![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Tradecraft Primer: A Framework for Aspiring Interrogators is a timely and relevant reference manual for a new generation of professionals as we enter a new era in our nation's interrogation programs. A must-read for anyone thinking of entering the interrogation profession, whether in law enforcement, the military, or intelligence, it provides fresh insights from the latest empirical-based studies that will enhance your results and contribute to best practices. It challenges past beliefs and legacy interrogation practices of previous generations by capturing novel approaches that no longer rely on physical and psychological coercion, unethical or questionable ruses, or abusive mistreatment. Importantly, this primer also opens the door to valuable lessons from contemporary experts in human motivation and more effective social influence methodologies and tactics while you learn of the art and science behind rapport-building, effective communication constructs, and the influence of interpersonal and intrapersonal dynamics for use inside the interrogation room. In addition, it captures the "interrogation cycle" as a handy reference graphic. By reading this primer, you will learn how to reduce incidences of false confessions, mitigate eyewitness misidentification, and gain simple contemporary insights to outsmart liars and discern truth-tellers from deceivers. As an advocate for a sea change in the way our nation's interrogation programs are run and managed, this primer encourages a team approach to interrogations and emphasizes active engagement and oversight by supervisors in efforts to corroborate interrogation outcomes. It also asserts the need for the adoption of a common code of ethics shared among all practitioners-an ethical code created in deference to our nation's Constitution, statutes, international treaties, and the policies of our nation's leaders. One that encompasses the pledge and built on two underlying principles: Do no harm and respect human rights.
MSNBC counterterrorism analyst and New York Times bestselling author Malcolm Nance was the first person to blow the whistle on Russia's hacking of the 2016 election and to reveal Vladmir Putin's masterplan. Now, in THE PLOT TO BETRAY AMERICA, Nance provides a detailed assessment of how Donald Trump lead a cabal of American financial charlatans, political opportunists and power-hungry sycophants to eagerly betray the nation in order to execute a Russian inspired plan to place him, a Kremlin-friendly President in power. It details an evidence-based conspiracy of a ravenously avaricious family leading an administration of political mercenaries who plotted to dismantle 244 years of American democracy and break up the American-led world order since WWII. Seduced by promises of riches dangled in front of them by Putin, the Trump administration has been was caught trying to use all of its political power to stop investigations by US Intelligence and the Special Counsel to conceal the greatest betrayal in American history: The sale of the American presidency to foreign adversaries. THE PLOT TO BETRAY AMERICA will unscramble the framework and strategies used by the Republican Party and non-state conspirators, including Rudy Guiliani, Mitch McConnell, Jeff Sessions, and more. Nance's in-depth research and interviews with intelligence experts and insiders illustrate Trump's deep financial ties to Russia through his family's investments, the behaviors of his pro-Moscow associates and the carefully crafted seduction of numerous Americans by Russian intelligence led to work with Vladimir Putin to betray the nation. In what reads like a fast-paced geopolitical spy-thriller, Nance clarifies the spiders web of relationships both personal and financial (including Russia and American based mafia) that lead back to the Kremlin. THE PLOT TO BETRAY AMERICA provides a step-by-step blueprint of how and why Trump will be brought to justice.
'A compelling history of the dark arts of statecraft... Fascinating' Jonathan Rugman 'Rich in anecdote and detail.' The Times Today's world is in flux. Competition between the great powers is back on the agenda and governments around the world are turning to secret statecraft and the hidden hand to navigate these uncertain waters. From poisonings to electoral interference, subversion to cyber sabotage, states increasingly operate in the shadows, while social media has created new avenues for disinformation on a mass scale. This is covert action: perhaps the most sensitive - and controversial - of all state activity. However, for all its supposed secrecy, it has become surprisingly prominent - and it is something that has the power to affect all of us. In an enthralling and urgent narrative packed with real-world examples, Rory Cormac reveals how such activity is shaping the world and argues that understanding why and how states wield these dark arts has never been more important.
The question of how far a state should authorise its agents to go in seeking and using secret intelligence is one of the big unresolved issues of public policy for democracies today. The tension between security and privacy sits at the heart of broader debates concerning the relationship between the citizen and the state. The public needs-and wants-protection from the very serious threats posed by domestic and international terrorism, from serious criminality, to be safe in using cyberspace, and to have active foreign and aid policies to help resolve outstanding international problems. Secret intelligence is widely accepted to be essential to these tasks, and to be a legitimate function of the nation state, yet the historical record is that it also can pose significant ethical risks. Principled Spying lays out a framework for thinking about public policy in this area by clarifying the relationship between ethics and intelligence, both human and technical. In this book, intelligence expert Mark Phythian teams up with the former head of Britain's GCHQ signals and intelligence agency to try to resolve the knotty question of secret intelligence-and how far it should be allowed to go in a democratic society.
If the experts could point to any single book as a starting point for understanding the subject of intelligence from the late twentieth century to today, that single book would be Allen W. Dulles's The Craft of Intelligence. This classic of spycraft is based on Allen Dulles's incomparable experience as a diplomat, international lawyer, and America's premier intelligence officer. Dulles was a high-ranking officer of the CIA's predecessor--the Office of Strategic Services--and was present at the inception of the CIA, where he served eight of his ten years there as director. Here he sums up what he learned about intelligence from nearly a half-century of experience in foreign affairs. In World War II his OSS agents penetrated the German Foreign Office, worked with the anti-Nazi underground resistance, and established contacts that brought about the Nazi military surrender in North Italy. Under his direction the CIA developed both a dedicated corps of specialists and a whole range of new intelligence devices, from the U-2 high-altitude photographic plane to minute electronic listening and transmitting equipment. Dulles reveals much about how intelligence is collected and processed, and how the resulting estimates contribute to the formation of national policy. He discusses methods of surveillance, and the usefulness of defectors from hostile nations. His knowledge of Soviet espionage techniques is unrivaled, and he explains how the Soviet State Security Service recruited operatives and planted "illegals" in foreign countries. He spells out not only the techniques of modern espionage but also the philosophy and role of intelligence in a free society threatened by global conspiracies. Dulles also addresses the Bay of Pigs incident, denying that the 1961 invasion was based on a CIA estimate that a popular Cuban uprising would ensue. This account is enlivened with a wealth of personal anecdotes. It is a book for readers who seek wider understanding of the contribution of intelligence to our national security.
As increasingly contentious politics in the United States raise concerns over the "politicization" of traditionally non-partisan institutions, many have turned their attention to how the American military has been-and will be-affected by this trend. Since a low point following the end of the Vietnam War, the U.S. military has experienced a dramatic reversal of public opinion, becoming one of the most trusted institutions in American society. However, this trend is more complicated than it appears: just as individuals have become fonder of their military, they have also become increasingly polarized from one another along partisan lines. The result is a new political environment rife with challenges to traditional civil-military norms. In a data-driven analysis of contemporary American attitudes, Dangerous Instrument examines the current state of U.S. civil-military affairs, probing how the public views their military and the effect that partisan tribalism may have on that relationship in the future. Michael A. Robinson studies the sources and potential limits of American trust in the armed services, focusing on the interplay of the public, political parties, media outlets, and the military itself on the prospect of politicization and its associated challenges. As democratic institutions face persistent pressure worldwide, Dangerous Instrument provides important insights into the contemporary arc of American civil-military affairs and delivers recommendations on ways to preserve a non-partisan military.
"We are dropping cyber bombs. We have never done that before."-U.S. Defense Department official. A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country's attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called "digital combat power" and how the United States should incorporate that power into its national security strategy.
For decades, the reigning scholarly wisdom about nuclear weapons policy has been that the United States only needs the ability to absorb an enemy nuclear attack and still be able to respond with a devastating counterattack. This argument is reasonable, but, empirically, we see that the US has always maintained a nuclear posture that is much more robust than a mere second-strike capability. In The Logic of American Nuclear Strategy, Matthew Kroenig challenges the conventional wisdom and explains why a robust nuclear posture, above and beyond a mere second-strike capability, contributes to a state's national security goals. In fact, when a state has a robust nuclear weapons force, such a capability reduces its expected costs in a war, provides it with bargaining leverage, and ultimately enhances nuclear deterrence. Buoyed by an innovative thesis and a vast array of historical and quantitative evidence, this book provides the first coherent theoretical explanation for why military nuclear advantages translate into geopolitical advantages. In so doing, it resolves one of the most-intractable puzzles in international security studies.
In 1935-37 America passed several Neutrality Acts, vowing never again to take sides in a European conflict. In 1938 public attitudes changed, with the American people beginning to favour Britain and turn against Germany - but what caused this shift of opinion? One reason was a tip-off received by the FBI on the eve of the Second World War, which led to the exposure of a Nazi spy ring operating right there in America. The FBI was able to bring the group to justice and launch a campaign to warn the American people about the Nazi threat to their shores and society. In Ring of Spies, Rhodri Jeffreys-Jones reveals how this case helped to awaken America to the Nazi menace, and how it skewed American opinion, thus spelling the end of US neutrality. Using evidence from FBI files he uncovers a story straight out of a detective novel featuring honey traps, fast cars and double agents.
Signal intelligence is the most secret, and most misunderstood, weapon in the modern espionage arsenal. As a reliable source of information, it is unequalled, which is why Government Communications Headquarters, almost universally known as GCHQ, is several times larger than the two smaller, but more familiar, organisations, MI5 and MI6. Because of its extreme sensitivity, and the ease with which its methods can be compromised, GCHQ's activities remain cloaked in secrecy. In GCHQ: The Secret Wireless War, the renowned expert Nigel West traces GCHQ's origins back to the early days of wireless and gives a detailed account of its development since that time. From the moment that Marconi succeeded in transmitting a radio signal across the Channel, Britain has been engaged in a secret wireless war, first against the Kaiser, then Hitler and the Soviet Union. Following painstaking research, Nigel West is able to describe all GCHQ's disciplines, including direction-finding, interception and traffic analysis, and code-breaking. Also explained is the work of several lesser known units such as the wartime Special Wireless Groups and the top-secret Radio Security Service. Laced with some truly remarkable anecdotes, this edition of this important book will intrigue historians, intelligence professionals and general readers alike.
It was inevitable that the Allies would invade France in the summer of 1944: the Nazis just had to figure out where and when. This job fell to the Abwehr and several other German intelligence services. Between them they put over 30,000 personnel to work studying British and American signals traffic, and achieved considerable success in intercepting and decrypting enemy messages. They also sent agents to England - but they weren't to know that none of them would be successful. Until now, the Nazi intelligence community has been disparaged by historians as incompetent and corrupt, but newly released declassified documents suggest this wasn't the case - and that they had a highly sophisticated system that concentrated on the threat of an Allied invasion. Written by acclaimed espionage historian Nigel West, Codeword Overlord is a vital reassessment of Axis behaviour in one of the most dramatic episodes of the twentieth century.
_____________ THE SUNDAY TIMES BESTSELLER LONGLISTED FOR THE CWA ALCS GOLD DAGGER FOR NON-FICTION _____________ 'John le Carre demystified the intelligence services; Higgins has demystified intelligence gathering itself' - Financial Times 'Uplifting . . . Riveting . . . What will fire people through these pages, gripped, is the focused, and extraordinary investigations that Bellingcat runs . . . Each runs as if the concluding chapter of a Holmesian whodunit' - Telegraph 'We Are Bellingcat is Higgins's gripping account of how he reinvented reporting for the internet age . . . A manifesto for optimism in a dark age' - Luke Harding, Observer _____________ How did a collective of self-taught internet sleuths end up solving some of the biggest crimes of our time? Bellingcat, the home-grown investigative unit, is redefining the way we think about news, politics and the digital future. Here, their founder - a high-school dropout on a kitchen laptop - tells the story of how they created a whole new category of information-gathering, galvanising citizen journalists across the globe to expose war crimes and pick apart disinformation, using just their computers. From the downing of Malaysia Flight 17 over the Ukraine to the sourcing of weapons in the Syrian Civil War and the identification of the Salisbury poisoners, We Are Bellingcat digs deep into some of Bellingcat's most successful investigations. It explores the most cutting-edge tools for analysing data, from virtual-reality software that can build photorealistic 3D models of a crime scene, to apps that can identify exactly what time of day a photograph was taken. In our age of uncertain truths, Bellingcat is what the world needs right now - an intelligence agency by the people, for the people.
The universe of actors involved in international cybersecurity includes both state actors and semi- and non-state actors, including technology companies, state-sponsored hackers, and cybercriminals. Among these are semi-state actors-actors in a close relationship with one state who sometimes advance this state's interests, but are not organizationally integrated into state functions. In Semi-State Actors in Cybersecurity, Florian J. Egloff argues that political relations in cyberspace fundamentally involve concurrent collaboration and competition between states and semi-state actors. To understand the complex interplay of cooperation and competition and the power relations that exist between these actors in international relations, Egloff looks to a historical analogy: that of mercantile companies, privateers, and pirates. Pirates, privateers, and mercantile companies were integral to maritime security between the 16th and 19th centuries. In fact, privateers and mercantile companies, like today's tech companies and private cyber contractors, had a particular relationship to the state in that they conducted state-sanctioned private attacks against foreign vessels. Pirates, like independent hackers, were sometimes useful allies, and other times enemies. These actors traded, explored, plundered, and controlled sea-lanes and territories across the world's oceans-with state navies lagging behind, often burdened by hierarchy. Today, as cyberspace is woven into the fabric of all aspects of society, the provision and undermining of security in digital spaces has become a new arena for digital pirates, privateers, and mercantile companies. In making the analogy to piracy and privateering, Egloff provides a new understanding of how attackers and defenders use their proximity to the state politically and offers lessons for understanding how actors exercise power in cyberspace. Drawing on historical archival sources, Egloff identifies the parallels between today's cyber in-security and the historical quest for gold and glory on the high seas. The book explains what the presence of semi-state actors means for national and international security, and how semi-state actors are historically and contemporarily linked to understandings of statehood, sovereignty, and the legitimacy of the state.
This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers.
The world of international politics has recently been rocked by a seemingly endless series of scandals involving auditory surveillance: the NSA's warrantless wiretapping is merely the most sensational example of what appears to be a universal practice today. What is the source of this generalized principle of eavesdropping? All Ears: The Aesthetics of Espionage traces the long history of moles from the Bible, through Jeremy Bentham's "panacoustic" project, all the way to the intelligence-gathering network called "Echelon." Together with this archeology of auditory surveillance, Szendy offers an engaging account of spycraft's representations in literature (Sophocles, Shakespeare, Joyce, Kafka, Borges), opera (Monteverdi, Mozart, Berg), and film (Lang, Hitchcock, Coppola, De Palma). Following in the footsteps of Orpheus, the book proposes a new concept of "overhearing" that connects the act of spying to an excessive intensification of listening. At the heart of listening Szendy locates the ear of the Other that manifests itself as the originary division of a "split-hearing" that turns the drive for mastery and surveillance into the death drive.
'David Omand is exactly the man you need in a crisis' Rory Stewart 'An extraordinary achievement. Probably the best book ever written on crisis management' Christopher Andrew, author of Defence of the Realm We never know when a crisis might explode. Some 'sudden impact' events, such as terrorist attacks or natural disasters, blow up out of a clear blue sky. Other 'slow burn' crises smoulder away for years, often with warning signs ignored along the way until, as if from nowhere, the troops storm the palace. In How to Survive a Crisis, Professor Sir David Omand draws on his experience in defence, security and intelligence, including as Director of GCHQ and UK Security and Intelligence Coordinator, to show how you can detect a looming crisis and extinguish it (or at least survive it with minimum loss). Using gripping real-world examples from Omand's storied career, and drawing lessons from historic catastrophes such as Chernobyl, 9/11, the Deepwater Horizon oil spill and the WannaCry ransomware cyberattack, this empowering book is filled with practical advice on how to survive the multiplying crises of the future. Not every crisis need tip into disaster - if we have invested in personal, business and national resilience. This is an essential toolkit for our turbulent twenty-first century, as well as an exhilarating read for anyone interested in the state of our world - and how we might improve it. 'Piercingly insightful, brilliantly lucid and illuminating, frightening and wise . . . From nuclear meltdown to apocalyptic cyber-attacks, from pandemics to the drums of war, here is a remarkable record of how the threads of society can be held firm in the darkest days' Sinclair McKay, author of Berlin 'An amazing book. Timely, essential and important. The brilliantly insightful David Omand draws on his unmatched experience to explore the complexities of crisis. He shows us how poor preparation leads to failure, but applied intelligence saves lives' Richard Aldrich, author of GCHQ 'This book is the instruction manual we all need' Sir Alex Younger, Chief of MI6
*** The Sunday Times bestseller *** 'Vividly imagined and prodigiously researched' Helen Davies, Sunday Times, Books of the Year 'Such a rewarding read' John Preston, Daily Mail, Books of the Year 'This odd, secretive man is brought to life', Robbie Millen, The Times, Books of the Year Maxwell Knight was a paradox. A jazz obsessive and nature enthusiast (he is the author of the definitive work on how to look after a gorilla), he is seen today as one of MI5's greatest spymasters, a man who did more than any other to break up British fascism during the Second World War - in spite of having once belonged to the British Fascisti himself. He was known to his agents and colleagues simply as M, and was rumoured to be part of the inspiration for the character M in the James Bond series. Knight became a legendary spymaster despite an almost total lack of qualifications. What set him apart from his peers was a mercurial ability to transform almost anyone into a fearless secret agent. He was the first in MI5 to grasp the potential of training female agents. M is about more than just one man however. In its pages, Hemming reveals for the first time in print the names and stories of seven men and women recruited by Knight, on behalf of MI5, and then asked to infiltrate the most dangerous political organizations in Britain at that time. Until now, their identities have been kept secret outside MI5. Drawn from every walk of life, they led double lives-often at great personal cost-in order to protect the country they loved. With the publication of this book, it will be possible at last to celebrate the lives of these courageous, selfless individuals. Drawing on declassified documents, private family archives and interviews with retired MI5 officers as well as the families of MI5 agents, M reveals not just the shadowy world of espionage but a brilliant, enigmatic man at its centre.
The Encyclopedia of U.S. Intelligence is the first definitive work to chronicle the history, profile prominent figures, examine world-renowned agencies, and mark key events that have shaped the present U.S. intelligence landscape. With contributions from scholars, researchers, academics, and practicing professionals, it explores issues that reflect the public interest about American intelligence at every level from the public to the private sector. The encyclopedia covers topics related to the field of U.S. intelligence practices, agencies, and history, presented in a holistic manner that reflects both academic and applied perspectives. Going beyond a basic overview of the intelligence community and its functions, the entries offer authoritative insight on historical issues and events, significant personalities, legislation, education and training, and current information about terrorism and counterterrorism. Entries detail not only the practice and profession of intelligence within the federal government, but also criminal intelligence and analysis and the organization and activities of foreign intelligence services. They reflect the interdisciplinary nature of intelligence analysis and the variety of government agencies that make up the intelligence community. This two-volume set is a must-have reference for government agencies, research and university libraries, and individuals interested in the development and practice of intelligence in the United States. Also Available Online This Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including: Citation tracking and alerts Active reference linking Saved searches and marked lists HTML and PDF format options Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages. US: (Tel) 1.888.318.2367; (E-mail) [email protected] International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]
This is a documentary history of how intelligence influenced Britain's policy response to key 20th century events. For more than 50 years, the Joint Intelligence Committee (JIC) has been central to the secret machinery of the British Government, acting as a broker between the realms of the spy and the policy-maker. From WWII to the War in Iraq, and from the Falklands to the IRA, it has been involved in almost every key foreign policy decision. These 18 case studies look at key moments in the JIC's history. Each case study includes a contextualising introduction, a full reproduction of an original JIC document that influenced the government's policy response to a particular situation and explanatory footnotes. It features 18 case studies that pinpoint the role of intelligence in foreign and defence policy from 1936 to the present day. It reproduces the original versions of declassified intelligence assessments and reports. It is suitable for students and academics studying contemporary international history and government policymaking processes.
Long the focus of popular interest, as witnessed by the plethora of spy-thriller movies and books, the Central Intelligence Agency (CIA) is an enigma to most people. With its primary focus the gathering of international intelligence information and the safeguarding of US national security, the CIA has taken on considerable importance in recent months. The agency has had to face down numerous questions in the wake of the September 11th terrorist attacks, such as whether any clues of the crimes were missed and if regulations hindered co-operation with other national agencies like the FBI. Congress and the White House have been considering ways to change and streamline the CIA's operations amidst a series of hearings and debates. Along with the issue of 9/11, the CIA faces periodic criticism for its ambiguous covert actions in foreign incidents. Despite these issues, the CIA remains an important tool in America's security apparatus, indispensable to the intelligence infrastructure. Although secrecy is a necessity for an organisation predicated on covert operations and national security, it remains important for the public to have some understanding of the organisation's history, mission, and practices. In order to shed some light on the CIA, this book provides a thorough and well-prepared overview of America's premier spy agency. Topics addressed include CIA history, organisation, practices, and specific operations. Following this analysis is a carefully selected bibliography of current literature dedicated to the study of the CIA. Further access is finally provided with author, title, and subject indexes. Given the public fascination with the CIA, and especially the recent events and international climate, understanding intelligence operations has never been more important and the resource of this book never more needed.
Everyone knows the story of the codebreaker and computer science pioneer Alan Turing. Except ... When Dermot Turing is asked about his famous uncle, people want to know more than the bullet points of his life. They want to know everything - was Alan Turing actually a codebreaker? What did he make of artificial intelligence? What is the significance of Alan Turing's trial, his suicide, the Royal Pardon, the GBP50 note and the film The Imitation Game? In Reflections of Alan Turing, Dermot strips off the layers to uncover the real story. It's time to discover a fresh legacy of Alan Turing for the twenty-first century.
Jane Whorwood(1612-84) was one of Charles I's closest confidantes. The daughter of Scots courtiers at Whitehall and the wife of an Oxfordshire squire, when the court moved to Oxford in 1642, at the start of the Civil War, she helped the Royalist cause by spying for the king and smuggling at least three-quarters of a ton of gold to help pay for his army. When Charles was held captive by the Parliamentarians, from 1646 to 1649, she organised money, correspondence, several escape attempts, astrological advice and a ship to carry him to Holland. The king and she also had a wartime 'brief encounter'. After Charles's execution in 1649, Jane's marriage collapsed in one of the most public and acrimonious separation cases of the seventeenth century. Using crucial evidence, John Fox provides a detailed biography of this extraordinary woman, a forgotten key player in the English Civil War.
Moscow in the late 1970s: one by one, CIA assets are disappearing. The perils of American arrogance, mixed with bureaucratic infighting, had left the country unspeakably vulnerable to ultra-sophisticated Russian electronic surveillance.. The Spy in Moscow Station tells of a time when―much like today―Russian spycraft was proving itself far ahead of the best technology the U.S. had to offer. This is the true story of unorthodox, underdog intelligence officers who fought an uphill battle against their government to prove that the KGB had pulled off the most devastating and breathtakingly thorough penetration of U.S. national security in history. Incorporating declassified internal CIA memos and diplomatic cables, this suspenseful narrative reads like a thriller―but real lives were at stake, and every twist is true as the US and USSR attempt to wrongfoot each other in eavesdropping technology and tradecraft. The book also carries a chilling warning for the present: like the State and CIA officers who were certain their "sweeps" could detect any threat in Moscow, we don't know what we don't know.
|
![]() ![]() You may like...
Project Mercury - NASA's First Manned…
John Catchpole
Hardcover
Orbital Relative Motion and Terminal…
Jean Albert Kechichian
Hardcover
R5,394
Discovery Miles 53 940
Solar Flare Loops: Observations and…
Guangli Huang, Victor F. Melnikov, …
Hardcover
R3,136
Discovery Miles 31 360
Space Habitats and Habitability…
Sandra Hauplik-Meusburger, Sheryl Bishop
Hardcover
R4,675
Discovery Miles 46 750
|