![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
A TIME TO BETRAY
After more than 50 years, some of the secrets behind the post-war kidnappings in Berlin remain classified. Following Second World War, West Berlin residents found themselves as prime targets for kidnapping by communist agents. Lurid press accounts of these abductions left Berliners frightened and intimidated. The central connection of American intelligence agencies (CIC, CIA) to most of these cases, however, was not well known at the time. Delving into these various kidnapping cases, Smith discovers a distinct profile for the abductees. Almost all were former residents of East Germany and, as such, had an intelligence value for the Americans. This connection in turn made them prime targets for Soviet and East German intelligence units. Examination of the climate of fear in West Berlin reveals the complexity of politics in the early Cold War. Many targeted individuals had Nazi pasts-a factor that the Americans took great pains to conceal. At one point, the United States even risked a diplomatic rupture with West Germany when American authorities went so far as to block prosecutions of a German citizen in German courts for aiding in the kidnapping of a number of West Berliners. Exactly why Washington was so willing to go to extreme lengths in this case remains unknown, but Smith's research sheds new light on the clash between East and West in one troubled city.
Nazi Germany's efforts to weaken the United States by subversion
failed miserably. Bungling spies were captured and half-hearted
efforts at sabotage came to nothing. Yet anyone who lived through
WWII remembers the chilling posters warning Americans that "Enemy
Agents Have Big Ears" and "Loose Lips Sink Ships." Even Superman
joined the struggle against these insidious foes. In 1940, polls
showed that 71% of Americans believed a Nazi Fifth Column had
penetrated the country. Almost half were convinced that spies,
saboteurs, dupes, and rumor-mongers lurked in their own
neighborhoods and work-places. These fears extended to the White
House and Congress.
The book relates to understanding the growing importance of aerospace power in modern warfare, including integration of air and space which has truly become the new theatre of war. The unifying space dimension will remain the single most important source for information and communication which can be used in multiple forms. It is an attempt to focus on China's evolving military strategy with emphasis on the aerospace dimension and its implications in the region, specifically in the Indian context. Initially, the book attempts to analyse the strategic importance of the rising economic, political and military stature of China with a view to understand its regional and global implications in the military domain. China, in recent times, has time and again demonstrated its resolve to defend its security interests at all costs. For over three decades, China has been modernising its strategic and nuclear capabilities besides developing new and complex military platforms that would be of great value to joint operations warfare. The current decade through 2020 will prove critical to the People's Liberation Army (PLA) as it attempts to integrate many new and complex platforms, and to adopt modern operational concepts, including network-centric warfare. Besides undertaking a comprehensive modernisation of its armed forces, China is developing a series of offensive space capabilities while advocating the peaceful use of outer space. In the later part, the book highlights the transformation of China's aerospace power. The PLA Air Force (PLAAF) appears to be well on its way to becoming a modern, highly capable air force for the 21st century. China's latest combat aircraft, the J-20, highlights China's ambition to produce a fighter aircraft that incorporates stealth attributes, advanced avionics, and super-cruise capable engines over the next several years. China's aviation industry is developing several types of Airborne Warning and Control System (AWACS) aircraft. PLAAF exercises have demonstrated that its role has changed from support to ground forces to being able to conduct operations independently. It is actively trying to imbibe better training programmes and has increased joint training with other air forces in the recent years. Induction of the aircraft carrier Liaoning in September 2012 highlights China's growing maritime interests and power projection capabilities. The book will be of immense value both for the readers of the countries in the immediate neighbourhood of China and the strategic community in general since the rise of China and other major Asian players, including India, will shape the strategic international environment in the coming decades of this century.
Everybody spied on everybody else during the Cold War. France had agents in the U.S., China had agents in East Germany, Poland had agents in Great Britain, and the U.S. and the U.S.S.R. had agents everywhere—in governments, in industry, in the military, and within each other's, and their own, intelligence agencies. A-Z entries provide a fascinating glimpse into the subterranean world, events, people and operations of the Cold War. Cold War espionage was a nightmare of errors, seen darkly in a wilderness of mirrors, raining desperate deceptions in a climate of treason, with assassins trading in treachery using hidden hands running invisible governments. As fascinating as it was lethal, this labyrinthian world is still masked in mystery. A good amount is known and knowable, however, and this encyclopedia offers up the latest and most up to date information available, drawn from scholarship, memoirs, and journalism. Everybody spied on everybody else during the Cold War. France had agents in the U.S., China had agents in East Germany, Poland had agents in Great Britain, and the United States and the U.S.S.R. had agents everywhere: in governments, in industry, in the military, and within each other's, and their own, intelligence agencies. A-Z entries provide a fascinating glimpse into the subterranean world, events, people and operations of the Cold War. Close to 300 hundred entries provide vivid summaries of hazardous careers, both long and tragically brief, of betrayal and double-cross, and of diplomatic maneuvering so freighted with deception and cunning it sometimes seems unreal. Every entry concludes with suggested readings, and is thoroughly cross-referenced. A thematic guide quickly directs users to Affairs, Crises, Disasters, Hoaxes and Scandals; Agents of Influence, Spies, Spymasters, and Informants by nationality; Assassins and Assassinations; Covert Operations; Defectors to the East and West; Double Agents, Fictional Agents and Operations; Honeytraps; Spy Exchanges; Victims of Covert Operations; and Women Spies and Agents. It contains an extensive annotated chronology, and is thoroughly indexed. This encyclopedia will be immensely helpful to students and researchers of the seamier side of 20th century world history, Cold War history, and world politics.
This book tracks post 9/11 developments in national security and policing intelligence and their relevance to new emerging areas of intelligence practice such as: corrections, biosecurity, private industry and regulatory environments. Developments are explored thematically across three broad sections: applying intelligence understanding structures developing a discipline. Issues explored include: understanding intelligence models; the strategic management challenges of intelligence; intelligence capacity building; and the ethical dimensions of intelligence practice. Using case studies collected from wide-ranging interviews with leaders, managers and intelligence practitioners from a range of practice areas in Australia, Canada, New Zealand, the UK and US, the book indentifies examples of good practice across countries and agencies that may be relevant to other settings. Uniquely bringing together significant theoretical and practical developments in a sample of traditional and emerging areas of intelligence, this book provides readers with a more holistic and inter-disciplinary perspective on the evolving intelligence field across several different practice contexts. Intelligence and Intelligence Analysis will be relevant to a broad audience including intelligence practitioners and managers working across all fields of intelligence (national security, policing, private industry and emerging areas) as well as students taking courses in policing and intelligence analysis.
Facing the threats posed by dedicated suicide bombers who have access to modern technology for mass destruction and who intend to cause maximum human suffering and casualties, democratic governments have hard choices to make. On the one hand, they must uphold the basic values of democratic societies based on due process and human rights. On the other, they need to pre-empt the kind of destruction inflicted upon New York, Madrid, London, and Bali. The premise of this book is that for intelligence organizations to be able to face up to the challenges of global terrorism, they must think outside the box and utilize all of their resources effectively and creatively. To overcome the enemy, we must also secure the peace. Winning the hearts and minds of the terrorists' pool of potential recruits will be essential to cutting off the supply of suicide bombers. The support and cooperation of the people in countries where the terrorists strike must be sustained by ensuring they have confidence in the government and intelligence services. If a government and its intelligence services become so focused on pre-empting terrorist attacks that they infringe on the rights of their citizens and encroach on democratic norms, they unwittingly fall into a trap set by Al Qaeda and its kind. These organizations aim to destroy the democratic way of life so cherished in the West, and to incite the Muslim populations in democratic countries and their non-Muslim fellow citizens into a vicious circle of mutual hatred and violence. This book therefore addresses not only the question of how intelligence organizations can improve their efficacy in pre-empting terrorist outrages, but also the wider issue of removing the forces that sustain global terrorism as a scourge of the 21st century. The general public in the target countries and recruiting grounds must also be persuaded that—despite their rhetoric—the terrorists are not engaged in a holy war. Ultimately, the brand of global terrorism promoted by Osama bin Laden and his associates is meant to satisfy their own vanity and aspirations toward semi-divine status; the organization they have formed for this purpose is merely a global syndicate that commits serious crimes of a particularly heinous nature. Intelligence services of various countries need to find convincing evidence to prove this point. But it is up to governments, civil society, and the media in different parts of the world to work together if the evidence unearthed by national intelligence services is to be accepted by the general public. Unless the emotional or quasi-religious appeal of the global terrorists can be removed, the simple arrest of bin Laden and his close associates—or even the destruction of Al Qaeda as an organization—will not be sufficient to prevent others from rising to replace them.
Turkish Intelligence and the Cold War examines the hitherto unexplored history of secret intelligence cooperation between three asymmetric partners - specifically the UK, US and Turkey - from the end of the Second World War until the Turkey's first military coup d'etat on 27 May 1960. The book shows that our understanding of the Cold War as a binary rivalry between the two blocs is too simple an approach and obscures important characteristics of intelligence cooperation among allies. Egemen Bezci shows that a pragmatic approach offers states new opportunities to protect national interests, by conducting ''intelligence diplomacy' to influence crucial areas such as nuclear weapons and to exploit cooperation in support of their own strategic imperatives. This study not only reveals previously-unexplored origins of secret intelligence cooperation between Turkey and West, but also contributes to wider academic debates on the nature of the Cold War by highlighting the potential agency of weaker states in the Western Alliance.
This is a history of the secret activities of the British
government in response to threats to the nation's well-being and
stability during the twentieth century. It is based on intensive
and widespread research in private and public archives and on
documents many of which have only recently come to light or been
made available.
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists. These rivalries provide rich case studies for scholars and offer today's analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
How can the United States guard against a clever unknown enemy while still preserving the freedoms it holds dear? Hulnick explains the need to revamp U.S. intelligence operations from a system focused on a single Cold War enemy to one offering more flexibility in combating non-state actors (including terrorists, spies, and criminals) like those responsible for the attacks of September 11, 2001. Offering possible solutions not to be found in the federal commission's official report, Hulnick's groundbreaking work examines what is really necessary to make intelligence and homeland security more efficient and competent, both at within the United States and abroad. The U.S. government's progress in establishing a system for homeland security is considerable, yet, besides shifts in alert status, most U.S. residents are unaware of the work being done to keep them safe. Describing the system already in place, Hulnick adds further ideas about what more is needed to protect Americans in the ever-changing world of intelligence. To create a truly valuable program, it is suggested the the United States consider not only new strategies and tactics, but also the need to break down the barriers between intelligence agencies and law enforcement.
The episode of the opportunistic valet of Britain's ambassador to neutral Turkey during World War II--dubbed Cicero for the eloquence of the top-secret material he appropriated from his employer Sir Hughe Knatchbull-Hugessen and sold to the Nazis--is a staple of intelligence lore. Yet this remarkable and sometimes comical story has often been recounted with little regard for the facts, most prominently in the popular film "Five Fingers." Now, historian and former intelligence officer Richard Wires presents the first full and objective account of the Cicero spy episode, offering closure to past discrepancies and credible solutions to remaining mysteries. Copiously documented, "The Cicero Spy Affair" provides readers with the true chronology of events and places them in an international context. It is a story set in the hotbed of intrigue that was wartime Turkey, replete with a dramatic car chase, a series of colorful mistresses ever loyal to their lover the spy, and an old-school British ambassador whose documents are photographed at night as he plays the piano in the drawing room and/or slips into a sleeping pill-induced slumber. Despite the affair's amusing aspects, it is also a sobering tale in which there are no winners and from which there are serious lessons to be learned. Germany never made use of the highly sensitive British documents it obtained during this crucial four-month period of the war because the handling of the information was caught up in a bitter and wasteful personal rivalry between Ribbentrop and Schellenberg. It was sheer luck for the British that their war effort did not sustain any significant damage. For, while the book states definitively that security regarding the Allied invasion of Normandy was not breached in the Cicero affair, Germany did gain a potential advantage concerning campaigns in the Aegean and the Balkans. This embarrassed the British greatly, especially since Cicero walked away a free man. However, the greedy valet--the most highly paid spy in history at that time--did not achieve his goals, either; he discovered some years later that the British banknotes he insisted on as payment were counterfeited by the Germans as part of a larger counterfeiting project. Cicero died a desperate man, deeply in debt--a fitting anticlimax for an espionage episode resulting in neither bodily injury nor strategic impact, but in humiliation on all sides.
John A. Walker Jr. was a Chief Warrant Officer and communications specialist for the US Navy. In 1985, he was arrested for selling classified secrets to the Soviet Union. Upon his arrest it was revealed that he had been acting as a spy from 1968 to 1985 and that his son, brother, ex-wife, and an acquaintance had also participated in the espionage ring. Altogether, their actions constituted one of the most serious security breaches in US history. In 1990, the New York Times stated, "Mr. Walker provided enough code-data information to alter significantly the balance of power between Russia and the United States." What motivated a career naval officer to become a spy during the height of the Cold War? Over the years, statements by Walker have been reported in various books, newspapers, and other media outlets, but Walker has never told his own story-till now. Walker has decided to make public a private document that he originally wrote for his children to explain his actions. Among the reasons he gives for publishing this work is the following statement: "As I grew older, I came to understand that the wars that had taken place during my entire life were just a symptom of a larger national policy. I watched my uncles and aunt go off to World War II, my brother to Korea, and myself to Vietnam, all of which were waged on foundations of lies. Voltaire said that history is a lie agreed upon by historians. How true. "I cannot classify myself as a visionary or idealist, but just a simple citizen who became angry by the government lies. I did conclude that the US system of government was broken, so I felt justified in breaking some rules in order to help save it.... Why did I feel responsible or qualified to end the pattern of perpetual war? I cannot answer my own questions. But then, my insane stunt seemed to have worked. By the admission of both the US and the USSR, I provided the most extensive intelligence ever to the Soviets. With my material in hand, the Soviet government eventually realized the US planned no attack upon them, so my actions have contributed greatly to the Soviet Union's decision to end the Cold War."
A unique exploration into the fascinating world of human and technological espionage, its contributions to national security, and its vital role in global politics. Espionage: A Reference Handbook illuminates the murky underworld of espionage and counterespionage efforts in the United States and around the world. Combining an academic treatment of the causes and forces that shape espionage with narrative accounts of how spying and spy catching are conducted, this is the only work of its kind to cover Benedict Arnold, J. Edgar Hoover, the CIA, the KGB, and Jay Pollard, all in one volume. Though special attention is focused on the American experience, British, Soviet, and Israeli cases are presented, along with recent world events of terrorism and ethnic conflict, providing a unique comparative perspective on the international forces behind spying.
Although China s intelligence activities may not have been well documented, they can be traced back to the ancient writings of Sun Tzu, and espionage has been a characteristic of Chinese domestic politics and international relations ever since. The People s Republic of China has long engaged in espionage, but relatively little is known about Chinese techniques, methodology, personnel, and organizations in comparison with what the West has learned about other more conventional intelligence agencies that conduct operations across the world. Whereas most intelligence services have suffered damaging defections, the number of Ministry of State Security professionals who have switched sides is relatively small, further limiting outside knowledge. The Historical Dictionary of Chinese Intelligence covers the history of Chinese Intelligence from 400 B.C. to modern times. This is done through a chronology, an introductory essay, an extensive bibliography, and an index. The dictionary section has over 400 cross-referenced entries on the agencies and agents, the operations and equipment, the tradecraft and jargon, and many of the countries involved. This book is an excellent access point for students, researchers, and anyone wanting to know more about Chinese Intelligence."
On 7 March 2004, former SAS soldier and mercenary Simon Mann prepared to take off from Harare International Airport with a plane full of heavy weaponry and guns for hire. Their destination: Equatorial Guinea. Their intention: to remove one of the most brutal dictators in Africa in a privately organised coup d’etat. The plot had the tacit approval of Western intelligence agencies. It had the backing of a European government, and the endorsement of a former Prime Minister. Simon Mann had personally planned, overseen and won two wars in Angola and Sierra Leone. Everything should have gone right. Why, then, did it go so wrong? When Simon Mann was released from five years’ incarceration in some of Africa’s toughest prisons, he made worldwide headlines. Since then, he has spoken to nobody about his experiences. Now he is telling everything, including:
An eye-opening account of the perils of America's techno-spy empire Ever since the earliest days of the Cold War, American intelligence agencies have launched spies in the sky, implanted spies in the ether, burrowed spies underground, sunk spies in the ocean, and even tried to control spies' minds by chemical means. But these weren't human spies. Instead, the United States expanded its reach around the globe through techno-spies. Nothing Is Beyond Our Reach investigates how America's technophiles inadvertently created a global espionage empire: one based on technology, not land. Author Kristie Macrakis shows how in the process of staking out the globe through technology, US intelligence created the ability to collect a massive amount of data. But did it help? Featuring the sites visited during her research and stories of the people who created the techno-spy empire, Macrakis guides the reader from its conception in the 1950s to its global reach in the Cold War and Global War on Terror. In an age of ubiquitous technology, Nothing Is Beyond Our Reach exposes the perils of relying too much on technology while demonstrating how the US carried on the tradition of British imperial espionage. Readers interested in the history of espionage and technology as well as those who work in the intelligence field will find the revelations and insights in Nothing Is Beyond Our Reach fascinating and compelling.
With the end of the Cold War and the dawning of a new century, the U.S. intelligence system faces new challenges and threats. The system has suffered from penetration by foreign agents, cutbacks in resources, serious errors in judgment, and what appears to be bad management; nonetheless, it remains one of the key elements of America's strategic defense. Hulnick suggests that things are not as bad as they seem, that America's intelligence system is reasonably well prepared to deal with the many threats to national security. He examines the various functions of intelligence from intelligence gathering and espionage to the arcane fields of analysis, spy-catching, secret operations, and even the business of corporate espionage. Hulnick offers a variety of ideas for making the system work better and for attracting the kinds of new intelligence professionals who will build a stronger intelligence system in the next century. "Fixing the Spy Machine" suggests that the role of the Director of Central Intelligence, the person who runs both the CIA and oversees the U.S. Intelligence Community, should be depoliticized and made stronger. It also concludes that people are responsible for making the system function, not its bureaucratic structure. Still, intelligence managers are going to have to become less risk-averse and more flexible if the system is to function at its best.
In this enlightening new book, former FBI Special Agent William E. Duff offers a gripping portrait of Theodore Stephanovich Mally and the historical and psychological factors that influenced and motivated him. By examining this instrumental yet largely ignored figure, Duff provides a unique glimpse into the rapidly evolving world of prewar Soviet intelligence, its people, and its tradecraft.
"Towne's narrative is a fascinating whodunit, with its vivid portrayal of Union commanders hiring questionable detectives in an effort to stymie the Knights of the Golden Circle, a loose collection of Confederate sympathizers in the Old Northwest. A valuable addition to any library seeking to upgrade its collection with a regional slant to the US Civil War. Summing Up: Highly recommended." -CHOICEA History Book Club Reading SelectionSurveillance and Spies in the Civil War represents pathbreaking research on the rise of U.S. Army intelligence operations in the Midwest during the American Civil War and counters long-standing assumptions about Northern politics and society. At the beginning of the rebellion, state governors in Ohio, Indiana, and Illinois cooperated with federal law enforcement officials in various attempts-all failed-to investigate reports of secret groups and individuals who opposed the Union war effort. Starting in 1862, army commanders took it upon themselves to initiate investigations of antiwar sentiment in those states. By 1863, several of them had established intelligence operations staffed by hired civilian detectives and by soldiers detailed from their units to chase down deserters and draft dodgers, to maintain surveillance on suspected persons and groups, and to investigate organized resistance to the draft. By 1864, these spies had infiltrated secret organizations that, sometimes in collaboration with Confederate rebels, aimed to subvert the war effort. Stephen E. Towne is the first to thoroughly explore the role and impact of Union spies against Confederate plots in the North. This new analysis invites historians to delve more deeply into the fabric of the Northern wartime experience and reinterpret the period based on broader archival evidence.
_____________ THE SUNDAY TIMES BESTSELLER LONGLISTED FOR THE CWA ALCS GOLD DAGGER FOR NON-FICTION _____________ 'John le Carre demystified the intelligence services; Higgins has demystified intelligence gathering itself' - Financial Times 'Uplifting . . . Riveting . . . What will fire people through these pages, gripped, is the focused, and extraordinary investigations that Bellingcat runs . . . Each runs as if the concluding chapter of a Holmesian whodunit' - Telegraph 'We Are Bellingcat is Higgins's gripping account of how he reinvented reporting for the internet age . . . A manifesto for optimism in a dark age' - Luke Harding, Observer _____________ How did a collective of self-taught internet sleuths end up solving some of the biggest crimes of our time? Bellingcat, the home-grown investigative unit, is redefining the way we think about news, politics and the digital future. Here, their founder - a high-school dropout on a kitchen laptop - tells the story of how they created a whole new category of information-gathering, galvanising citizen journalists across the globe to expose war crimes and pick apart disinformation, using just their computers. From the downing of Malaysia Flight 17 over the Ukraine to the sourcing of weapons in the Syrian Civil War and the identification of the Salisbury poisoners, We Are Bellingcat digs deep into some of Bellingcat's most successful investigations. It explores the most cutting-edge tools for analysing data, from virtual-reality software that can build photorealistic 3D models of a crime scene, to apps that can identify exactly what time of day a photograph was taken. In our age of uncertain truths, Bellingcat is what the world needs right now - an intelligence agency by the people, for the people.
The US intelligence community as it currently exists has been deeply influenced by the press. Although considered a vital overseer of intelligence activity, the press and its validity is often questioned, even by the current presidential administration. But dating back to its creation in 1947, the US Central Intelligence Agency (CIA) has benefited from relationships with members of the US press to garner public support for its activities, defend itself from its failures, and promote US interests around the world. Many reporters, editors, and publishers were willing and even eager to work with the agency, especially at the height of the Cold War. That relationship began to change by the 1960s when the press began to challenge the CIA and expose many of its questionable activities. Respected publications went from studiously ignoring the CIA's activities to reporting on the Bay of Pigs, CIA pacification programs in Vietnam, the CIA's war in Laos, and its efforts to use US student groups and a variety of other non-government organizations as Cold War tools. This reporting prompted the first major congressional investigation of the CIA in December 1974. In The Rising Clamor: The American Press, the Central Intelligence Agency, and the Cold War, David P. Hadley explores the relationships that developed between the CIA and the press, its evolution over time, and its practical impact from the creation of the CIA to the first major congressional investigations of its activities in 1975--76 by the Church and Pike committees. Drawing on a combination of archival research, declassified documents, and more than 2,000 news articles, Hadley provides a balanced and considered account of the different actors in the press and CIA relationships, how their collaboration helped define public expectations of what role intelligence should play in the US government, and what an intelligence agency should be able to do. |
You may like...
Rethinking American Grand Strategy
Elizabeth Borgwardt, Christopher McKnight Nichols, …
Hardcover
R2,460
Discovery Miles 24 600
Private Militaries and the Security…
Seden Akcinaroglu, Elizabeth Radziszewski
Hardcover
R1,859
Discovery Miles 18 590
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von
Paperback
R679
Discovery Miles 6 790
Ready To Fire - How India and I Survived…
Nambi Narayanan, Arun Ram
Hardcover
R1,089
Discovery Miles 10 890
|