![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Philip Agee's story is the stuff of a John le Carre novel-perilous and thrilling adventures around the globe. He joined the CIA as a young idealist, becoming an operations officer in hopes of seeing the world and safeguarding his country. He was the consummate intelligence insider, thoroughly entrenched in the shadow world. But in 1975, he became the first person to publicly betray the CIA-a pariah whose like was not seen again until Edward Snowden. For almost forty years in exile, he was a thorn in the side of his country. The first biography of this contentious, legendary man, Jonathan Stevenson's A Drop of Treason is a thorough portrait of Agee and his place in the history of American foreign policy and the intelligence community during the Cold War and beyond. Unlike mere whistleblowers, Agee exposed American spies by publicly blowing their covers. And he didn't stop there-his was a lifelong political struggle that firmly allied him with the social movements of the global left and against the American project itself from the early 1970s on. Stevenson examines Agee's decision to turn, how he sustained it, and how his actions intersected with world events. Having made profound betrayals and questionable decisions, Agee lived a rollicking, existentially fraught life filled with risk. He traveled the world, enlisted Gabriel Garcia Marquez in his cause, married a prima ballerina, and fought for what he believed was right. Raised a conservative Jesuit in Tampa, he died a socialist expat in Havana. In A Drop of Treason, Stevenson reveals what made Agee tick-and what made him run.
Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation explores a number of wrenching ethical issues and challenges faced by military and intelligence personnel. It provides a robust and practical approach to analyzing ethical issues in war and intelligence operations, and applies careful reasoning to issues of vital importance today, not only for soldiers, intelligence professionals, and policy makers, but also for the citizens they serve and protect. This new edition has been updated throughout and includes new contents, to deal with critical issues such as torturing detainees, using espionage to penetrate terrorist cells, mounting covert actions to undermine hostile regimes, practicing euthanasia on the battlefield as mercy-killing, or using targeted killings as a means to fight insurgencies. Partly Cloudy provides an excellent introduction to the field for students, instructors, and practitioners who are interested in the ethical challenges faced by public servants.
With its conceptual innovations and case studies, Whistleblowers clarifies the much-discussed but under-studied phenomena of leaking and whistleblowing, with a particular focus on the collaborative networks that make the extraction and publication of secrets possible.
An unprecedented expose of Soviet espionage in the United States during the 1930s and 40s This stunning book, based on KGB archives that have never come to light before, provides the most complete account of Soviet espionage in America ever written. In 1993, former KGB officer Alexander Vassiliev was permitted unique access to Stalin-era records of Soviet intelligence operations against the United States. Years later, living in Britain, Vassiliev retrieved his extensive notebooks of transcribed documents from Moscow. With these notebooks John Earl Haynes and Harvey Klehr have meticulously constructed a new, sometimes shocking, historical account. Along with general insights into espionage tactics and the motives of Americans who spied for Stalin, Spies resolves specific, long-seething controversies. The book confirms, among many other things, that Alger Hiss cooperated with Soviet intelligence over a long period of years, that journalist I. F. Stone worked on behalf of the KGB in the 1930s, and that Robert Oppenheimer was never recruited by Soviet intelligence. Spies also uncovers numerous American spies who were never even under suspicion and satisfyingly identifies the last unaccounted for American nuclear spies. Vassiliev tells the story of the notebooks and his own extraordinary life in a gripping introduction to the volume.
Experts in the intelligence community say that torture is ineffective. Yet much of the public appears unconvinced: surveys show that nearly half of Americans think that torture can be acceptable for counterterrorism purposes. Why do people persist in supporting torture-and can they be persuaded to change their minds? In Tortured Logic, Erin M. Kearns and Joseph K. Young draw upon a novel series of group experiments to understand how and why the average citizen might come to support the use of torture techniques. They find evidence that when torture is depicted as effective in the media, people are more likely to approve of it. Their analysis weighs variables such as the ethnicity of the interrogator and the suspect; the salience of one's own mortality; and framing by experts. Kearns and Young also examine who changes their opinions about torture and how, demonstrating that only some individuals have fixed views while others have more malleable beliefs. They argue that efforts to reduce support for torture should focus on convincing those with fluid views that torture is ineffective. The book features interviews with experienced interrogators and professionals working in the field to contextualize its findings. Bringing empirical rigor to a fraught topic, Tortured Logic has important implications for understanding public perceptions of counterterrorism strategy.
Since the end of the Cold War, the operations of secret police informers have come under the media spotlight and it is now common knowledge that vast internal networks of spies in the Soviet Union and East Germany were directed by the Communist Party. By contrast, very little historical information has been available on the covert operations of the security services in Mao Zedong's China. However, as Michael Schoenhals reveals in this intriguing and sometimes sinister account, public security was a top priority for the founders of the People's Republic and agents were recruited from all levels of society to ferret out 'counter-revolutionaries'. On the basis of hitherto classified archival records, the book tells the story of a vast surveillance and control apparatus through a detailed examination of the cultivation and recruitment of agents, their training and their operational activities across a twenty-year period from 1949 to 1967.
The spies had come without warning. They plied their craft silently, stealing secrets from the world's most powerful military. They were at work months before anyone noticed their presence. And when American officials finally detected the thieves, they saw it was too late. The damage was done . . . It could have been the plot of a Tom Clancy thriller: Chinese hackers break into American defence contractors and steal the plans for a new multi-billion dollar fighter jet. In fact, it is just one dispatch from the frontline of a new form of warfare. Our wars are increasingly being fought online. GCHQ and the NSA gather vast amounts of information from the internet - and do so with the complicity of companies like Google and Facebook. The American military fields teams of hackers who can, and do, launch computer virus attacks against enemy targets. And with the majority of civil infrastructure - things like nuclear power stations, hospitals, airports and banking systems - now run across the internet, the next 9/11 could be a cyber-attack. Welcome to the modern world of warfare.
This is a history of the Alger Hiss-Whittaker Chambers controversy of 1948 to 1950, a federal criminal case in which Hiss was convicted of perjury after two long trials. Chambers claimed that Hiss had passed classified State Department documents to him in 1937 and 1938 for transmittal to the Soviet Union. Hiss denied the charges but was found guilty at his second trial (the jury could not reach a decision in the first). Hiss was not charged with espionage because of the statute of limitations. The main focus of this narrative focuses on the early months of the affair, from August 1948 when Whittaker Chambers appeared before the House Committee on Un-American Activities and publicly denounced Hiss and several others as underground Communists who had infiltrated the government in the 1930s, to the following December when Hiss was indicted for perjury. The author believes the truth emerges as the story unfolds during these months, based in part on grand jury records unsealed by court order in 1999, leading to the conclusion that the stories Whittaker Chambers told the authorities and later published about himself and Alger Hiss as confederates in the Communist underground of the 1930s are completely fraudulent.
This book critically analyses the concept of the intelligence cycle, highlighting the nature and extent of its limitations and proposing alternative ways of conceptualising the intelligence process. The concept of the intelligence cycle has been central to the study of intelligence. As Intelligence Studies has established itself as a distinctive branch of Political Science, it has generated its own foundational literature, within which the intelligence cycle has constituted a vital thread - one running through all social-science approaches to the study of intelligence and constituting a staple of professional training courses. However, there is a growing acceptance that the concept neither accurately reflects the intelligence process nor accommodates important elements of it, such as covert action, counter-intelligence and oversight. Bringing together key authors in the field, the book considers these questions across a number of contexts: in relation to intelligence as a general concept, military intelligence, corporate/private sector intelligence and policing and criminal intelligence. A number of the contributions also go beyond discussion of the limitations of the cycle concept to propose alternative conceptualisations of the intelligence process. What emerges is a plurality of approaches that seek to advance the debate and, as a consequence, Intelligence Studies itself. This book will be of great interest to students of intelligence studies, strategic studies, criminology and policing, security studies and IR in general, as well as to practitioners in the field.
At the Center of the Storm is a revealing look at the inner workings of the most important intelligence organization in the world during the most challenging times in recent history. Based on his unparalleled access to both the highest echelons of government and raw intelligence from the field, former CIA Director George Tenet's candid and gripping memoir disentangles the interlocking events that led to 9/11 and offers eye-opening new information on the deliberations and strategies that culminated in the U.S. invasion of Iraq. Through it all, Tenet paints an unflinching self-portrait of a man caught between the warring forces of the administration's decision-making process and his own conscience.
As Asia increases in economic and geopolitical significance, it is necessary to better understand the region's intelligence cultures. The Handbook of Asian Intelligence Cultures explores the historical and contemporary influences that have shaped Asian intelligence cultures as well as the impact intelligence service have had on domestic and foreign affairs. In examining thirty Asian countries, it considers the roles, practices, norms and oversight of Asia's intelligence services, including the ends to which intelligence tools are applied. The book argues that there is no archetype of Asian intelligence culture due to the diversity of history, government type and society found in Asia. Rather, it demonstrates how Asian nations' histories, cultures and governments play vital roles in intelligence cultures. This book is a valuable study for scholars of intelligence and security services in Asia, shedding light on understudied countries and identifying opportunities for future scholarship.
It began with an unsigned email: "I am a senior member of the intelligence community". What followed was the most spectacular intelligence breach ever, brought about by one extraordinary man, Edward Snowden. The consequences have shaken the leaders of nations worldwide, from Obama to Cameron, to the presidents of Brazil, France, and Indonesia, and the chancellor of Germany. Edward Snowden, a young computer genius working for America's National Security Agency, blew the whistle on the way this frighteningly powerful organisation uses new technology to spy on the entire planet. The spies call it "mastering the internet". Others call it the death of individual privacy. This is the inside story of Snowden's deeds and the journalists who faced down pressure from the US and UK governments to break a remarkable scoop. Snowden's story reads like a globe-trotting thriller, from the day he left his glamorous girlfriend in Hawaii, carrying a hard drive full of secrets, to the weeks of secret-spilling in Hong Kong and his battle for asylum. Now stuck in Moscow, a uniquely hunted man, he faces US espionage charges and an uncertain future in exile. What drove Snowden to sacrifice himself? Award-winning Guardian journalist Luke Harding asks the question which should trouble every citizen of the internet age. Luke Harding's other books include Wikileaks: Inside Julian Assange's War on Secrecy and Mafia State: How One Reporter Became an Enemy of the Brutal New Russia.
SEXUAL DEVIANTS, NAZI SPIES, DANGEROUS LONERS, COMMUNISTS, DRUG ADDICTS, TRAITORS, AND MOBSTERS. THIS IS HOLLYWOOD. "DECLASSIFIED." It's tough being rich and famous -- stalked, photographed, hounded, and dissected. But obsessive celebrity watching has a lurid history that began long before tabloid shutterbugs took their first shot. Here for the first time are the recently declassified celebrity files of the FBI, the CIA, and the military, giving the private dirt on the most "suspect, dangerous and immoral" public figures in the world -- from George Burns to Andy Warhol. EXPOSED! The panty parties and massive porn stash of comedian Lou Costello. EXPOSED! Ernest Hemingway enlisted as a spy on behalf of the American Embassy. EXPOSED! The sexual drives of our youth aroused beyond normalcy by Elvis Presley. EXPOSED! Hollywood honey Marilyn Monroe had shocking ties to Soviet Russia. EXPOSED! Mysterious death of Princess Di a threat to national security. What were the motivating factors behind the spying, the suspicions, and the accusations? What did those motivations actually reveal about the military, the CIA, the FBI, and the mood of the country? The answers make for a startling, insightful, astonishing, outrageous, sometimes shocking, and always controversial peek into the most secret of lives.
'Early in my research, a friend with excellent knowledge of the United Auto Workers internal operations told me, "Don't give up. They are hiding something"...' It's 1990, and US labour is being outsourced to Mexico. Rumours of a violent confrontation at the Mexican Ford Assembly plant on January 8 reach the United Auto Workers (UAW) union in the US: nine employees had been shot by a group of drunken thugs and gangsters, in an act of political repression which changed the course of Mexican and US workers' rights forever. Rob McKenzie was working at the Ford Twin Cities Assembly plant in Minnesota when he heard of the attack. He didn't believe the official story, and began a years-long investigation to uncover the truth. His findings took him further than he expected - all the way to the doors of the CIA. Virtually unknown outside of Mexico, the full story of 'El Golpe', or 'The Coup', is a dark tale of political intrigue that still resonates today.
Barry Broman has led a remarkable life, and met some remarkable people along the way of his years at a Central Intelligence Agency case officer. Broman was a teenage photographer for the Associated Press in Southeast Asia, then a Marine Corps infantry officer in combat in Vietnam before spending a quarter century as a "head-hunter" with dozens of recruits for the Clandestine Service in operations around the world. Mr. Broman received a BA in Political Science in 1967 followed by an MA in Southeast Asian Studies a year later. Immediately following his service in the Marine Corps, he was recruited by the CIA and spent his first posting in Cambodia at war. He was present at the fall of Phnom Penh in 1975, escaping just before the Khmer Rouge took power. He subsequently served in other Asian postings, one in Europe, and one in the Western Hemisphere. During his career, Mr. Broman was twice a CIA chief of station, once a Deputy Chief of Station, and supervised an international para-military project in support of the Cambodian resistance to Vietnamese invaders. He was actively involved in several assignments in counter-narcotics operations in Southeast Asia including a major "bust" that yielded 551 kilograms of high-grade heroin from a major drug trafficker. His "favorite agent" against a variety of "hard targets" was a fellow whose only demand was that his assignments be "life threatening." He survived them all. At times, the memoir reads like a travel book with tales of visits to little-known and rarely seen places like the Naga Hills on the India-Burma border, the world-famous but off limits jade and ruby mines of Burma, and the isolated Banda Islands of Indonesia, the home of nutmeg. The book is strengthened by many photos by the author. They include Marines in action in Vietnam, the ravages of war in Cambodia at war, and opium buyers forcing growers to sell in Burma.
This book tells for the first time the extraordinary story of Sergei Degaev, a political terrorist in tsarist Russia who disappeared after participating in the assassination of the chief of Russia's security organization in 1883. Those who knew and admired Alexander Pell at the University of South Dakota never guessed that he was actually Degaev, a revolutionary who had reinvented himself as a quiet mathematics professor. "An amazing story, part Dostoevsky, part Conrad. . . . Remarkable."-Michael J. Ybarra, Wall Street Journal "One of the most distinguished historians of Russia . . . [gives] us a real-life thriller that is also a cautionary tale rich with insight into depths of the human psyche."-David Pryce-Jones, Commentary "Absorbing, brilliantly researched. . . . [A] fascinating display of scholarly detective work."-Raymond Carr, Spectator "Pipes is the finest historian of late nineteenth- and early twentieth-century Russia. . . . [His] Degaev Affair takes the reader through the dark and terrifying alleyways of the historical underworld. As a story, it ranks as a true-life version of Conrad's Under Western Eyes."-Nikolai Tolstoy, Literary Review "A brilliant history of treason, deception, terror, and academe in the underworld of Imperial Russia and the respectability of midwestern U.S. universities."-Simon Sebag Montefiore, Financial Times "Fascinating."-Orlando Figes, New York Review of Books
Established in the 1940s, the Five Eyes intelligence network consists of Australia, Britain, Canada, New Zealand, and the United States. The alliance was integral to shaping domestic and international security decisions during the Cold War, yet much of the intelligence history of these countries remains unknown. In The Bridge in the Parks, intelligence scholars from across the Five Eyes come together to present case studies detailing the varied successes and struggles their countries experienced in the world of Cold War counter-intelligence. The case studies draw on newly declassified documents on a variety of topics, including civil liberties, agent handling, wiretapping, and international relations. Collectively, these studies highlight how Cold War intelligence history is more nuanced than it has often been portrayed - and much like in the world of intelligence, nothing is ever entirely as it seems.
Home-grown terrorists equipped by a foreign power are not a new phenomenon. During the Second World War, Hitler's Germany made sustained efforts to inflict a terror campaign on the streets of Britain through the use of secret agents and agents provocateurs. The aim was to blow up military, industrial, transport and telecommunication targets, to lower morale among the civilian population and disrupt the war effort. Even before the outbreak of war, the Nazis provided the IRA with assistance for their plan to sabotage the British mainland. Prior to their planned invasion in the summer of 1940, the Nazis were also keen to recruit members of the Welsh and Scottish Nationalist Parties to engage in sabotaging British targets and, over the course of the war, infiltrated dozens of trained agents from countries including Norway, Denmark, Holland, France and Cuba. What happened to the myriad plots to blow up Britain? We know that intelligence obtained from decrypted enemy messages via Bletchley Park and double agents like ZIGZAG, SUMMER and TATE alerted MI5 to some of these spies' arrivals, but what about the others? And how successful were MI5's efforts to fake acts of sabotage and arrange media coverage to fool the enemy into thinking their agents were still at large and on task? In this book, Bernard O'Connor, a noted wartime espionage historian, tells the complete story of the successes and failures of the Nazi terror offensive on mainland Britain during 1938-1944.
MSNBC counterterrorism analyst and New York Times bestselling author Malcolm Nance was the first person to blow the whistle on Russia's hacking of the 2016 election and to reveal Vladmir Putin's masterplan. Now, in THE PLOT TO BETRAY AMERICA, Nance provides a detailed assessment of how Donald Trump lead a cabal of American financial charlatans, political opportunists and power-hungry sycophants to eagerly betray the nation in order to execute a Russian inspired plan to place him, a Kremlin-friendly President in power. It details an evidence-based conspiracy of a ravenously avaricious family leading an administration of political mercenaries who plotted to dismantle 244 years of American democracy and break up the American-led world order since WWII. Seduced by promises of riches dangled in front of them by Putin, the Trump administration has been was caught trying to use all of its political power to stop investigations by US Intelligence and the Special Counsel to conceal the greatest betrayal in American history: The sale of the American presidency to foreign adversaries. THE PLOT TO BETRAY AMERICA will unscramble the framework and strategies used by the Republican Party and non-state conspirators, including Rudy Guiliani, Mitch McConnell, Jeff Sessions, and more. Nance's in-depth research and interviews with intelligence experts and insiders illustrate Trump's deep financial ties to Russia through his family's investments, the behaviors of his pro-Moscow associates and the carefully crafted seduction of numerous Americans by Russian intelligence led to work with Vladimir Putin to betray the nation. In what reads like a fast-paced geopolitical spy-thriller, Nance clarifies the spiders web of relationships both personal and financial (including Russia and American based mafia) that lead back to the Kremlin. THE PLOT TO BETRAY AMERICA provides a step-by-step blueprint of how and why Trump will be brought to justice.
The authors reveal how, for 60 years, there has been an unprecedented cover-up by both the British Establishment and successive generations of historians about the flight of Hitler's Deputy Rudolf Hess to Scotland in May 1941. Long dismissed as the misguided attempt of a madman to make contact with a non-existent British peace party, "Double Standards" shows that Hess's peace mission was one of the pivotal events of the 20th century - and that the Establishment had very good reasons for covering up the truth: the Establishment WAS the peace party that Hess had come to meet Perhaps even more shockingly, the book reveals that members of the Royal Family itself - whose involvement in the Hess affair, the authors say, has been "airbrushed" out of history - were at the heart of this group. Exposing the wartime propaganda that still masquerades as fact, and based on new material from eyewitnesses, hitherto inaccessible archives and intelligence sources, the book reveals that Hess's peace mission was of supreme importance and raises some of the most intriguing questions about the history of the 20th century. The authors' mission is to answer them.
The secret history of MI6 - from the Cold War to the present day. The British Secret Service has been cloaked in secrecy and shrouded in myth since it was created a hundred years ago. Our understanding of what it is to be a spy has been largely defined by the fictional worlds of James Bond and John le Carre. THE ART OF BETRAYAL provides a unique and unprecedented insight into this secret world and the reality that lies behind the fiction. It tells the story of how the secret service has changed since the end of World War II and by focusing on the people and the relationships that lie at the heart of espionage, revealing the danger, the drama, the intrigue, the moral ambiguities and the occasional comedy that comes with working for British intelligence. From the defining period of the early Cold War through to the modern day, MI6 has undergone a dramatic transformation from a gung-ho, amateurish organisation to its modern, no less controversial, incarnation. Gordon Corera reveals the triumphs and disasters along the way. The grand dramas of the Cold War and after - the rise and fall of the Berlin Wall, the Cuban Missile Crisis, the 11 September 2001 attacks and the Iraq war - are the backdrop for the human stories of the individual spies whose stories form the centrepiece of the narrative. But some of the individuals featured here, in turn, helped shape the course of those events. Corera draws on the first-hand accounts of those who have spied, lied and in some cases nearly died in service of the state. They range from the spymasters to the agents they ran to their sworn enemies. Many of these accounts are based on exclusive interviews and access. From Afghanistan to the Congo, from Moscow to the back streets of London, these are the voices of those who have worked on the front line of Britain's secret wars. And the truth is often more remarkable than the fiction.
'The best book on codebreaking I have read', SIR DERMOT TURING 'Brings back the joy I felt when I first read about these things as a kid', PHIL ZIMMERMANN 'This is at last the single book on codebreaking that you must have. If you are not yet addicted to cryptography, this book will get you addicted. Read, enjoy, and test yourself on history's great still-unbroken messages!' JARED DIAMOND is the Pulitzer Prize-winning author of Guns, Germs, and Steel; Collapse; and other international bestsellers 'This is THE book about codebreaking. Very concise, very inclusive and easy to read', ED SCHEIDT 'Riveting', MIKE GODWIN 'Approachable and compelling', GLEN MIRANKER This practical guide to breaking codes and solving cryptograms by two world experts, Elonka Dunin and Klaus Schmeh, describes the most common encryption techniques along with methods to detect and break them. It fills a gap left by outdated or very basic-level books. This guide also covers many unsolved messages. The Zodiac Killer sent four encrypted messages to the police. One was solved; the other three were not. Beatrix Potter's diary and the Voynich Manuscript were both encrypted - to date, only one of the two has been deciphered. The breaking of the so-called Zimmerman Telegram during the First World War changed the course of history. Several encrypted wartime military messages remain unsolved to this day. Tens of thousands of other encrypted messages, ranging from simple notes created by children to encrypted postcards and diaries in people's attics, are known to exist. Breaking these cryptograms fascinates people all over the world, and often gives people insight into the lives of their ancestors. Geocachers, computer gamers and puzzle fans also require codebreaking skills. This is a book both for the growing number of enthusiasts obsessed with real-world mysteries, and also fans of more challenging puzzle books. Many people are obsessed with trying to solve famous crypto mysteries, including members of the Kryptos community (led by Elonka Dunin) trying to solve a decades-old cryptogram on a sculpture at the centre of CIA Headquarters; readers of the novels of Dan Brown as well as Elonka Dunin's The Mammoth Book of Secret Code Puzzles (UK)/The Mammoth Book of Secret Codes and Cryptograms (US); historians who regularly encounter encrypted documents; perplexed family members who discover an encrypted postcard or diary in an ancestor's effects; law-enforcement agents who are confronted by encrypted messages, which also happens more often than might be supposed; members of the American Cryptogram Association (ACA); geocachers (many caches involve a crypto puzzle); puzzle fans; and computer gamers (many games feature encryption puzzles). The book's focus is very much on breaking pencil-and-paper, or manual, encryption methods. Its focus is also largely on historical encryption. Although manual encryption has lost much of its importance due to computer technology, many people are still interested in deciphering messages of this kind.
|
You may like...
Personnel Management in Secret Service…
Barbara Czarniawska, Sabina Siebert, …
Hardcover
R2,580
Discovery Miles 25 800
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von
Paperback
R809
Discovery Miles 8 090
Ready To Fire - How India and I Survived…
Nambi Narayanan, Arun Ram
Hardcover
R1,089
Discovery Miles 10 890
Spying And The Crown - The Secret…
Richard J. Aldrich, Rory Cormac
Paperback
R358
Discovery Miles 3 580
The Official CIA Manual of Trickery and…
H. Keith Melton, Robert Wallace
Paperback
Fair Game - How a Top Spy Was Betrayed…
Valerie Plame Wilson
Paperback
|