![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Politics & government > International relations > Espionage & secret services
This book explores contemporary civil-military relations in the United States. Much of the canonical literature on civil-military relations was either written during or references the Cold War, while other major research focuses on the post-Cold War era, or the first decade of the twenty-first century. A great deal has changed since then. This book considers the implications for civil-military relations of many of these changes. Specifically, it focuses on factors such as breakdowns in democratic and civil-military norms and conventions; intensifying partisanship and deepening political divisions in American society; as well as new technology and the evolving character of armed conflict. Chapters are organized around the principal actors in civil-military relations, and the book includes sections on the military, civilian leadership, and the public. It explores the roles and obligations of each. The book also examines how changes in contemporary armed conflict influence civil-military relations. Chapters in this section examine the cyber domain, grey zone operations, asymmetric warfare and emerging technology. The book thus brings the study of civil-military relations into the contemporary era, in which new geopolitical realities and the changing character of armed conflict combine with domestic political tensions to test, if not potentially redefine, those relations.
Gus Martin's Understanding Homeland Security provides students with a comprehensive introduction to U.S. homeland security in the modern world, with a focus on the post-September 11, 2001 era. This insightful resource examines the theories, agency missions, laws, and regulations governing the homeland security enterprise through the lens of threat scenarios and countermeasures related to terrorism, natural disasters, emergency management, cyber security, and much more. The Third Edition keeps readers on the forefront of homeland security with coverage of cutting-edge topics, such as the role of FEMA and preparedness planning; the role of civil liberty and countering extremism through reform; and hackings during the 2016 and 2018 U.S. elections. Readers will gain much-needed insight into the complex nature of issues surrounding today's homeland security and learn to think critically to analyze and respond to various threat environments.
Intelligence agencies are reflections of the societies they serve. No surprise, then, that modern spies and the agencies they work for are fixated on the internet and electronic communications. These same officials also struggle with notions of privacy, appropriateness, national boundaries and the problem of disinformation. They are citizens of both somewhere and nowhere, serving a national public yet confronting spies who operate across borders. These adversaries are utilising new technologies that offer a transnational anonymity. Meanwhile, ordinary people are keen to be protected from threats, but equally keen - basing their understanding of intelligence on news and popular culture - to avoid over-reach by authorities believed to have near-God-like powers. This is the new operating environment for spies: a heady mix of rapid technological development, identity politics, plausible deniability, uncertainty and distrust of authority. Hacker, Influencer, Faker, Spy explores both the challenges spies face from these digital horizons, and the challenges citizens face in understanding what spies do and how it impacts on them. Rob Dover makes a radical case for overhauling intelligence to capitalise on open-source information: shrinking the secret state, whilst still supporting the functioning of modern governments in the post-COVID age.
For decades, the reigning scholarly wisdom about nuclear weapons policy has been that the United States only needs the ability to absorb an enemy nuclear attack and still be able to respond with a devastating counterattack. This argument is reasonable, but, empirically, we see that the US has always maintained a nuclear posture that is much more robust than a mere second-strike capability. In The Logic of American Nuclear Strategy, Matthew Kroenig challenges the conventional wisdom and explains why a robust nuclear posture, above and beyond a mere second-strike capability, contributes to a state's national security goals. In fact, when a state has a robust nuclear weapons force, such a capability reduces its expected costs in a war, provides it with bargaining leverage, and ultimately enhances nuclear deterrence. Buoyed by an innovative thesis and a vast array of historical and quantitative evidence, this book provides the first coherent theoretical explanation for why military nuclear advantages translate into geopolitical advantages. In so doing, it resolves one of the most-intractable puzzles in international security studies.
'Puts Richard Kerbaj in the front rank of modern authors on espionage. It is, by turns, gripping and shocking and sheds completely new light on the most important intelligence alliance in the world' - Tim Shipman, author of All Out War 'Examines decades of intelligence sharing' - The Telegraph 'Reopen[s] the debate' - The Times 'Explosive' - The World News The Secret History of The Five Eyes: The untold story of the international spy network, is a riveting and exclusive narrative of the most powerful and least understood intelligence alliance, which has been steeped in secrecy since its formation in 1956. Richard Kerbaj, an award-winning investigative journalist and filmmaker, bypasses the usual censorship channels to tell the definitive account of authoritative but unauthorised stories of the Western world's most powerful but least known intelligence alliance made up of the US, Britain, Australia, Canada, and New Zealand. As Kerbaj shows, spy stories are never better than when they are true - and these span from 1930s Nazi spy rings to the most recent developments in Ukraine and China. Through personal interviews with world leaders - including British Prime Ministers Theresa May and David Cameron - and more than 100 intelligence officials, this book explores the complex personalities who helped shape the Five Eyes. They include a Scotland Yard detective who became a spymaster and inspired the first exchanges between MI5 and the FBI. An American home economics teacher who helped create one of the most effective programmes to counter Soviet espionage. The CIA's lone officer in Budapest during the Hungarian Revolution. GCHQ's chief during the Edward Snowden intelligence leak. And the Australian politician turned diplomat whose tip-off to the FBI instigated the inquiry into Russia's meddling in the US presidential contest between Donald Trump and Hillary Clinton in 2016. Richard Kerbaj is able to draw from deep inside the secret corridors of power and his unparalleled access spans all 5 countries. Some of the people he has interviewed include former GCHQ director Sir Iain Lobban, CIA director General David Petraeus, MI5 director-general Eliza Manningham-Buller, NSA director Admiral Mike Rogers, British National Security Advisor Kim Darroch, ASIO chief Mike Burgess, the Canadian Security Intelligence Service's chief Richard Fadden, and Ciaran Martin, the official who oversaw Britain's assessments on whether the Chinese telecoms firm, Huawei, should have had a role in the creation of the UK's 5G network. This page-turning book will lift the lid on spy stories from across the English-speaking world, question the future of the alliance, and our place within it.
In an era of intensified international terror, universities have been increasingly drawn into an arena of locating, monitoring and preventing such threats, forcing them into often covert relationships with the security and intelligence agencies. With case studies from across the world, the Routledge International Handbook of Universities, Security and Intelligence Studies provides a comparative, in-depth analysis of the historical and contemporary relationships between global universities, national security and intelligence agencies. Written by leading international experts and from multidisciplinary perspectives, the Routledge International Handbook of Universities, Security and Intelligence Studies provides theoretical, methodological and empirical definition to academic, scholarly and research enquiry at the interface of higher education, security and intelligence studies. Divided into eight sections, the Handbook explores themes such as: the intellectual frame for our understanding of the university-security-intelligence network; historical, contemporary and future-looking interactions from across the globe; accounts of individuals who represent the broader landscape between universities and the security and intelligence agencies; the reciprocal interplay of personnel from universities to the security and intelligence agencies and vice versa; the practical goals of scholarship, research and teaching of security and intelligence both from within universities and the agencies themselves; terrorism research as an important dimension of security and intelligence within and beyond universities; the implication of security and intelligence in diplomacy, journalism and as an element of public policy; the extent to which security and intelligence practice, research and study far exceeds the traditional remit of commonly held notions of security and intelligence. Bringing together a unique blend of leading academic and practitioner authorities on security and intelligence, the Routledge International Handbook of Universities, Security and Intelligence Studies is an essential and authoritative guide for researchers and policymakers looking to understand the relationship between universities, the security services and the intelligence community.
This book reveals, for the first time, a hitherto unexplored dimension of Britain's engagement with the post-war Middle East: the counter-subversive policies and measures conducted by the British Intelligence and Security Services and he Information Research Department (IRD) of the Foreign Office, Britain's secret propaganda apparatus.
Why were white bourgeois gay male writers so interested in spies, espionage, and treason in the twentieth century? Erin G. Carlston believes such figures and themes were critical to exploring citizenship and its limits, requirements, and possibilities in the modern Western state. Through close readings of Marcel Proust's novels, W. H. Auden's poetry, and Tony Kushner's play "Angels in America," which all reference real-life espionaage cases involving Jews, homosexuals, or Communists, Carlston connects gay men's fascination with spying to larger debates about the making and contestation of social identity. Carlston argues that in the modern West, a distinctive position has been assigned to those perceived to be marginal to the nation because of non-visible religious, political, or sexual differences. Because these "invisible Others" existed somewhere between the wholly alien and the fully normative, they evoked acute anxieties about the security and cohesion of the nation-state. Incorporating readings of nonliterary cultural artifacts, such as trial transcripts, into her analysis, Carlston pinpoints moments in which national self-conceptions in France, England, and the United States grew unstable. Concentrating specifically on the Dreyfus affair in France, the defections of Communist spies in the U.K., and the Rosenberg case in the United States, Carlston directly links twentieth-century tensions around citizenship to the social and political concerns of three generations of influential writers.
Acclaimed author and managing director of The Times Literary Supplement, James MacManus, creates a compelling historical novel that brings to life an unbelievable but true love story set during the Second World War. In 1942, Cork-born Kay Summersby's life is changed forever when she is tasked with driving General Eisenhower on his fact-finding visit to wartime London. Despite Eisenhower's marriage to Mamie, the pair takes an immediate liking to one another and he gifts Kay a rare wartime luxury: a box of chocolates. So begins a tumultuous relationship that against all military regulation sees Kay travelling with Eisenhower on missions to far flung places before the final assault on Nazi Germany. She becomes known as "Ike's shadow" and in letters Mamie bemoans his new obsession with 'Ireland'. That does not stop him from using his influence to grant Kay US citizenship and rank in the US army, drawing her closer when he returns to America. When the US authorities discover Eisenhower's plans to divorce from his wife they threaten the fragile but passionate affair and Kay is forced to take desperate measures to hold onto the man she loves...
Before the Second World War, Herbert Cukurs was a world-famous aviator and a hero in his hometown of Riga, Latvia. During the war he joined the SS, led a militia and was responsible for the genocide of 30,000 Latvian Jews. By the 1960s the man who became known as the Butcher of Riga was living in South America. And Mossad were coming for him. In 1965, a statute of limitations on Nazi war crimes threatened to expire and Germany was seeking to reintegrate concentration camp commanders, pogrom leaders and executioners. The global hunt for Nazi criminals was stepped up, and a target was painted on the back of Cukurs. Yaakov Meidad, the Mossad agent who had kidnapped Adolf Eichmann three years earlier, was called into action once more, leading to an astonishing undercover operation that saw Meidad travel to Brazil in an elaborate disguise before befriending Cukurs and earning his trust. Uncovering a little-known part of Holocaust history and telling the story of one of the most daring operations in the history of the Israeli intelligence community, The Good Assassin is a thrilling story of a forgotten monster and the twenty-year quest to bring him to justice, told by a master of narrative non-fiction.
Venice's Secret Service is the untold and arresting story of the world's earliest centrally-organised state intelligence service. Long before the inception of SIS and the CIA, in the period of the Renaissance, the Republic of Venice had masterminded a remarkable centrally-organised state intelligence organisation that played a pivotal role in the defence of the Venetian empire. Housed in the imposing Doge's Palace and under the direction of the Council of Ten, the notorious governmental committee that acted as Venice's spy chiefs, this 'proto-modern' organisation served prominent intelligence functions including operations (intelligence and covert action), analysis, cryptography and steganography, cryptanalysis, and even the development of lethal substances. Official informants and amateur spies were shipped across Europe, Anatolia, and Northern Africa, conducting Venice's stealthy intelligence operations. Revealing a plethora of secrets, their keepers, and their seekers, Venice's Secret Service explores the social and managerial processes that enabled their existence and that furnished the foundation for an extraordinary intelligence organisation created by one of the early modern world's most cosmopolitan states.
After a tragic childhood among the Great War cemeteries of Flanders Fields, a troubled young woman searches for love and meaning in war ravaged Europe. Elaine Madden's quest takes her from occupied Belgium through the chaos of Dunkirk, where she flees, disguised as a British soldier, into the London Blitz, where she finally begins to discover herself. Recruited to T Section of the Special Operations Executive (SOE) as a 'fast courier', she is parachuted back to the country of her birth to undertake a top secret political mission and help speed its liberation from Nazi oppression. Elaine Madden never claimed to be a heroine, but her story proves otherwise. Its centrepiece - war service as one of only two female SOE agents parachuted into occupied Belgium - is just one episode in an extraordinary real-life drama of highs and lows, love, loss and betrayal. Relayed to the author in the final years of her life, Elaine's true story of courage and humour in testing times is more intriguing and compelling than fiction.
A legendary CIA spy and counterterrorism expert tells the
spellbinding story of his high-risk, action-packed career
"The Bougainville ReportS"--by Jack Read, Paul Mason, and other coast watchers--are vivid accounts of the coast watching activities on Buka and Bougainville Islands in the Solomon Islands chain during World War II and describe in detail one of the most successful intelligence operations of the war. By the time war came to the South Pacific on December 8, 1941, an excellent intra-district communication network had already been established on Bougainville. A daily system of radio reporting was put into effect by Lieutenant Commander Eric Feldt, who later wrote: Few realized that when the first waves of United States Marines landed on the bitterly contested beaches of Guadalcanal, coast watchers on Bougainville, New Georgia, and other islands were sending warning signals of impending Japanese air raids almost two hours before enemy aircraft formations appeared over the island. Japanese shipping and aircraft activity was monitored and news of spottings was telegraphed to Guadalcanal Headquarters. Information on shipping was directly responsible for the American victory in November 1942, when 12 Japanese transports, loaded with reinforcements, were intercepted and destroyed. Jack Read summarized his activities as follows: Reviewing the course of our operations, we can see that coast watching on that most northerly peg of the Solomons had fulfilled its mission long before we were driven out--and to a far greater effect than even we realized. During the early and uncertain days of the American struggle to wrest Guadalcanal from the Japanese, the reports and timely warnings from Bougainville were directly responsible for the enemy's defeat. Admiral William Halsey praised the work of the coast watchers and said that the intelligence information from Bougainville saved Guadalcanal and that Guadalcanal saved the South Pacific. These edited reports tell the remarkable story of Read, Mason, and other coast watchers and depict their struggles for survival in the Japanese-patrolled jungles of Bougainville. They provide a fascinating account that will intrigue historians, World War II and espionage buffs, and students.
Spring 1958: a mysterious individual believed to be high up in the Polish secret service began passing Soviet secrets to the West. His name was Michal Goleniewski and he remains one of the most important, least known and most misunderstood spies of the Cold War. Even his death is shrouded in mystery and he has been written out of the history of Cold War espionage - until now. Tim Tate draws on a wealth of previously-unpublished primary source documents to tell the dramatic true story of the best spy the west ever lost and how Goleniewski exposed hundreds of KGB agents operating undercover in the West; from George Blake and the 'Portland Spy Ring', to a senior Swedish Air Force and NATO officer and a traitor inside the Israeli government. The information he produced devastated intelligence services on both sides of the Iron Curtain. Bringing together love and loyalty, courage and treachery, betrayal, greed and, ultimately, insanity, Tim Tate tells the extraordinary true story of one of the most significant spies of the Cold War. Acclaim for The Spy Who Was Left Out in the Cold: 'Totally gripping . . . a masterpiece. Tate lifts the lid on one of the most important and complex spies of the Cold War, who passed secrets to the West and finally unmasked traitor George Blake.' HELEN FRY, author of MI9: A History of the Secret Service for Escape and Evasion in World War Two 'A wonderful and at times mind-boggling account of a bizarre and almost forgotten spy - right up to the time when he's living undercover in Queens, New York and claiming to be the last of the Romanoffs.' SIMON KUPER, author of The Happy Traitor 'A highly readable and thoroughly researched account of one of the Cold War's most intriguing and tragic spy stories.' OWEN MATTHEWS, author of An Impeccable Spy
The story of the intelligence war in South Africa during the Second World War is one of suspense, drama and dogged persistence. In 1939, when the Union of South Africa entered the war on Britain's side, the German government secretly contacted the political opposition, and the leadership of the anti-war movement, the Ossewabrandwag. The Nazis' aim was to spread sedition, undermine the Allied war effort, and - given the strategic importance of the Cape of Good Hope sea route - gain naval intelligence. Soon U-boat packs were sent to operate in South African waters, to deadly effect. With the Ossewabrandwag's help, a network of German spies was established to gather and relay back to the Reich important political and military intelligence. Agents would send coded messages to Axis diplomats in neighbouring Mozambique. Meanwhile, police detectives and MI5 hunted in vain for illegal wireless transmitters. Hitler's South African Spies presents an unrivalled account of German intelligence networks in wartime South Africa. It also details the hunt in post-war Europe for witnesses to help the government bring charges of high treason against key Ossewabrandwag members.
When the United States declared war on Germany in April 1917, it was woefully unprepared to wage a modern war. Whereas their European counterparts already had three years of experience in using code and cipher systems in the war, American cryptologists had to help in the building of a military intelligence unit from scratch. This book relates the personal experiences of one such character, providing a uniquely American perspective on the Great War. It is a story of spies, coded letters, plots to blow up ships and munitions plants, secret inks, arms smuggling, treason, and desperate battlefield messages. Yet it all begins with a college English professor and Chaucer scholar named John Mathews Manly. In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U.S. Army's Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war.
Acts of terrorist violence and foreign espionage may pose a serious threat to the security of the United States; yet recent disclosures demonstrate the great risk in giving an agency such as the FBI unlimited authority for gathering intelligence about terrorists and spies. Taking into account the findings and recommendations of the post-Watergate inquiries into FBI operations, John Elliff analyzes the legal and policy questions posed by a "security police" in a nation committed to constitutional government and the rule of law. The author draws on his experience both as principal consultant for the Police Foundation's research on FBI intelligence operations and as head of the Church committee's congressional staff task force on domestic intelligence. He examines the changes made in the structure and policy framework for FBI intelligence operations, including issues not fully resolved by reorganization and new guidelines. He also covers the standards and procedures for dealing with misconduct by FBI personnel. Dr. Elliff concludes that the present restrictions on FBI activities are necessary and that close supervision and control by the Attorney General will allow the Bureau to operate effectively without depriving law-abiding persons of their privacy or their freedom. Originally published in 1979. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
In essays that illuminate not only the recent past but shortcomings in today's intelligence assessments, sixteen experts show how prospective antagonists appraised each other prior to the World Wars. This cautionary tale, warns that intelligence agencies can do certain things very well--but other things poorly, if at all. Originally published in 1985. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
Virginia Hall left her comfortable Baltimore roots of privilege in
1931 to follow a dream of becoming a Foreign Service Officer. After
watching Hitler roll into Poland, then France, she decided to work
for the British Special Operations Executive (SOE), a secret
espionage and sabotage organization. She was soon deployed to
France where the Gestapo imprisoned, beat, and tortured
spies.
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels. These sweeping changes have nearly annihilated privacy anywhere in the world and have also affected how global information warfare is waged and what must be done to counter its attacks. In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens. Upgrades to the Second Edition Include: Revised discussions of changes and impacts of global information warfare since 2002 Updated analyses of the capabilities of several nation-states as well as nonstate actors A comprehensive list of incidents that have occurred in the past year to show the scope of the problem of GIW Discussions of post-9/11 governmental changes and shifting priorities with clearer hindsight than was possible in the first edition The book underscores how hostile countries, business competitors, terrorists, and others are waging information warfare against adversaries, even from across the globe. It describes attacks on information systems through theft, Internet espionage, deception, and sabotage, and illustrates countermeasures used to defeat these threats. The second edition of Global Information Warfare contains a wealth of information and detailed analyses of capabilities of contemporary information technology and the capabilities of the individuals and groups who employ it in their respective digital wars. It is a crucial source for gaining the best understanding of the current state of information warfare and the most effective ways to counter it.
Nearly forty female agents were sent out by the French section of Britain's Special Operations Executive (SOE) during the Second World War. The youngest was 19 and the oldest 53. Most were trained in paramilitary warfare, fieldcraft, the use of weapons and explosives, sabotage, silent killing, parachuting, codes and cyphers, wireless transmission and receiving, and general spycraft. These women - as well as others from clandestine Allied organisations - were flown out and parachuted or landed into France on vital and highly dangerous missions: their task, to work with resistance movements both before and after D-Day. Bernard O'Connor uses recently declassified government documents, personnel files, mission reports and memoirs to assess the successes and failures of the 38 women including Odette Sansom, Denise Colin, and Cecile Pichard. Of the twelve who were captured, only two survived; the others were executed, some after being tortured by the sadistic officers of the Gestapo. This is their story.
Democracy Declassified tackles an enduring question of particular current importance: How do democratic governments balance the need for foreign policy secrecy with accountability to the public? Democracies keep secrets both from potential enemies and their publics. This simple fact challenges the surprisingly prevalent assumption that foreign policy successes and failures can be attributed to public transparency and accountability. In fact, the ability to keep secrets has aided democratic victories from the European and Pacific theatres in World War II to the global competition of the Cold War. At the same time, executive discretion over the capacity to classify information created the opportunity for abuse that contributed to Watergate, as well as domestic spying and repression in France, Norway and Canada over the last 40 years. Therefore, democracies face a secrecy dilemma. Secrecy is useful, but once a group or person has the ability to decide what information is concealed from an international competitor, citizens can no longer monitor that information. How then can the public be assured that national security policies are not promoting hidden corruption or incompetence? As Democracy Declassified shows, it is indeed possible for democracies to keep secrets while also maintaining national security oversight institutions that can deter abuse and reassure the public, including freedom of information laws, legislative committee powers, and press freedom. Understanding secrecy and oversight in democracies helps us explain not only why the Maginot Line rose and the French Republic fell, or how the US stumbled but eventually won the Cold War, but more generally how democracies can benefit from both public consent and necessary national security secrets. At a time when the issue of institutional accountability and transparency has reached fever pitch, Democracy Declassified provides a grounded and important view on the connection between the role of secrecy in democratic governance and foreign policy-making.
|
You may like...
Mass and Energy Balances - Basic…
Seyed Ali Ashrafizadeh, Zhongchao Tan
Hardcover
R2,229
Discovery Miles 22 290
Sorrow Into Pride - The Story of a…
Kenneth John Wayman, Barry Crutchley
Paperback
R595
Discovery Miles 5 950
How to Give Effective Feedback to Your…
Susan M. Brookhart
Paperback
Equity and Quality Dimensions in…
Leonidas Kyriakides, Bert Creemers, …
Hardcover
R2,444
Discovery Miles 24 440
Formula One: The Rivals, Volume 4 - F1's…
Tony Dodgins, Mark Webber
Hardcover
|