fought the good fight against the Axis powers of Germany and Japan. For example, when OSS operatives stole vital military codebooks from the Japanese embassy in Portugal, the operation was considered a success. But the success turned into a flop as the Japanese discovered what had happened, and hastily changed a code that had already been decrypted by the U.S. Navy. Colorful personalities and truly priceless anecdotes abound in what may be called the most authoritative work on the subject.
The Cambridge Spies continue to fascinate - but one of them, John Cairncross, has always been more of an enigma than the others. He worked alone and was driven by his hostility to Fascism rather than to the promotion of Communism. During his war-time work at Bletchley Park, he passed documents to the Soviets which went on to influence the Battle of Kursk. Geoff Andrews gained exclusive access to the Cairncross papers and secrets, and has spoken to friends, relatives and former colleagues. In his portrait, a complex individual emerges – a scholar as well as a spy – whose motivations have often been misunderstood. After his resignation from the Civil Service, Cairncross moved to Italy and there he rebuilt his life as a foreign correspondent, editor and university professor. This gave him new circles and friendships – which included the writer Graham Greene – while he always lived with the fear that his earlier espionage would come to light. The full account of Cairncross's spying, his confession and his dramatic public exposure as the ‘fifth man’ is told here for the first time, unveiling the story of his post-espionage life.
James Klugmann appears as a shadowy figure in the legendary history of the Cambridge spies. As both mentor and friend to Donald Maclean, Guy Burgess and others, Klugmann was the man who manipulated promising recruits deemed ripe for conversion to the communist cause. This perception of him was reinforced following the release of his MI5 file and the disclosure of Soviet intelligence files in Moscow, which revealed he played a key part in the recruitment of John Cairncross, the 'fifth man', and had a pivotal war-time role in the Special Operations Executive, helping shift Churchill and the allies to support Tito and the communist partisans in Yugoslavia. In this book, Geoff Andrews reveals Klugmann's story in full for the first time, uncovering the motivations, conflicts and illusions of those drawn into the world of communism - and the sacrifices they made on its behalf.
Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, “deepfake” videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late.
Tears of Theory demonstrates the value of making storytelling and personal experience integral parts of International Relations (IR) scholarship. Through an examination of the disappearance of Korean Air (KAL) flight 858 in 1987, the book also explores what it means to conduct research in sensitive and difficult settings. According to South Korea, a female secret agent bombed the plane under instructions from the North Korean leadership, killing 115 people. Many unanswered questions emerged and resulted in two rounds of reinvestigations. Taking this case in the context of the ongoing Cold War, Park-Kang presents the story about a researcher, whose life is deeply entangled with the Cold War mystery. The autoethnography-oriented story is based on the author's dramatic research journey of seventeen years on the mysterious female spy. The book will be of interest to students and scholars of IR, Asian/Korean Studies, Narrative Studies, Security Studies, Pedagogy and methodology. |
You may like...
Black Like You - An Autobiography
Herman Mashaba, Isabella Morris
Paperback
(4)
|