![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Since the end of the Cold War, the operations of secret police informers have come under the media spotlight and it is now common knowledge that vast internal networks of spies in the Soviet Union and East Germany were directed by the Communist Party. By contrast, very little historical information has been available on the covert operations of the security services in Mao Zedong's China. However, as Michael Schoenhals reveals in this intriguing and sometimes sinister account, public security was a top priority for the founders of the People's Republic and agents were recruited from all levels of society to ferret out 'counter-revolutionaries'. On the basis of hitherto classified archival records, the book tells the story of a vast surveillance and control apparatus through a detailed examination of the cultivation and recruitment of agents, their training and their operational activities across a twenty-year period from 1949 to 1967.
Poland was the 'tripwire' that brought Britain into the Second World War but neither Britain, nor Poland's older ally, France, had the material means to prevent Poland being overrun. The broadcast, 'Poland is no longer alone' had a distinctly hollow ring. During the next four years the Polish Government in exile and armed forces made a significant contribution to the Allied war effort; in return the Polish Home Army received a paltry 600 tons of supplies. Poland Alone focuses on the climactic year of 1944 when the Polish Resistance attempted to gain control of Warsaw from the Germans. A bloody uprising ensued, but little help was received from the Allies. After the Warsaw Poles were massacred, the Red Army finally moved into the city and then occupied the whole country. Jonathan Walker examines whether Britain could have done more to save the Polish people and the victims of the Holocaust. While Allied political and military leaders clashed over the level of support for the Poles, SOE, RAF and Intelligence personnel fought a bitter covert war to help the Polish resistance fighters. The War ended with over five million Poles dead. Had Britain betrayed her ally?
China's Security State describes the creation, evolution, and development of Chinese security and intelligence agencies as well as their role in influencing Chinese Communist Party politics throughout the party's history. Xuezhi Guo investigates patterns of leadership politics from the vantage point of security and intelligence organization and operation by providing new evidence and offering alternative interpretations of major events throughout Chinese Communist Party history. This analysis promotes a better understanding of the CCP's mechanisms for control over both Party members and the general population. This study specifies some of the broader implications for theory and research that can help clarify the nature of Chinese politics and potential future developments in the country's security and intelligence services.
Initially stationed at the U.S. Army's counterintelligence headquarters in Saigon, David Noble was sent north to launch the army's first covert intelligence-gathering operation in Vietnam's Central Highlands. Living in the region of the Montagnards-Vietnam's indigenous tribal people, deemed critical to winning the war-Noble documented strategic hamlets and Green Beret training camps, where Special Forces teams taught the Montagnards to use rifles rather than crossbows and spears. In this book, he relates the formidable challenges he confronted in the course of his work. Weaving together memoir, excerpts from letters written home, and photographs, Noble's compelling narrative throws light on a little-known corner of the Vietnam War in its early years-before the Tonkin Gulf Resolution and the deployment of combat units-and traces his transformation from a novice intelligence agent and believer in the war to a political dissenter and active protester.
Little is known of the true origins of the French adventurer Victor-Antoine-Claude Robert, Count de Parades (1752-86). He arrived in Paris in 1778, just as the Franco-American alliance, which guaranteed French military support to the United States against Great Britain, was being signed. Parades was determined to join the French Army, but lacking the connections to do so, offered his services as a spy. He travelled repeatedly to England, visiting ports and fortifications to gather confidential information. First published in 1791, this work provides a detailed account of Parades' adventures and misfortune. Written while he was jailed in the Bastille, the book denounces the corruption of ministers who wrongly accused him of state treason after the failure of the 1779 Franco-Spanish 'Armada' against Plymouth. A fascinating historical document, it sheds light on the political relations between France and England during the American War of Independence.
In the wake of World War II, the United States and its allies developed a new type of security arrangement in which a state could maintain a long-term, peacetime military presence on the territory of another equally sovereign state that, unlike earlier practice, was not tied to occupational regimes or colonial rule. The impact of this development on international politics is hard to overstate, and it has become a constitutive feature of contemporary security dynamics. Despite its significance, the origins of this basing practice have remained largely understudied and unexplained. In Armed Guests, Sebastian Schmidt develops a theory to explain the emergence of this phenomenon, which he calls "sovereign basing," and in doing so, shows how its development fundamentally transformed state sovereignty and the very nature of security politics. He applies concepts derived from pragmatist thought to a historical study of the relations between the United States and its wartime allies to explain how sovereign basing originated through the efforts of policymakers to come to grips with the unique security environment of the postwar era. As he argues, the tools offered by pragmatism provide needed analytical leverage over the emergence of novelty and offer valuable insight into the dynamics of stability and change. Armed Guests is a wide-ranging account of the development of sovereign basing practices in the years before and after World War II. It is a book with significant implications for our understanding of contemporary security politics and the future of basing strategies as well as for broader issues in IR, including the sociological foundations of security strategies, the nature of norms, and the practice of sovereignty.
Based on previously classified documents and on interviews with former secret police officers and ordinary citizens, The Firm is the first comprehensive history of East Germany's secret police, the Stasi, at the grassroots level. Focusing on Gransee and Perleberg, two East German districts located north of Berlin, Gary Bruce reveals how the Stasi monitored small-town East Germany. He paints an eminently human portrait of those involved with this repressive arm of the government, featuring interviews with former officers that uncover a wide array of personalities, from devoted ideologues to reluctant opportunists, most of whom talked frankly about East Germany's obsession with surveillance. Their paths after the collapse of Communism are gripping stories of resurrection and despair, of renewal and demise, of remorse and continued adherence to the movement. The book also sheds much light on the role of the informant, the Stasi's most important tool in these out-of-the-way areas. Providing on-the-ground empirical evidence of how the Stasi operated on a day-to-day basis with ordinary people, this remarkable volume offers an unparalleled picture of life in a totalitarian state. "Brilliantly written and deeply researched, this is the best book in any language on East Germany's Stasi." -Robert Gellately, author of Lenin, Stalin, and Hitler: The Age of Social Catastrophe "This is surely the most detailed micro-analysis of the East German security service.... In a rare step, Bruce actually interviews a number of former Stasi staff, weaving from his conversations telling portraits of 14 of them." -Foreign Affairs | "Brilliant, thoroughly researched, and highly readableenables readers to better understand how the Stasi operated in everyday life and how its inescapable presence affected citizens." -CHOICE "Bruce has done an admirable job of exploring the repressive nature of the East German state and the experience of normalcy in small towns where the watchers and watched lived side by side." -Oral History Review
Andrew Thomson rethinks the history of US imperialism, from the Cold War to today, to reveal how paramilitaries, militias, mercenaries, private armies, and contractors have always been central to US-sponsored insurgencies and US counterinsurgent statecraft. Examining a broad range of events from the Bay of Pigs to the occupation of Iraq, and from the Soviet-Afghan war to the ongoing conflict in Syria, Thomson offers an analysis of the evolution of US support for various para-institutional actors or non-state armed forces. He demonstrates how and why militias, mercenaries, and private military companies have increasingly formed a central part of US imperial strategies designed to influence political and economic conditions abroad. Drawing on declassified documents including military training manuals, CIA communiqus, and national security documents, Outsourced Empire reveals new evidence that helps us understand these institutions and their collective role in maintaining global order.
The U.S. government spends enormous resources each year on the gathering and analysis of intelligence, yet the history of American foreign policy is littered with missteps and misunderstandings that have resulted from intelligence failures. In Why Intelligence Fails, Robert Jervis examines the politics and psychology of two of the more spectacular intelligence failures in recent memory: the mistaken belief that the regime of the Shah in Iran was secure and stable in 1978, and the claim that Iraq had active WMD programs in 2002. The Iran case is based on a recently declassified report Jervis was commissioned to undertake by CIA thirty years ago and includes memoranda written by CIA officials in response to Jervis's findings. The Iraq case, also grounded in a review of the intelligence community's performance, is based on close readings of both classified and declassified documents, though Jervis's conclusions are entirely supported by evidence that has been declassified. In both cases, Jervis finds not only that intelligence was badly flawed but also that later explanations analysts were bowing to political pressure and telling the White House what it wanted to hear or were willfully blind were also incorrect. Proponents of these explanations claimed that initial errors were compounded by groupthink, lack of coordination within the government, and failure to share information. Policy prescriptions, including the recent establishment of a Director of National Intelligence, were supposed to remedy the situation. In Jervis's estimation, neither the explanations nor the prescriptions are adequate. The inferences that intelligence drew were actually quite plausible given the information available. Errors arose, he concludes, from insufficient attention to the ways in which information should be gathered and interpreted, a lack of self-awareness about the factors that led to the judgments, and an organizational culture that failed to probe for weaknesses and explore alternatives. Evaluating the inherent tensions between the methods and aims of intelligence personnel and policymakers from a unique insider's perspective, Jervis forcefully criticizes recent proposals for improving the performance of the intelligence community and discusses ways in which future analysis can be improved."
The actual course given to all secret agents in SOE before working behind enemy lines. It includes everything you needed to know to go undercover - from documents, cover stories and how to live off the land to how to get through an interrogation. The Special Operations Executive (SOE) was a secret British World War II organisation formed in 1940 to conduct espionage, sabotage and reconnaissance in occupied Europe against the Axis powers, and to aid local resistance movements. In late 1942, SOE was asked to increase the number of agents to aid the invasion of mainland Europe. Part of agent training was 'tradecraft' - the practical details on how to be a clandestine agent behind enemy lines - which every agent had to attend at various bases centred around Beaulie in Hampshire. The course was a set of lectures and this book contains the actual text of those lectures which were discovered in the National Archives this year. It is not only a fascinating insight into the workings of one of the Second World Wars most famous and secretive organisations, but is also a reminder of the huge danger anyone being dropped behind enemy lines had to face. SYLLABUS Introduction to Course. Individual Security. Informant Service. Cover. Interrogations. Operational Orders. Know your Enemy. Surveillance. Internal Communications. Premises. Security and Premises for W/T Operator. W/T Operator. External Communications. Organisation. Cell System. Security of Organisation. Recruiting. Discipline and Morale. Burglary. Lock-picking. Selection of Dropping Points and Reception Arrangements. To be given on instructions from London.). Handcuffs. Pigeons. German Counter Espionage. German Uniformed Police. National Police - e.g. of France, Belgium etc. (Given according to student's destination.). The Nazi Party and its Formations in Occupied Territory. Recognition of German Troops by weapons and equipment. Recognition of German Troops by uniforms. Military Intelligence Reports. Handling of German Light Weapons. Morale Warfare. Methods of Morale Warfare. Subversion of enemy troops. Instructions for Foreign Workers in Germany. Passive Resistance in Occupied Countries. Current German Propaganda to Europe. Tasks Preparatory to Allied arrival.
In November 1998, Alexander Litvinenko, a former Lieutenant Colonel of the Russian security service or FSB, along with several former colleagues, publicly stated that their superiors had instigated an assassination attempt on a Russian tycoon and oligarch. Following his subsequent arrest and failed trials, Litvinenko fled to London where, having been granted asylum, he worked as a journalist and writer, as well as acting as a consultant for the British intelligence services. Eight years later, Litvinenko's past caught up with him when he was assassinated in London. It was on 1 November 2006 that Litvinenko was suddenly taken ill-so serious was his condition that he was hospitalised. He passed away twenty-two days later. Significant amounts of a rare and highly toxic element were subsequently found in his body. Before his death, Litvinenko had said: 'You may succeed in silencing one man but the howl of protest from around the world, Mr Putin, will reverberate in your ears for the rest of your life.' In this examination of the events surrounding Litvinenko's murder, the author, Boris Volodarsky, who was consulted by the Metropolitan Police during the investigation and remains in close contact with Litvinenko's widow, details the events surrounding the assassination. He brings the story up to date, referring to the findings of the official British inquiry, on the release of which Prime Minister David Cameron condemned Putin for presiding over 'state sponsored murder'. The author proves that the Litvinenko's poisoning is just one of many. Some of these assassinations or attempted assassinations are already known; others are revealed by him for the first time.
A fresh perspective on statecraft in the cyber domain The idea of “cyber war” has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war? In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies. Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.
The nearly forgotten story of Soviet dissidents. It has been nearly three decades since the collapse of the Soviet Union enough time for the role that the courageous dissidents ultimately contributed to the communist system's collapse to have been largely forgotten, especially in the West. This book brings to life, for contemporary readers, the often underground work of the men and women who opposed the regime and authored dissident texts, known as samizdat, that exposed the tyrannies and weaknesses of the Soviet state both inside and outside the country. Peter Reddaway spent decades studying the Soviet Union and got to know these dissidents and their work, publicizing their writings in the West and helping some of them to escape the Soviet Union and settle abroad. In this memoir he captures the human costs of the repression that marked the Soviet state, focusing in particular on Pavel Litvinov, Larisa Bogoraz, General Petro Grigorenko, Anatoly Marchenko, Alexander Podrabinek, Vyacheslav Bakhmin, and Andrei Sinyavsky. His book describes their courage but also puts their work in the context of the power struggles in the Kremlin, where politicians competed with and even succeeded in ousting one another. Reddaway's book takes readers beyond Moscow, describing politics and dissident work in other major Russian cities as well as in the outlying republics.
John Goldsmith's wartime exploits are all the more remarkable considering that at first his services were consistently refused due to his being over 30. Not easily deterred he eventually became a tank driving instructor in the ranks. In 1942 accidental circumstances saw his recruitment into Buckmaster's F Section of the Special Operations Executive. His faultless French and upbringing in Paris were to prove invaluable. Commissioned overnight and after intensive training he was parachuted into France for the first of his three missions. His adventures included crossing the Pyrenees, sabotage, forming his own circuits, being captured by the Gestapo, a daring escape and black-marketeering. In 1944, now a Major, he was advisor to the Maquis in the Mont Ventoux area where they fought the Germans in pitched battles and won. Although this refreshingly modest account does not admit to it, Goldsmith's extraordinary war is best summed up by his DSO, MC, three Croix de Guerre and Legion d'honneur. Accidental Agent is as thrilling an account of war behind enemy lines as has ever been written.The author's descriptions of his experiences and the many colourful characters he came across are a joy to read.
During the Cold War, U.S. intelligence was concerned primarily with states; non-state actors like terrorists were secondary. Now the priorities are reversed. And the challenge is enormous. States had an address, and they were hierarchical and bureaucratic. They thus came with some story. Terrorists do not. States were over there, but terrorists are there and here. They thus put pressure on intelligence at home, not just abroad. They also force intelligence and law enforcement the CIA and the FBI to work together in new ways, and if those 700,000 police officers in the United States are to be the eyes and ears in the fight against terror, new means of sharing not just information but also analysis across the federal system are imperative. The strength of this book is that it underscores the extent of the change and ranges broadly across data collection and analysis, foreign and domestic, as well as presenting the issues of value that arise as new targets require collecting more information at home.
"Ben Macintyre's rollicking, spellbinding "Agent Zigzag" blends the
spy-versus-
We are living in an age of conspiracy theories, whether it's
enduring, widely held beliefs such as government involvement in the
Kennedy assassination or alien activity at Roswell, fears of a
powerful infiltrating group such as the Illuminati, Jews,
Catholics, or communists, or modern fringe movements of varying
popularity such as birtherism and trutherism. What is it in
American culture that makes conspiracy theories proliferate? Who is
targeted, and why? Are we in the heyday of the conspiracy theory,
or is it in decline?
SOE agent Violette Szabo was one of the most incredible women who operated behind enemy lines during the Second World War. The daughter of an English father and French mother, and widow of a French army officer, she was daring and courageous, conducting sabotage missions, being embroiled in gun battles and battling betrayal. On her second mission she was captured by the Nazis, interrogated and tortured, then deported to Germany where she was eventually executed at Ravensbruck concentration camp. Violette was one of the first women ever to be awarded the George Cross, and her fascinating life has been immortalised in film and on the page. Written by her daughter, Young, Brave and Beautiful reveals the woman and mother behind this extraordinary hero.
The time for serious soul-searching regarding the role of the Central Intelligence Agency and the intelligence community in general is long overdue. The recent intelligence failures regarding the unanticipated collapse of the Soviet Union, the terrorist attacks of September 11, 2001, and the run-up to the Iraq war demonstrate a CIA and a $50 billion intelligence enterprise that cannot provide strategic warning to policymakers and, even worse, is capable of falsifying intelligence to suit political purposes. It will not be possible to reform the enterprise until we understand and debate the nexus between intelligence and policy, the important role of intelligence, and the need for an intelligence agency that is not beholden to political interests. The recent appointment of three general officers to the three most important positions in the intelligence community points to the militarization of overall national security policy, which must be reversed. The military domination of the intelligence cycle makes it more difficult to rebuild strategic intelligence and to provide a check on the Pentagon's influence over foreign policy and the use of force. Failure of Intelligence is designed to inform such a debate and suggest a reform agenda. In this timely and important book, the author offers a provocative mingling of historical description with contemporary political analysis and reform prescription that challenges the conventional wisdom on clandestine collection. The book ultimately and persuasively asserts that the failure to have diplomatic relations has led to the inability to collect intelligence.
The astonishing, gripping and long-awaited inside story of an ordinary man who became an extraordinary spy. After years of living in semi-isolation, David Rupert speaks for the first time about how a trucker from New York ended up being recruited to the FBI and MI5 at one of the most crucial moments in British political history. Including shock revelations about Rupert's discoveries working within the Real IRA - such as sending plastic explosives and detonators, hidden inside toys, to a primary school in Donegal. Author Sean O'Driscoll tells the incredible story of David, 'The Big Yank', a 6ft7 American tourist who found himself at the centre of a chilling campaign of terror that targeted civilians, the forces and Prime Minister Tony Blair. Countless lives have been saved by David Rupert's decision to risk his neck working for years within one of the most brutal and ruthless terrorist organisations in the world - an organisation whose language of violence left women and children amongst the dead in the Omagh atrocity. An unprecedented bombing campaign was planned to destroy any hopes of a peace agreement. In a trial that rested entirely on the evidence of the 'Big Yank', those plans for ongoing bloodshed and an end to the Good Friday Agreement were brought to a halt.
A TLS and a Prospect Book of the Year A revelatory, explosive new analysis of the military today. Over the first two decades of the twenty-first century the British Army fought in Iraq and Afghanistan, at considerable financial and human cost. Yet neither war achieved its objectives. Award-winning journalist Simon Akam questions why, and provides challenging but necessary answers. Composed from assiduous documentary research, field reportage, and hundreds of interviews, this book is a strikingly rich, nuanced portrait of one of our pivotal national institutions in a time of great stress. This is as much a book about Britain, and about the politics of failure, as it is about the military.
This book explores the powers, activities, and accountability of MI5 from the end of the Second World War to 1964. It argues that MI5 acted with neither statutory authority nor statutory powers, and with no obvious forms of statutory accountability. It was established as a counter-espionage agency, yet was beset by espionage scandals on a frequency that suggested if not high levels of incompetence, then high levels of distraction and the squandering of resources. The book addresses the evolution of MI5's mandate after the Second World War which set out its role and functions, and to a limited extent the lines of accountability, the surveillance targets of MI5 and the surveillance methods that it used for this purpose, with a focus in two chapters on MPs and lawyers respectively; the purposes for which this information was used, principally to exclude people from certain forms of employment; and the accountability of MI5 or the lack thereof for the way in which it discharged its responsibilities under the mandate. As lawyers the authors' concern is to consider these questions within the context of the rule of law, one of the core principles of the British constitution, the values of which it was the duty of the Security Service to uphold. Based on extensive archival research, it suggests that MI5 operated without legal authority or exceeded the legal authority it did have.
Communism was never a popular ideology in America, but the vehemence of American anticommunism varied from passive disdain in the 1920s to fervent hostility in the early years of the Cold War. Nothing so stimulated the white hot anticommunism of the late 1940s and 1950s more than a series of spy trials that revealed that American Communists had co-operated with Soviet espionage against the United States and had assisted in stealing the technical secrets of the atomic bomb as well as penetrating the US State Department, the Treasury Department, and the White House itself. This book, first published in 2006, reviews the major spy cases of the early Cold War (Hiss-Chambers, Rosenberg, Bentley, Gouzenko, Coplon, Amerasia and others) and the often-frustrating clashes between the exacting rules of the American criminal justice system and the requirements of effective counter-espionage.
Communism was never a popular ideology in America, but the vehemence of American anticommunism varied from passive disdain in the 1920s to fervent hostility in the early years of the Cold War. Nothing so stimulated the white hot anticommunism of the late 1940s and 1950s more than a series of spy trials that revealed that American Communists had co-operated with Soviet espionage against the United States and had assisted in stealing the technical secrets of the atomic bomb as well as penetrating the US State Department, the Treasury Department, and the White House itself. This book, first published in 2006, reviews the major spy cases of the early Cold War (Hiss-Chambers, Rosenberg, Bentley, Gouzenko, Coplon, Amerasia and others) and the often-frustrating clashes between the exacting rules of the American criminal justice system and the requirements of effective counter-espionage. |
![]() ![]() You may like...
Advances in Heat Transfer, Volume 52
John Patrick Abraham, John M Gorman, …
Hardcover
Aircraft Design Projects - For…
Lloyd R. Jenkinson, Jim Marchman
Paperback
R1,553
Discovery Miles 15 530
Hearing and Hormones
Andrew H. Bass, Joseph A. Sisneros, …
Hardcover
Internal Combustion Engines…
Institution of Mechanical Engineers
Paperback
R5,216
Discovery Miles 52 160
Tribocorrosion - Fundamentals, Methods…
Arpith Siddaiah, Rahul Ramachandran, …
Paperback
R4,219
Discovery Miles 42 190
The Auditory Cortex - A Synthesis of…
Peter Heil, Henning Scheich, …
Hardcover
R4,197
Discovery Miles 41 970
Mechanics Of Materials - SI Edition
Barry Goodno, James Gere
Paperback
|