![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
‘One of our very best writers on France.’ Antony Beevor After publishing an acclaimed biography of Jean Moulin, leader of the French Resistance, Patrick Marnham received an anonymous letter from a person who claimed to have worked for British Intelligence during the war. The ex-spy praised his book but insisted that he had missed the real ‘treasure’. The letter drew Marnham back to the early 1960s when he had been taught French by a mercurial woman – a former Resistance leader, whose SOE network was broken on the same day that Moulin was captured and who endured eighteen months in Ravensbrück concentration camp. Could these two events have been connected? His anonymous correspondent offered a tantalising set of clues that seemed to implicate Churchill and British Intelligence in the catastrophe. Drawing on a deep knowledge of France and original research in British and French archives, War in the Shadows exposes the ruthless double-dealing of the Allied intelligence services and the Gestapo through one of the darkest periods of the Second World War. It is a story worthy of Le Carré, but with this difference – it is not fiction. ‘A melange of Le Grand Meaulnes and The Spy Who Came in from the Cold. It is unforgettable.’ Ferdinand Mount, TLS, Books of the Year ‘A masterly analysis, impeccably presented.’ Allan Mallinson, Spectator ‘Fascinating… Marnham has a vast and scholarly knowledge of this often treacherous world.’ Caroline Moorehead, Literary Review
'A scrupulous piece of reporting, necessary, timely and very sobering'
John Le Carré
In King of Spies, prize-winning journalist and bestselling author of Escape From Camp 14, Blaine Harden, reveals one of the most astonishing – and previously untold – spy stories of the twentieth century. Donald Nichols was 'a one man war', according to his US Air Force commanding general. He won the Distinguished Service Cross, along with a chest full of medals for valor and initiative in the Korean War. His commanders described Nichols as the bravest, most resourceful and effective spymaster of that forgotten war. But there is far more to Donald Nichols' story than first meets the eye . . . Based on long-classified government records, unsealed court records, and interviews in Korea and the U.S., King of Spies tells the story of the reign of an intelligence commander who lost touch with morality, legality, and even sanity, if military psychiatrists are to be believed. Donald Nichols was America's Kurtz. A seventh-grade dropout, he created his own black-ops empire, commanding a small army of hand-selected spies, deploying his own makeshift navy, and ruling over it as a clandestine king, with absolute power over life and death. He claimed a – 'legal license to murder' – and inhabited a world of mass executions and beheadings, as previously unpublished photographs in the book document. Finally, after eleven years, the U.S. military decided to end Nichols's reign. He was secretly sacked and forced to endure months of electroshock in a military hospital in Florida. Nichols told relatives the American government was trying to destroy his memory. King of Spies looks to answer the question of how an uneducated, non-trained, non-experienced man could end up as the number-one US spymaster in South Korea and why his US commanders let him get away with it for so long . . .
Acclaimed author and managing director of The Times Literary Supplement, James MacManus, creates a compelling historical novel that brings to life an unbelievable but true love story set during the Second World War. In 1942, Cork-born Kay Summersby's life is changed forever when she is tasked with driving General Eisenhower on his fact-finding visit to wartime London. Despite Eisenhower's marriage to Mamie, the pair takes an immediate liking to one another and he gifts Kay a rare wartime luxury: a box of chocolates. So begins a tumultuous relationship that against all military regulation sees Kay travelling with Eisenhower on missions to far flung places before the final assault on Nazi Germany. She becomes known as "Ike's shadow" and in letters Mamie bemoans his new obsession with 'Ireland'. That does not stop him from using his influence to grant Kay US citizenship and rank in the US army, drawing her closer when he returns to America. When the US authorities discover Eisenhower's plans to divorce from his wife they threaten the fragile but passionate affair and Kay is forced to take desperate measures to hold onto the man she loves...
Wolfe Frank was Chief Interpreter at the Nuremberg Trials where he was dubbed 'The Voice of Doom'. A playboy turned resistance worker he had fled Germany for England in 1937 having been branded an 'enemy of the state - to be shot on sight'. Initially interned as an 'enemy alien', he was later released and allowed to join the British Army - where he rose to the rank of Captain. Unable to speak English when he arrived by the time of the trials he was considered to be the finest interpreter in the world. In the months following his service at Nuremberg, Frank became increasingly alarmed at the misinformation coming out of Germany so in 1949, backed by the New York Herald Tribune, he risked his life again by returning to the country of his birth to make an 'undercover' survey of the main facets of post-war German life and viewpoints. During his enterprise he worked as a German alongside Germans in factories, on the docks, in a refugee camp and elsewhere. Equipped with false papers he sought objective answers to many questions including: refugees; anti-Semiticism; morality, de-Nazification; religion; nationalism. The NYHT said at the time: 'A fresh appraisal of the German question could only be obtained by a German and Mr Frank had all the exceptional qualifications necessary. We believe the result of his "undercover" work told in human, factual terms, is an important contribution to one of the great key problems of the post-war world ... and incidentally it contains some unexpected revelations and dramatic surprises'. The greatest of those surprises was Frank single handedly tracking down and arresting the SS General ranked 'fourth' on the allies 'most wanted' list - and personally taking and transcribing the Nazi's confession. The Undercover Nazi Hunter not only reproduces Frank's series of articles (as he wrote them) and a translation of the confession, which, until now, has never been seen in the public domain, it also reveals the fascinating behind-the-scenes story of a great American newspaper agonizing over how best to deal with this unique opportunity and these important exposes.
Intelligence was a central element of the Cold War and the need for
it was expected to diminish after the USSR's collapse, yet in
recent years it has been in greater demand than ever. The
atrocities of 11 September and the subsequent "war on terrorism"
now call for an even more intensive effort. Important questions
arise on how intelligence fits into the world of increased threats,
globalization and expanded international action. This volume
contains the recent work on this subject by Michael Herman, British
intelligence professional for 35 years and Oxford University
academic. It compares intelligence with other government
information services, and discusses the British intelligence system
and the case for its reform. It also addresses the ethical issues
raised by intelligence's methods and results: "do they on balance
make for a better world or a worse one?." Other chapters explore a
wide range of intelligence topics past and present, including the
transatlantic relationship, the alliance strategies of Norway and
New Zealand, Mrs Thatcher's "de-unionization" of British Sigint,
and personal memories of the British Cabinet Office in the
1970s.
The Stasi were among the most successful security and intelligence services of the Cold War. Behind the Berlin Wall, colleagues, friends, husbands and wives, informed on each other. Stasi chief, General Mielke, prided himself on this situation. Under Marcus Wolf, Stasi agents were spectacularly successful in gaining entry into the West German Establishment and NATO. Some remain undiscovered. In this book two British experts reveal how the Stasi operated. Based on a wealth of sources, including interviews with former Stasi officers and their victims, the book tells a story of unbridled power, misguided idealism, treachery, widespread opportunism and lonely courage.
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
This is a first-hand report by a top German intelligence agent sent to the still-neutral United States in World War I. Official German records, captured by British and American forces at the end of World War II, show the memoirs of the German naval officer to be accurate. Rintelen's orders in Berlin had called for measures to prevent the shipment of American war material to Germany's enemies. In the US, this meant buying arms to keep them from being purchased by the Allies, but it could also mean placing bombs in the hulls of ships sailing for Eurpoe and fomenting strikes among the labour force of American ammunition manufacturers.
Even paranoids have enemies. Hitler's most powerful foes were the Allied powers, but he also feared internal conspiracies bent on overthrowing his malevolent regime. In fact, there was a small but significant internal resistance to the Nazi regime, and it did receive help from the outside world. Through recently declassified intelligence documents, this book reveals for the first time the complete story of America's wartime knowledge about, encouragement of, and secret collaboration with the German resistance to Hitler?including the famous July 20th plot to assassinate the Fuehrer.The U.S. government's secret contacts with the anti-Nazi resistance were conducted by the OSS, the World War II predecessor to the CIA. Highly sensitive intelligence reports recently released by the CIA make it evident that the U.S. government had vast knowledge of what was going on inside the Third Reich. For example, a capitulation offer to the western Allies under consideration by Count von Moltke in 1943 was thoroughly discussed within the U.S. government. And Allen Dulles, who was later to become head of the CIA, was well informed about the legendary plot of July 20th. In fact, these secret reports from inside Germany provide a well-rounded picture of German society, revealing the pro- or anti-Nazi attitudes of different social groups (workers, churches, the military, etc.). The newly released documents also show that scholars in the OSS, many of them recruited from ivy-league universities, looked for anti-Nazi movements and leaders to help create a democratic Germany after the war.Such intelligence gathering was a major task of the OSS. However, OSS director ?Wild Bill? Donovan and others favored subversive operations, spreading disinformation, and issuing propaganda. Unorthodox and often dangerous schemes were developed, including bogus ?resistance newspapers,? anti-Nazi letters and postcards distributed through the German postal service, sabotage, and fake radio broadcasts from ?German generals? calling for uprisings against the regime.This is much more than a documentary collection. Explanatory footnotes supply a wealth of background information for the reader, and a comprehensive introduction puts the documents into their wider historical perspective. Arranged in chronological order, these intelligence reports provide a fascinating new perspective on the story of the German resistance to Hitler and reveal an intriguing and previously unexplored aspect of America's war with Hitler.
This book looks at political corruption in Latin American and Europe from both an historical and a contemporary angle. The approach is therefore comparative and interdisciplinary, bringing together scholars from history, political science, anthropology, sociology and economics. In addition to general essays, this book includes chapters analysing political corruption in individual countries: Italy, Spain, France, Great Britain, Chile, Brazil, Venezuela, Paraguay and Mexico.
The Man Who Rode the Tiger is the dramatic story of the biggest investigation of political corruption in American municipal history. The "Seabury Investigation" became a model for federal, state, and city investigations of major officeholders and minor rascals. Samuel Seabury was a patrician New Yorker who was called upon to ride the Tammany Tiger, longtime symbol of crooked politics and influence-peddling. Seabury and his staff of tough young lawyers toppled Mayor Jimmy Walker - the popular Beau James; struck a near-death blow to Tammany Hall; were directly responsible for selecting and electing Fiorello H. LaGuardia as the most popular Mayor in New York history; and helped Governor Franklin D. Roosevelt in his campaign for the presidency of the United States. The final confrontation between Judge Seabury and Jimmy Walker was before Governor Roosevelt in Albany. FDR surprised those who thought he was a lightweight - and Tammany instrument - by handling himself beautifully, disengaging himself from Tammany's grip, and gaining national attention.
In September 1940 a beautiful young woman arrived by seaplane and rubber dinghy on the shores of Scotland accompanied by two men - one of Germany's many attempt to penetrate British defences and infiltrate spies into the UK. This seems to be one of the few established facts in the otherwise mysterious tale of Vera Eriksen. Even the origins of the woman described as 'the most beautiful spy' remain hazy, as does her ultimate fate. David Tremain delves into the archives, and in doing so begins to reveal glimpses of her fascinating life story: her career as a dancer in Paris; a tumultuous and violent dalliance with a White Russian officer of uncertain identity; her time in England with the Duchesse de Chateau-Thierry, an Abwehr agent; the suspicious and untimely death of her husband, and a rumoured pregnancy. The Beautiful Spy also grapples with perhaps the biggest mystery of all: what happened to Vera after she was released by the British?
The explosive new book from ex-MI5 surveillance officer Tom Marcus takes the reader on a non-stop, adrenalin-fuelled ride as he hunts down those who would do our country harm. Tom spent years working covertly to stop those who want to do us harm. In his bestselling memoir Soldier Spy, he told how he was recruited and described some of his top-secret operations. In his new book, he takes us deeper undercover as he puts his life on the line once more. I Spy plunges the reader straight into the action as Tom and his team race to prevent terrorists from causing carnage on our streets and outsmart Russian agents, blocking a daring plot that threatens the security of the nation. Relying on their quick wits, training and courage, the extraordinary men and women of MI5 are under intense pressure every day. Not everyone is suited for the work, and Tom shows how the incredibly tough challenges he faced growing up gave him the mental strength and skills to survive in a dangerous world. Gritty and eye-opening, this is a unique insight into a hidden war and the sacrifices made by those who fight it. You will never take your safety for granted again.
To what extent do cyberspace operations increase the risks of escalation between nation-state rivals? Scholars and practitioners have been concerned about cyber escalation for decades, but the question remains hotly debated. The issue is increasingly important for international politics as more states develop and employ offensive cyber capabilities, and as the international system is increasingly characterized by emergent multipolarity. In Escalation Dynamics in Cyberspace, Erica D. Lonergan and Shawn W. Lonergan tackle this question head-on, presenting a comprehensive theory that explains the conditions under which cyber operations may lead to escalation. In doing so, they challenge long-held assumptions about strategic interactions in cyberspace, arguing that cyberspace is not as dangerous as the conventional wisdom might suggest. In some cases, cyber operations could even facilitate the de-escalation of international crises. To support their claims, Lonergan and Lonergan test their theory against a range of in-depth case studies, including strategic interactions between the United States and key rivals; a series of case studies of the role of cyber operations in international crises; and plausible future scenarios involving cyber operations during conflict. They then apply their analytical insights to policymaking, making the case that skepticism is warranted about the overall efficacy of employing cyber power for strategic ends. By exploring the role of cyber operations in routine competition, crises, and warfighting, Escalation Dynamics in Cyberspace presents nuanced insights about how cyberspace affects international politics.
Security intelligence continues to be of central importance to the contemporary world: individuals, organizations and states all seek timely and actionable intelligence in order to increase their sense of security. But what exactly is intelligence? Who seeks to develop it and to what ends? How can we ensure that intelligence is not abused? In this third edition of their classic text, Peter Gill and Mark Phythian set out a comprehensive framework for the study of intelligence, discussing how states organize the collection and analysis of information in order to produce intelligence, how it is acted upon, why it may fail and how the process should be governed in order to uphold democratic rights. Fully revised and updated throughout, the book covers recent developments, including the impact of the Snowden leaks on the role of intelligence agencies in Internet and social media surveillance and in defensive and offensive cyber operations, and the legal and political arrangements for democratic control. The role of intelligence as part of 'hybrid' warfare in the case of Russia and Ukraine is also explored, and the problems facing intelligence in the realm of counterterrorism is considered in the context of the recent wave of attacks in Western Europe. Intelligence in an Insecure World is an authoritative and accessible guide to a rapidly expanding area of inquiry - one that everyone has an interest in understanding.
This book reveals the development, strategy and extraordinary success of Britains secret services in Francos Spain during the Second World War. The main claim of this study is that British pressure, exercised above all through their intelligence services, led Franco to distance himself from the Axis cause and eventually embrace that of the Allies. Starting from a virtually non-existent base, the British rapidly built up a complex intelligence network in Spain that stretched from Corunna to Barcelona and from Bilbao to Gibraltar. As Spain was a non-belligerent, spy networks including those of the Germans, Italians, Portuguese and British proliferated in the Iberian Peninsula. Double-agents abounded within these networks; each one knew what the others were up to. The British exploited this two-way traffic to let Franco know that if he did not accede to their demands, they would back a restoration of the Bourbon monarchy under Don Juan. This pressure culminated in the meeting of 1943 between Franco and the British Ambassador, Sir Samuel Hoare, at the dictators country retreat in Galicia, the British underlining their purpose by flying warplanes close by the estate. Following this meeting, Franco almost immediately began to move away from the Axis powers and towards the Allies. The British swiftly dismantled their intelligence networks given that they had achieved their aim. Francos expulsion of the German naval forces from Spanish ports and the denazification of the regime explains the benevolent attitude of the Allies towards the Spanish dictatorship after the war. Throughout this whole process, the British secret service, as this extensively researched study uncovers, played a crucial role.
Andrew W. Neal argues that while 'security' was once an anti-political 'exception' in liberal democracies - a black box of secret intelligence and military decision-making at the dark heart of the state - it has now become normalised in professional political life. This represents a direct challenge to critical security studies debates and their core assumption that security is a kind of illiberal and undemocratic 'anti-politics'. Using archival research and interviews with politicians, Neal investigates security politics from the 1980s to the present day to show how its meaning and practice have changed over time. In doing so, he develops an original reassessment of the security/politics relationship.
In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking their movements and transactions with public and private institutions. The state is becoming like a one-way mirror, where it can see more of what its citizens do and say, while citizens see less and less of what the state does, owing to high levels of secrecy around surveillance. In this book, Jane Duncan assesses the relevance of Snowden’s revelations for South Africa. In doing so she questions the extent to which South Africa is becoming a surveillance society governed by a surveillance state. Duncan challenges members of civil society to be concerned about and to act on the ever-expanding surveillance capacities of the South African state. Is surveillance used for the democratic purpose of making people safer, or is it being used for the repressive purpose of social control, especially of those considered to be politically threatening to ruling interests? She explores the forms of collective action needed to ensure that unaccountable surveillance does not take place and examines what does and does not work when it comes to developing organised responses. This book is aimed at South African citizens, academics as well as the general reader, who care about our democracy and the direction it is taking.
James Lockhart blends Chilean, inter-American and transatlantic national, regional and world-historical trends into a century-long Cold War narrative. He argues that Chileans made their own history as highly engaged internationalists while reassessing American and other foreign-directed intelligence, surveillance and secret warfare operations in Chile and southern South America. The book transcends a well-known, US-centred historiography while offering a more equitable and global interpretation of Chile's Cold War experience than previously possible. This advances research that has progressively expanded the framework of Chile's Cold War experience since the arrest of General Augusto Pinochet in the UK for human rights violations more than 20 years ago.
"We are dropping cyber bombs. We have never done that before."-U.S. Defense Department official. A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country's attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called "digital combat power" and how the United States should incorporate that power into its national security strategy.
By shifting American security policy away from maximizing military power for the United States and toward maximizing human security for all, policymakers and citizens can also maximize national security for the United States and sustainable peace for the world. Why do war and political violence persist? Political realists argue that violent conflict and the struggle for power are inherent in the international system, and there is little we can do but manage it. However, as Robert Johansen argues in this path-breaking work, there are other ways forward. In Where the Evidence Leads, Johansen develops an "empirical realist" theory to enable the United Sates to respond more effectively to rising security threats. Together, peace research and security studies show that more security benefits are likely to result from maximizing the "causes" or correlates of peace than from maximizing military power. Ironically, a global grand strategy for human security, with national security folded into it, is likely to produce more security for the United States than a national security strategy. Peace reigns when states implement peace correlates, which range from addressing all nations' security fears to making life more predictable through better global governance. This approach, respectful of forgotten insights from Hans Morgenthau and others, revolutionizes thinking about national security policy by bringing it into a human security framework. The analysis shows that the anarchic, militarized balance-of-power system can be gradually changed with help from enhanced lawmaking, enforcement, and governance capacities. This thought-provoking book builds bridges between past policies-many of which have failed-and more deft ways of handling new realities that focus on building peace. In a world of threats, this book opens doors onto a future of sustainable peace, security, and hope.
As increasingly contentious politics in the United States raise concerns over the "politicization" of traditionally non-partisan institutions, many have turned their attention to how the American military has been-and will be-affected by this trend. Since a low point following the end of the Vietnam War, the U.S. military has experienced a dramatic reversal of public opinion, becoming one of the most trusted institutions in American society. However, this trend is more complicated than it appears: just as individuals have become fonder of their military, they have also become increasingly polarized from one another along partisan lines. The result is a new political environment rife with challenges to traditional civil-military norms. In a data-driven analysis of contemporary American attitudes, Dangerous Instrument examines the current state of U.S. civil-military affairs, probing how the public views their military and the effect that partisan tribalism may have on that relationship in the future. Michael A. Robinson studies the sources and potential limits of American trust in the armed services, focusing on the interplay of the public, political parties, media outlets, and the military itself on the prospect of politicization and its associated challenges. As democratic institutions face persistent pressure worldwide, Dangerous Instrument provides important insights into the contemporary arc of American civil-military affairs and delivers recommendations on ways to preserve a non-partisan military.
Late in his life, former president Lyndon B. Johnson told a reporter that he didn't believe the Warren Commission's finding that Lee Harvey Oswald acted alone in killing President John F. Kennedy. Johnson thought Cuban president Fidel Castro was behind it. After all, Johnson said, Kennedy was running "a damned Murder, Inc., in the Caribbean," giving Castro reason to retaliate. Murder, Inc., tells the story of the CIA's assassination operations under Kennedy up to his own assassination and beyond. James H. Johnston was a lawyer for the Senate Intelligence Committee in 1975, which investigated and first reported on the Castro assassination plots and their relation to Kennedy's murder. Johnston examines how the CIA steered the Warren Commission and later investigations away from connecting its own assassination operations to Kennedy's murder. He also looks at the effect this strategy had on the Warren Commission's conclusions that assassin Lee Harvey Oswald acted alone and that there was no foreign conspiracy. Sourced from in-depth research into the "secret files" declassified by the JFK Records Act and now stored in the National Archives and Records Administration, Murder, Inc. is the first book to narrate in detail the CIA's plots against Castro and to delve into the question of why retaliation by Castro against Kennedy was not investigated. |
![]() ![]() You may like...
Differential Equations with…
Warren Wright, Dennis Zill
Paperback
![]()
Modeling and Simulating Complex Business…
Zoumpolia Dikopoulou
Hardcover
R3,608
Discovery Miles 36 080
Advances in Data Science and Management…
Samarjeet Borah, Valentina Emilia Balas, …
Hardcover
R5,690
Discovery Miles 56 900
Dissolved Organic Matter in Lacustrine…
K. Salonen, T. Kairesalo, …
Hardcover
R5,834
Discovery Miles 58 340
Understanding Statistics Using R
Randall Schumacker, Sara Tomek
Hardcover
R3,623
Discovery Miles 36 230
|