![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Elizabeth I came to the throne at a time of insecurity and unrest. Rivals threatened her reign; England was a Protestant island, isolated in a sea of Catholic countries. Spain plotted an invasion, but Elizabeth's Secretary, Francis Walsingham, was prepared to do whatever it took to protect her. He ran a network of agents in England and Europe who provided him with information about invasions or assassination plots. He recruited likely young men and 'turned' others. He encourage Elizabeth to make war against the Catholic Irish rebels, with extreme brutality and oversaw the execution of Mary Queen of Scots. The Queen's Agent is a story of secret agents, cryptic codes and ingenious plots, set in a turbulent period of England's history. It is also the story of a man devoted to his queen, sacrificing his every waking hour to save the threatened English state.
Analyzing Intelligence, now in a revised and extensively updated second edition, assesses the state of the profession of intelligence analysis from the practitioners point of view. The contributors-most of whom have held senior positions in the US intelligence community-review the evolution of the field, the rise of new challenges, pitfalls in analysis, and the lessons from new training and techniques designed to deal with 21st century national security problems. This second edition updates this indispensable book with new chapters that highlight advances in applying more analytic rigor to analysis, along with expertise-building, training, and professional development. New chapters by practitioners broaden the original volume's discussion of the analyst-policymaker relationship by addressing analytic support to the military customer as well as by demonstrating how structured analysis can benefit military commanders on the battlefield. Analyzing Intelligence is written for national security practitioners such as producers and users of intelligence, as well as for scholars and students seeking to understand the nature and role of intelligence analysis, its strengths and weaknesses, and steps that can improve it and lead it to a more recognizable profession. The most comprehensive and up-to-date volume on professional intelligence analysis as practiced in the US Government, Analyzing Intelligence is essential reading for practitioners and users of intelligence analysis, as well as for students and scholars in security studies and related fields.
Experts in the intelligence community say that torture is ineffective. Yet much of the public appears unconvinced: surveys show that nearly half of Americans think that torture can be acceptable for counterterrorism purposes. Why do people persist in supporting torture-and can they be persuaded to change their minds? In Tortured Logic, Erin M. Kearns and Joseph K. Young draw upon a novel series of group experiments to understand how and why the average citizen might come to support the use of torture techniques. They find evidence that when torture is depicted as effective in the media, people are more likely to approve of it. Their analysis weighs variables such as the ethnicity of the interrogator and the suspect; the salience of one's own mortality; and framing by experts. Kearns and Young also examine who changes their opinions about torture and how, demonstrating that only some individuals have fixed views while others have more malleable beliefs. They argue that efforts to reduce support for torture should focus on convincing those with fluid views that torture is ineffective. The book features interviews with experienced interrogators and professionals working in the field to contextualize its findings. Bringing empirical rigor to a fraught topic, Tortured Logic has important implications for understanding public perceptions of counterterrorism strategy.
We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.
The incredible true story of the only woman to have worked during the Second World War as a codebreaker at both Bletchley Park and the Pentagon   Betty Webb is the only surviving codebreaker to have worked on both Nazi and Japanese codes at Bletchley Park during the Second World War. This is the tale of her extraordinary life. Betty has had a ringside seat to history. Born one hundred years ago, she spent her childhood in the Shropshire countryside during the 1920s – without heating, electricity or running water. As a schoolgirl, thanks to her mother’s desire for her to learn to speak German proficiently, she took part in an exchange programme and spent time in Nazi Germany. It was 1937 and Germany was on the cusp of war. As a small act of rebellion, she refused to give the Nazi salute alongside her classmates. Back in England, after graduating from school, Betty faced the usual limited opportunities for employment on offer to women at the time. However, with the war in full swing, fate intervened and in 1941, wanting to play her part in the war effort, Betty joined the Auxiliary Territorial Service (Women’s Army). After being interviewed by an intelligence officer, she found herself at Euston station with her kit-bag, a travel warrant in her pocket and instructions to get off the train at Bletchley Park. There, having signed the Official Secrets Act with a gun laid next to her on the table highlighting the enormous importance of the work she was about to do, she joined the ranks of the other men and women ‘codebreakers’. Between 1941 and 1945 Betty Webb played a vital role in the top-secret efforts being made to decipher the secret communications of the Germans and later the Japanese. In 1945, as other members of the forces returned home from the war in Europe, she was sent to the Pentagon and was in Washington DC when the atomic bombs fell and when Eisenhower announced the end of the war. Betty was unable to reveal the true nature of her work, even to her parents, until years later. In this fascinating book, she revisits the key moments of her life and recounts the incredible stories from her time at Bletchley Park.
Risk, Threats and the New Normal explains the new political and technological developments that created new domestic national security threats against the nation and the people of the United States.The book traces the development of and competition between national preparedness (focused on people and property), and civil defense / security (focused on the defense of systems and infrastructure) since the latter days of World War I. While Homeland Security was created to meet national security threats in the domestic arena, most of the duties have devolved to public safety personnel and organizations. The result is a clash of cultures, jurisdictions, and perspectives that produces “less than optimal†results from the many bureaucracies involved. The second of four volumes in McIntyre’s How to Think About Homeland Security series offers suggestions for how these issues might be addressed by Homeland Security.
This book examines how key developments in international relations in recent years have affected intelligence agencies and their oversight. Since the turn of the millennium, intelligence agencies have been operating in a tense and rapidly changing security environment. This book addresses the impact of three factors on intelligence oversight: the growth of more complex terror threats, such as those caused by the rise of Islamic State; the colder East-West climate following Russia's intervention in Ukraine and annexation of Crimea; and new challenges relating to the large-scale intelligence collection and intrusive surveillance practices revealed by Edward Snowden. This volume evaluates the impact these factors have had on security and intelligence services in a range of countries, together with the challenges that they present for intelligence oversight bodies to adapt in response. With chapters surveying developments in Norway, Romania, the UK, Belgium, France, the USA, Canada and Germany, the coverage is varied, wide and up-to-date. This book will be of much interest to students of intelligence studies, security studies and International Relations.
The second edition of Secret Intelligence: A Reader brings together key essays from the field of intelligence studies, blending classic works on concepts and approaches with more recent essays dealing with current issues and ongoing debates about the future of intelligence. Secret intelligence has never enjoyed a higher profile. The events of 9/11, the conflicts in Iraq and Afghanistan, the missing WMD controversy, public debates over prisoner interrogation, together with the revelations of figures such as Edward Snowden, recent cyber attacks and the rise of 'hybrid warfare' have all contributed to make this a 'hot' subject over the past two decades. Aiming to be more comprehensive than existing books, and to achieve truly international coverage of the field, this book provides key readings and supporting material for students and course convenors. It is divided into four main sections, each of which includes full summaries of each article, further reading suggestions and student questions: * The intelligence cycle * Intelligence, counter-terrorism and security * Ethics, accountability and secrecy * Intelligence and the new warfare This new edition contains essays by leading scholars in the field and will be essential reading for students of intelligence studies, strategic studies, international security and political science in general, and of interest to anyone wishing to understand the current relationship between intelligence and policy-making.
Risk, Threats and the New Normal explains the new political and technological developments that created new domestic national security threats against the nation and the people of the United States.The book traces the development of and competition between national preparedness (focused on people and property), and civil defense / security (focused on the defense of systems and infrastructure) since the latter days of World War I. While Homeland Security was created to meet national security threats in the domestic arena, most of the duties have devolved to public safety personnel and organizations. The result is a clash of cultures, jurisdictions, and perspectives that produces “less than optimal†results from the many bureaucracies involved. The second of four volumes in McIntyre’s How to Think About Homeland Security series offers suggestions for how these issues might be addressed by Homeland Security.
This book focuses on the activities of the scientific staff of the British National Institute of Oceanography during the Cold War. Revealing how issues such as intelligence gathering, environmental surveillance, the identification of 'enemy science', along with administrative practice informed and influenced the Institute's Cold War program. In turn, this program helped shape decisions taken by Government, military and the civil service towards science in post-war Britain. This was not simply a case of government ministers choosing to patronize particular scientists, but a relationship between politics and science that profoundly impacted on the future of ocean science in Britain.
Acclaimed author and managing director of The Times Literary Supplement, James MacManus, creates a compelling historical novel that brings to life an unbelievable but true love story set during the Second World War. In 1942, Cork-born Kay Summersby's life is changed forever when she is tasked with driving General Eisenhower on his fact-finding visit to wartime London. Despite Eisenhower's marriage to Mamie, the pair takes an immediate liking to one another and he gifts Kay a rare wartime luxury: a box of chocolates. So begins a tumultuous relationship that against all military regulation sees Kay travelling with Eisenhower on missions to far flung places before the final assault on Nazi Germany. She becomes known as "Ike's shadow" and in letters Mamie bemoans his new obsession with 'Ireland'. That does not stop him from using his influence to grant Kay US citizenship and rank in the US army, drawing her closer when he returns to America. When the US authorities discover Eisenhower's plans to divorce from his wife they threaten the fragile but passionate affair and Kay is forced to take desperate measures to hold onto the man she loves...
Counter-Terrorism Networks in the European Union: Maintaining Democratic Legitimacy after 9/11 presents a model of democratic legitimacy for within international counter-terrorism co-operation. Exploring the current practices of European Union (EU) counter-terrorism policing, developed after 9/11, it highlights the current significant challenges to democratic legitimacy and seeks to present tools and solutions which ensure 'democratic' counter-terrorism actions and the protection of human rights. Counter-terrorism policing is now a global concern, with co-operation between security authorities of different countries a crucial feature in the fight to prevent terrorism and extremism. Yet, given the emphasis on pre-emption, this type of policing tends to interfere to a far greater extent with the rights of the individual than traditional policing. This book scrutinises the current focus of enhanced communication between counter-terrorist associates at member-state and EU levels within Europe, alongside analysis of just how far the traditional, protective mechanisms of accountability and oversight are managing to keep up with this development. It proposes that current forms of counter-terrorism policing within the EU should be understood as networks - sets of expert institutional nodes or individual agents, from at least two countries - that are interconnected in order to authorize and provide security with regard to counter-terrorism, using the European Police Office (Europol) as a key example.
Robert 'Bob' Maloubier, otherwise known as the French James Bond and as Churchill's Secret Agent, led a life straight out of a spy thriller. At the age of just 19, he escaped occupied France and ended up in England, where he was given intensive training by the Special Operations Executive (SOE). Back in occupied France, Maloubier's SOE duties saw him commit large-scale industrial sabotage in Le Havre and Rouen, suffer gunshot wounds while evading capture and be evacuated in the nick of time by 161 Special Duties Squadron. Always at the centre of the action, just after D-Day he was flown back to France alongside fellow agents Philippe Liewer, Violette Szabo and Jean Claude Guiet, where he operated in guerilla warfare conditions and destroyed vital bridges. After another mission with Force 136 in the Far East, the sheer wealth of experience Maloubier gathered during the war made him a perfect candidate to help found the French Secret Service, for whom he proved invaluable. Bob Maloubier was undoubtedly one of the Second World War's most remarkable, courageous and flamboyant characters. His simply and uniquely told personal account of wartime spent as an SOE agent and with the French Resistance is poignant, brutally truthful, and is told here for the first time in English.
Investigating the global system of detention centers that imprison asylum seekers and conceal persistent human rights violations  Remote detention centers confine tens of thousands of refugees, asylum seekers, and undocumented immigrants around the world, operating in a legal gray area that hides terrible human rights abuses from the international community. Built to temporarily house eight hundred migrants in transit, the immigrant “reception center†on the Italian island of Lampedusa has held thousands of North African refugees under inhumane conditions for weeks on end. Australia’s use of Christmas Island as a detention center for asylum seekers has enabled successive governments to imprison migrants from Asia and Africa, including the Sudanese human rights activist Abdul Aziz Muhamat, held there for five years. In The Death of Asylum, Alison Mountz traces the global chain of remote sites used by states of the Global North to confine migrants fleeing violence and poverty, using cruel measures that, if unchecked, will lead to the death of asylum as an ethical ideal. Through unprecedented access to offshore detention centers and immigrant-processing facilities, Mountz illustrates how authorities in the United States, the European Union, and Australia have created a new and shadowy geopolitical formation allowing them to externalize their borders to distant islands where harsh treatment and deadly force deprive migrants of basic human rights. Mountz details how states use the geographic inaccessibility of places like Christmas Island, almost a thousand miles off the Australian mainland, to isolate asylum seekers far from the scrutiny of humanitarian NGOs, human rights groups, journalists, and their own citizens. By focusing on borderlands and spaces of transit between regions, The Death of Asylum shows how remote detention centers effectively curtail the basic human right to seek asylum, forcing refugees to take more dangerous risks to escape war, famine, and oppression.
A wide range of actors have publicly identified cyber stability as a key policy goal but the meaning of stability in the context of cyber policy remains vague and contested: vague because most policymakers and experts do not define cyber stability when they use the concept; contested because they propose measures that rely - often implicitly - on divergent understandings of cyber stability. This is a thorough investigation of instability within cyberspace and of cyberspace itself. Its purpose is to reconceptualise stability and instability for cyberspace, highlight their various dimensions and thereby identify relevant policy measures. It critically examines both 'classic' notions associated with stability - for example, whether cyber operations can lead to unwanted escalation - as well as topics that have so far not been addressed in the existing cyber literature, such as the application of a decolonial lens to investigate Euro-American conceptualisations of stability in cyberspace.
An extraordinarily brave and moving memoir from one of the world's most famous whistle-blowers, activists and trans women. In 2010 Chelsea Manning, working as an intelligence analyst in the U.S. Army in Iraq, disclosed 720,000 classified military documents that she had smuggled out via the memory card of her digital camera. In March 2011, the United States Army sentenced Manning to thirty-five years in military prison, charging her with twenty-two counts relating to the unauthorized possession and distribution of classified military documents. The day after her conviction, Manning declared her gender identity as a woman and began to transition. In 2017, President Barack Obama commuted her sentence and she was released from prison. In her memoir, Manning recounts how her pleas for increased institutional transparency and government accountability took place alongside a fight to defend her rights as a trans woman. She reveals her challenging childhood, her struggles as an adolescent, what led her to join the military, and the fierce pride she took in her work. We also learn the details of how and why she made the decision to send classified military documents to WikiLeaks. This powerful, observant memoir will stand as one of the definitive testaments of the digital age. **CHOSEN AS A SUNDAY TIMES BOOK TO WATCH OUT FOR, A NEW STATESMAN BOOK TO READ, AND ONE OF COSMOPOLITAN'S BEST FORTHCOMING BOOKS**
Paul Dukes was sent into Russia in 1918, shortly after the Bolshevik Revolution. His role was to keep the British spy networks in place during the "Red Terror", when the Cheka secret police were killing large numbers of opponents of the communist regime. Dukes operated under a variety of covers, the most daring of which was as a member of the Cheka itself. On his return the British government publicised his role to prove their case against the Bolsheviks, knighting him publicly and awarding him the Victoria Cross.
This book analyses changes in intelligence governance and offers a comparative analysis of intelligence democratisation. Within the field of Security Sector Reform (SSR), academics have paid significant attention to both the police and military. The democratisation of intelligence structures that are at the very heart of authorit
This collection, comprising key works by James J. Wirtz, explains how different threat perceptions can lead to strategic surprise attack, intelligence failure and the failure of deterrence. This volume adopts a strategist's view of the issue of surprise and intelligence failure by placing these phenomena in the context of conflict between strong and weak actors in world affairs. A two-level theory explains the incentives and perceptions of both parties when significant imbalances of military power exist between potential combatants, and how this situation sets the stage for strategic surprise and intelligence failure to occur. The volume illustrates this theory by applying it to the Kargil Crisis, attacks launched by non-state actors, and by offering a comparison of Pearl Harbor and the September 11, 2001 attacks. It explores the phenomenon of deterrence failure; specifically, how weaker parties in an enduring or nascent conflict come to believe that deterrent threats posed by militarily stronger antagonists will be undermined by various constraints, increasing the attractiveness of utilising surprise attack to achieve their objectives. This work also offers strategies that could mitigate the occurrence of intelligence failure, strategic surprise and the failure of deterrence. This book will be of much interest to students of intelligence studies, strategic studies, security studies and IR in general.
Intelligence activities have always been an integral part of statecraft. Ancient governments, like modern ones, realized that to keep their borders safe, control their populations, and keep abreast of political developments abroad, they needed a means to collect the intelligence which enabled them to make informed decisions. Today we are well aware of the damage spies can do.Here, for the first time, is a comprehensive guide to the literature of ancient intelligence. The entries present books and periodical articles in English, French, German, Italian, Spanish, Polish, and Dutch - with annotations in English. These works address such subjects as intelligence collection and analysis (political and military), counterintelligence, espionage, cryptology (Greek and Latin), tradecraft, covert action, and similar topics (it does not include general battle studies and general discussions of foreign policy).Sections are devoted to general espionage, intelligence related to road building, communication, and tradecraft, intelligence in Greece, during the reign of Alexander the Great and in the Hellenistic Age, in the Roman republic, the Roman empire, the Byzantine empire, the Muslim world, and in Russia, China, India, and Africa. The books can be located in libraries in the United States; in cases where volumes are in one library only, the author indicates where they may be found.
When the United States declared war on Germany in April 1917, it was woefully unprepared to wage a modern war. Whereas their European counterparts already had three years of experience in using code and cipher systems in the war, American cryptologists had to help in the building of a military intelligence unit from scratch. This book relates the personal experiences of one such character, providing a uniquely American perspective on the Great War. It is a story of spies, coded letters, plots to blow up ships and munitions plants, secret inks, arms smuggling, treason, and desperate battlefield messages. Yet it all begins with a college English professor and Chaucer scholar named John Mathews Manly. In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U.S. Army's Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war. |
![]() ![]() You may like...
Crooked Soley - A Crop Circle Revelation
Allan Brown, John Michell
Paperback
R216
Discovery Miles 2 160
Gender Issues in Ancient and Reformation…
Helen Kraus
Hardcover
Contemplation and Classical Christianity…
John Peter Kenney
Hardcover
|