![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Experts in the intelligence community say that torture is ineffective. Yet much of the public appears unconvinced: surveys show that nearly half of Americans think that torture can be acceptable for counterterrorism purposes. Why do people persist in supporting torture-and can they be persuaded to change their minds? In Tortured Logic, Erin M. Kearns and Joseph K. Young draw upon a novel series of group experiments to understand how and why the average citizen might come to support the use of torture techniques. They find evidence that when torture is depicted as effective in the media, people are more likely to approve of it. Their analysis weighs variables such as the ethnicity of the interrogator and the suspect; the salience of one's own mortality; and framing by experts. Kearns and Young also examine who changes their opinions about torture and how, demonstrating that only some individuals have fixed views while others have more malleable beliefs. They argue that efforts to reduce support for torture should focus on convincing those with fluid views that torture is ineffective. The book features interviews with experienced interrogators and professionals working in the field to contextualize its findings. Bringing empirical rigor to a fraught topic, Tortured Logic has important implications for understanding public perceptions of counterterrorism strategy.
This book examines how key developments in international relations in recent years have affected intelligence agencies and their oversight. Since the turn of the millennium, intelligence agencies have been operating in a tense and rapidly changing security environment. This book addresses the impact of three factors on intelligence oversight: the growth of more complex terror threats, such as those caused by the rise of Islamic State; the colder East-West climate following Russia's intervention in Ukraine and annexation of Crimea; and new challenges relating to the large-scale intelligence collection and intrusive surveillance practices revealed by Edward Snowden. This volume evaluates the impact these factors have had on security and intelligence services in a range of countries, together with the challenges that they present for intelligence oversight bodies to adapt in response. With chapters surveying developments in Norway, Romania, the UK, Belgium, France, the USA, Canada and Germany, the coverage is varied, wide and up-to-date. This book will be of much interest to students of intelligence studies, security studies and International Relations.
Why are we still at 'war' with terror 16 years after 9/11? This book will discuss what we have collectively done well, what we have done poorly, what we have yet to try and how we get to the point where terrorism does not dominate public discourse and cause disproportionate fear around the world. This book looks at a variety of approaches and responses to international Islamist extremism, ranging from military and security/law enforcement action to government policies, community measures and religious efforts, with a goal to determining what has worked and what has not. The examples are drawn largely from the West but the book's scope is global. Key features: Written in a clear, non-academic styleUses recent events to explain terrorismIs wide-ranging and 'ex-practitioner' based
The world of intelligence has been completely transformed by the end of the Cold War and the onset of an age of information. Prior to the 1990s, US government intelligence had one principal target, the Soviet Union; a narrow set of 'customers', the political and military officials of the US government; and a limited set of information from the sources they owned, spy satellites and spies. Today, world intelligence has many targets, numerous consumers - not all of whom are American or in the government - and too much information, most of which is not owned by the U.S. government and is of widely varying reliability. In this bold and penetrating study, Gregory Treverton, former Vice Chair of the National Intelligence Council and Senate investigator, offers his insider's views on how intelligence gathering and analysis must change. He suggests why intelligence needs to be both contrarian, leaning against the conventional wisdom, and attentive to the longer term, leaning against the growing shorter time horizons of Washington policy makers. He urges that the solving of intelligence puzzles tap expertise outside government - in the academy, think tanks, and Wall Street - to make these parties colleagues and co-consumers of intelligence, befitting the changed role of government from doer to convener, mediator, and coalition-builder.
Paul Dukes was sent into Russia in 1918, shortly after the Bolshevik Revolution. His role was to keep the British spy networks in place during the "Red Terror", when the Cheka secret police were killing large numbers of opponents of the communist regime. Dukes operated under a variety of covers, the most daring of which was as a member of the Cheka itself. On his return the British government publicised his role to prove their case against the Bolsheviks, knighting him publicly and awarding him the Victoria Cross.
Why are some multiethnic countries more prone to civil violence than others? This book examines the occurrence and forms of conflict in multiethnic states. It presents a theory that explains not only why ethnic groups rebel but also how they rebel. It shows that in extremely unequal societies, conflict typically occurs in non-violent forms because marginalized groups lack both the resources and the opportunities for violent revolt. In contrast, in more equal, but segmented multiethnic societies, violent conflict is more likely. The book traces the origins of these different types of multiethnic states to distinct experiences of colonial rule. Settler colonialism produced persistent stratification and far-reaching cultural and economic integration of the conquered groups, as, for example, in Guatemala, the United States, or Bolivia. By contrast, in decolonized states, such as Iraq, Pakistan, or Sri Lanka, in which independence led to indigenous self-rule, the colonizersa adivide and rulea policies resulted in deeply segmented post-colonial societies. Combining statistical analyses with case studies based on original field research in four different countries in Sub-Saharan Africa and Latin America, Vogt analyzes why and how colonial legacies have led to peaceful or violent ethnic movements.
The visionary chemist Sidney Gottlieb was the CIA's master magician and gentle hearted torturer - the agency's "poisoner in chief." As head of the MK-ULTRA mind control project, he directed brutal experiments at secret prisons on three continents. He made pills, powders, and potions that could kill or maim without a trace, and he secretly dosed unsuspecting American citizens with mind-altering drugs. His experiments spread LSD across the United States, making him a hidden godfather of the 1960s counterculture, and he was also the chief supplier of spy tools used by CIA officers around the world. Stephen Kinzer, the author of groundbreaking books about U.S. clandestine operations, draws on new documentary research and original interviews to bring to life one of the most powerful unknown Americans of the twentieth century. And in a new afterword, he brings to light newly revealed stories about Gottlieb's astonishing career at the intersection of extreme science and covert action.
Tells the fist person story of Verne Lyon, an Iowa farm boy away at college who is inducted into the CIA to spy on his professors and fellow student as part of MHCHAOS, the then largest domestic surveillance program in American history. Framed by his handlers for an airport bombing the young Lyon is dispatched to Cuba to subvert the Castro regime and, when he balks at increasingly nefarious dirty tricks and tries to quit, the CIA kidnaps him twice, finally returning him to American soil and Leavenworth Penitentiary. Today a free man, Lyon details his journey through CIA lies and deceit both to make amends and to reveal the secret workings of government all around us.
After Hitler annexed Austria in 1938, the Gestapo began silencing critics. Many were shipped to concentration camps; those deemed most dangerous to the Reich were executed. Yet a few slipped through the Gestapo's net and organized resistance cells. One group, codenamed CASSIA, became America's most effective spy ring in Austria during World War II. This first full-length account of CASSIA describes its contributions to the Allied war effort-including reports on the V-2 missile, Nazi death camps and advanced combat aircraft and tanks-before a catastrophic intelligence failure sent key members to the guillotine, firing squad or gas chamber.
Andrei Sakharov (1921-1989), a brilliant physicist and the
principal designer of the Soviet hydrogen bomb, later became a
human rights activist and--as a result--a source of profound
irritation to the Kremlin. This book publishes for the first time
ever KGB files on Sakharov that became available during Boris
Yeltsin's presidency. The documents reveal the untold story of KGB
surveillance of Sakharov from 1968 until his death in 1989 and of
the regime's efforts to intimidate and silence him. The disturbing
archival materials show the KGB to have had a profound lack of
understanding of the spiritual and moral nature of the human rights
movement and of Sakharov's role as one of its leading
figures.
The story of one of the most astonishing episodes of espionage and deception of World War Two.This is the tale of two men: Claude Dansey, deputy head of MI6, and double agent Henri Dericourt, who was planted with the rival wartime secret service - SOE - at Dansey's instructions. From there began a terrifying trail of destruction. After making contact with Dansey in 1942, Dericourt was recruited to SOE as the man desperately needed to organize top-secret flights in and out of occupied French territory. But at the same time Dericourt was in touch with German counter-espionage in Paris. As SOE congratulated themselves on a new asset, Dericourt gave the Nazis everything; every flight, operation and coded message he could. Against a background of unprecedented deception and betrayal, Dansey's secret MI6 operation eventually led to the arrest of nearly one thousand men and women, hundreds of whom died in concentration camps. How did it go so wrong? A shocking, enthralling account of a devastating episode in the history of the British secret services, perfect for readers of Ben MacIntyre.
Robert 'Bob' Maloubier, otherwise known as the French James Bond and as Churchill's Secret Agent, led a life straight out of a spy thriller. At the age of just 19, he escaped occupied France and ended up in England, where he was given intensive training by the Special Operations Executive (SOE). Back in occupied France, Maloubier's SOE duties saw him commit large-scale industrial sabotage in Le Havre and Rouen, suffer gunshot wounds while evading capture and be evacuated in the nick of time by 161 Special Duties Squadron. Always at the centre of the action, just after D-Day he was flown back to France alongside fellow agents Philippe Liewer, Violette Szabo and Jean Claude Guiet, where he operated in guerilla warfare conditions and destroyed vital bridges. After another mission with Force 136 in the Far East, the sheer wealth of experience Maloubier gathered during the war made him a perfect candidate to help found the French Secret Service, for whom he proved invaluable. Bob Maloubier was undoubtedly one of the Second World War's most remarkable, courageous and flamboyant characters. His simply and uniquely told personal account of wartime spent as an SOE agent and with the French Resistance is poignant, brutally truthful, and is told here for the first time in English.
A wide range of actors have publicly identified cyber stability as a key policy goal but the meaning of stability in the context of cyber policy remains vague and contested: vague because most policymakers and experts do not define cyber stability when they use the concept; contested because they propose measures that rely - often implicitly - on divergent understandings of cyber stability. This is a thorough investigation of instability within cyberspace and of cyberspace itself. Its purpose is to reconceptualise stability and instability for cyberspace, highlight their various dimensions and thereby identify relevant policy measures. It critically examines both 'classic' notions associated with stability - for example, whether cyber operations can lead to unwanted escalation - as well as topics that have so far not been addressed in the existing cyber literature, such as the application of a decolonial lens to investigate Euro-American conceptualisations of stability in cyberspace.
This book analyses changes in intelligence governance and offers a comparative analysis of intelligence democratisation. Within the field of Security Sector Reform (SSR), academics have paid significant attention to both the police and military. The democratisation of intelligence structures that are at the very heart of authorit
This book is an in-depth examination of the relations between Ireland and the former East Germany between the end of the Second World War and the fall of the Berlin Wall. It explores political, diplomatic, economic, media and cultural issues. The long and tortuous process of establishing diplomatic relations is unique in the annals of diplomatic history. Central in this study are the activities of the Stasi. They show how and where East German intelligence obtained information on Ireland and Northern Ireland and also what kind of information was gathered. A particularly interesting aspect of the book is the monitoring of the activities of the Irish Republican Army and the Irish National Liberation Army and their campaigns against the British army in West Germany. The Stasi had infiltrated West German security services and knew about Irish suspects and their contacts with West German terrorist groups. East German Intelligence and Ireland, 1949-90 makes an original contribution to diplomatic, intelligence, terrorist and Cold War studies. -- .
In the last decade, the proliferation of billions of new Internet-enabled devices and users has significantly expanded concerns about cybersecurity. But should we believe the prophets of cyber war or worry about online government surveillance? Are such security concerns real, exaggerated or just poorly understood? In this comprehensive text, Damien Van Puyvelde and Aaron F. Brantly provide a cutting-edge introduction to the key concepts, controversies and policy debates in cybersecurity. Exploring the interactions of individuals, groups and states in cyberspace, and the integrated security risks to which these give rise, they examine cyberspace as a complex socio-technical-economic domain that fosters both great potential and peril. Structured around ten chapters, the book explores the complexities and challenges of cybersecurity using case studies - from the Morris Worm and Titan Rain to BlackEnergy and the Cyber Caliphate - to highlight the evolution of attacks that can exploit and damage individual systems and critical infrastructures. With questions for group discussion and suggestions for further reading throughout, Cybersecurity will be essential reading for anyone interested in understanding the challenges and opportunities presented by the continued expansion of cyberspace.
In 1927, Chiang Kai-shek - the head of China's military academy and leader of the Kuomintang (KMT) - began the `northern expeditions' to bring China's northern territories back under the control of the state. It was during this period that the KMT purged communist activities, fractured the army and sparked the Chinese Civil War - which would rage for over twenty years. The communists, led by General Mao Tse-Tsung, were for much of the period forced underground and concentrated in the Chinese countryside. As the author argues, this resulted in China's war featuring unusually high levels of espionage and sabotage, and increased the military importance of information gathering. Based on newly declassified material, Panagiotis Dimitrakis charts the double-crossings, secret meetings and bloody assassinations which would come to define China's future. Uniquely, The Secret War for China gives equal weighting to the role of foreign actors: the role of British intelligence in unmasking Communist International (Comintern) agents in China, for example, and the allies' attempts to turn nationalist China against the Japanese. The Secret War for China also documents the clandestine confrontation between Mao and Chiang and the secret negotiations between Chiang and the Axis Powers, whose forces he employed against the CCP once the Second World War was over. In his turn, Mao employed nationalist forces who had defected - during the last three years of the civil war about 105 out of 869 KMT generals defected to the CCP. This book is an urgent and necessary guide to the intricacies of the Chinese Civil War, a war which decisively shaped the modern Asian world.
This collection, comprising key works by James J. Wirtz, explains how different threat perceptions can lead to strategic surprise attack, intelligence failure and the failure of deterrence. This volume adopts a strategist's view of the issue of surprise and intelligence failure by placing these phenomena in the context of conflict between strong and weak actors in world affairs. A two-level theory explains the incentives and perceptions of both parties when significant imbalances of military power exist between potential combatants, and how this situation sets the stage for strategic surprise and intelligence failure to occur. The volume illustrates this theory by applying it to the Kargil Crisis, attacks launched by non-state actors, and by offering a comparison of Pearl Harbor and the September 11, 2001 attacks. It explores the phenomenon of deterrence failure; specifically, how weaker parties in an enduring or nascent conflict come to believe that deterrent threats posed by militarily stronger antagonists will be undermined by various constraints, increasing the attractiveness of utilising surprise attack to achieve their objectives. This work also offers strategies that could mitigate the occurrence of intelligence failure, strategic surprise and the failure of deterrence. This book will be of much interest to students of intelligence studies, strategic studies, security studies and IR in general.
Spring 1958: a mysterious individual believed to be high up in the Polish secret service began passing Soviet secrets to the West. His name was Michal Goleniewski and he remains one of the most important, least known and most misunderstood spies of the Cold War. Even his death is shrouded in mystery and he has been written out of the history of Cold War espionage - until now. Tim Tate draws on a wealth of previously-unpublished primary source documents to tell the dramatic true story of the best spy the west ever lost and how Goleniewski exposed hundreds of KGB agents operating undercover in the West; from George Blake and the 'Portland Spy Ring', to a senior Swedish Air Force and NATO officer and a traitor inside the Israeli government. The information he produced devastated intelligence services on both sides of the Iron Curtain. Bringing together love and loyalty, courage and treachery, betrayal, greed and, ultimately, insanity, Tim Tate tells the extraordinary true story of one of the most significant spies of the Cold War. Acclaim for The Spy Who Was Left Out in the Cold: 'Totally gripping . . . a masterpiece. Tate lifts the lid on one of the most important and complex spies of the Cold War, who passed secrets to the West and finally unmasked traitor George Blake.' HELEN FRY, author of MI9: A History of the Secret Service for Escape and Evasion in World War Two 'A wonderful and at times mind-boggling account of a bizarre and almost forgotten spy - right up to the time when he's living undercover in Queens, New York and claiming to be the last of the Romanoffs.' SIMON KUPER, author of The Happy Traitor 'A highly readable and thoroughly researched account of one of the Cold War's most intriguing and tragic spy stories.' OWEN MATTHEWS, author of An Impeccable Spy
'A deeply human read, wonderfully written, on the foibles of a fascinating, flawed, treacherous and sort of likeable character.' Philippe Sands Those people who were betrayed were not innocent people. They were no better nor worse than I am. It's all part of the intelligence world. If the man who turned me in came to my house today, I'd invite him to sit down and have a cup of tea. George Blake was the last remaining Cold War spy. As a Senior Officer in the British Intelligence Service who was double agent for the Soviet Union, his actions had devastating consequences for Britain. Yet he was also one of the least known double agents, and remained unrepentant. In 1961, Blake was sentenced to forty-two years imprisonment for betraying to the KGB all of the Western operations in which he was involved, and the names of hundreds of British agents working behind the Iron Curtain. This was the longest sentence for espionage ever to have been handed down by a British court. On the surface, Blake was a charming, intelligent and engaging man, and most importantly, a seemingly committed patriot. Underneath, a ruthlessly efficient mole and key player in the infamous 'Berlin Tunnel' operation. This illuminating biography tracks Blake from humble beginnings as a teenage courier for the Dutch underground during the Second World War, to the sensational prison-break from Wormwood Scrubs that inspired Hitchcock to write screenplay. Through a combination of personal interviews, research and unique access to Stasi records, journalist Simon Kuper unravels who Blake truly was, what he was capable of, and why he did it.
Building on Goldman's Words of Intelligence and Maret's On Their Own Terms this is a one-stop reference tool for anyone studying and working in intelligence, security, and information policy. This comprehensive resource defines key terms of the theoretical, conceptual, and organizational aspects of intelligence and national security information policy. It explains security classifications, surveillance, risk, technology, as well as intelligence operations, strategies, boards and organizations, and methodologies. It also defines terms created by the U.S. legislative, regulatory, and policy process, and routinized by various branches of the U.S. government. These terms pertain to federal procedures, policies, and practices involving the information life cycle, national security controls over information, and collection and analysis of intelligence information. This work is intended for intelligence students and professionals at all levels, as well as information science students dealing with such issues as the Freedom of Information Act. |
![]() ![]() You may like...
A Research Agenda for Intelligence…
Robert Dover, Huw Dylan, …
Hardcover
R3,101
Discovery Miles 31 010
Spying And The Crown - The Secret…
Richard J. Aldrich, Rory Cormac
Paperback
R342
Discovery Miles 3 420
Wicked Problems - The Ethics of Action…
Austin Choi-Fitzpatrick, Douglas Irvin-Erickson, …
Hardcover
R2,591
Discovery Miles 25 910
Fair Game - How a Top Spy Was Betrayed…
Valerie Plame Wilson
Paperback
|