![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
This is the true story of the Englishman allegedly freed from a French prison after meeting John Amery, the treacherous son of a Cabinet minister, and sent back to Britain to spy - only to be caught, prosecuted and hanged as a traitor. In November 1943, with the Second World War at its height, a fifty-eight-year-old London-born man claiming to be a refugee from the Nazis arrived by flying boat at Poole Harbour. His name was Oswald John Job and he said he had escaped from internment by the Germans in Paris, then fled to Spain. But hidden inside his keys and razor was invisible ink, and on him he carried a jewelled tiepin and a ring with eighteen diamonds sent by the Germans as payment to an agent in London. What Job did not know was that this man was a double agent, working for MI5. Within four months Job would be hanged as a traitor. He claimed to the end that he had accepted the German offer purely to get back to Britain and never intended to spy. As an English traitor who was caught and executed, Job is a fascinating figure in the story of Second World War intelligence and counter-intelligence. Utilising archives in both Britain and France, Britain's Forgotten Traitor is a fresh look at treachery and secret agents. This 'spy' always claimed to have lied simply in order to come home. Was he telling the truth?
We have witnessed a digital revolution that affects the dynamics of existing traditional social, economic, political and legal systems. This revolution has transformed espionage and its features, such as its purpose and targets, methods and means, and actors and incidents, which paves the way for the emergence of the term cyberespionage. This book seeks to address domestic and international legal tools appropriate to adopt in cases of cyberespionage incidents. Cyberespionage operations of state or non-state actors are a kind of cyber attack, which violates certain principles of international law but also constitute wrongful acquisition and misappropriation of the data. Therefore, from the use of force to state responsibility, international law offers a wide array of solutions; likewise, domestic regulations through either specialized laws or general principles stipulate civil and criminal remedies against cyberespionage. Confronting Cyberespionage Under International Law examines how espionage and its applications have transformed since World War II and how domestic and international legal mechanisms can provide effective legal solutions to this change, hindering the economic development and well-being of individuals, companies and states to the detriment of others. It shows the latest state of knowledge on the topic and will be of interest to researchers, academics, legal practitioners, legal advisors and students in the fields of international law, information technology law and intellectual property law.
As increasingly contentious politics in the United States raise concerns over the "politicization" of traditionally non-partisan institutions, many have turned their attention to how the American military has been-and will be-affected by this trend. Since a low point following the end of the Vietnam War, the U.S. military has experienced a dramatic reversal of public opinion, becoming one of the most trusted institutions in American society. However, this trend is more complicated than it appears: just as individuals have become fonder of their military, they have also become increasingly polarized from one another along partisan lines. The result is a new political environment rife with challenges to traditional civil-military norms. In a data-driven analysis of contemporary American attitudes, Dangerous Instrument examines the current state of U.S. civil-military affairs, probing how the public views their military and the effect that partisan tribalism may have on that relationship in the future. Michael A. Robinson studies the sources and potential limits of American trust in the armed services, focusing on the interplay of the public, political parties, media outlets, and the military itself on the prospect of politicization and its associated challenges. As democratic institutions face persistent pressure worldwide, Dangerous Instrument provides important insights into the contemporary arc of American civil-military affairs and delivers recommendations on ways to preserve a non-partisan military.
This political analysis exposes the fanciful logic that the United States can use nuclear weapons to vanquish nuclear adversaries or influence them when employing various coercive tactics. During the Cold War, American policymakers sought nuclear advantages to offset an alleged Soviet edge. Policymakers hoped that US nuclear capabilities would safeguard deterrence, when backed perhaps by a set of coercive tactics. But policymakers also hedged their bets with plans to fight a nuclear war to their advantage should deterrence fail. In The False Promise of Superiority, James H. Lebovic argues that the US approach was fraught with peril and remains so today. He contends that the United States can neither simply impose its will on nuclear adversaries nor safeguard deterrence using these same coercive tactics without risking severe, counterproductive effects. As Lebovic shows, the current faith in US nuclear superiority could produce the disastrous consequences that US weapons and tactics are meant to avoid. This book concludes that US interests are best served when policymakers resist the temptation to use, or prepare to use, nuclear weapons first or to brandish nuclear weapons for coercive effect.
An overarching exploration of the Indian state's approaches, laws, and organizations that maintain order and contain violence. Maintaining order and containing violence-the core constituents of internal security-are fundamental responsibilities of any government. Yet, developing countries find this task especially challenging. In Internal Security in India, Amit Ahuja, Devesh Kapur, and a cast of leading scholars on the subject focus on India's security and the threats it faces. Since Independence, the Indian state has grappled with a variety of internal security challenges, including insurgencies, terrorist attacks, caste and communal violence, riots, and electoral violence. Their toll has claimed more lives than all of India's five external wars put together. As the contributors in this volume analyze how the Indian State has managed the core concern of internal security over time, they address three broad questions: How well has India contained violence and preserved order? How have the approaches and capacity of the State evolved to attain these twin objectives? And what implications do the State's approach towards internal security have for civil liberties and the quality of democracy? A major reinterpretation of order and internal security in India, this book sheds light on an underanalyzed issue of global import given the changing nature of threats that states face.
Did the Trump administration have a cybersecurity strategy, or was it hell-bent on dismantling years of consensus-building on how the nation should respond to an existential threat to its digital life blood? Based on insider accounts and exclusive interviews with experts, Cyber in the Age of Trump offers a first-time chronicle and analysis of the Trump administration's approach to cybersecurity, its curious decisions and strategic choices, places where its work has earned applause, and the places where cyber pros see major signs of danger. The new administration came in with a strong faith in technology, a sense that the U.S. could better deploy its cyber weaponry to deter foes, and a willingness to continue popular Obama-era policies on collaborating with industry. But it didn't seem to have a cyber vision, or one that was applied consistently. And in the absence of such a strategic overview, the threat to the nation would only grow. Cyber in the Age of Trump is the first book to examine the impact of President Trump on the nation's greatest long-term strategic challenge and how a "disruptor presidency" has upended consensus and threatened to derail cyber policy.
It is January 6, 2017, two weeks before the inauguration. Only a handful of people know about the Steele dossier, and the nation is bitterly divided by the election results. As rumours begin to circulate that something might be brewing with the newly elected president and Russia, FBI special agent Josh Campbell joins the heads of the US intelligence community on a briefing visit to Trump Tower in New York City. He does not yet know that this meeting will eventually lead to the firing of his boss, James Comey, or that within weeks his former boss Robert Mueller will be appointed to investigate collusion and obstruction of justice at the highest level. He does not yet know that the FBI will come under years of sustained attacks from the commander in chief of the very nation its agents have sworn to protect. But, from his unique position within the FBI, he will watch it occur. In this gripping fly-on-the-wall narrative, Campbell takes readers behind the scenes of the earliest days of the Russia investigation - codename: Crossfire Hurricane - up to the present. Using both first hand experience and reporting, he reveals fresh details about this tumultuous period; explains how the FBI goes about its work and its historic independence from partisan forces; and describes the increasing dismay inside the bureau as the president and his allies escalate their attacks on the agency. Appalled by Trump's assault on the bureau's credibility, Campbell left the FBI in 2018 to sound the alarm about unfair political attacks on the institutions that keep America safe. Smart, clear, passionate, Crossfire Hurricane will captivate readers struggling to make sense of a news cycle careening out of control.
The universe of actors involved in international cybersecurity includes both state actors and semi- and non-state actors, including technology companies, state-sponsored hackers, and cybercriminals. Among these are semi-state actors-actors in a close relationship with one state who sometimes advance this state's interests, but are not organizationally integrated into state functions. In Semi-State Actors in Cybersecurity, Florian J. Egloff argues that political relations in cyberspace fundamentally involve concurrent collaboration and competition between states and semi-state actors. To understand the complex interplay of cooperation and competition and the power relations that exist between these actors in international relations, Egloff looks to a historical analogy: that of mercantile companies, privateers, and pirates. Pirates, privateers, and mercantile companies were integral to maritime security between the 16th and 19th centuries. In fact, privateers and mercantile companies, like today's tech companies and private cyber contractors, had a particular relationship to the state in that they conducted state-sanctioned private attacks against foreign vessels. Pirates, like independent hackers, were sometimes useful allies, and other times enemies. These actors traded, explored, plundered, and controlled sea-lanes and territories across the world's oceans-with state navies lagging behind, often burdened by hierarchy. Today, as cyberspace is woven into the fabric of all aspects of society, the provision and undermining of security in digital spaces has become a new arena for digital pirates, privateers, and mercantile companies. In making the analogy to piracy and privateering, Egloff provides a new understanding of how attackers and defenders use their proximity to the state politically and offers lessons for understanding how actors exercise power in cyberspace. Drawing on historical archival sources, Egloff identifies the parallels between today's cyber in-security and the historical quest for gold and glory on the high seas. The book explains what the presence of semi-state actors means for national and international security, and how semi-state actors are historically and contemporarily linked to understandings of statehood, sovereignty, and the legitimacy of the state.
Eclipse of the Assassins investigates the sensational 1984 murder of Mexico's most influential newspaper columnist, Manuel Buendia, and how that crime reveals the lethal hand of the U.S. government in Mexico and Central America during the final decades of the twentieth century. The authors uncover new information about the U.S.-instigated "dirty wars" that ravaged all of Latin America in the 1960s, '70s, and '80s and reveal-for the first time-how Mexican officials colluded with Washington in its proxy Contra war against the Sandinista government of Nicaragua. They document the deadly connections among historical events usually remembered as separate episodes: the Iran-Contra scandal; the 1985 kidnapping and murder of U.S. Drug Enforcement Administration special agent Enrique (Kiki) Camarena in Guadalajara; Operation Trifecta, a major DEA sting against key CIA-linked Bolivian, Panamanian, and Mexican drug traffickers; the Christic Institute's public interest lawsuit against twenty-eight Contra-related defendants on behalf of American freelance journalists Tony Avirgon and Martha Honey; and the CIA-orchestrated media savaging of investigative reporter Gary Webb for his 1996 expose of Agency collusion with cocaine-trafficking Contra supporters in California. Eclipse of the Assassins places a major political crime in its full historical perspective. It is the first book in English to recount the history of Cold War political violence in Mexico and to show how that history-in the post-Cold War era-segues into the current crime-driven state of societal collapse where growing areas of Mexico's national territory are beyond the effective authority of the national government.
'Thrilling! The Hostage is an intense, white-knuckle ride from start to finish' LAURA GRIFFIN 'An action-packed, don't-blink-or-you'll-miss-something kind of novel, which makes it impossible to put down once you've started reading' reader review 'This was my first book by Melinda Di Lorenzo and I definitely will be looking out for her books in future, it was outstanding' reader review 'A captivating, action packed thriller that didn't let up from the beginning to the end and kept me riveted long into the night' reader review 'Riveting read - could not put it down!' reader review 'I read a ton of romantic suspense but this book was fantastic! This story had so many twists and turns! I didn't figure out any of them. Definitely worth the time to read!' reader review 'High energy, exciting and edge of your seat suspense' reader review 'An amazing story that sucks you in on the first page' reader review He was the last person she expected to save her life . . . Air Force One meets The Fugitive with a thrillingly romantic spin in Melinda Di Lorenzo's gripping suspense novel. Perfect for fans of Nora Roberts, Melinda Leigh and Debra Webb. ................................. Surviving the plane crash was the easy part. After losing someone close to her, nurse Joelle Diedrich needs a change of scene. But stepping in as a last-minute medical escort on a prisoner transfer flight results in a bigger one than she bargained for. Waking in the wreckage of a crash, Joelle swiftly gathers that no one else on the plane was what they seemed. And if she wants to make it out of this alive, she must place her trust in the only survivor who's not trying to kill her: Beck, the convicted murderer who was being transported. Fleeing with Beck presents more than one danger - not only that of simple survival across treacherous terrain, but by making Joelle a target in a ruthless plot. As the threats multiply and Beck and Joelle grow closer, Joelle has to ask herself just how much she's willing to risk for a man she's just met, and figure out whether Beck will risk the same for her . . . ................................. Readers are gripped by The Hostage! 'The anticipation is taut, the surprises are many, and the twists come to skew what one might think one has figured out. It is an exciting, romantic, suspenseful read with a very satisfying ending 'A captivating, action-packed thriller that didn't let up from the beginning to the end and kept me riveted long into the night . . . Highly recommend!' 'A good mystery romance with a twist I couldn't have predicted' 'All this book was missing was Nicolas Cage - it definitely gave me some serious Con Air vibes - but with way more romance . . . I highly recommend this as a action suspense romance' 'Fast-paced and entertaining' 'I enjoyed this book, particularly the relationship between Beck and Joelle and their amusing dialogue! It reminded me of a mix between Con Air and Romancing The Stone'
In a time where US deployments are uncertain, this book shows how US service members can either build the necessary support to sustain their presence or create added animosity towards the military presence. The United States stands at a crossroads in international security. The backbone of its international position for the last 70 years has been the massive network of overseas military deployments. However, the US now faces pressures to limit its overseas presence and spending. In Beyond the Wire, Michael Allen, Michael Flynn, Carla Martinez Machain, and Andrew Stravers argue that the US has entered into a "Domain of Competitive Consent" where the longevity of overseas deployments relies upon the buy-in from host-state populations and what other major powers offer in security guarantees. Drawing from three years of surveys and interviews across fourteen countries, they demonstrate that a key component of building support for the US mission is the service members themselves as they interact with local community members. Highlighting both the positive contact and economic benefits that flow from military deployments and the negative interactions like crime and anti-base protests, this book shows in the most rigorous and concrete way possible how US policy on the ground shapes its ability to advance its foreign policy goals.
Downsizing, outsourcing, and intensifying performance management have become common features of corporate restructuring. They have also helped to drive up job insecurity and inequality. Under what conditions do companies take alternative approaches to restructuring that balance market demands for profits with social demands for high quality jobs? In Exit, Voice, and Solidarity, Doellgast compares strategies to reorganize service jobs in the US and European telecommunications industries. Market liberalization and shareholder pressure pushed employers to adopt often draconian cost cutting measures, while labor unions pushed back with creative collective bargaining and organizing campaigns. Their success depended on the intersection of three factors: constraints on employer exit, support for collective worker voice, and strategies of inclusive labor solidarity. Together, these proved to be crucial sources of worker power in fights to keep high quality jobs within core employers, while extending decent pay and conditions across increasingly complex networks of subsidiaries, subcontractors, and temporary agencies. Based on research at incumbent telecom companies in Denmark, Sweden, Austria, Germany, France, Italy, UK, US, Czech Republic, and Poland, this book provides an original framework for analyzing cross-national differences in restructuring strategies and outcomes.
James Bond's amazing gadgets reveal both enthusiasm about technology and fear of its potential ramifications. The popularity of the 007 franchise depends on a seductive formula of sex, violence, and snobbery. Much of its appeal, too, lies in its gadgets: slick, somewhat improbable technological devices that give everyone's favorite secret agent the edge over his adversaries. In Equipping James Bond, Andre Millard chronicles a hundred-year history of espionage technology through the lens of Ian Fleming's infamous character and his ingenious spyware. Beginning with the creation of MI6, the British secret service, Millard traces the development of espionage technology from the advanced weaponry of the nineteenth century to the evolving threat of computer hacking and surveillance. Arguing that the gadgets in the books and films articulate the leading edge of technological awareness at the time, Millard describes how Bond goes from protecting 1950s England from criminal activity to saving a world threatened by nuclear bombs, poison gas, and attacks from space. As a modern and modernizing hero, Bond has to keep up with the times. His film franchise is committed to equipping both Bond and his adversaries with the latest technological gadgets. Simultaneously, Millard stresses, the villains and threats that Bond faces embody contemporary fears about the downside of technological change. Taking a wide-ranging look at factual (and fictional) technology, Millard views the James Bond universe as evidence for popular perceptions of technological development as both inevitably progressive and apocalyptically threatening.
This volume examines the ethical issues generated by recent developments in intelligence collection and offers a comprehensive analysis of the key legal, moral and social questions thereby raised. Intelligence officers, whether gatherers, analysts or some combination thereof, are operating in a sea of social, political, scientific and technological change. This book examines the new challenges faced by the intelligence community as a result of these changes. It looks not only at how governments employ spies as a tool of state and how the ultimate outcomes are judged by their societies, but also at the mind-set of the spy. In so doing, this volume casts a rare light on an often ignored dimension of spying: the essential role of truth and how it is defined in an intelligence context. This book offers some insights into the workings of the intelligence community and aims to provide the first comprehensive and unifying analysis of the relevant moral, legal and social questions, with a view toward developing policy that may influence real-world decision making. The contributors analyse the ethics of spying across a broad canvas - historical, philosophical, moral and cultural - with chapters covering interrogation and torture, intelligence's relation to war, remote killing, cyber surveillance, responsibility and governance. In the wake of the phenomena of WikiLeaks and the Edward Snowden revelations, the intelligence community has entered an unprecedented period of broad public scrutiny and scepticism, making this volume a timely contribution. This book will be of much interest to students of ethics, intelligence studies, security studies, foreign policy and IR in general.
Volume 1: The Imperfect Intersection of National Security and Public Safety explains homeland security as a struggle to meet new national security threats with traditional public safety practitioners. It offers a new solution that reaches beyond training and equipment to change practitioner culture through education. This first volume represents a major new contribution to the literature by recognizing that homeland security is not based on theories of nuclear response or countering terrorism, but on making bureaucracy work. The next evolution in improving homeland security is to analyze and evaluate various theories of bureaucratic change against the national-level catastrophic threats we are most likely to face. This synthesis provides the bridge between volume 1 (understanding homeland security) and the next in the series (understanding the risk and threats to domestic security). All four volumes could be used in an introductory course at the graduate or undergraduate level. Volumes 2 and 3 are most likely to be adopted in a risk management (RM) course which generally focus on threats, vulnerabilities, and consequences, while volume 4 will get picked up in courses on emergency management (EM).
A unique theory of what happens when leaders fear a revolution abroad will spread to their own country and how that affects international relations. When do leaders fear that a revolution elsewhere will spread to their own polities, and what are the international effects of this fear? In Revolutionary Contagion, Chad E. Nelson develops and tests a theory that explains how states react to ideological-driven revolutions that have occurred in other nations. To do this, he analyzes four key revolutionary movements over two centuries-liberalism, communism, fascism, and Islamism. He further explains that the key to understanding the response to revolutions lies in focusing on the extent to which leaders fear upheaval in their own countries. According to the theory, Nelson argues, fear of contagion is driven more by the characteristics of the host rather than the activities of the infecting agents. In other words, leaders will fear revolutionary contagion when they have significant revolutionary opposition movements that have an ideological affinity with the revolutionary state. A powerful theory of the profound effects revolutions have on international relations, this book shows why one simply cannot make sense of international politics-including patterns of alliances and wars-in certain situations without considering the fear of contagion.
A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace. Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates the exploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace.
In an era of intensified international terror, universities have been increasingly drawn into an arena of locating, monitoring and preventing such threats, forcing them into often covert relationships with the security and intelligence agencies. With case studies from across the world, the Routledge International Handbook of Universities, Security and Intelligence Studies provides a comparative, in-depth analysis of the historical and contemporary relationships between global universities, national security and intelligence agencies. Written by leading international experts and from multidisciplinary perspectives, the Routledge International Handbook of Universities, Security and Intelligence Studies provides theoretical, methodological and empirical definition to academic, scholarly and research enquiry at the interface of higher education, security and intelligence studies. Divided into eight sections, the Handbook explores themes such as: the intellectual frame for our understanding of the university-security-intelligence network; historical, contemporary and future-looking interactions from across the globe; accounts of individuals who represent the broader landscape between universities and the security and intelligence agencies; the reciprocal interplay of personnel from universities to the security and intelligence agencies and vice versa; the practical goals of scholarship, research and teaching of security and intelligence both from within universities and the agencies themselves; terrorism research as an important dimension of security and intelligence within and beyond universities; the implication of security and intelligence in diplomacy, journalism and as an element of public policy; the extent to which security and intelligence practice, research and study far exceeds the traditional remit of commonly held notions of security and intelligence. Bringing together a unique blend of leading academic and practitioner authorities on security and intelligence, the Routledge International Handbook of Universities, Security and Intelligence Studies is an essential and authoritative guide for researchers and policymakers looking to understand the relationship between universities, the security services and the intelligence community.
Internationally, the profession of intelligence continues to develop and expand. So too does the academic field of intelligence, both in terms of intelligence as a focus for academic research and in terms of the delivery of university courses in intelligence and related areas. To a significant extent both the profession of intelligence and those delivering intelligence education share a common aim of developing intelligence as a discipline. However, this shared interest must also navigate the existence of an academic-practitioner divide. Such a divide is far from unique to intelligence - it exists in various forms across most professions - but it is distinctive in the field of intelligence because of the centrality of secrecy to the profession of intelligence and the way in which this constitutes a barrier to understanding and openly teaching about aspects of intelligence. How can co-operation in developing the profession and academic study be maximized when faced with this divide? How can and should this divide be navigated? The Academic-Practitioner Divide in Intelligence provides a range of international approaches to, and perspectives on, these crucial questions.
Kim Philby's life and career has inspired an entire literary genre: the spy novel of betrayal. He was one of the leaders of the British counter-intelligence efforts, first against the Nazis, then against the Soviet Union. He was also the KGB's most valuable double-agent, so highly regarded that today his image is on the postage stamps of the Russian Federation. Philby was the mentor of James Jesus Angleton, one of the central figures in the early years of the CIA who became the long-serving chief of the counter-intelligence staff of the Agency. James Angleton and Kim Philby were friends for six years, or so Angleton thought. They were then enemies for the rest of their lives. This is the story of their intertwined careers and a betrayal that would have dramatic and irrevocable effects on the Cold War and US-Soviet relations. Featuring vivid locations in London, Washington DC, Rome and Istanbul, SPIES AND TRAITORS anatomises one of the most important and flawed personal relationships in modern history.
An unprecedented history of the CIA's secret and amazing gadgetry behind the art of espionage In this look at the CIA's most secretive operations and the devices that made them possible, Spycraft tells gripping life-and-death stories about a group of spytechs-much of it never previously revealed and with images never before seen by the public. The CIA's Office of Technical Service is the ultrasecret department that grappled with challenges such as: What does it take to build a quiet helicopter? How does one embed a listening device in a cat? What is an invisible photo used for? These amazingly inventive devices were created and employed against a backdrop of geopolitical tensions-including the Cold War, the Cuban Missile Crisis, and continuing terrorist threats. Written by Robert Wallace, the former director of the Office of Technical Service, and internationally renowned intelligence historian Keith Melton, Spycraft is both a fantastic encyclopedia of gadgetry and a revealing primer on the fundamentals of high-tech espionage. "The first comprehensive look at the technical achievements of American espionage from the 1940s to the present."-Wired "Reveals more concrete information about CIA tradecraft than any book."-The Washington Times "This is a story I thought could never be told."-JAMES M. OLSON, former chief of CIA counterintelligence
*** The Sunday Times bestseller *** 'Vividly imagined and prodigiously researched' Helen Davies, Sunday Times, Books of the Year 'Such a rewarding read' John Preston, Daily Mail, Books of the Year 'This odd, secretive man is brought to life', Robbie Millen, The Times, Books of the Year Maxwell Knight was a paradox. A jazz obsessive and nature enthusiast (he is the author of the definitive work on how to look after a gorilla), he is seen today as one of MI5's greatest spymasters, a man who did more than any other to break up British fascism during the Second World War - in spite of having once belonged to the British Fascisti himself. He was known to his agents and colleagues simply as M, and was rumoured to be part of the inspiration for the character M in the James Bond series. Knight became a legendary spymaster despite an almost total lack of qualifications. What set him apart from his peers was a mercurial ability to transform almost anyone into a fearless secret agent. He was the first in MI5 to grasp the potential of training female agents. M is about more than just one man however. In its pages, Hemming reveals for the first time in print the names and stories of seven men and women recruited by Knight, on behalf of MI5, and then asked to infiltrate the most dangerous political organizations in Britain at that time. Until now, their identities have been kept secret outside MI5. Drawn from every walk of life, they led double lives-often at great personal cost-in order to protect the country they loved. With the publication of this book, it will be possible at last to celebrate the lives of these courageous, selfless individuals. Drawing on declassified documents, private family archives and interviews with retired MI5 officers as well as the families of MI5 agents, M reveals not just the shadowy world of espionage but a brilliant, enigmatic man at its centre.
In the 21st century, more than any other time, US agencies have relied on contractors to conduct core intelligence functions. This book charts the swell of intelligence outsourcing in the context of American political culture and considers what this means for the relationship between the state, its national security apparatus and accountability within a liberal democracy. Through analysis of a series of case studies, recently declassified documents and exclusive interviews with national security experts in the public and private sectors, the book provides an in-depth and illuminating appraisal of the evolving accountability regime for intelligence contractors.
Gwen Terasaki's Bridge to the Sun, an idealized memoir of her marriage in the 1930s and 1940s to a Japanese diplomat, Terasaki Hidenari, is still widely read as an inspiring tale of a "bridge" between two cultures that waged savage war against each other from 1941 to 1945. However, neither this memoir nor charges that Terasaki was a master spy and a double agent are the whole historical truth. In Terasaki Hidenari, Pearl Harbor, and Occupied Japan, Roger B. Jeans reassesses Terasaki Hidenari's story, using the FBI's voluminous dossier on Terasaki, decoded Japanese Foreign Ministry cables (MAGIC), and the papers of an isolationist, a pacifist, and an FBI agent and chief investigator at the Tokyo war crimes trial. Jeans reveals that far from being simply a saint or villain, Terasaki, despite his opposition to an American-Japanese war, served as a Foreign Ministry intelligence officer, propaganda chief, and liaison with American isolationists and pacifists in 1941, while using all means to protect Hirohito during the postwar occupation. |
You may like...
Primary Social Studies and Tourism…
Brother James, Michael Morrissey
Paperback
R556
Discovery Miles 5 560
|