Athan Theoharis, long a respected authority on surveillance and secrecy, established his reputation for meticulous scholarship with his work on the loyalty security program developed under Truman and McCarthy. In Abuse of Power, Theoharis continues his investigation of U.S. government surveillance and historicizes the 9/11 response.
Criticizing the U.S. government's secret activities and policies during periods of "unprecedented crisis," he recounts how presidents and FBI officials exploited concerns about foreign-based internal security threats.
Drawing on information sequestered until recently in FBI records, Theoharis shows how these secret activities in the World War II and Cold War eras expanded FBI surveillance powers and, in the process, eroded civil liberties without substantially advancing legitimate security interests.
Passionately argued, this timely book speaks to the costs and consequences of still-secret post-9/11 surveillance programs and counterintelligence failures. Ultimately, Abuse of Power makes the case that the abusive surveillance policies of the Cold War years were repeated in the government's responses to the September 11 attacks.
American Spies presents the stunning histories of more than forty Americans who spied against their country during the past six decades. Michael Sulick, former head of the CIA’s clandestine service, illustrates through these stories—some familiar, others much less well known—the common threads in the spy cases and the evolution of American attitudes toward espionage since the onset of the Cold War. After highlighting the accounts of many who have spied for traditional adversaries such as Russian and Chinese intelligence services, Sulick shows how spy hunters today confront a far broader spectrum of threats not only from hostile states but also substate groups, including those conducting cyberespionage.
Sulick reveals six fundamental elements of espionage in these stories: the motivations that drove them to spy; their access and the secrets they betrayed; their tradecraft, i.e., the techniques of concealing their espionage; their exposure; their punishment; and, finally, the damage they inflicted on America’s national security.
The book is the sequel to Sulick’s popular Spying in America: Espionage from the Revolutionary War to the Dawn of the Cold War. Together they serve as a basic introduction to understanding America’s vulnerability to espionage, which has oscillated between peacetime complacency and wartime vigilance, and continues to be shaped by the inherent conflict between our nation’s security needs and our commitment to the preservation of civil liberties.
Analyzing Intelligence, now in a revised and extensively updated second edition, assesses the state of the profession of intelligence analysis from the practitioners point of view. The contributors—most of whom have held senior positions in the US intelligence community—review the evolution of the field, the rise of new challenges, pitfalls in analysis, and the lessons from new training and techniques designed to deal with 21st century national security problems. This second edition updates this indispensable book with new chapters that highlight advances in applying more analytic rigor to analysis, along with expertise-building, training, and professional development. New chapters by practitioners broaden the original volume’s discussion of the analyst-policymaker relationship by addressing analytic support to the military customer as well as by demonstrating how structured analysis can benefit military commanders on the battlefield.
Analyzing Intelligence is written for national security practitioners such as producers and users of intelligence, as well as for scholars and students seeking to understand the nature and role of intelligence analysis, its strengths and weaknesses, and steps that can improve it and lead it to a more recognizable profession.
The most comprehensive and up-to-date volume on professional intelligence analysis as practiced in the US Government, Analyzing Intelligence is essential reading for practitioners and users of intelligence analysis, as well as for students and scholars in security studies and related fields.
Drawing on the individual and collective experience of recognized intelligence experts and scholars in the field, Analyzing Intelligence provides the first comprehensive assessment of the state of intelligence analysis since 9/11. Its in-depth and balanced evaluation of more than fifty years of U.S. analysis includes a critique of why it has under-performed at times. It provides insights regarding the enduring obstacles as well as new challenges of analysis in the post-9/11 world, and suggests innovative ideas for improved analytical methods, training, and structured approaches.
The book's six sections present a coherent plan for improving analysis. Early chapters examine how intelligence analysis has evolved since its origins in the mid-20th century, focusing on traditions, culture, successes, and failures. The middle sections examine how analysis supports the most senior national security and military policymakers and strategists, and how analysts must deal with the perennial challenges of collection, politicization, analytical bias, knowledge building and denial and deception. The final sections of the book propose new ways to address enduring issues in warning analysis, methodology (or "analytical tradecraft") and emerging analytic issues like homeland defense. The book suggests new forms of analytic collaboration in a global intelligence environment, and imperatives for the development of a new profession of intelligence analysis.
Analyzing Intelligence is written for the national security expert who needs to understand the role of intelligence and its strengths and weaknesses. Practicing and future analysts will also find that its attention to the enduring challenges provides useful lessons-learned to guide their own efforts. The innovations section will provoke senior intelligence managers to consider major changes in the way analysis is currently organized and conducted, and the way that analysts are trained and perform.
Since 9/11, a new configuration of power situated at the core of the executive branch of the U.S. government has taken hold. In Crimes of Power & States of Impunity, Michael Welch takes a close look at the key historical, political, and economic forces shaping the country's response to terror.
Welch continues the work he began in Scapegoats of September 11th and argues that current U.S. policies, many enacted after the attacks, undermine basic human rights and violate domestic and international law. He recounts these offenses and analyzes the system that sanctions them, offering fresh insight into the complex relationship between power and state crime. Welch critically examines the unlawful enemy combatant designation, Guantanamo Bay, recent torture cases, and collateral damage relating to the war in Iraq. This book transcends important legal arguments as Welch strives for a broader sociological interpretation of what transpired early this century, analyzing the abuses of power that jeopardize our safety and security.
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists.
These rivalries provide rich case studies for scholars and offer today’s analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
How can the United States avoid a future surprise attack on the scale of 9/11 or Pearl Harbor, in an era when such devastating attacks can come not only from nation states, but also from terrorist groups or cyber enemies?
Intelligence and Surprise Attack examines why surprise attacks often succeed even though, in most cases, warnings had been available beforehand. Erik J. Dahl challenges the conventional wisdom about intelligence failure, which holds that attacks succeed because important warnings get lost amid noise or because intelligence officials lack the imagination and collaboration to “connect the dots” of available information. Comparing cases of intelligence failure with intelligence success, Dahl finds that the key to success is not more imagination or better analysis, but better acquisition of precise, tactical-level intelligence combined with the presence of decision makers who are willing to listen to and act on the warnings they receive from their intelligence staff.
The book offers a new understanding of classic cases of conventional and terrorist attacks such as Pearl Harbor, the Battle of Midway, and the bombings of US embassies in Kenya and Tanzania. The book also presents a comprehensive analysis of the intelligence picture before the 9/11 attacks, making use of new information available since the publication of the 9/11 Commission Report and challenging some of that report’s findings.
Spying, the “world’s second oldest profession,” is hardly limited to the traditional great power countries. Intelligence Elsewhere, nevertheless, is the first scholarly volume to deal exclusively with the comparative study of national intelligence outside of the anglosphere and European mainstream. Past studies of intelligence and counterintelligence have tended to focus on countries such as the United States, Great Britain, and Russia, as well as, to a lesser extent, Canada, Australia, France, and Germany. This volume examines the deep historical and cultural origins of intelligence in several countries of critical importance today: India, China, the Arab world, and indeed, Russia, the latter examined from a fresh perspective. The authors then delve into modern intelligence practice in countries with organizations significantly different from the mainstream: Iran, Pakistan, Japan, Finland, Sweden, Indonesia, Argentina, and Ghana.
With contributions by leading intelligence experts for each country, the chapters give the reader important insights into intelligence culture, current practice, and security sector reform. As the world morphs into an increasingly multi-polar system, it is more important than ever to understand the national intelligence systems of rising powers and regional powers that differ significantly from those of the US, its NATO allies, and its traditional opponents. This fascinating book shines new light into intelligence practices in regions that, until now, have eluded our understanding.
This textbook introduces students to the critical role of the US intelligence community within the wider national security decision-making and political process. Intelligence in the National Security Enterprise defines what intelligence is and what intelligence agencies do, but the emphasis is on showing how intelligence serves the policymaker. Roger Z. George draws on his thirty-year CIA career and more than a decade of teaching at both the undergraduate and graduate level to reveal the real world of intelligence. Intelligence support is examined from a variety of perspectives to include providing strategic intelligence, warning, daily tactical support to policy actions as well as covert action. The book includes useful features for students and instructors such as excerpts and links to primary-source documents, suggestions for further reading, and a glossary.
As chief of counterintelligence for the Central Intelligence Agency from the early 1950s to the early 1970s, James Jesus Angleton built a formidable reputation. Although perhaps best known for leading the agency's notorious “Molehunt”—the search for a Soviet spy believed to have infiltrated the upper levels of the American government—Angleton also played a key role in the U.S. intervention in the Italian election of 1948, in Israel's development of nuclear weapons, and in the management of the CIA's investigation of the assassination of John F. Kennedy. He later led CIA efforts to contain the Vietnam-era antiwar movement, including the campaign to destroy the liberal Catholic magazine Ramparts . In this deeply researched biography, Michael Holzman uses Angleton's story to illuminate the history of the CIA from its founding in the late 1940s to the mid-1970s. Like many of his colleagues in the CIA, James Angleton learned the craft of espionage during World War II as an officer in the Office of Strategic Services (OSS), where he became a friend and protégé of the British double agent Kim Philby. Yet Angleton's approach to counterintelligence was also influenced by his unusual Mexican American family background and his years at Yale as a student of the New Critics and publisher of modernist poets. His marriage to Cicely d'Autremont and the couple's friendship with E. E. and Marion Cummings became part of a network of cultural connections that linked the U.S. secret intelligence services and American writers and artists during the postwar period. Drawing on a broad range of sources, including previously unexamined archival documents, personal letters, and interviews, Holzman looks beneath the surface of Angleton's career to reveal the sensibility that governed not only his personal aims and ambitions but those of the organization he served and helped shape.
Identifying “lessons learned” is not new—the military has been doing it for decades. However, members of the worldwide intelligence community have been slow to extract wider lessons gathered from the past and apply them to contemporary challenges. Learning from the Secret Past is a collection of ten carefully selected cases from post-World War II British intelligence history. Some of the cases include the Malayan Emergency, the Cuban Missile Crisis, Northern Ireland, and the lead up to the Iraq War. Each case, accompanied by authentic documents, illuminates important lessons that today's intelligence officers and policymakers—in Britain and elsewhere—should heed.
Written by former and current intelligence officers, high-ranking government officials, and scholars, the case studies in this book detail intelligence successes and failures, discuss effective structuring of the intelligence community, examine the effective use of intelligence in counterinsurgency, explore the ethical dilemmas and practical gains of interrogation, and highlight the value of human intelligence and the dangers of the politicization of intelligence. The lessons learned from this book stress the value of past experience and point the way toward running effective intelligence agencies in a democratic society.
Scholars and professionals worldwide who specialize in intelligence, defense and security studies, and international relations will find this book to be extremely valuable.
In 2015, for the first time, millennials outnumbered baby boomers as the largest generational segment of the U.S. population. This report describes how the intelligence community must engage millennials across multiple segments to succeed in the future: millennials as intelligence clients, employees, and partners and as members of the public.
A drastic reform of intelligence activities is long overdue. The Cold War has been over for ten years. No country threatens this nation's existence. Yet we still spend billions of dollars on covert action and espionage.
In National Insecurity ten prominent experts describe, from an insider perspective, what went wrong with U.S. intelligence and what will be necessary to fix it. Drawing on their experience in government administration, research, and the foreign service, they propose a radical rethinking of the United States' intelligence needs in the post-Cold War world. In addition, they offer a coherent and unified plan for reform that can simultaneously protect U. S. security and uphold the values of our democratic system.
As we now know, even during the Cold War, when intelligence was seen as a matter of life and death, our system served us badly. It provided unreliable information, which led to a grossly inflated military budget, as it wreaked havoc around the world, supporting corrupt regimes, promoting the drug trade, and repeatedly violating foreign and domestic laws. Protected by a shroud of secrecy, it paid no price for its mistakes. Instead it grew larger and more insulated every year.
Taking into consideration our strategic interests abroad as well as the price of covert operations in dollars, in reliability, and in good will, every American taxpayer can be informed by and will want to read this book. National Insecurity is essential for readers interested in contemporary political issues, international relations, U.S. history, public policy issues, foreign policy, intelligence reform, and political science.
Spy romances of Cold War counterespionage evoke scenes of heroic FBI and CIA agents dedicated to smashing communism and its subversive coterie of intellectual fellow travelers bent on painting the world red.
John Rodden cuts this tall tale down to its authentic pint size, refusing to indulge the public relations myth promoted by J. Edgar Hoover's FBI. In Of G-Men and Eggheads, Rodden portrays federal agents’ hilarious obsession with monitoring that ever-present threat to national security, the American literary intellectual. Drawing on government dossiers and archives, Rodden focuses on the onetime members of a radical political sect of ex-Trotskyists (barely numbering a thousand at its height), the so-called New York intellectuals. He describes the nonsensical decades-long pursuit of this group of intellectuals, especially Lionel Trilling, Dwight Macdonald, and Irving Howe. The Keystone Cops style of numerous FBI agents is documented carefully in Rodden's meticulous case studies of how Hoover's men recruited informants to snoop on the "Commies," opened their personal mail, tracked their movements, and reported on their wives and friends.
This sweeping history of the development of professional, institutionalized intelligence examines the implications of the fall of the state monopoly on espionage today and beyond.
During the Cold War, only the alliances clustered around the two superpowers maintained viable intelligence endeavors, whereas a century ago, many states could aspire to be competitive at these dark arts. Today, larger states have lost their monopoly on intelligence skills and capabilities as technological and sociopolitical changes have made it possible for private organizations and even individuals to unearth secrets and influence global events.
Historian Michael Warner addresses the birth of professional intelligence in Europe at the beginning of the twentieth century and the subsequent rise of US intelligence during the Cold War. He brings this history up to the present day as intelligence agencies used the struggle against terrorism and the digital revolution to improve capabilities in the 2000s. Throughout, the book examines how states and other entities use intelligence to create, exploit, and protect secret advantages against others, and emphasizes how technological advancement and ideological competition drive intelligence, improving its techniques and creating a need for intelligence and counterintelligence activities to serve and protect policymakers and commanders.
The world changes intelligence and intelligence changes the world. This sweeping history of espionage and intelligence will be a welcomed by practitioners, students, and scholars of security studies, international affairs, and intelligence, as well as general audiences interested in the evolution of espionage and technology.
During the Cold War, the political leadership of the Soviet Union avidly sought intelligence about its main adversary, the United States. Although effective on an operational level, Soviet leaders and their intelligence chiefs fell short when it came to analyzing intelligence. Soviet leaders were often not receptive to intelligence that conflicted with their existing beliefs, and analysts were reluctant to put forward assessments that challenged ideological orthodoxy.
There were, however, important changes over time. Ultimately the views of an enlightened Soviet leader, Gorbachev, trumped the ideological blinders of his predecessors and the intelligence service’s dedication to an endless duel with their ideologically spawned “main adversary," making it possible to end the Cold War.
Raymond Garthoff draws on over five decades of personal contact with Soviet diplomats, intelligence officers, military leaders, and scholars during his remarkable career as an analyst, senior diplomat, and historian. He also builds on previous scholarship and examines documents from Soviet and Western archives. Soviet Leaders and Intelligence offers an informed and highly readable assessment of how the Soviets understood—and misunderstood—the intentions and objectives of their Cold War adversary.
A Classic in Counterintelligence—Now Back in Print
Originally published in 1987, Thwarting Enemies at Home and Abroad is a unique primer that teaches the principles, strategy, and tradecraft of counterintelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations.
Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.
Transforming U.S. Intelligence
Jennifer E. Sims and Burton Gerber, Editors Georgetown University Press, 2005 Library of Congress JK468.I6T67 2005 | Dewey Decimal 353.170973
The intelligence failures exposed by the events of 9/11 and the missing weapons of mass destruction in Iraq have made one thing perfectly clear: change is needed in how the U.S. intelligence community operates. Transforming U.S. Intelligence argues that transforming intelligence requires as much a look to the future as to the past and a focus more on the art and practice of intelligence rather than on its bureaucratic arrangements. In fact, while the recent restructuring, including the creation of the Department of Homeland Security, may solve some problems, it has also created new ones. The authors of this volume agree that transforming policies and practices will be the most effective way to tackle future challenges facing the nation's security.
This volume's contributors, who have served in intelligence agencies, the Departments of State or Defense, and the staffs of congressional oversight committees, bring their experience as insiders to bear in thoughtful and thought-provoking essays that address what such an overhaul of the system will require. In the first section, contributors discuss twenty-first-century security challenges and how the intelligence community can successfully defend U.S. national interests. The second section focuses on new technologies and modified policies that can increase the effectiveness of intelligence gathering and analysis. Finally, contributors consider management procedures that ensure the implementation of enhanced capabilities in practice.
Transforming U.S. Intelligence supports the mandate of the new director of national intelligence by offering both careful analysis of existing strengths and weaknesses in U.S. intelligence and specific recommendations on how to fix its problems without harming its strengths. These recommendations, based on intimate knowledge of the way U.S. intelligence actually works, include suggestions for the creative mixing of technologies with new missions to bring about the transformation of U.S. intelligence without incurring unnecessary harm or expense. The goal is the creation of an intelligence community that can rapidly respond to developments in international politics, such as the emergence of nimble terrorist networks while reconciling national security requirements with the rights and liberties of American citizens.
Decision makers matching wits with an adversary want intelligence—good, relevant information to help them win. Intelligence can gain these advantages through directed research and analysis, agile collection, and the timely use of guile and theft. Counterintelligence is the art and practice of defeating these endeavors. Its purpose is the same as that of positive intelligence—to gain advantage—but it does so by exploiting, disrupting, denying, or manipulating the intelligence activities of others. The tools of counterintelligence include security systems, deception, and disguise: vaults, mirrors, and masks.
In one indispensable volume, top practitioners and scholars in the field explain the importance of counterintelligence today and explore the causes of—and practical solutions for—U.S. counterintelligence weaknesses. These experts stress the importance of developing a sound strategic vision in order to improve U.S. counterintelligence and emphasize the challenges posed by technological change, confused purposes, political culture, and bureaucratic rigidity. Vaults, Mirrors, and Masks skillfully reveals that robust counterintelligence is vital to ensuring America's security.
Published in cooperation with the Center for Peace and Security Studies and the George T. Kalaris Memorial Fund, Edmund A. Walsh School of Foreign Service, Georgetown University.