![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
'A compelling history of the dark arts of statecraft... Fascinating' Jonathan Rugman 'Rich in anecdote and detail.' The Times Today's world is in flux. Competition between the great powers is back on the agenda and governments around the world are turning to secret statecraft and the hidden hand to navigate these uncertain waters. From poisonings to electoral interference, subversion to cyber sabotage, states increasingly operate in the shadows, while social media has created new avenues for disinformation on a mass scale. This is covert action: perhaps the most sensitive - and controversial - of all state activity. However, for all its supposed secrecy, it has become surprisingly prominent - and it is something that has the power to affect all of us. In an enthralling and urgent narrative packed with real-world examples, Rory Cormac reveals how such activity is shaping the world and argues that understanding why and how states wield these dark arts has never been more important.
Tradecraft Primer: A Framework for Aspiring Interrogators is a timely and relevant reference manual for a new generation of professionals as we enter a new era in our nation's interrogation programs. A must-read for anyone thinking of entering the interrogation profession, whether in law enforcement, the military, or intelligence, it provides fresh insights from the latest empirical-based studies that will enhance your results and contribute to best practices. It challenges past beliefs and legacy interrogation practices of previous generations by capturing novel approaches that no longer rely on physical and psychological coercion, unethical or questionable ruses, or abusive mistreatment. Importantly, this primer also opens the door to valuable lessons from contemporary experts in human motivation and more effective social influence methodologies and tactics while you learn of the art and science behind rapport-building, effective communication constructs, and the influence of interpersonal and intrapersonal dynamics for use inside the interrogation room. In addition, it captures the "interrogation cycle" as a handy reference graphic. By reading this primer, you will learn how to reduce incidences of false confessions, mitigate eyewitness misidentification, and gain simple contemporary insights to outsmart liars and discern truth-tellers from deceivers. As an advocate for a sea change in the way our nation's interrogation programs are run and managed, this primer encourages a team approach to interrogations and emphasizes active engagement and oversight by supervisors in efforts to corroborate interrogation outcomes. It also asserts the need for the adoption of a common code of ethics shared among all practitioners-an ethical code created in deference to our nation's Constitution, statutes, international treaties, and the policies of our nation's leaders. One that encompasses the pledge and built on two underlying principles: Do no harm and respect human rights.
Originally published in 1998 and a best seller in its hardcover and paperback publications, Blind Man's Bulff is a dramatic, and riveting history. Over the course of five years, investigative reporters Sherry Sontag and Chris Drew interviewed hundreds of men who had never spoken about their underwater lives,not even to their wives and children. They uncovered a wealth of classified information: the tapping of undersea Soviet telephone cables, the stealing of Soviet weapons, the tragic collisions of enemy submarines. They tell of medals awarded in secret and deaths disguised with disinformation. Blind Man's Bluff is a critical work of history that reads with all the excitement of a Tom Clancy novel and all the tragedy of Das Boot.
As increasingly contentious politics in the United States raise concerns over the "politicization" of traditionally non-partisan institutions, many have turned their attention to how the American military has been-and will be-affected by this trend. Since a low point following the end of the Vietnam War, the U.S. military has experienced a dramatic reversal of public opinion, becoming one of the most trusted institutions in American society. However, this trend is more complicated than it appears: just as individuals have become fonder of their military, they have also become increasingly polarized from one another along partisan lines. The result is a new political environment rife with challenges to traditional civil-military norms. In a data-driven analysis of contemporary American attitudes, Dangerous Instrument examines the current state of U.S. civil-military affairs, probing how the public views their military and the effect that partisan tribalism may have on that relationship in the future. Michael A. Robinson studies the sources and potential limits of American trust in the armed services, focusing on the interplay of the public, political parties, media outlets, and the military itself on the prospect of politicization and its associated challenges. As democratic institutions face persistent pressure worldwide, Dangerous Instrument provides important insights into the contemporary arc of American civil-military affairs and delivers recommendations on ways to preserve a non-partisan military.
"Ben Macintyre's rollicking, spellbinding "Agent Zigzag" blends the
spy-versus-
The question of how far a state should authorise its agents to go in seeking and using secret intelligence is one of the big unresolved issues of public policy for democracies today. The tension between security and privacy sits at the heart of broader debates concerning the relationship between the citizen and the state. The public needs-and wants-protection from the very serious threats posed by domestic and international terrorism, from serious criminality, to be safe in using cyberspace, and to have active foreign and aid policies to help resolve outstanding international problems. Secret intelligence is widely accepted to be essential to these tasks, and to be a legitimate function of the nation state, yet the historical record is that it also can pose significant ethical risks. Principled Spying lays out a framework for thinking about public policy in this area by clarifying the relationship between ethics and intelligence, both human and technical. In this book, intelligence expert Mark Phythian teams up with the former head of Britain's GCHQ signals and intelligence agency to try to resolve the knotty question of secret intelligence-and how far it should be allowed to go in a democratic society.
"A must-read...It reveals important truths." -Vint Cerf, Internet pioneer "One of the finest books on information security published so far in this century-easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive." -Thomas Rid, author of Active Measures Cyber attacks are less destructive than we thought they would be-but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists. Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph. "A helpful reminder...of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission." -Jonathan Freedland, New York Review of Books "The best examination I have read of how increasingly dramatic developments in cyberspace are defining the 'new normal' of geopolitics in the digital age." -General David Petraeus, former Director of the CIA "Fundamentally changes the way we think about cyber operations from 'war' to something of significant import that is not war-what Buchanan refers to as 'real geopolitical competition.'" -Richard Harknett, former Scholar-in-Residence at United States Cyber Command
For decades, the reigning scholarly wisdom about nuclear weapons policy has been that the United States only needs the ability to absorb an enemy nuclear attack and still be able to respond with a devastating counterattack. This argument is reasonable, but, empirically, we see that the US has always maintained a nuclear posture that is much more robust than a mere second-strike capability. In The Logic of American Nuclear Strategy, Matthew Kroenig challenges the conventional wisdom and explains why a robust nuclear posture, above and beyond a mere second-strike capability, contributes to a state's national security goals. In fact, when a state has a robust nuclear weapons force, such a capability reduces its expected costs in a war, provides it with bargaining leverage, and ultimately enhances nuclear deterrence. Buoyed by an innovative thesis and a vast array of historical and quantitative evidence, this book provides the first coherent theoretical explanation for why military nuclear advantages translate into geopolitical advantages. In so doing, it resolves one of the most-intractable puzzles in international security studies.
It was inevitable that the Allies would invade France in the summer of 1944: the Nazis just had to figure out where and when. This job fell to the Abwehr and several other German intelligence services. Between them they put over 30,000 personnel to work studying British and American signals traffic, and achieved considerable success in intercepting and decrypting enemy messages. They also sent agents to England - but they weren't to know that none of them would be successful. Until now, the Nazi intelligence community has been disparaged by historians as incompetent and corrupt, but newly released declassified documents suggest this wasn't the case - and that they had a highly sophisticated system that concentrated on the threat of an Allied invasion. Written by acclaimed espionage historian Nigel West, Codeword Overlord is a vital reassessment of Axis behaviour in one of the most dramatic episodes of the twentieth century.
The first edition of this book, published in 1999, was well-received, but interest in it has surged in recent years. It chronicles an early example of regime change that was based on a flawed interpretation of intelligence and proclaimed a success even as its mistakes were becoming clear. Since 1999, a number of documents relating to the CIA's activities in Guatemala have been declassified, and a truth and reconciliation process has unearthed other reports, speeches, and writings that shed more light on the role of the United States. For this edition, the author has selected and annotated twenty documents for a new documentary Appendix, culminating with President Clinton's apology to the people of Guatemala.
The universe of actors involved in international cybersecurity includes both state actors and semi- and non-state actors, including technology companies, state-sponsored hackers, and cybercriminals. Among these are semi-state actors-actors in a close relationship with one state who sometimes advance this state's interests, but are not organizationally integrated into state functions. In Semi-State Actors in Cybersecurity, Florian J. Egloff argues that political relations in cyberspace fundamentally involve concurrent collaboration and competition between states and semi-state actors. To understand the complex interplay of cooperation and competition and the power relations that exist between these actors in international relations, Egloff looks to a historical analogy: that of mercantile companies, privateers, and pirates. Pirates, privateers, and mercantile companies were integral to maritime security between the 16th and 19th centuries. In fact, privateers and mercantile companies, like today's tech companies and private cyber contractors, had a particular relationship to the state in that they conducted state-sanctioned private attacks against foreign vessels. Pirates, like independent hackers, were sometimes useful allies, and other times enemies. These actors traded, explored, plundered, and controlled sea-lanes and territories across the world's oceans-with state navies lagging behind, often burdened by hierarchy. Today, as cyberspace is woven into the fabric of all aspects of society, the provision and undermining of security in digital spaces has become a new arena for digital pirates, privateers, and mercantile companies. In making the analogy to piracy and privateering, Egloff provides a new understanding of how attackers and defenders use their proximity to the state politically and offers lessons for understanding how actors exercise power in cyberspace. Drawing on historical archival sources, Egloff identifies the parallels between today's cyber in-security and the historical quest for gold and glory on the high seas. The book explains what the presence of semi-state actors means for national and international security, and how semi-state actors are historically and contemporarily linked to understandings of statehood, sovereignty, and the legitimacy of the state.
"We are dropping cyber bombs. We have never done that before."-U.S. Defense Department official. A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country's attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called "digital combat power" and how the United States should incorporate that power into its national security strategy.
The History of Espionage recounts the fascinating story of spies and spying from the cloak-and-dagger machinations of the Ancient Greeks and Romans to the high-tech surveillance operations of the post-9/11, post-truth world. It is a tale of clandestine agents, military scouts, captured documents, dead-letter drops, intercepted mail, decoded telegrams, secret codes and ciphers, bugging devices, desperate plots and honey traps. Featuring case studies on the most fascinating spies and plots through history and illustrated with rare photographs throughout, The History of Espionage decodes the sinister world of surveillance like never before.
Northern sympathizer in the Confederate capital, daring spymaster,
postwar politician: Elizabeth Van Lew was one of the most
remarkable figures in American history, a woman who defied the
conventions of the nineteenth-century South. In Southern Lady,
Yankee Spy, historian Elizabeth Varon provides a gripping, richly
researched account of the woman who led what one historian called
"the most productive espionage operation of the Civil War." Under
the nose of the Confederate government, Van Lew ran a spy ring that
gathered intelligence, hampered the Southern war effort, and helped
scores of Union soldiers to escape from Richmond prisons.
This book on intelligence analysis written by intelligence expert Dr. Stephen Marrin argues that scholarship can play a valuable role in improving intelligence analysis. Improving intelligence analysis requires bridging the gap between scholarship and practice. Compared to the more established academic disciplines of political science and international relations, intelligence studies scholarship is generally quite relevant to practice. Yet a substantial gap exists nonetheless. Even though there are many intelligence analysts, very few of them are aware of the various writings on intelligence analysis which could help them improve their own processes and products. If the gap between scholarship and practice were to be bridged, practitioners would be able to access and exploit the literature in order to acquire new ways to think about, frame, conceptualize, and improve the analytic process and the resulting product. This volume contributes to the broader discussion regarding mechanisms and methods for improving intelligence analysis processes and products. It synthesizes these articles into a coherent whole, linking them together through common themes, and emphasizes the broader vision of intelligence analysis in the introduction and conclusion chapters. The book will be of great interest to students of intelligence studies, strategic studies, US national security, US foreign policy, security studies and political science in general,as well as professional intelligence analysts and managers.
The Soviet-German War of 1941-1945 was the most extensive intelligence/counterintelligence war in modern history, involving the capture, torture, deportation, execution, and "doubling" of tens of thousands of agents--most of them Soviet citizens. While Russian armies fought furiously to defeat the Wehrmacht, Stalin's security services waged an equally ruthless secret war against Hitler's spies, as well as against the Soviet population. For the first time, Robert Stephan now combines declassified U.S. intelligence documents, captured German records, and Russian sources, including a top-secret Soviet history of its intelligence and security services, to reveal the magnitude and scope of the brutal but sophisticated Soviet counterintelligence war against Nazi Germany. Employing as many as 150,000 trained agents across a 2,400-mile front, the Soviets neutralized the majority of the more than 40,000 German agents deployed against them. As Stephan shows, their combination of Soviet military deception operations and State Security's defeat of the Abwehr's human intelligence effort had devastating consequences for the German Army in every major battle against the Red army, including Moscow, Stalingrad, Kursk, the Belorussian offensive, and the Vistula-Oder operation. Simultaneously, Soviet State Security continued to penetrate the world's major intelligence services including those of its allies, terrorize its own citizens to prevent spying, desertion, and real or perceived opposition to the regime, and run millions of informants, making the USSR a vast prison covering one sixth of the world's surface. Stephan discusses all facets of the Soviet counterintelligence effort, including the major Soviet "radio games" used to mislead the Germans--operations Monastery, Berezino, and those that defeated Himmler's Operation Zeppelin. He also gives the most comprehensive account to date of the Abwehr's infamous agent "Max," whose organization allegedly ran an entire network of agents inside the USSR, and reveals the reasons for Germany's catastrophic under-estimation of Soviet forces by more than one million men during their 1944 summer offensive in Belorussia. Richly detailed and epic in scope, "Stalin's Secret War" opens up a previously hidden dimension of World War II.
The Encyclopedia of U.S. Intelligence is the first definitive work to chronicle the history, profile prominent figures, examine world-renowned agencies, and mark key events that have shaped the present U.S. intelligence landscape. With contributions from scholars, researchers, academics, and practicing professionals, it explores issues that reflect the public interest about American intelligence at every level from the public to the private sector. The encyclopedia covers topics related to the field of U.S. intelligence practices, agencies, and history, presented in a holistic manner that reflects both academic and applied perspectives. Going beyond a basic overview of the intelligence community and its functions, the entries offer authoritative insight on historical issues and events, significant personalities, legislation, education and training, and current information about terrorism and counterterrorism. Entries detail not only the practice and profession of intelligence within the federal government, but also criminal intelligence and analysis and the organization and activities of foreign intelligence services. They reflect the interdisciplinary nature of intelligence analysis and the variety of government agencies that make up the intelligence community. This two-volume set is a must-have reference for government agencies, research and university libraries, and individuals interested in the development and practice of intelligence in the United States. Also Available Online This Taylor & Francis encyclopedia is also available through online subscription, offering a variety of extra benefits for researchers, students, and librarians, including: Citation tracking and alerts Active reference linking Saved searches and marked lists HTML and PDF format options Contact Taylor and Francis for more information or to inquire about subscription options and print/online combination packages. US: (Tel) 1.888.318.2367; (E-mail) [email protected] International: (Tel) +44 (0) 20 7017 6062; (E-mail) [email protected]
Everyone knows the story of the codebreaker and computer science pioneer Alan Turing. Except ... When Dermot Turing is asked about his famous uncle, people want to know more than the bullet points of his life. They want to know everything - was Alan Turing actually a codebreaker? What did he make of artificial intelligence? What is the significance of Alan Turing's trial, his suicide, the Royal Pardon, the GBP50 note and the film The Imitation Game? In Reflections of Alan Turing, Dermot strips off the layers to uncover the real story. It's time to discover a fresh legacy of Alan Turing for the twenty-first century.
'Puts Richard Kerbaj in the front rank of modern authors on espionage. It is, by turns, gripping and shocking and sheds completely new light on the most important intelligence alliance in the world' -- Tim Shipman, author of All Out War The Secret History of The Five Eyes: The untold story of the international spy network, is a riveting and exclusive narrative of the most powerful and least understood intelligence alliance, which has been steeped in secrecy since its formation in 1956. Richard Kerbaj, an award-winning investigative journalist and filmmaker, bypasses the usual censorship channels to tell the definitive account of authoritative but unauthorised stories of the Western world's most powerful but least known intelligence alliance made up of the US, Britain, Australia, Canada, and New Zealand. As Kerbaj shows, spy stories are never better than when they are true - and these span from 1930s Nazi spy rings to the most recent developments in Ukraine and China. Through personal interviews with world leaders - including British Prime Ministers Theresa May and David Cameron - and more than 100 intelligence officials, this book explores the complex personalities who helped shape the Five Eyes. They include a Scotland Yard detective who became a spymaster and inspired the first exchanges between MI5 and the FBI. An American home economics teacher who helped create one of the most effective programmes to counter Soviet espionage. The CIA's lone officer in Budapest during the Hungarian Revolution. GCHQ's chief during the Edward Snowden intelligence leak. And the Australian politician turned diplomat whose tip-off to the FBI instigated the inquiry into Russia's meddling in the US presidential contest between Donald Trump and Hillary Clinton in 2016. Richard Kerbaj is able to draw from deep inside the secret corridors of power and his unparalleled access spans all 5 countries. Some of the people he has interviewed include former GCHQ director Sir Iain Lobban, CIA director General David Petraeus, MI5 director-general Eliza Manningham-Buller, NSA director Admiral Mike Rogers, British National Security Advisor Kim Darroch, ASIO chief Mike Burgess, the Canadian Security Intelligence Service's chief Richard Fadden, and Ciaran Martin, the official who oversaw Britain's assessments on whether the Chinese telecoms firm, Huawei, should have had a role in the creation of the UK's 5G network. This page-turning book will lift the lid on spy stories from across the English-speaking world, question the future of the alliance, and our place within it.
Long the focus of popular interest, as witnessed by the plethora of spy-thriller movies and books, the Central Intelligence Agency (CIA) is an enigma to most people. With its primary focus the gathering of international intelligence information and the safeguarding of US national security, the CIA has taken on considerable importance in recent months. The agency has had to face down numerous questions in the wake of the September 11th terrorist attacks, such as whether any clues of the crimes were missed and if regulations hindered co-operation with other national agencies like the FBI. Congress and the White House have been considering ways to change and streamline the CIA's operations amidst a series of hearings and debates. Along with the issue of 9/11, the CIA faces periodic criticism for its ambiguous covert actions in foreign incidents. Despite these issues, the CIA remains an important tool in America's security apparatus, indispensable to the intelligence infrastructure. Although secrecy is a necessity for an organisation predicated on covert operations and national security, it remains important for the public to have some understanding of the organisation's history, mission, and practices. In order to shed some light on the CIA, this book provides a thorough and well-prepared overview of America's premier spy agency. Topics addressed include CIA history, organisation, practices, and specific operations. Following this analysis is a carefully selected bibliography of current literature dedicated to the study of the CIA. Further access is finally provided with author, title, and subject indexes. Given the public fascination with the CIA, and especially the recent events and international climate, understanding intelligence operations has never been more important and the resource of this book never more needed.
Jane Whorwood(1612-84) was one of Charles I's closest confidantes. The daughter of Scots courtiers at Whitehall and the wife of an Oxfordshire squire, when the court moved to Oxford in 1642, at the start of the Civil War, she helped the Royalist cause by spying for the king and smuggling at least three-quarters of a ton of gold to help pay for his army. When Charles was held captive by the Parliamentarians, from 1646 to 1649, she organised money, correspondence, several escape attempts, astrological advice and a ship to carry him to Holland. The king and she also had a wartime 'brief encounter'. After Charles's execution in 1649, Jane's marriage collapsed in one of the most public and acrimonious separation cases of the seventeenth century. Using crucial evidence, John Fox provides a detailed biography of this extraordinary woman, a forgotten key player in the English Civil War.
A career of nearly three decades with the CIA and the National Intelligence Council showed Paul R. Pillar that intelligence reforms, especially measures enacted since 9/11, can be deeply misguided. They often miss the sources that underwrite failed policy and misperceive our ability to read outside influences. They also misconceive the intelligence-policy relationship and promote changes that weaken intelligence-gathering operations. In this book, Pillar confronts the intelligence myths Americans have come to rely on to explain national tragedies, including the belief that intelligence drives major national security decisions and can be fixed to avoid future failures. Pillar believes these assumptions waste critical resources and create harmful policies, diverting attention away from smarter reform, and they keep Americans from recognizing the limits of obtainable knowledge. Pillar revisits U.S. foreign policy during the Cold War and highlights the small role intelligence played in those decisions, and he demonstrates the negligible effect that America's most notorious intelligence failures had on U.S. policy and interests. He then reviews in detail the events of 9/11 and the 2003 invasion of Iraq, condemning the 9/11 commission and the George W. Bush administration for their portrayals of the role of intelligence. Pillar offers an original approach to better informing U.S. policy, which involves insulating intelligence management from politicization and reducing the politically appointed layer in the executive branch to combat slanted perceptions of foreign threats. Pillar concludes with principles for adapting foreign policy to inevitable uncertainties.
Your guide to current terms and concepts used in intelligence and security Arabic What is the Arabic term for 'sleeper cell'? How would you say 'hijacker'? Could you recognise the phrase 'operational planning'? Or 'money-laundering investigations'? This short, accessible vocabulary gives you ready-made lists of key terms in intelligence and security Arabic for translating both from and into Arabic. Key Features: * Terms grouped in thematic sections * Easy-to-learn lists to test translation * CD with audio files to help you check your pronunciation * Interactive online audio-visual e-Flashcards * Index Keywords: Arabic; Intelligence Studies; Security Studies; language; vocabulary |
![]() ![]() You may like...
A Research Agenda for Intelligence…
Robert Dover, Huw Dylan, …
Hardcover
R3,101
Discovery Miles 31 010
|