![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Andrew Thomson rethinks the history of US imperialism, from the Cold War to today, to reveal how paramilitaries, militias, mercenaries, private armies, and contractors have always been central to US-sponsored insurgencies and US counterinsurgent statecraft. Examining a broad range of events from the Bay of Pigs to the occupation of Iraq, and from the Soviet-Afghan war to the ongoing conflict in Syria, Thomson offers an analysis of the evolution of US support for various para-institutional actors or non-state armed forces. He demonstrates how and why militias, mercenaries, and private military companies have increasingly formed a central part of US imperial strategies designed to influence political and economic conditions abroad. Drawing on declassified documents including military training manuals, CIA communiqus, and national security documents, Outsourced Empire reveals new evidence that helps us understand these institutions and their collective role in maintaining global order.
This fascinating account of how two young Americans turned traitor during the Cold War is an "absolutely smashing real-life spy story" (The New York Times Book Review). At the height of the Cold War, some of the nation's most precious secrets passed through a CIA contractor in Southern California. Only a handful of employees were cleared to handle the intelligence that came through the Black Vault. One of them was Christopher John Boyce, a hard-partying genius with a sky-high IQ, a passion for falconry, and little love for his country. Security at the Vault was so lax, Boyce couldn't help but be tempted. And when he gave in, the fate of the free world would hang in the balance. With the help of his best friend, Andrew Daulton Lee, a drug dealer with connections south of the border, Boyce began stealing classified documents and selling them to the Soviet embassy in Mexico City. It was an audacious act of treason, committed by two spoiled young men who were nearly always drunk, stoned, or both--and were about to find themselves caught in the middle of a fight between the CIA and the KGB. This Edgar Award-winning book was the inspiration for the critically acclaimed film starring Timothy Hutton and Sean Penn--a true story as thrilling as any dreamed up by Ian Fleming or John le Carre. Before Edward Snowden, there were Boyce and Lee, two of the most unlikely spies in the history of the Cold War.
THE USA TODAY BESTSELLER 'As fast paced as a thriller' Fred Burton, Stratfor Talks' Pen and Sword Podcast 'Jacobsen here presents a tour de force exploring the CIA's paramilitary activities...this excellent work feels like uncovering the tip of the iceberg ...Highly recommended for those seeking a better understanding of American foreign policy in action' Jacob Sherman, Library Journal 'A behind-the-scenes look at the most shadowy corners of the American intelligence community...Well-sourced and well-paced, this book is full of surprises' Kirkus 'Annie Jacobsen takes us inside the darkest and most morally ambiguous corner of our government, where politicians ask brave men and women to kill-up close and personal-on America's behalf' Garrett M. Graff, author of Raven Rock: The Story of the U.S. Government's Secret Plan to Save Itself - While the Rest of us Die 'This is a first rate book on the CIA, its paramilitary armies, operators, and assassins' New York Journal of Books 'Having already demonstrated her remarkable aptitude for unearthing government secrets in books like Area 51 (2011) and The Pentagon's Brain (2015), Jacobsen pulls back the curtain on the history of covert warfare and state sanctioned assassinations from WWII to the present...Jacobsen's work revealing a poorly understood but essential slice of warfare history belongs in every library collection' Booklist The definitive, character-driven history of CIA covert operations and U.S. government-sponsored assassinations, from the author of the Pulizter Prize finalist The Pentagon's Brain Since 1947, domestic and foreign assassinations have been executed under the C IA-led covert action operations team. Before that time, responsibility for taking out America's enemies abroad was even more shrouded in mystery. Despite Hollywood notions of last-minute rogue-operations and external secret hires, covert action is actually a cog in a colossal foreign policy machine, moving through, among others, the Bureau of Intelligence and Research, the House and Senate Select Committees. At the end of the day, it is the President, not the C IA, who is singularly in charge. For the first time, Pulitzer Prize finalist and New York Times bestselling author Annie Jacobsen takes us deep inside this top-secret history. With unparalleled access to former operatives, ambassadors, and even past directors of the Secret Service and CIA operations, Jacobsen reveals the inner workings of these teams, and just how far a U.S. president may go, covertly but lawfully, to pursue the nation's interests.
An Open Letters Review Best Book of the Year "One of the finest books on information security published so far in this century-easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive." -Thomas Rid, author of Active Measures "The best examination I have read of how increasingly dramatic developments in cyberspace are defining the 'new normal' of geopolitics in the digital age. Buchanan...captures the dynamics of all of this truly brilliantly." -General David Petraeus, former Director of the CIA and Commander of Coalition Forces in Iraq and Afghanistan Few national-security threats are as potent-or as nebulous-as cyber attacks. Ben Buchanan reveals how hackers are transforming spycraft and statecraft, catching us all in the crossfire, whether we know it or not. Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference. Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph.
A fresh perspective on statecraft in the cyber domain The idea of “cyber war†has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war? In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies. Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.
Combining his expertise as a national security correspondent and research academic, Paul Lashmar reveals how and why the media became more critical in its reporting of the Secret State. He explores a series of major case studies including Snowden, WikiLeaks, Spycatcher, rendition and torture, and MI5's vetting of the BBC - most of which he reported on as they happened. He discusses the issues that news coverage raises for democracy and gives you a deeper understanding of how intelligence and the media function, interact and fit into structures of power and knowledge.
From the moment man learned how to ascend off the ground, the strategic significance of air intelligence became apparent. This relatively new discipline the first dedicated air reconnaissance missions were undertaken in 1870 during the siege of Paris when tethered French balloons were employed to spot enemy positions and direct artillery fire onto them has developed at an astonishing speed. Over the past century air intelligence has moved from hazardous observation balloons to micro-circuitry, which can send pictures from a video camera mounted on a remotely-controlled vehicle the size of a hummingbird. The Historical Dictionary of Air Intelligence relates the evolving history of the rapidly advancing field of air intelligence. A chronology, an introductory essay, and cross-referenced dictionary entries on the agencies, agents, operations, equipment, tradecraft, and jargon of air intelligence make this reference as essential as it is fascinating."
When considering strategies to address violent conflict, scholars and policymakers debate the wisdom of recognizing versus avoiding reference to ethnic identities in government institutions. In Diversity, Violence, and Recognition, Elisabeth King and Cyrus Samii examine the reasons that governments choose to recognize ethnic identities and the consequences of such choices for peace. The authors introduce a theory on the merits and risks of recognizing ethnic groups in state institutions, pointing to the crucial role of ethnic demographics. Through a global quantitative analysis and in-depth case studies of Burundi, Rwanda, and Ethiopia, they find promise in recognition. Countries that adopt recognition go on to experience less violence, more economic vitality, and more democratic politics, but these effects depend on which ethnic group is in power. King and Samii's findings are important for scholars studying peace, democracy, and development, and practically relevant to policymakers attempting to make these concepts a reality.
Letty Davenport is back, and this time she’s taking no prisoners. The new incredible thriller from the #1 global bestseller.Letty Davenport’s days working a desk job are behind her. Her previous actions at a gunfight in Texas – and her incredible skills with firearms – draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security tasks her with infiltrating a hacker group that is intent on wreaking havoc nationwide. Letty and her reluctant partner from the NSA pose as free-spirited programmers for hire and embark on a cross country road trip to the group’s California headquarters. But soon they begin to suspect that the hackers are not their only enemy. Someone within their own circle may have betrayed them, and has ulterior motives that place their mission – and their lives – in grave danger. From one of the world’s greatest living mystery writers, Dark Angel is an absolute must read for any thriller lover.
This book explores the powers, activities, and accountability of MI5 from the end of the Second World War to 1964. It argues that MI5 acted with neither statutory authority nor statutory powers, and with no obvious forms of statutory accountability. It was established as a counter-espionage agency, yet was beset by espionage scandals on a frequency that suggested if not high levels of incompetence, then high levels of distraction and the squandering of resources. The book addresses the evolution of MI5's mandate after the Second World War which set out its role and functions, and to a limited extent the lines of accountability, the surveillance targets of MI5 and the surveillance methods that it used for this purpose, with a focus in two chapters on MPs and lawyers respectively; the purposes for which this information was used, principally to exclude people from certain forms of employment; and the accountability of MI5 or the lack thereof for the way in which it discharged its responsibilities under the mandate. As lawyers the authors' concern is to consider these questions within the context of the rule of law, one of the core principles of the British constitution, the values of which it was the duty of the Security Service to uphold. Based on extensive archival research, it suggests that MI5 operated without legal authority or exceeded the legal authority it did have.
The cross-border sharing of intelligence is fundamental to the establishment and preservation of security and stability. The American invasion of Iraq in 2003 was based in part on flawed intelligence, and current efforts to defeat al Qaeda would not be possible without an exchange of information among Britain, Pakistan, Indonesia, and the United States. While critical to national security and political campaigns, intelligence sharing can also be a minefield of manipulation and maneuvering, especially when secrecy makes independent verification of sources impossible. In "The International Politics of Intelligence Sharing," James Igoe Walsh advances novel strategies for securing more reliable intelligence. His approach puts states that seek information in control of other states' intelligence efforts. According to this hierarchical framework, states regularly draw agreements in which one power directly monitors and acts on another power's information-gathering activities-a more streamlined approach that prevents the dissemination of false "secrets." In developing this strategy, Walsh draws on recent theories of international cooperation and evaluates both historical and contemporary case studies of intelligence sharing. Readers with an interest in intelligence matters cannot ignore this urgent, timely, and evidence-based book.
Communism was never a popular ideology in America, but the vehemence of American anticommunism varied from passive disdain in the 1920s to fervent hostility in the early years of the Cold War. Nothing so stimulated the white hot anticommunism of the late 1940s and 1950s more than a series of spy trials that revealed that American Communists had co-operated with Soviet espionage against the United States and had assisted in stealing the technical secrets of the atomic bomb as well as penetrating the US State Department, the Treasury Department, and the White House itself. This book, first published in 2006, reviews the major spy cases of the early Cold War (Hiss-Chambers, Rosenberg, Bentley, Gouzenko, Coplon, Amerasia and others) and the often-frustrating clashes between the exacting rules of the American criminal justice system and the requirements of effective counter-espionage.
Communism was never a popular ideology in America, but the vehemence of American anticommunism varied from passive disdain in the 1920s to fervent hostility in the early years of the Cold War. Nothing so stimulated the white hot anticommunism of the late 1940s and 1950s more than a series of spy trials that revealed that American Communists had co-operated with Soviet espionage against the United States and had assisted in stealing the technical secrets of the atomic bomb as well as penetrating the US State Department, the Treasury Department, and the White House itself. This book, first published in 2006, reviews the major spy cases of the early Cold War (Hiss-Chambers, Rosenberg, Bentley, Gouzenko, Coplon, Amerasia and others) and the often-frustrating clashes between the exacting rules of the American criminal justice system and the requirements of effective counter-espionage.
From Ukraine to Afghanistan and beyond, occupations and exit dilemmas permeate contemporary geopolitics. However, the existing literature on territorial conflict rarely scrutinizes a pivotal, related question: what makes a state withdraw from an occupied territory, or entrench itself within it? In Understanding Territorial Withdrawal, Rob Geist Pinfold addresses this research gap. He focuses primarily on Israel, a unique but important milieu that offers pertinent lessons for other states facing similar policy problems. As Pinfold demonstrates, occupiers choose to either perpetuate or abandon an occupation because of three factors: their relations with the occupied, interactions with third parties, and the occupier's domestic politics. He argues that each withdrawal is the culmination of a gradual process of policy re-assessment. Critically, it is a combination of local violence and international pressure that causes popular and elite opinion within the occupier to endorse an exit, rather than perpetuate the status quo. To affirm this pattern, Pinfold constructs a generalizable framework for understanding territorial withdrawal. He then applies this framework to multiple case studies, which include: Israel's withdrawal from the Sinai Peninsula between 1974-1982; its "unilateral" withdrawal from southern Lebanon in 2000; and its "unilateral disengagement" from the Gaza Strip in 2005, as well as Israel's non-withdrawals from the West Bank and Golan Heights. Overall, Understanding Territorial Withdrawal delineates commonalities that manifested in each exit yet were absent in the cases of occupation without exit. A powerful analysis of a central concern for the study of international security, territorial conflict, and the Arab-Israel conflict alike, this book provides a critical intervention that identifies why occupiers either retain, or leave, occupied territory.
Dekades lank het die wereld gegis oor Suid-Afrika en Die Bom. Die land het ses kernbomme in die geheim ontwikkel, maar hulle self vernietig. Geen ander land ter wereld het dit nog ooit gedoen nie. Hierdie boek is vir wetenskaplikes en leke, en lees soos 'n spanningsverhaal. Dit is die volledigste opgaaf van Suid-Afrika se kernwapenvermoe tot dusver, en geskryf deur 'n kernfisikus wat sedert 1975 direk by die proses betrokke was. Saam met sy dogter Lydia von Wielligh-Steyn deel dr. Nic von Wielligh 'n fassinerende verhaal oor die atoommonster en hoe hy getem is.
Most of us remember the seventh of September 1940 as the day the London docks were bombed and devastated by fire. I remember it as the day I was called up. But the police car that collected me took me to Wormwood Scrubs Prison . . . Major Ronnie Reed never spoke about what he did in the Second World War. He was only 23 when it broke out; an amateur radio enthusiast who was working as a maintenance engineer for the BBC. And yet, despite minimal money and qualifications, he became one of the men behind some of the most remarkable spy stories of all time. Recruited in the dead of night from his Anderson shelter, Ronnie became a case officer for double agents, including Eddie Chapman, known then as Agent Zigzag. The passport photo of The Man Who Never Was, was a photo of Ronnie Reed. For ten years after the Second World War, he headed the anti-Russian department of MI5, dealing with notorious spies such as Philby, Burgess and Maclean. In 1994, shortly before Ronnie's death, he revealed the truth of his remarkable past to his son, Nicholas. In Spy Runner he reveals his father's fascinating story with a collection of recently released reports and photos from The National Archives, and intimate family snaps.
This is the first history and analysis of the intelligence and espionage activities of the regime of Charles II (1660–85). It is concerned with the mechanics, activities and philosophy of the intelligence system which developed under the auspices of the office of the Secretary of State and which emerged in the face of the problems of conspiracy and international politics. It examines the development of intelligence networks on a local and international level, the use made of the Post Office, codes and ciphers, and the employment of spies, informers and assassins. The careers of a number of spies employed by the regime are examined through a series of detailed case studes. The book provides a balanced portrait of the dark byways of Restoration politics, particularly in the 1660s and 1670s, and fills an important gap in the current literature.
This book reveals, for the first time, a hitherto unexplored dimension of Britain's engagement with the post-war Middle East: the counter-subversive policies and measures conducted by the British Intelligence and Security Services and he Information Research Department (IRD) of the Foreign Office, Britain's secret propaganda apparatus.
For more than half a century, Big Safari-modified aircraft have performed dangerous and essential missions to collect intelligence, conduct surveillance and reconnaissance, and engage in special operations missions around the globe in the interest of national security. These state-of-the-art aircraft have been flown, operated, and maintained by men and women whose dedication and commitment have made the world a safer place. In The History of Big Safari, author Colonel Bill Grimes, a retired US Air Force officer, presents a history of this program, which has been in existence for more than sixty years. Born as a special acquisition program in 1952, Big Safari has been in a unique position to save lives by rapidly fielding essential systems with a quick-reaction capability to ensure decision makers on the battlefield and at the Pentagon have timely intelligence to plan and execute operations. Grimes shows how, without a special acquisition program such as Big Safari, the nation's ability to react to evolving dangers and threats would be mired in bureaucracy when timely responses are critical. With detailed cutaway illustrations revealing aircraft modifications and mission equipment, The History of Big Safari also includes photographs, sidebars, and anecdotes. It goes behind the scenes with the men and women who participated in the challenging projects and daring missions. It shares the development of cutting-edge technology and special mission aircraft, as well as the global events that necessitated these once-classified programs. Finally, it provides insight into long-veiled projects, operations, and missions that comprise the world under the purview of Big Safari.
In the 21st century, more than any other time, US agencies have relied on contractors to conduct core intelligence functions. This book charts the swell of intelligence outsourcing in the context of American political culture and considers what this means for the relationship between the state, its national security apparatus and accountability within a liberal democracy. Through analysis of a series of case studies, recently declassified documents and exclusive interviews with national security experts in the public and private sectors, the book provides an in-depth and illuminating appraisal of the evolving accountability regime for intelligence contractors. |
![]() ![]() You may like...
Creative Placemaking - Research, Theory…
Cara Courage, Anita Mckeown
Hardcover
R4,568
Discovery Miles 45 680
Understanding Authenticity in Chinese…
Anke Hein, Christopher J. Foster
Hardcover
R3,952
Discovery Miles 39 520
Libraries, Archives, and Museums in…
Casper Hvenegaard Rasmussen, Kerstin Rydbeck, …
Paperback
R1,230
Discovery Miles 12 300
Reconstructing Exhibitions in Art…
Natasha Adamou, Michaela Giebelhausen
Hardcover
R4,569
Discovery Miles 45 690
Art Museums of the World - Norway-Zaire
Virginia Jackson, Etc
Hardcover
R4,993
Discovery Miles 49 930
|