Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Cecile Fabre draws back the curtain on the ethics of espionage and counterintelligence. Espionage and counter-intelligence activities, both real and imagined, weave a complex and alluring story. Yet there is hardly any serious philosophical work on the subject. Cecile Fabre presents a systematic account of the ethics of espionage and counterintelligence. She argues that such operations, in the context of war and foreign policy, are morally justified as a means, but only as a means, to protect oneself and third parties from ongoing violations of fundamental rights. In doing so, she addresses a range of ethical questions: are intelligence officers morally permitted to bribe, deceive, blackmail, and manipulate as a way to uncover state secrets? Is cyberespionage morally permissible? Are governments morally permitted to resort to the mass surveillance of their and foreign populations as a means to unearth possible threats against national security? Can treason ever be morally permissible? Can it ever be legitimate to resort to economic espionage in the name of national security? The book offers answers to those questions through a blend of philosophical arguments and historical examples.
Traditionally the military community held the intelligence profession in low esteem, spying was seen as dirty work and information was all to often ignored if it conflicted with a commander's own view. Handel examines the ways in which this situation has improved and argues that co-operation between the intelligence adviser and the military decision maker is vital.
The story of the intelligence war in South Africa during the Second World War is one of suspense, drama and dogged persistence. In 1939, when the Union of South Africa entered the war on Britain's side, the German government secretly contacted the political opposition, and the leadership of the anti-war movement, the Ossewabrandwag. The Nazis' aim was to spread sedition, undermine the Allied war effort, and - given the strategic importance of the Cape of Good Hope sea route - gain naval intelligence. Soon U-boat packs were sent to operate in South African waters, to deadly effect. With the Ossewabrandwag's help, a network of German spies was established to gather and relay back to the Reich important political and military intelligence. Agents would send coded messages to Axis diplomats in neighbouring Mozambique. Meanwhile, police detectives and MI5 hunted in vain for illegal wireless transmitters. Hitler's South African Spies presents an unrivalled account of German intelligence networks in wartime South Africa. It also details the hunt in post-war Europe for witnesses to help the government bring charges of high treason against key Ossewabrandwag members.
Spies in the Congo is the untold story of one of the most tightly-guarded secrets of the Second World War: America's desperate struggle to secure enough uranium to build its atomic bomb.The Shinkolobwe mine in the Belgian Congo was the most important deposit of uranium yet discovered anywhere on earth, vital to the success of the Manhattan Project. Given that Germany was also working on an atomic bomb, it was an urgent priority for the US to prevent uranium from the Congo being diverted to the enemy - a task entrusted to Washington's elite secret intelligence agents. Sent undercover to colonial Africa to track the ore and to hunt Nazi collaborators, their assignment was made even tougher by the complex political reality and by tensions with Belgian and British officials. A gripping spy-thriller, Spies in the Congo is the true story of unsung heroism, of the handful of good men -- and one woman -- in Africa who were determined to deny Hitler his bomb.
He was the son of a hereditary peer, one of the wealthiest men in Britain. His childhood was privileged; at Cambridge, he flourished. At the age of 21, he founded The Film Society, and became a pioneering standard-bearer for film as art. He was a collaborator of Alfred Hitchcock, rescuing The Lodger and later producing his ground-breaking British thrillers The Man Who Knew Too Much, The 39 Steps, Secret Agent and Sabotage. He directed comedies from stories by H.G. Wells, worked in Hollywood with Eisenstein, and made documentaries in Spain during the Civil War. He lobbied for Trotsky to be granted asylum in the UK, and became a leading propagandist for the anti-fascist and Communist cause. Under the nose of MI5, who kept him under constant surveillance, he became a secret agent of the Comintern and a Soviet spy. He was a man of high intelligence and moral concern, yet he was blind to the atrocities of the Stalin regime. This is the remarkable story of Ivor Montagu, and of the burgeoning cinematic culture and left-wing politics of Britain between the wars. It is a story of restless energy, generosity of spirit, creative achievement and intellectual corruption.
THE INSTANT NEW YORK TIMES BESTSELLER. American Kompromat unravels the Russian-influenced operations that amassed the dirty little secrets of the richest and most powerful men on earth. American Kompromat is based on extended and exclusive interviews with high-level sources in the KGB, CIA, and FBI, as well as lawyers at white-shoe Washington firms, associates of Jeffrey Epstein, and thousands of pages of FBI reports, police investigations, and news articles in English, Russian, and Ukrainian. A narrative offering jaw-dropping context, and set in Upper East Side mansions and private Caribbean islands, gigantic yachts, and private jets, American Kompromat shows that, from Donald Trump to Jeffrey Epstein, Russian operations transformed the darkest secrets of the most powerful people in the world into potent weapons that served its interests. Among its many revelations, American Kompromat addresses what may be the single most important unanswered question of the entire Trump era - and one that Unger argues is even more important now that Trump is out of office: Was Donald Trump a Russian asset? Just how compromised was he? And how could such an audacious feat have been accomplished? To answer these questions and more, Craig Unger reports, is to understand kompromat - operations that amassed compromising information on the richest and most powerful men on earth, and that leveraged power by appealing to what is, for some, the most prized possession of all: their vanity. This is a story that transcends the end of the Trump administration, illuminating a major underreported aspect of Trump's corruption that has profoundly damaged American democracy.
Keenie Meenie Services - the most powerful mercenary company you've never heard of - was involved in war crimes around the world from Sri Lanka to Nicaragua for which its shadowy directors have never been held accountable. Like its mysterious name, Keenie Meenie Services escaped definition and to this day has evaded sanctions. Now explosive new evidence - only recently declassified - exposes the extent of these war crimes, and the British government's tacit support for the company's operations. Including testimonies from SAS veterans, spy chiefs and diplomats, we hear from key figures battle-hardened by the Troubles in Northern Ireland and the Iranian Embassy siege. Investigative journalist Phil Miller asks, who were these mercenaries: heroes, terrorists, freedom fighters or war criminals? This book presents the first ever comprehensive case against Keenie Meenie Services, providing long overdue evidence on the crimes of the people who make a killing from killing.
The U.S. government spends enormous resources each year on the gathering and analysis of intelligence, yet the history of American foreign policy is littered with missteps and misunderstandings that have resulted from intelligence failures. In Why Intelligence Fails, Robert Jervis examines the politics and psychology of two of the more spectacular intelligence failures in recent memory: the mistaken belief that the regime of the Shah in Iran was secure and stable in 1978, and the claim that Iraq had active WMD programs in 2002. The Iran case is based on a recently declassified report Jervis was commissioned to undertake by CIA thirty years ago and includes memoranda written by CIA officials in response to Jervis's findings. The Iraq case, also grounded in a review of the intelligence community's performance, is based on close readings of both classified and declassified documents, though Jervis's conclusions are entirely supported by evidence that has been declassified. In both cases, Jervis finds not only that intelligence was badly flawed but also that later explanations analysts were bowing to political pressure and telling the White House what it wanted to hear or were willfully blind were also incorrect. Proponents of these explanations claimed that initial errors were compounded by groupthink, lack of coordination within the government, and failure to share information. Policy prescriptions, including the recent establishment of a Director of National Intelligence, were supposed to remedy the situation. In Jervis's estimation, neither the explanations nor the prescriptions are adequate. The inferences that intelligence drew were actually quite plausible given the information available. Errors arose, he concludes, from insufficient attention to the ways in which information should be gathered and interpreted, a lack of self-awareness about the factors that led to the judgments, and an organizational culture that failed to probe for weaknesses and explore alternatives. Evaluating the inherent tensions between the methods and aims of intelligence personnel and policymakers from a unique insider's perspective, Jervis forcefully criticizes recent proposals for improving the performance of the intelligence community and discusses ways in which future analysis can be improved."
When Joint Special Operations Command deployed Task Force 714 to Iraq in 2003, it faced an adversary unlike any it had previously encountered: al-Qaeda in Iraq (AQI). AQI's organization into multiple, independent networks and its application of Information Age technologies allowed it to wage war across a vast landscape. To meet this unique threat, TF 714 developed the intelligence capacity to operate inside those networks, and in the words of commander Gen. Stanley McChrystal, USA (Ret.) "claw the guts out of AQI." In Transforming US Intelligence for Irregular War, Richard H. Shultz Jr. provides a broad discussion of the role of intelligence in combatting nonstate militants and revisits this moment of innovation during the Iraq War, showing how the defense and intelligence communities can adapt to new and evolving foes. Shultz tells the story of how TF 714 partnered with US intelligence agencies to dismantle AQI's secret networks by eliminating many of its key leaders. He also reveals how TF 714 altered its methods and practices of intelligence collection, intelligence analysis, and covert paramilitary operations to suppress AQI's growing insurgency and, ultimately, destroy its networked infrastructure. TF 714 remains an exemplar of successful organizational learning and adaptation in the midst of modern warfare. By examining its innovations, Shultz makes a compelling case for intelligence leading the way in future campaigns against nonstate armed groups.
Winner of the St Ermin's Intelligence Book of the Year Award. 'One of the great biographies of 2015.' The Times Fully updated edition including recently released information. A Guardian Book of the Year. The Times Best Biography of the Year. Mail on Sunday Biography of the Year. Daily Mail Biography of Year. Spectator Book of the Year. BBC History Book of the Year. 'A remarkable and definitive portrait ' Frederick Forsyth 'Andrew Lownie's biography of Guy Burgess, Stalin's Englishman ... shrewd, thorough, revelatory.' William Boyd 'In the sad and funny Stalin's Englishman, [Lownie] manages to convey the charm as well as the turpitude.' Craig Brown Guy Burgess was the most important, complex and fascinating of 'The Cambridge Spies' - Maclean, Philby, Blunt - all brilliant young men recruited in the 1930s to betray their country to the Soviet Union. An engaging and charming companion to many, an unappealing, utterly ruthless manipulator to others, Burgess rose through academia, the BBC, the Foreign Office, MI5 and MI6, gaining access to thousands of highly sensitive secret documents which he passed to his Russian handlers. In this first full biography, Andrew Lownie shows us how even Burgess's chaotic personal life of drunken philandering did nothing to stop his penetration and betrayal of the British Intelligence Service. Even when he was under suspicion, the fabled charm which had enabled many close personal relationships with influential Establishment figures (including Winston Churchill) prevented his exposure as a spy for many years. Through interviews with more than a hundred people who knew Burgess personally, many of whom have never spoken about him before, and the discovery of hitherto secret files, Stalin's Englishman brilliantly unravels the many lives of Guy Burgess in all their intriguing, chilling, colourful, tragi-comic wonder.
There are a limited number of intelligence analysis books available on the market. Intelligence Analysis Fundamentals is an introductory, accessible text for college level undergraduate and graduate level courses. While the principles outlined in the book largely follow military intelligence terminology and practice, concepts are presented to correlate with intelligence gathering and analysis performed in law enforcement, homeland security, and corporate and business security roles. Most of the existing texts on intelligence gathering and analysis focus on specific types of intelligence such as 'target centric' intelligence, and many of these, detail information from a position of prior knowledge. In other words, they are most valuable to the consumer who has a working-level knowledge of the subject. The book is general enough in nature that a lay student-interested in pursuing a career in intelligence, Homeland Security, or other related areas of law enforcement-will benefit from it. No prior knowledge of intelligence analysis, functions, or operations is assumed. Chapters illustrate methods and techniques that, over the years, have consistently demonstrate results, superior to those achieved with other means. Chapters describe such analytical methods that are most widely used in the intelligence community and serve as recognized standards and benchmarks in the practice of intelligence analysis. All techniques have been selected for inclusion for their specific application to homeland security, criminal investigations, and intelligence operations. Uses numerous hands-on activities-that can easily be modified by instructors to be more or less challenging depending on the course level-to reinforce concepts As current and active members of the intelligence community, the authors draw on their decades of experience in intelligence to offer real-world examples to illustrate concepts All methodologies reflect the latest trends in the intelligence communities assessment, analysis, and reporting processes with all presented being open source, non-classified information As such, the non-sensitive information presented is appropriate-and methods applicable-for use for education and training overseas and internationally Military-style collection and analysis methods are the primary ones presented, but all are directly correlated intelligence to current concepts, functions and practices within Homeland Security and the law communities Covers the counterterrorism environment where joint operations and investigative efforts combine military, private sector, and law enforcement action and information sharing The book will be a welcome addition to the body of literature available and a widely used reference for professionals and students alike.
After the guns fell silent in May 1945, the USSR resumed its clandestine warfare against the western democracies. Stalin installed secret police services in the satellite countries of Central and Eastern Europe. Trained by his NKVD officers of the Polish UB, the Czech StB, the Hungarian AVO, Romania's Securitate, Bulgaria's KDS, Albania's Sigurimi and the Stasi of the German Democratic Republic spied on and ruthlessly repressed their fellow citizens on the Soviet model. When the resultant hatred exploded in uprisings they were put down by brutality, bloodshed and Soviet tanks. Not so obvious was that these state terror organisations were also designed for military and commercial espionage in the West, to conceal the real case officers in Moscow. Specially trained operatives undertook 'wet jobs', including the assassinations. Perhaps the most menacing were the sleepers who who married and raised families in the west while waiting to strike against their host countries; many are still among us. In Moscow Rules Douglas Boyd explores the relationship between the KGB and its ghastly brood - a family from hell.
Written by the undisputed dean of U.S. denial and deception experts, Practise to Deceive is the most in-depth look at deception as a military strategy. Barton Whaley knew the history of denial and deception across time, disciplines, and culture. He was the foremost authority on the intricacies of denial and deception strategy and tactics. For Whaley, deception was a mind-game, requiring imagination, deep critical thought, a profound understanding of the enemy as well as one's self (a variation of Sun Tzu), and patience and fortitude. This book presents 88 vividly descriptive case studies to serve as a handbook for intelligence and military professionals. In Whaley's analysis, variations in guilefulness between opposing individuals or groups can be crucial in deciding who achieves victory in combat.
During the Cold War, U.S. intelligence was concerned primarily with states; non-state actors like terrorists were secondary. Now the priorities are reversed and the challenge is enormous. States had an address, and they were hierarchical and bureaucratic. They thus came with some 'story'. Terrorists do not. States were 'over there', but terrorists are there and here. They thus put pressure on intelligence at home, not just abroad. The strength of this book is that it underscores the extent of the change and ranges broadly across data collection and analysis, foreign and domestic, as well as presenting the issues of value that arise as new targets require collecting more information at home.
In the greatest intelligence operation in the history of the world, Donald Trump was made President of the United States with the assistance of a foreign power. For the first time, The Plot to Destroy Democracy reveals the dramatic story of how blackmail, espionage, assassination, and psychological warfare were used by Vladimir Putin and his spy agencies to steal the 2016 U.S. election--and attempted to bring about the fall of NATO, the European Union, and western democracy. It will show how Russia and its fifth column allies tried to flip the cornerstones of democracy in order to re-engineer the world political order that has kept most of the world free since 1945. Career U.S. Intelligence officer Malcolm Nance will examine how Russia has used cyber warfare, political propaganda, and manipulation of our perception of reality--and will do so again--to weaponize American news, traditional media, social media, and the workings of the internet to attack and break apart democratic institutions from within, and what we can expect to come should we fail to stop their next attack. Nance has utilized top secret Russian-sourced political and hybrid warfare strategy documents to demonstrate the master plan to undermine American institutions that has been in effect from the Cold War to the present day. Based on original research and countless interviews with espionage experts, Nance examines how Putin's recent hacking accomplished a crucial first step for destabilizing the West for Russia, and why Putin is just the man to do it. Nance exposes how Russia has supported the campaigns of right-wing extremists throughout both the U.S. and Europe to leverage an axis of autocracy, and how Putin's agencies have worked since 2010 to bring fringe candidate Donald Trump into elections. Revelatory, insightful, and shocking, The Plot To Destroy Democracy puts a professional spy lens on Putin's plot and unravels it play-by-play. In the end, he provides a better understanding of why Putin's efforts are a serious threat to our national security and global alliances--in much more than one election--and a blistering indictment of Putin's puppet, President Donald J. Trump.
Moving the debate beyond the place of tactical intelligence in counterinsurgency warfare, Confronting the Colonies considers the view from Whitehall, where the biggest decisions were made. It reveals the evolving impact of strategic intelligence upon government under- standings of, and policy responses to, insurgent threats. Confronting the Colonies demonstrates for the first time how, in the decades after World War Two, the intelligence agenda expanded to include non-state actors, insurgencies, and irregular warfare. It explores the challenges these emerging threats posed to intelligence assessment and how they were met with varying degrees of success. Such issues remain of vital importance today. By examining the relationship between intelligence and policy, Cormac provides original and revealing in- sights into government thinking in the era of decolonisation, from the origins of nationalist unrest to the projection of dwindling British power. He demonstrates how intelligence (mis-) understood the complex relationship between the Cold War, nationalism, and decolonisation; how it fuelled fierce Whitehall feuding; and how it shaped policymakers' attempts to integrate counterinsurgency into broader strategic policy.
Following the German invasion of the Soviet Union in June 1941, Churchill and Stalin secretly agreed that Britain would infiltrate Soviet agents into occupied Western Europe. Liaison began between the NKVD and the SOE, each country's secret service. Transported in convoys across the Arctic Ocean and often attacked by German U-Boats, thirty-four men and women arrived in Scotland. To stop people finding out that Britain was helping the Communists, the agents were given false identities and provided with accommodation and training at remote country houses in southern England, including Beaulieu. Codenamed PICKAXES, they were sent for parachute practice at Ringway aerodrome, provided with documents, cover stories and wireless sets and sent on clandestine missions into France, Belgium, Holland, Austria, Germany and Italy. Whilst most were sent from RAF Tempsford, Churchill's Most Secret airfield, one was sent by boat across the Channel and another by submarine into Northern Italy. Only a few survived the war as most were caught, interrogated and executed. Based on extensive research, Bernard O'Connor tells their human stories enmeshed in a web of political intrigue and diplomacy.
Michael Herman (1929 2021) was the world's leading intelligence practitioner academic. Among his senior roles during a thirty-five year career in Her Majesty's Civil Service, he was Secretary of the Joint Intelligence Committee from 1972 75, and Head of several GCHQ Divisions in the 1970s 80s. After his professional retirement, he was a Gwilym Gibbon Research Fellow at Nuffield College Oxford and founding director of the Oxford Intelligence Group.This volume draws on Herman's professional experience and personal recollections to examine the past and present British intelligence. In twenty-one chapters he offers an insider's perspective on the Cold War intelligence contest against the Soviet Union and its continuing legacy today. This includes proposals for intelligence ethics and reform in the twenty-first century, and the declassified copy of his evidence to the 2004 Butler Review. Herman also discusses the role of personalities in the British intelligence community, producing sketches of Cold War contemporaries on the JIC and several Directors of GCHQ. The combination of operational experience and academic reflection makes this volume a unique contribution to intelligence scholarship.
Paul Dukes was sent into Russia in 1918, shortly after the Bolshevik Revolution. His role was to keep the British spy networks in place during the "Red Terror", when the Cheka secret police were killing large numbers of opponents of the communist regime. Dukes operated under a variety of covers, the most daring of which was as a member of the Cheka itself. On his return the British government publicised his role to prove their case against the Bolsheviks, knighting him publicly and awarding him the Victoria Cross.
During the Cold War, the Central Intelligence Agency's biggest and longest paramilitary operation was in the tiny kingdom of Laos. Hundreds of advisors and support personnel trained and led guerrilla formations across the mountainous Laotian countryside, as well as running smaller road-watch and agent teams that stretched from the Ho Chi Minh Trail to the Chinese frontier. Added to this number were hundreds of contract personnel providing covert aviation services. It was dangerous work. On the Memorial Wall at the CIA headquarters in Langley, Virginia, nine stars are dedicated to officers who perished in Laos. On top of this are more than one hundred from propriety airlines killed in aviation mishaps between 1961 and 1973. Combined, this grim casualty figure is orders of magnitude larger than any other CIA paramilitary operation. But for the Foreign Intelligence officers at Langley, Laos was more than a paramilitary battleground. Because of its geographic location as a buffer state, as well as its trifurcated political structure, Laos was a unique Cold War melting pot. All three of the Lao political factions, including the communist Pathet Lao, had representation in Vientiane. The Soviet Union had an extremely active embassy in the capital, while the People's Republic of China - though in the throes of the Cultural Revolution - had multiple diplomatic outposts across the kingdom. So, too, did both North and South Vietnam. All of this made Laos fertile ground for clandestine operations. This book comprehensively details the cloak-and-dagger side of the war in Laos for the first time, from agent recruitments to servicing dead-drops in Vientiane.
The Cold War was only cold in that the major powers, the U.S. and
the Soviet Union, did not engage in a nuclear war. But during that
period (1945-1991) there were wars, spying, shoot downs of numerous
reconnaissance aircraft, captures of U.S. military personnel,
murders, defections, a space race with men put in orbit and an
eventual moon landing.
|
You may like...
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von
Paperback
R601
Discovery Miles 6 010
Fair Game - How a Top Spy Was Betrayed…
Valerie Plame Wilson
Paperback
Personnel Management in Secret Service…
Barbara Czarniawska, Sabina Siebert, …
Hardcover
R2,321
Discovery Miles 23 210
|