![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
'Puts Richard Kerbaj in the front rank of modern authors on espionage. It is, by turns, gripping and shocking and sheds completely new light on the most important intelligence alliance in the world' - Tim Shipman, author of All Out War 'Examines decades of intelligence sharing' - The Telegraph 'Reopen[s] the debate' - The Times 'Explosive' - The World News The Secret History of The Five Eyes: The untold story of the international spy network, is a riveting and exclusive narrative of the most powerful and least understood intelligence alliance, which has been steeped in secrecy since its formation in 1956. Richard Kerbaj, an award-winning investigative journalist and filmmaker, bypasses the usual censorship channels to tell the definitive account of authoritative but unauthorised stories of the Western world's most powerful but least known intelligence alliance made up of the US, Britain, Australia, Canada, and New Zealand. As Kerbaj shows, spy stories are never better than when they are true - and these span from 1930s Nazi spy rings to the most recent developments in Ukraine and China. Through personal interviews with world leaders - including British Prime Ministers Theresa May and David Cameron - and more than 100 intelligence officials, this book explores the complex personalities who helped shape the Five Eyes. They include a Scotland Yard detective who became a spymaster and inspired the first exchanges between MI5 and the FBI. An American home economics teacher who helped create one of the most effective programmes to counter Soviet espionage. The CIA's lone officer in Budapest during the Hungarian Revolution. GCHQ's chief during the Edward Snowden intelligence leak. And the Australian politician turned diplomat whose tip-off to the FBI instigated the inquiry into Russia's meddling in the US presidential contest between Donald Trump and Hillary Clinton in 2016. Richard Kerbaj is able to draw from deep inside the secret corridors of power and his unparalleled access spans all 5 countries. Some of the people he has interviewed include former GCHQ director Sir Iain Lobban, CIA director General David Petraeus, MI5 director-general Eliza Manningham-Buller, NSA director Admiral Mike Rogers, British National Security Advisor Kim Darroch, ASIO chief Mike Burgess, the Canadian Security Intelligence Service's chief Richard Fadden, and Ciaran Martin, the official who oversaw Britain's assessments on whether the Chinese telecoms firm, Huawei, should have had a role in the creation of the UK's 5G network. This page-turning book will lift the lid on spy stories from across the English-speaking world, question the future of the alliance, and our place within it.
In an era of intensified international terror, universities have been increasingly drawn into an arena of locating, monitoring and preventing such threats, forcing them into often covert relationships with the security and intelligence agencies. With case studies from across the world, the Routledge International Handbook of Universities, Security and Intelligence Studies provides a comparative, in-depth analysis of the historical and contemporary relationships between global universities, national security and intelligence agencies. Written by leading international experts and from multidisciplinary perspectives, the Routledge International Handbook of Universities, Security and Intelligence Studies provides theoretical, methodological and empirical definition to academic, scholarly and research enquiry at the interface of higher education, security and intelligence studies. Divided into eight sections, the Handbook explores themes such as: the intellectual frame for our understanding of the university-security-intelligence network; historical, contemporary and future-looking interactions from across the globe; accounts of individuals who represent the broader landscape between universities and the security and intelligence agencies; the reciprocal interplay of personnel from universities to the security and intelligence agencies and vice versa; the practical goals of scholarship, research and teaching of security and intelligence both from within universities and the agencies themselves; terrorism research as an important dimension of security and intelligence within and beyond universities; the implication of security and intelligence in diplomacy, journalism and as an element of public policy; the extent to which security and intelligence practice, research and study far exceeds the traditional remit of commonly held notions of security and intelligence. Bringing together a unique blend of leading academic and practitioner authorities on security and intelligence, the Routledge International Handbook of Universities, Security and Intelligence Studies is an essential and authoritative guide for researchers and policymakers looking to understand the relationship between universities, the security services and the intelligence community.
This book reveals, for the first time, a hitherto unexplored dimension of Britain's engagement with the post-war Middle East: the counter-subversive policies and measures conducted by the British Intelligence and Security Services and he Information Research Department (IRD) of the Foreign Office, Britain's secret propaganda apparatus.
The Cambridge Spies continue to fascinate - but one of them, John Cairncross, has always been more of an enigma than the others. He worked alone and was driven by his hostility to Fascism rather than to the promotion of Communism. During his war-time work at Bletchley Park, he passed documents to the Soviets which went on to influence the Battle of Kursk. Now, Geoff Andrews has access to the Cairncross papers and secrets, and has spoken to friends, relatives and former colleagues. A complex individual emerges - a scholar as well as a spy - whose motivations have often been misunderstood. After his resignation from the Civil Service, Cairncross moved to Italy and here he rebuilt his life as a foreign correspondent, editor and university professor. This gave him new circles and friendships - which included the writer Graham Greene - while he always lived with the fear that his earlier espionage would come to light. The full account of Cairncross's spying, his confession and his dramatic public exposure as the 'fifth man' will be told here for the first time, while also unveiling the story of his post-espionage life.
Why were white bourgeois gay male writers so interested in spies, espionage, and treason in the twentieth century? Erin G. Carlston believes such figures and themes were critical to exploring citizenship and its limits, requirements, and possibilities in the modern Western state. Through close readings of Marcel Proust's novels, W. H. Auden's poetry, and Tony Kushner's play "Angels in America," which all reference real-life espionaage cases involving Jews, homosexuals, or Communists, Carlston connects gay men's fascination with spying to larger debates about the making and contestation of social identity. Carlston argues that in the modern West, a distinctive position has been assigned to those perceived to be marginal to the nation because of non-visible religious, political, or sexual differences. Because these "invisible Others" existed somewhere between the wholly alien and the fully normative, they evoked acute anxieties about the security and cohesion of the nation-state. Incorporating readings of nonliterary cultural artifacts, such as trial transcripts, into her analysis, Carlston pinpoints moments in which national self-conceptions in France, England, and the United States grew unstable. Concentrating specifically on the Dreyfus affair in France, the defections of Communist spies in the U.K., and the Rosenberg case in the United States, Carlston directly links twentieth-century tensions around citizenship to the social and political concerns of three generations of influential writers.
Before the Second World War, Herbert Cukurs was a world-famous aviator and a hero in his hometown of Riga, Latvia. During the war he joined the SS, led a militia and was responsible for the genocide of 30,000 Latvian Jews. By the 1960s the man who became known as the Butcher of Riga was living in South America. And Mossad were coming for him. In 1965, a statute of limitations on Nazi war crimes threatened to expire and Germany was seeking to reintegrate concentration camp commanders, pogrom leaders and executioners. The global hunt for Nazi criminals was stepped up, and a target was painted on the back of Cukurs. Yaakov Meidad, the Mossad agent who had kidnapped Adolf Eichmann three years earlier, was called into action once more, leading to an astonishing undercover operation that saw Meidad travel to Brazil in an elaborate disguise before befriending Cukurs and earning his trust. Uncovering a little-known part of Holocaust history and telling the story of one of the most daring operations in the history of the Israeli intelligence community, The Good Assassin is a thrilling story of a forgotten monster and the twenty-year quest to bring him to justice, told by a master of narrative non-fiction.
"A must-read...It reveals important truths." -Vint Cerf, Internet pioneer "One of the finest books on information security published so far in this century-easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive." -Thomas Rid, author of Active Measures Cyber attacks are less destructive than we thought they would be-but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists. Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph. "A helpful reminder...of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission." -Jonathan Freedland, New York Review of Books "The best examination I have read of how increasingly dramatic developments in cyberspace are defining the 'new normal' of geopolitics in the digital age." -General David Petraeus, former Director of the CIA "Fundamentally changes the way we think about cyber operations from 'war' to something of significant import that is not war-what Buchanan refers to as 'real geopolitical competition.'" -Richard Harknett, former Scholar-in-Residence at United States Cyber Command
After a tragic childhood among the Great War cemeteries of Flanders Fields, a troubled young woman searches for love and meaning in war ravaged Europe. Elaine Madden's quest takes her from occupied Belgium through the chaos of Dunkirk, where she flees, disguised as a British soldier, into the London Blitz, where she finally begins to discover herself. Recruited to T Section of the Special Operations Executive (SOE) as a 'fast courier', she is parachuted back to the country of her birth to undertake a top secret political mission and help speed its liberation from Nazi oppression. Elaine Madden never claimed to be a heroine, but her story proves otherwise. Its centrepiece - war service as one of only two female SOE agents parachuted into occupied Belgium - is just one episode in an extraordinary real-life drama of highs and lows, love, loss and betrayal. Relayed to the author in the final years of her life, Elaine's true story of courage and humour in testing times is more intriguing and compelling than fiction.
"The Bougainville ReportS"--by Jack Read, Paul Mason, and other coast watchers--are vivid accounts of the coast watching activities on Buka and Bougainville Islands in the Solomon Islands chain during World War II and describe in detail one of the most successful intelligence operations of the war. By the time war came to the South Pacific on December 8, 1941, an excellent intra-district communication network had already been established on Bougainville. A daily system of radio reporting was put into effect by Lieutenant Commander Eric Feldt, who later wrote: Few realized that when the first waves of United States Marines landed on the bitterly contested beaches of Guadalcanal, coast watchers on Bougainville, New Georgia, and other islands were sending warning signals of impending Japanese air raids almost two hours before enemy aircraft formations appeared over the island. Japanese shipping and aircraft activity was monitored and news of spottings was telegraphed to Guadalcanal Headquarters. Information on shipping was directly responsible for the American victory in November 1942, when 12 Japanese transports, loaded with reinforcements, were intercepted and destroyed. Jack Read summarized his activities as follows: Reviewing the course of our operations, we can see that coast watching on that most northerly peg of the Solomons had fulfilled its mission long before we were driven out--and to a far greater effect than even we realized. During the early and uncertain days of the American struggle to wrest Guadalcanal from the Japanese, the reports and timely warnings from Bougainville were directly responsible for the enemy's defeat. Admiral William Halsey praised the work of the coast watchers and said that the intelligence information from Bougainville saved Guadalcanal and that Guadalcanal saved the South Pacific. These edited reports tell the remarkable story of Read, Mason, and other coast watchers and depict their struggles for survival in the Japanese-patrolled jungles of Bougainville. They provide a fascinating account that will intrigue historians, World War II and espionage buffs, and students.
Between 1942 and 1944 a very small, very secret, very successful clandestine unit of the Royal Navy, operated between Dartmouth in Devon, and the Brittany Coast in France. It was a crossing of about 100 miles, every yard of it dangerous. The unit was called the 15th Motor Gunboat Flotilla: crewed by 125 officers and men, it became the most highly decorated Royal Naval unit of the Second World War. The 15th MGBF was an extraordinary group of men thrown together in the most secret of adventures. Very few were regular Royal Naval officers: instead the unit was made up of mostly Royal Naval Volunteer Officers and 'duration only' sailors. Their home was a converted paddle steamer and luxury yacht, but their work could not have been more serious. Their mission was to ferry agents of SIS and SOE to pinpoint landing sites on the Brittany coast in Occupied France. Once they had landed their agents, together with stores for the Resistance, they picked up evaders, escaped POWs who had had the good fortune to be collected by escape lines run by M19, as well as returning SIS and SOE agents. It is a story that is inextricably entwined with that of the many agents they were responsible for - Pierre Hentic, Yves Le Tac, Virginia Hall, Albert Hue, Jeannie Rousseau, Suzanne Warengham, Francois Mitterrand and Mathilde Carre, as well as many others. Without the Flotilla, such intelligence gathering networks as Jade Fitzroy and Alliance would never have developed, and SOE's VAR Line and MI9's Shelburne Escape Line would never have been realised. Drawing on a huge amount of research on both sides of the Channel, including private archives of many of the families involved, A Dangerous Enterprise brings the story of this most clandestine of operations brilliantly to life.
An explosive expose of how British military intelligence really
works-from the inside. This book presents the stories of two
undercover agents: Brian Nelson, who worked for the Force Research
Unit (FRU), aiding loyalist terrorists and murderers in their
bloody work; and the man known as Stakeknife, deputy head of the
IRA's infamous "Nutting Squad," the internal security force that
tortured and killed suspected informers.
In the early 1970s, Sir Maurice Oldfield of the British Secret Service, MI6, embarked upon a decade-long campaign to derail the political career of Charles Haughey. The English spymaster believed Haughey was a Provisional IRA godfather, therefore, a threat to Britain. Oldfield was assisted by unscrupulous British agents and by a shadowy group of conspirators inside the Irish state's security apparatus, all sharing his distrust of Haughey. Escaping scrutiny for their actions until now, Enemy of the Crown examines more than a dozen instances of their activities. Oldfield was conspiratorial by nature and lacked a moral compass. Involved in regime change plots and torture in the Middle East, in the Republic of Ireland he engaged with convicted criminals as agent provocateurs as well as the exploitation of pedophile rings in Northern Ireland. He and his spies engaged in dirty tricks as they ran vicious smear campaigns in Ireland, Britain and the US. MI6 and IRD intrigues were deployed to impede Haughey's bid to secure a position on Fianna Fail's front bench and any return to respectability. London's hateful drive against Haughey saw no let-up after Fianna Fail's triumphal return to power in 1977 which saw them win a large majority of seats in the Dail. When Haughey sought a place at Cabinet, Oldfield and his spies devised more dirty tricks to impede him. While Haughey was suspicious of MI6 interference, he had no inkling of the full extent of London's clandestine efforts to destroy him. By circulating lurid stories about him, they played a major part in trying to prevent him succeed Jack Lynch as Taoiseach in 1979. This book attempts to shed light on some of the anti-Haughey conspiracies which took place during the period of the late 1960s right through to the early 1980s.
The story of the intelligence war in South Africa during the Second World War is one of suspense, drama and dogged persistence. In 1939, when the Union of South Africa entered the war on Britain's side, the German government secretly contacted the political opposition, and the leadership of the anti-war movement, the Ossewabrandwag. The Nazis' aim was to spread sedition, undermine the Allied war effort, and - given the strategic importance of the Cape of Good Hope sea route - gain naval intelligence. Soon U-boat packs were sent to operate in South African waters, to deadly effect. With the Ossewabrandwag's help, a network of German spies was established to gather and relay back to the Reich important political and military intelligence. Agents would send coded messages to Axis diplomats in neighbouring Mozambique. Meanwhile, police detectives and MI5 hunted in vain for illegal wireless transmitters. Hitler's South African Spies presents an unrivalled account of German intelligence networks in wartime South Africa. It also details the hunt in post-war Europe for witnesses to help the government bring charges of high treason against key Ossewabrandwag members.
When the United States declared war on Germany in April 1917, it was woefully unprepared to wage a modern war. Whereas their European counterparts already had three years of experience in using code and cipher systems in the war, American cryptologists had to help in the building of a military intelligence unit from scratch. This book relates the personal experiences of one such character, providing a uniquely American perspective on the Great War. It is a story of spies, coded letters, plots to blow up ships and munitions plants, secret inks, arms smuggling, treason, and desperate battlefield messages. Yet it all begins with a college English professor and Chaucer scholar named John Mathews Manly. In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U.S. Army's Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war.
Acts of terrorist violence and foreign espionage may pose a serious threat to the security of the United States; yet recent disclosures demonstrate the great risk in giving an agency such as the FBI unlimited authority for gathering intelligence about terrorists and spies. Taking into account the findings and recommendations of the post-Watergate inquiries into FBI operations, John Elliff analyzes the legal and policy questions posed by a "security police" in a nation committed to constitutional government and the rule of law. The author draws on his experience both as principal consultant for the Police Foundation's research on FBI intelligence operations and as head of the Church committee's congressional staff task force on domestic intelligence. He examines the changes made in the structure and policy framework for FBI intelligence operations, including issues not fully resolved by reorganization and new guidelines. He also covers the standards and procedures for dealing with misconduct by FBI personnel. Dr. Elliff concludes that the present restrictions on FBI activities are necessary and that close supervision and control by the Attorney General will allow the Bureau to operate effectively without depriving law-abiding persons of their privacy or their freedom. Originally published in 1979. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
In essays that illuminate not only the recent past but shortcomings in today's intelligence assessments, sixteen experts show how prospective antagonists appraised each other prior to the World Wars. This cautionary tale, warns that intelligence agencies can do certain things very well--but other things poorly, if at all. Originally published in 1985. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Virginia Hall left her comfortable Baltimore roots of privilege in
1931 to follow a dream of becoming a Foreign Service Officer. After
watching Hitler roll into Poland, then France, she decided to work
for the British Special Operations Executive (SOE), a secret
espionage and sabotage organization. She was soon deployed to
France where the Gestapo imprisoned, beat, and tortured
spies.
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks. In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens. Upgrades to the Second Edition Include: Revised discussions of changes and impacts of global information warfare since 2002 Updated analyses of the capabilities of several nation-states as well as nonstate actors A comprehensive list of incidents that have occurred in the past year to show the scope of the problem of GIW Discussions of post-9/11 governmental changes and shifting priorities with clearer hindsight than was possible in the first edition The book underscores how hostile countries, business competitors, terrorists, and others are waging information warfare against adversaries, even from across the globe. It describes attacks on information systems through theft, Internet espionage, deception, and sabotage, and illustrates countermeasures used to defeat these threats. The second edition of Global Information Warfare contains a wealth of information and detailed analyses of capabilities of contemporary information technology and the capabilities of the individuals and groups who employ it in their respective digital wars. It is a crucial source for gaining the best understanding of the current state of information warfare and the most effective ways to counter it.
Democracy Declassified tackles an enduring question of particular current importance: How do democratic governments balance the need for foreign policy secrecy with accountability to the public? Democracies keep secrets both from potential enemies and their publics. This simple fact challenges the surprisingly prevalent assumption that foreign policy successes and failures can be attributed to public transparency and accountability. In fact, the ability to keep secrets has aided democratic victories from the European and Pacific theatres in World War II to the global competition of the Cold War. At the same time, executive discretion over the capacity to classify information created the opportunity for abuse that contributed to Watergate, as well as domestic spying and repression in France, Norway and Canada over the last 40 years. Therefore, democracies face a secrecy dilemma. Secrecy is useful, but once a group or person has the ability to decide what information is concealed from an international competitor, citizens can no longer monitor that information. How then can the public be assured that national security policies are not promoting hidden corruption or incompetence? As Democracy Declassified shows, it is indeed possible for democracies to keep secrets while also maintaining national security oversight institutions that can deter abuse and reassure the public, including freedom of information laws, legislative committee powers, and press freedom. Understanding secrecy and oversight in democracies helps us explain not only why the Maginot Line rose and the French Republic fell, or how the US stumbled but eventually won the Cold War, but more generally how democracies can benefit from both public consent and necessary national security secrets. At a time when the issue of institutional accountability and transparency has reached fever pitch, Democracy Declassified provides a grounded and important view on the connection between the role of secrecy in democratic governance and foreign policy-making.
Truth to Power, the first-ever history of the U.S. National Intelligence Council (NIC), is told through the reflections of its eight Chairs in the period from the end of the Cold War until 2017. Co-editors Robert Hutchings and Gregory Treverton add a substantial introduction placing the NIC in its historical context going all the way back to the Board of National Estimates in the 1940s, as well as a concluding chapter that highlights key themes and judgments. This historic mission of this remarkable but little-known organization, now almost forty years old, is strategic intelligence assessment in service of senior American foreign policymakers. Its signature inside products, National Intelligence Estimates, are now accompanied by the NIC's every-four-years Global Trends. Unclassified, Global Trends has become a noted NIC brand, its release awaited by officials, academics and private sector managers around the world. Each chapter places its particular period of the NIC's history in context (the global situation, the administration, the intelligence community) and assesses the most important issues with which the NIC grappled during the period, acknowledging failures as well as claiming successes. For example, Hutchings' chapter examines the invasion and occupation of Iraq, the fallout from the ill-fated Iraqi WMD estimate, the debate over intelligence community reform, and the year-long National Intelligence Council 2020 project. With the creation of the Director of National Intelligence in 2005, the NIC's mission mushroomed to include direct intelligence support to the two main policymaking committees in the government: the Principals Committee (cabinet secretaries in the foreign affairs departments) and the Deputies Committee (their deputies or number threes). The mission shift took the NIC directly into the thick of the action but at some cost to its abilities to do strategic thinking: of some 700 NIC papers in 2016, more than half were responses to questions from the National Security Adviser or her deputies, most, though hardly all, of which were current and tactical, not longer-term and strategic.
In Spies We Trust reveals the full story of the Anglo-American intelligence relationship - ranging from the deceits of World War I to the mendacities of 9/11 - for the first time. Why did we ever start trusting spies? It all started a hundred years ago. First we put our faith in them to help win wars, then we turned against the bloodshed and expense, and asked our spies instead to deliver peace and security. By the end of World War II, Britain and America were cooperating effectively to that end. At its peak in the 1940s and 1950s, the 'special intelligence relationship' contributed to national and international security in what was an Anglo-American century. But from the 1960s this 'special relationship' went into decline. Britain weakened, American attitudes changed, and the fall of the Soviet Union dissolved the fear that bound London and Washington together. A series of intelligence scandals along the way further eroded public confidence. Yet even in these years, the US offered its old intelligence partner a vital gift: congressional attempts to oversee the CIA in the 1970s encouraged subsequent moves towards more open government in Britain and beyond. So which way do we look now? And what are the alternatives to the British-American intelligence relationship that held sway in the West for so much of the twentieth century? Rhodri Jeffreys-Jones shows that there are a number - the most promising of which, astonishingly, remain largely unknown to the Anglophone world. |
You may like...
Handbook on Risk of AIDS - Injection…
Barry S. Brown, George M. Beschner
Hardcover
R2,252
Discovery Miles 22 520
Parenting and Teen Drug Use - The Most…
Lawrence M. Scheier, William B. Hansen
Hardcover
R3,067
Discovery Miles 30 670
Gods in America - Religious Pluralism in…
Charles L. Cohen, Ronald L. Numbers
Hardcover
R3,850
Discovery Miles 38 500
|