Athan Theoharis, long a respected authority on surveillance and secrecy, established his reputation for meticulous scholarship with his work on the loyalty security program developed under Truman and McCarthy. In Abuse of Power, Theoharis continues his investigation of U.S. government surveillance and historicizes the 9/11 response.
Criticizing the U.S. government's secret activities and policies during periods of "unprecedented crisis," he recounts how presidents and FBI officials exploited concerns about foreign-based internal security threats.
Drawing on information sequestered until recently in FBI records, Theoharis shows how these secret activities in the World War II and Cold War eras expanded FBI surveillance powers and, in the process, eroded civil liberties without substantially advancing legitimate security interests.
Passionately argued, this timely book speaks to the costs and consequences of still-secret post-9/11 surveillance programs and counterintelligence failures. Ultimately, Abuse of Power makes the case that the abusive surveillance policies of the Cold War years were repeated in the government's responses to the September 11 attacks.
A history of Americans who spied against their country and what their stories reveal about national security
What's your secret?
American Spies presents the stunning histories of more than forty Americans who spied against their country during the past six decades. Michael Sulick, former head of the CIA's clandestine service, illustrates through these stories—some familiar, others much less well known—the common threads in the spy cases and the evolution of American attitudes toward espionage since the onset of the Cold War. After highlighting the accounts of many who have spied for traditional adversaries such as Russian and Chinese intelligence services, Sulick shows how spy hunters today confront a far broader spectrum of threats not only from hostile states but also substate groups, including those conducting cyberespionage.
Sulick reveals six fundamental elements of espionage in these stories: the motivations that drove them to spy; their access and the secrets they betrayed; their tradecraft, or the techniques of concealing their espionage; their exposure; their punishment; and, finally, the damage they inflicted on America's national security.
The book is the sequel to Sulick's popular Spying in America: Espionage from the Revolutionary War to the Dawn of the Cold War. Together they serve as a basic introduction to understanding America's vulnerability to espionage, which has oscillated between peacetime complacency and wartime vigilance, and continues to be shaped by the inherent conflict between our nation's security needs and our commitment to the preservation of civil liberties. Now available in paperback, with a new preface that brings the conversation up to the present, American Spies is as insightful and relevant as ever.
Analyzing Intelligence, now in a revised and extensively updated second edition, assesses the state of the profession of intelligence analysis from the practitioner's point of view. The contributors—most of whom have held senior positions in the US intelligence community—review the evolution of the field, the rise of new challenges, pitfalls in analysis, and the lessons from new training and techniques designed to deal with 21st century national security problems. This second edition updates this indispensable book with new chapters that highlight advances in applying more analytic rigor to analysis, along with expertise-building, training, and professional development. New chapters by practitioners broaden the original volume’s discussion of the analyst-policymaker relationship by addressing analytic support to the military customer as well as by demonstrating how structured analysis can benefit military commanders on the battlefield.
Analyzing Intelligence is written for national security practitioners such as producers and users of intelligence, as well as for scholars and students seeking to understand the nature and role of intelligence analysis, its strengths and weaknesses, and steps that can improve it and lead it to a more recognizable profession.
The most comprehensive and up-to-date volume on professional intelligence analysis as practiced in the US Government, Analyzing Intelligence is essential reading for practitioners and users of intelligence analysis, as well as for students and scholars in security studies and related fields.
The most comprehensive history of Canadian military intelligence and its influence on key military operations
Canadian intelligence has become increasingly central to the operations of the Canadian Armed Forces (CAF). Canadian Military Intelligence: Operations and Evolution from the October Crisis to the War in Afghanistan is the first comprehensive history that examines the impact of tactical, operational, and strategic intelligence on the Canadian military.
Drawing upon a wide range of original documents and interviews with participants in specific operations, author David A. Charters provides an inside perspective on the development of military intelligence since the Second World War. He shows how intelligence influenced key military operations, from domestic internal security to peacekeeping efforts to high-intensity air campaigns—including the October Crisis of 1970, the Oka Crisis, the Gulf War, peacekeeping and enforcement operations in the Balkans, and the war in Afghanistan. He describes how decades of experience, innovation, and increasingly close cooperation with its Five Eyes and NATO allies allowed Canada’s military intelligence to punch above its weight. Its tactical effectiveness and ability to overcome challenges reshaped the outlook of military commanders, and intelligence emerged from the margins to become a central feature of military and defense operations.
Canadian Military Intelligence offers lessons from the past and critical implications for future intelligence support with the creation of the Canadian Forces Intelligence Command. This book will be essential to both intelligence history and military history readers and collections.
What’s your impression of the CIA? A bumbling agency that can’t protect its own spies? A rogue organization prone to covert operations and assassinations? Or a dedicated public service that advances the interests of the United States? Astute TV and movie viewers may have noticed that the CIA’s image in popular media has spanned this entire range, with a decided shift to more positive portrayals in recent years. But what very few people know is that the Central Intelligence Agency has been actively engaged in shaping the content of film and television, especially since it established an entertainment industry liaison program in the mid-1990s.
The CIA in Hollywood offers the first full-scale investigation of the relationship between the Agency and the film and television industries. Tricia Jenkins draws on numerous interviews with the CIA’s public affairs staff, operations officers, and historians, as well as with Hollywood technical consultants, producers, and screenwriters who have worked with the Agency, to uncover the nature of the CIA’s role in Hollywood. In particular, she delves into the Agency’s and its officers’ involvement in the production of The Agency, In the Company of Spies, Alias, The Recruit, The Sum of All Fears, Enemy of the State, Syriana, The Good Shepherd, and more. Her research reveals the significant influence that the CIA now wields in Hollywood and raises important and troubling questions about the ethics and legality of a government agency using popular media to manipulate its public image.
An in-depth analysis of why COVID-19 warnings failed and how to avert the next disaster
Epidemiologists and national security agencies warned for years about the potential for a deadly pandemic, but in the end global surveillance and warning systems were not enough to avert the COVID-19 disaster. In The COVID-19 Intelligence Failure, Erik J. Dahl demonstrates that understanding how intelligence warnings work—and how they fail—shows why the years of predictions were not enough.
In the first in-depth analysis of the topic, Dahl examines the roles that both traditional intelligence services and medical intelligence and surveillance systems play in providing advance warning against public health threats—and how these systems must be improved for the future. For intelligence to effectively mitigate threats, specific, tactical-level warnings must be collected and shared in real time with receptive decision makers who will take appropriate action. Dahl shows how a combination of late and insufficient warnings about COVID-19, the Trump administration’s political aversion to scientific advice, and decentralized public health systems all exacerbated the pandemic in the United States. Dahl’s analysis draws parallels to other warning failures that preceded major catastrophes from Pearl Harbor to 9/11, placing current events in context.
The COVID-19 Intelligence Failure is a wake-up call for the United States and the international community to improve their national security, medical, and public health intelligence systems and capabilities.
Investigating the global system of detention centers that imprison asylum seekers and conceal persistent human rights violations
Remote detention centers confine tens of thousands of refugees, asylum seekers, and undocumented immigrants around the world, operating in a legal gray area that hides terrible human rights abuses from the international community. Built to temporarily house eight hundred migrants in transit, the immigrant “reception center” on the Italian island of Lampedusa has held thousands of North African refugees under inhumane conditions for weeks on end. Australia’s use of Christmas Island as a detention center for asylum seekers has enabled successive governments to imprison migrants from Asia and Africa, including the Sudanese human rights activist Abdul Aziz Muhamat, held there for five years.
In The Death of Asylum, Alison Mountz traces the global chain of remote sites used by states of the Global North to confine migrants fleeing violence and poverty, using cruel measures that, if unchecked, will lead to the death of asylum as an ethical ideal. Through unprecedented access to offshore detention centers and immigrant-processing facilities, Mountz illustrates how authorities in the United States, the European Union, and Australia have created a new and shadowy geopolitical formation allowing them to externalize their borders to distant islands where harsh treatment and deadly force deprive migrants of basic human rights.
Mountz details how states use the geographic inaccessibility of places like Christmas Island, almost a thousand miles off the Australian mainland, to isolate asylum seekers far from the scrutiny of humanitarian NGOs, human rights groups, journalists, and their own citizens. By focusing on borderlands and spaces of transit between regions, The Death of Asylum shows how remote detention centers effectively curtail the basic human right to seek asylum, forcing refugees to take more dangerous risks to escape war, famine, and oppression.
The first book-length study of one of the Civil War's most outlandish and mysterious characters
Devil's Game traces the amazing career of Charles A. Dunham, Civil War spy, forger, journalist, and master of dirty tricks. Writing for a variety of New York papers under alternate names, Dunham routinely faked stories, created new identities, and later boldly cast himself to play those roles. He achieved his greatest infamy when he was called to testify in Washington concerning Abraham Lincoln's assassination. Many parts of Dunham's career remain shadowy, but Cumming offers the first detailed tour of Dunham's convoluted, high-stakes, international deceits, including his effort to sell Lincoln on plans for a raid to capture Jefferson Davis.
Exhaustively researched and unprecedented in depth, this carefully crafted assessment of Dunham's motives, personality, and the complex effects of his schemes changes assumptions about covert operations during the Civil War.
The 1970s revealed a number of infamous and sometimes illegal practices used by federal law enforcement agencies to monitor political dissent in the United States. In the aftermath of Watergate the revelation of serious abuses created distrust of virtually all domestic intelligence operations and led to vigorous efforts at reform.
Richard E. Morgan emphasizes the importance of guarding against an overreaction to the disclosures of the mid-1970s. While acknowledging the need for many of the recent reforms that seek to establish accountability, guarantee privacy, and protect dissent, he cautions against limitations on domestic intelligence gathering that could seriously hamper government's ability to prevent crime, particularly terrorism.
Domestic Intelligence has several major objectives: to trace the way in which government agencies became involved with domestic intelligence gathering; to review the controversies and abuses associated with these agencies, especially the FBI, the CIA, and the NSA; to discuss the constitutionality of domestic intelligence collection; to review intelligence reforms adopted; and to suggest additional reforms.
This volume is concerned with the tension between the need to protect privacy and political dissent and the need for the government to protect the community. Morgan concludes that intelligence operations aimed at anticipating criminal activity are necessary in a complex, highly vulnerable society, and that these operations can be conducted responsibly with proper guidelines and oversight mechanisms.
'Early in my research, a friend with excellent knowledge of the United Auto Workers internal operations told me, "Don't give up. They are hiding something"…'
It's 1990, and US labor is being outsourced to Mexico. Rumors of a violent confrontation at the Mexican Ford Assembly plant on January 8 reach the United Auto Workers (UAW) union in the US: nine employees had been shot by a group of drunken thugs and gangsters, in an act of political repression which changed the course of Mexican and US workers' rights forever.
Rob McKenzie was working at the Ford Twin Cities Assembly plant in Minnesota when he heard of the attack. He didn't believe the official story, and began a years-long investigation to uncover the truth. His findings took him further than he expected - all the way to the doors of the CIA.
Virtually unknown outside of Mexico, the full story of 'El Golpe', or 'The Coup', is a dark tale of political intrigue that still resonates today.
In December 1974, a front-page story in the New York Times revealed the explosive details of illegal domestic spying by the Central Intelligence Agency. This included political surveillance, eavesdropping, detention, and interrogation. The revelation of illegal activities over many years shocked the American public and led to investigations of the CIA by a presidential commission and committees in both houses of Congress, which found evidence of more abuse, even CIA plans for assassinations. Investigators and the public soon discovered that the CIA abuses were described in a top-secret document agency insiders dubbed the “Family Jewels.” That document became ground zero for a political firestorm that lasted more than a year. The “Family Jewels” debacle ultimately brought about greater congressional oversight of the CIA, but excesses such as those uncovered in the 1970s continue to come to light.
The Family Jewels probes the deepest secrets of the CIA and its attempts to avoid scrutiny. John Prados recounts the secret operations that constituted “Jewels” and investigators’ pursuit of the truth, plus the strenuous efforts—by the agency, the executive branch, and even presidents—to evade accountability. Prados reveals how Vice President Richard Cheney played a leading role in intelligence abuses and demonstrates that every type of “Jewel” has been replicated since, especially during the post-9/11 war on terror. The Family Jewels masterfully illuminates why these abuses are endemic to spying, shows that proper relationships are vital to control of intelligence, and advocates a system for handling “Family Jewels” crises in a democratic society.
With a new epilogue that discusses former CIA employee Edward Snowden’s revelation of massive covert surveillance by the NSA, this powerful accounting of intelligence abuses committed by the CIA from the Cold War through the war on terror reveals why such abuses and attempts to conceal them are endemic to spying and proposes how a democratic nation can rein in its spymasters.
A rallying cry to link the food justice movement to broader social justice debates
The United States is a nation of foodies and food activists, many of them progressives, and yet their overwhelming concern for what they consume often hinders their engagement with social justice more broadly. Food Justice Now! charts a path from food activism to social justice activism that integrates the two. It calls on the food-focused to broaden and deepen their commitment to the struggle against structural inequalities both within and beyond the food system.
In an engrossing, historically grounded, and ethnographically rich narrative, Joshua Sbicca argues that food justice is more than just a myopic focus on food, allowing scholars and activists alike to investigate the causes behind inequities and evaluate and implement political strategies to overcome them. Focusing on carceral, labor, and immigration crises, Sbicca tells the stories of three California-based food movement organizations, showing that when activists use food to confront neoliberal capitalism and institutional racism, they can creatively expand how to practice and achieve food justice.
Sbicca sets his central argument in opposition to apolitical and individual solutions, discussing national food movement campaigns and the need for economically and racially just food policies—a matter of vital public concern with deep implications for building collective power across a diversity of interests.
A riveting introduction to the complex and evolving field of geospatial intelligence.
Although geospatial intelligence is a term of recent origin, its underpinnings have a long and interesting history. Geospatial Intelligence: Origins and Evolution shows how the current age of geospatial knowledge evolved from its ancient origins to become ubiquitous in daily life across the globe. Within that framework, the book weaves a tapestry of stories about the people, events, ideas, and technologies that affected the trajectory of what has become known as GEOINT.
Author Robert M. Clark explores the historical background and subsequent influence of fields such as geography, cartography, remote sensing, photogrammetry, geopolitics, geophysics, and geographic information systems on GEOINT. Although its modern use began in national security communities, Clark shows how GEOINT has rapidly extended its reach to other government agencies, NGOs, and corporations. This global explosion in the use of geospatial intelligence has far-reaching implications not only for the scientific, academic, and commercial communities but for a society increasingly reliant upon emerging technologies. Drones, the Internet of things, and cellular devices transform how we gather information and how others can collect that information, to our benefit or detriment.
“A must-read…It reveals important truths.”
—Vint Cerf, Internet pioneer
“One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.”
—Thomas Rid, author of Active Measures
Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists.
Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph.
“A helpful reminder…of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.”
—Jonathan Freedland, New York Review of Books
“The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.”
—General David Petraeus, former Director of the CIA
“Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’”
—Richard Harknett, former Scholar-in-Residence at United States Cyber Command
Intelligence agencies spend huge sums of money to collect and analyze vast quantities of national security data for their political leaders. How well is this intelligence analyzed, how often is it acted on by policymakers, and does it have a positive or negative effect on decision making? Drawing on declassified documents, interviews with intelligence veterans and policymakers, and other sources, The Image of the Enemy breaks new ground as it examines how seven countries analyzed and used intelligence to shape their understanding of their main adversary. The cases in the book include the Soviet Union's analysis of the United States (and vice versa), East Germany's analysis of West Germany (and vice versa), British intelligence in the early years of the Troubles in Northern Ireland, Israeli intelligence about the Palestinians, Pakistani intelligence on India, and US intelligence about Islamist terrorists.
These rivalries provide rich case studies for scholars and offer today’s analysts and policymakers the opportunity to closely evaluate past successes and failures in intelligence analysis and the best ways to give information support to policymakers. Using these lessons from the past, they can move forward to improve analysis of current adversaries and future threats.
How can the United States avoid a future surprise attack on the scale of 9/11 or Pearl Harbor, in an era when such devastating attacks can come not only from nation states, but also from terrorist groups or cyber enemies?
Intelligence and Surprise Attack examines why surprise attacks often succeed even though, in most cases, warnings had been available beforehand. Erik J. Dahl challenges the conventional wisdom about intelligence failure, which holds that attacks succeed because important warnings get lost amid noise or because intelligence officials lack the imagination and collaboration to “connect the dots” of available information. Comparing cases of intelligence failure with intelligence success, Dahl finds that the key to success is not more imagination or better analysis, but better acquisition of precise, tactical-level intelligence combined with the presence of decision makers who are willing to listen to and act on the warnings they receive from their intelligence staff.
The book offers a new understanding of classic cases of conventional and terrorist attacks such as Pearl Harbor, the Battle of Midway, and the bombings of US embassies in Kenya and Tanzania. The book also presents a comprehensive analysis of the intelligence picture before the 9/11 attacks, making use of new information available since the publication of the 9/11 Commission Report and challenging some of that report’s findings.
Spying, the “world’s second oldest profession,” is hardly limited to the traditional great power countries. Intelligence Elsewhere, nevertheless, is the first scholarly volume to deal exclusively with the comparative study of national intelligence outside of the anglosphere and European mainstream. Past studies of intelligence and counterintelligence have tended to focus on countries such as the United States, Great Britain, and Russia, as well as, to a lesser extent, Canada, Australia, France, and Germany. This volume examines the deep historical and cultural origins of intelligence in several countries of critical importance today: India, China, the Arab world, and indeed, Russia, the latter examined from a fresh perspective. The authors then delve into modern intelligence practice in countries with organizations significantly different from the mainstream: Iran, Pakistan, Japan, Finland, Sweden, Indonesia, Argentina, and Ghana.
With contributions by leading intelligence experts for each country, the chapters give the reader important insights into intelligence culture, current practice, and security sector reform. As the world morphs into an increasingly multi-polar system, it is more important than ever to understand the national intelligence systems of rising powers and regional powers that differ significantly from those of the US, its NATO allies, and its traditional opponents. This fascinating book shines new light into intelligence practices in regions that, until now, have eluded our understanding.
This textbook introduces students to the critical role of the US intelligence community within the wider national security decision-making and political process. Intelligence in the National Security Enterprise defines what intelligence is and what intelligence agencies do, but the emphasis is on showing how intelligence serves the policymaker. Roger Z. George draws on his thirty-year CIA career and more than a decade of teaching at both the undergraduate and graduate level to reveal the real world of intelligence. Intelligence support is examined from a variety of perspectives to include providing strategic intelligence, warning, daily tactical support to policy actions as well as covert action. The book includes useful features for students and instructors such as excerpts and links to primary-source documents, suggestions for further reading, and a glossary.
Jihadist ideology inspires a diverse and decentralized collection of radical groups to fight alleged enemies of Islam and to attempt to “restore” a holy caliphate to unite Muslim peoples across the Middle East, Africa, and Asia. Islamic Radicalism and Global Jihad provides unique insights into the philosophical foundations, strategic vision, organizational dynamics, and tactics of the modern jihadist movement—with specific attention to its primary driver, Al-Qa’ida.
Springer, Regens, and Edger draw heavily on Arabic language sources seldom seen in the West to explain what jihadists want and how radical thinkers have distorted the teachings of Islam to convince followers to pursue terrorism as a religious duty. With sophisticated and systematic analysis, the authors lead their readers on a fascinating intellectual journey through the differing ideas, goals, and vulnerabilities of the jihadist movement as it has evolved over time. The authors also impart wisdom from their own professional experience with terrorism, counterinsurgency, and intelligence to provide scholars, students, counterterrorism professionals, and general readers with this accessible overview of key radical Islamic thinkers and today’s jihadists.
In 1967 the magazine Ramparts ran an exposé revealing that the Central Intelligence Agency had been secretly funding and managing a wide range of citizen front groups intended to counter communist influence around the world. In addition to embarrassing prominent individuals caught up, wittingly or unwittingly, in the secret superpower struggle for hearts and minds, the revelations of 1967 were one of the worst operational disasters in the history of American intelligence and presaged a series of public scandals from which the CIA's reputation has arguably never recovered.
CIA official Frank Wisner called the operation his "mighty Wurlitzer," on which he could play any propaganda tune. In this illuminating book, Hugh Wilford provides the first comprehensive account of the clandestine relationship between the CIA and its front organizations. Using an unprecedented wealth of sources, he traces the rise and fall of America's Cold War front network from its origins in the 1940s to its Third World expansion during the 1950s and ultimate collapse in the 1960s.
Covering the intelligence officers who masterminded the CIA's fronts as well as the involved citizen groups--émigrés, labor, intellectuals, artists, students, women, Catholics, African Americans, and journalists--Wilford provides a surprising analysis of Cold War society that contains valuable lessons for our own age of global conflict.
How capitalism is reconfiguring the very texture of life
Mutant Ecologies traces the spinning of new synthetic threads into the web of life. It is a critical cartography of the shifting landscapes of capital accumulation conjured by recent developments in genomic science, genome editing, and the biotech industry.
CRISPR crops, fast-growing salmons, heat-resistant Slick™ cows, Friendly™ Mosquitoes, humanized mice, pigs growing human organs – these are but a few of the dazzling new life-forms that have recently emerged from corporate and university laboratories around the world, all promising to lubricate the circuits of capital accumulation in distinct ways. The deliberate induction of genetic mutations is increasingly central to business operations in a number of sectors, from agriculture to pharmaceuticals.
While the Nobel Committee recently proclaimed the life sciences to have entered 'a new epoch', the authors show how these technological innovations continue to operate within a socio-historical context defined by the iron rules of capitalist competition and exploitation. Capital no longer contents itself by simply appropriating the living bodies of plants and animals. It purposefully designs its internal metabolism, and in that way, it redesigns the countless living vectors that constitute the global biosphere. It is driving a biological revolution, which will ripple through the everyday lives of people everywhere.
What does it mean for human beings to exist in an era of dronified state violence? How can we understand the rise of robotic systems of power and domination? Focusing on U.S. drone warfare and its broader implications as no other book has to date, Predator Empire argues that we are witnessing a transition from a labor-intensive “American empire” to a machine-intensive “Predator Empire.”
Moving from the Vietnam War to the War on Terror and beyond, Ian G. R. Shaw reveals how changes in military strategy, domestic policing, and state surveillance have come together to enclose our planet in a robotic system of control. The rise of drones presents a series of “existential crises,” he suggests, that are reengineering not only spaces of violence but also the character of the modern state. Positioning drone warfare as part of a much longer project to watch and enclose the human species, he shows that for decades—centuries even—human existence has slowly but surely been brought within the artificial worlds of “technological civilization.” Instead of incarcerating us in prisons or colonizing territory directly, the Predator Empire locks us inside a worldwide system of electromagnetic enclosure—in which democratic ideals give way to a system of totalitarian control, a machinic “rule by Nobody.”
As accessibly written as it is theoretically ambitious, Predator Empire provides up-to-date information about U.S. drone warfare, as well as an in-depth history of the rise of drones.
Intelligence agencies provide critical information to national security and foreign policy decision makers, but spying also poses inherent dilemmas for liberty, privacy, human rights, and diplomacy. Principled Spying explores how to strike a balance between necessary intelligence activities and protecting democratic values by developing a new framework of ethics.
David Omand and Mark Phythian structure this book as an engaging debate between a former national security practitioner and an intelligence scholar. Rather than simply presenting their positions, throughout the book they pose key questions to each other and to the reader and offer contrasting perspectives to stimulate further discussion. They demonstrate the value for both practitioners and the public of weighing the dilemmas of secret intelligence through ethics. The chapters in the book cover key areas including human intelligence, surveillance, acting on intelligence, and oversight and accountability. The authors disagree on some key questions, but in the course of their debate they demonstrate that it is possible to find a balance between liberty and security. This book is accessible reading for concerned citizens, but it also delivers the sophisticated insights of a high-ranking former practitioner and a distinguished scholar.
Researchers in the rapidly growing field of intelligence studies face unique and difficult challenges ranging from finding and accessing data on secret activities, to sorting through the politics of intelligence successes and failures, to making sense of complex socio-organizational or psychological phenomena. The contributing authors to Researching National Security Intelligence survey the state of the field and demonstrate how incorporating multiple disciplines helps to generate high-quality, policy-relevant research. Following this approach, the volume provides a conceptual, empirical, and methodological toolkit for scholars and students informed by many disciplines: history, political science, public administration, psychology, communications, and journalism. This collection of essays written by an international group of scholars and practitioners propels intelligence studies forward by demonstrating its growing depth, by suggesting new pathways to the creation of knowledge, and by identifying how scholarship can enhance practice and accountability.
This sweeping history of the development of professional, institutionalized intelligence examines the implications of the fall of the state monopoly on espionage today and beyond.
During the Cold War, only the alliances clustered around the two superpowers maintained viable intelligence endeavors, whereas a century ago, many states could aspire to be competitive at these dark arts. Today, larger states have lost their monopoly on intelligence skills and capabilities as technological and sociopolitical changes have made it possible for private organizations and even individuals to unearth secrets and influence global events.
Historian Michael Warner addresses the birth of professional intelligence in Europe at the beginning of the twentieth century and the subsequent rise of US intelligence during the Cold War. He brings this history up to the present day as intelligence agencies used the struggle against terrorism and the digital revolution to improve capabilities in the 2000s. Throughout, the book examines how states and other entities use intelligence to create, exploit, and protect secret advantages against others, and emphasizes how technological advancement and ideological competition drive intelligence, improving its techniques and creating a need for intelligence and counterintelligence activities to serve and protect policymakers and commanders.
The world changes intelligence and intelligence changes the world. This sweeping history of espionage and intelligence will be a welcomed by practitioners, students, and scholars of security studies, international affairs, and intelligence, as well as general audiences interested in the evolution of espionage and technology.
During the Cold War, the political leadership of the Soviet Union avidly sought intelligence about its main adversary, the United States. Although effective on an operational level, Soviet leaders and their intelligence chiefs fell short when it came to analyzing intelligence. Soviet leaders were often not receptive to intelligence that conflicted with their existing beliefs, and analysts were reluctant to put forward assessments that challenged ideological orthodoxy.
There were, however, important changes over time. Ultimately the views of an enlightened Soviet leader, Gorbachev, trumped the ideological blinders of his predecessors and the intelligence service’s dedication to an endless duel with their ideologically spawned “main adversary," making it possible to end the Cold War.
Raymond Garthoff draws on over five decades of personal contact with Soviet diplomats, intelligence officers, military leaders, and scholars during his remarkable career as an analyst, senior diplomat, and historian. He also builds on previous scholarship and examines documents from Soviet and Western archives. Soviet Leaders and Intelligence offers an informed and highly readable assessment of how the Soviets understood—and misunderstood—the intentions and objectives of their Cold War adversary.
In literature and film the spy chief is an all-knowing, all-powerful figure who masterfully moves spies into action like pieces on a chessboard. How close to reality is that depiction, and what does it really take to be an effective leader in the world of intelligence?
This first volume of Spy Chiefs broadens and deepens our understanding of the role of intelligence leaders in foreign affairs and national security in the United States and United Kingdom from the early 1940s to the present. The figures profiled range from famous spy chiefs such as William Donovan, Richard Helms, and Stewart Menzies to little-known figures such as John Grombach, who ran an intelligence organization so secret that not even President Truman knew of it. The volume tries to answer six questions arising from the spy-chief profiles: how do intelligence leaders operate in different national, institutional, and historical contexts? What role have they played in the conduct of international relations and the making of national security policy? How much power do they possess? What qualities make an effective intelligence leader? How secretive and accountable to the public have they been? Finally, does popular culture (including the media) distort or improve our understanding of them? Many of those profiled in the book served at times of turbulent change, were faced with foreign penetrations of their intelligence service, and wrestled with matters of transparency, accountability to democratically elected overseers, and adherence to the rule of law. This book will appeal to both intelligence specialists and general readers with an interest in the intelligence history of the United States and United Kingdom.
Throughout history and across cultures, the spy chief has been a leader of the state security apparatus and an essential adviser to heads of state. In democracies, the spy chief has become a public figure, and intelligence activities have been brought under the rule of law. In authoritarian regimes, however, the spy chief was and remains a frightening and opaque figure who exercises secret influence abroad and engages in repression at home.
This second volume of Spy Chiefs goes beyond the commonly studied spy chiefs of the United States and the United Kingdom to examine leaders from Renaissance Venice to the Soviet Union, Germany, India, Egypt, and Lebanon in the twentieth century. It provides a close-up look at intelligence leaders, good and bad, in the different political contexts of the regimes they served. The contributors to the volume try to answer the following questions: how do intelligence leaders operate in these different national, institutional and historical contexts? What role have they played in the conduct of domestic affairs and international relations? How much power have they possessed? How have they led their agencies and what qualities make an effective intelligence leader? How has their role differed according to the political character of the regime they have served? The profiles in this book range from some of the most notorious figures in modern history, such as Feliks Dzerzhinsky and Erich Mielke, to spy chiefs in democratic West Germany and India.
Save when you purchase Volumes 1 and 2 in a bundle!
The first volume of Spy Chiefs broadens and deepens our understanding of the role of intelligence leaders in foreign affairs and national security in the United States and United Kingdom from the early 1940s to the present. The figures profiled range from famous spy chiefs such as William Donovan, Richard Helms, and Stewart Menzies to little-known figures such as John Grombach, who ran an intelligence organization so secret that not even President Truman knew of it. The volume tries to answer six questions arising from the spy-chief profiles: how do intelligence leaders operate in different national, institutional, and historical contexts? What role have they played in the conduct of international relations and the making of national security policy? How much power do they possess? What qualities make an effective intelligence leader? How secretive and accountable to the public have they been? Finally, does popular culture (including the media) distort or improve our understanding of them? Many of those profiled in the book served at times of turbulent change, were faced with foreign penetrations of their intelligence service, and wrestled with matters of transparency, accountability to democratically elected overseers, and adherence to the rule of law. This book will appeal to both intelligence specialists and general readers with an interest in the intelligence history of the United States and United Kingdom.
The second volume of Spy Chiefs goes beyond the commonly studied spy chiefs of the United States and the United Kingdom to examine leaders from Renaissance Venice to the Soviet Union, Germany, India, Egypt, and Lebanon in the twentieth century. It provides a close-up look at intelligence leaders, good and bad, in the different political contexts of the regimes they served. The contributors to the volume try to answer the following questions: how do intelligence leaders operate in these different national, institutional and historical contexts? What role have they played in the conduct of domestic affairs and international relations? How much power have they possessed? How have they led their agencies and what qualities make an effective intelligence leader? How has their role differed according to the political character of the regime they have served? The profiles in this book range from some of the most notorious figures in modern history, such as Feliks Dzerzhinsky and Erich Mielke, to spy chiefs in democratic West Germany and India.
Through every era of American history, New York City has been a battleground for international espionage, where secrets are created, stolen, and passed through clandestine meetings and covert communications. Some spies do their work and escape, while others are compromised, imprisoned, and—a few—executed. Spy Sites of New York City takes you inside this shadowy world and reveals the places where it all happened.
In 233 main entries as well as listings for scores more spy sites, H. Keith Melton and Robert Wallace weave incredible true stories of derring-do and double-crosses that put even the best spy fiction to shame. The cases and sites follow espionage history from the Revolutionary War and Civil War, to the rise of communism and fascism in the twentieth century, to Russian sleeper agents in the twenty-first century. The spy sites are not only in Manhattan, Brooklyn, Queens, and the Bronx but also on Long Island and in New Jersey. Maps and 380 photographs allow readers to follow in the footsteps of spies and spy-hunters to explore the city, tradecraft, and operations that influenced wars hot and cold. Informing and entertaining, Spy Sites of New York City is a must-have guidebook to the espionage history of the Big Apple.
An illustrated guide to the history of espionage in Philadelphia and the Delaware Valley.
Philadelphia became a battleground for spies as George Washington’s Patriot army in nearby Valley Forge struggled to survive the winter of 1776-77. In the centuries that followed—through the Civil War, the rise of fascism and communism in the twentieth century, and today’s fight against terrorism—the city has been home to international intrigue and some of America’s most celebrated spies.
Spy Sites of Philadelphia takes readers inside this shadowy world to reveal the places and people of Philadelphia’s hidden history. These fascinating entries portray details of stolen secrets, clandestine meetings, and covert communications through every era of American history. Along the way, readers will meet both heroes and villains whose daring deceptions helped shape the nation.
Authors H. Keith Melton and Robert Wallace weave incredible true stories of courage and deceit that rival even the best spy fiction. Featuring over 150 spy sites in Philadelphia and its neighboring towns and counties, this illustrated guide invites readers to follow in the footsteps of moles and sleuths.
Authoritative, entertaining, and informative, Spy Sites of Philadelphia is a must-have guidebook to the espionage history of the region.
Can you keep a secret?
Maybe you can, but the United States government cannot. Since the birth of the country, nations large and small, from Russia and China to Ghana and Ecuador, have stolen the most precious secrets of the United States.
Written by Michael Sulick, former director of CIA’s clandestine service, Spying in America presents a history of more than thirty espionage cases inside the United States. These cases include Americans who spied against their country, spies from both the Union and Confederacy during the Civil War, and foreign agents who ran operations on American soil. Some of the stories are familiar, such as those of Benedict Arnold and Julius Rosenberg, while others, though less well known, are equally fascinating.
From the American Revolution, through the Civil War and two World Wars, to the atomic age of the Manhattan Project, Sulick details the lives of those who have betrayed America’s secrets. In each case he focuses on the motivations that drove these individuals to spy, their access and the secrets they betrayed, their tradecraft or techniques for concealing their espionage, their exposure and punishment, and the damage they ultimately inflicted on America’s national security.
Spying in America serves as the perfect introduction to the early history of espionage in America. Sulick’s unique experience as a senior intelligence officer is evident as he skillfully guides the reader through these cases of intrigue, deftly illustrating the evolution of American awareness about espionage and the fitful development of American counterespionage leading up to the Cold War.
Jan Karski’s Story of a Secret State stands as one of the most poignant and inspiring memoirs of World War II and the Holocaust. With elements of a spy thriller, documenting his experiences in the Polish Underground, and as one of the first accounts of the systematic slaughter of the Jews by the German Nazis, this volume is a remarkable testimony of one man’s courage and a nation’s struggle for resistance against overwhelming oppression.
Karski was a brilliant young diplomat when war broke out in 1939 with Hitler’s invasion of Poland. Taken prisoner by the Soviet Red Army, which had simultaneously invaded from the East, Karski narrowly escaped the subsequent Katyn Forest Massacre. He became a member of the Polish Underground, the most significant resistance movement in occupied Europe, acting as a liaison and courier between the Underground and the Polish government-in-exile. He was twice smuggled into the Warsaw Ghetto, and entered the Nazi’s Izbica transit camp disguised as a guard, witnessing first-hand the horrors of the Holocaust.
Karski’s courage and testimony, conveyed in a breathtaking manner in Story of a Secret State, offer the narrative of one of the world’s greatest eyewitnesses and an inspiration for all of humanity, emboldening each of us to rise to the challenge of standing up against evil and for human rights. This definitive edition—which includes a foreword by Madeleine Albright, a biographical essay by Yale historian Timothy Snyder, an afterword by Zbigniew Brzezinski, previously unpublished photos, notes, further reading, and a glossary—is an apt legacy for this hero of conscience during the most fraught and fragile moment in modern history.
John A. Gentry and Joseph S. Gordon update our understanding of strategic warning intelligence analysis for the twenty-first century. Strategic warning—the process of long-range analysis to alert senior leaders to trending threats and opportunities that require action—is a critical intelligence function. It also is frequently misunderstood and underappreciated. Gentry and Gordon draw on both their practitioner and academic backgrounds to present a history of the strategic warning function in the US intelligence community. In doing so, they outline the capabilities of analytic methods, explain why strategic warning analysis is so hard, and discuss the special challenges strategic warning encounters from senior decision-makers. They also compare how strategic warning functions in other countries, evaluate why the United States has in recent years emphasized current intelligence instead of strategic warning, and recommend warning-related structural and procedural improvements in the US intelligence community. The authors examine historical case studies, including postmortems of warning failures, to provide examples of the analytic points they make. Strategic Warning Intelligence will interest scholars and practitioners and will be an ideal teaching text for intermediate and advanced students.
One article looks at the emergence of the biometrics industries and its effect on surveillance systems and businesses. Another addresses the labor of surveillance and how surveillance work and policy affect the homeland security workforce. Various geographic areas are highlighted in several essays, including those on sex workers in Bengal, local surveillance in Turkey, and welfare surveillance and resistance in Appalachian Ohio. Additional themes include historical modes of surveillance, processes of legitimation for intensifying surveillance, and cultural representations of surveillance.
Contributors. Kelly A. Gates, Swati Ghosh, John Gilliom, Margaret Morganroth Gullette, Richard Maxwell, Laikwan Pang, David J. Phillips, Michael J. Shapiro, Çagatay Topal
A Classic in Counterintelligence—Now Back in Print
Originally published in 1987, Thwarting Enemies at Home and Abroad is a unique primer that teaches the principles, strategy, and tradecraft of counterintelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations.
Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.
How the US is losing the counterintelligence war and what the country should do to better protect our national security and trade secrets
The United States is losing the counterintelligence war. Foreign intelligence services, particularly those of China, Russia, and Cuba, are recruiting spies in our midst and stealing our secrets and cutting-edge technologies. In To Catch a Spy: The Art of Counterintelligence, James M. Olson, former chief of CIA counterintelligence, offers a wake-up call for the American public and also a guide for how our country can do a better job of protecting its national security and trade secrets. Olson takes the reader into the arcane world of counterintelligence as he lived it during his thirty-year career in the CIA. After an overview of what the Chinese, Russian, and Cuban spy services are doing to the United States, Olson explains the nitty-gritty of the principles and methods of counterintelligence. Readers will learn about specific aspects of counterintelligence such as running double-agent operations and surveillance. The book also analyzes twelve real-world case studies to illustrate why people spy against their country, the tradecraft of counterintelligence, and where counterintelligence breaks down or succeeds. A “lessons learned” section follows each case study.
The intelligence failures exposed by the events of 9/11 and the missing weapons of mass destruction in Iraq have made one thing perfectly clear: change is needed in how the U.S. intelligence community operates. Transforming U.S. Intelligence argues that transforming intelligence requires as much a look to the future as to the past and a focus more on the art and practice of intelligence rather than on its bureaucratic arrangements. In fact, while the recent restructuring, including the creation of the Department of Homeland Security, may solve some problems, it has also created new ones. The authors of this volume agree that transforming policies and practices will be the most effective way to tackle future challenges facing the nation's security.
This volume's contributors, who have served in intelligence agencies, the Departments of State or Defense, and the staffs of congressional oversight committees, bring their experience as insiders to bear in thoughtful and thought-provoking essays that address what such an overhaul of the system will require. In the first section, contributors discuss twenty-first-century security challenges and how the intelligence community can successfully defend U.S. national interests. The second section focuses on new technologies and modified policies that can increase the effectiveness of intelligence gathering and analysis. Finally, contributors consider management procedures that ensure the implementation of enhanced capabilities in practice.
Transforming U.S. Intelligence supports the mandate of the new director of national intelligence by offering both careful analysis of existing strengths and weaknesses in U.S. intelligence and specific recommendations on how to fix its problems without harming its strengths. These recommendations, based on intimate knowledge of the way U.S. intelligence actually works, include suggestions for the creative mixing of technologies with new missions to bring about the transformation of U.S. intelligence without incurring unnecessary harm or expense. The goal is the creation of an intelligence community that can rapidly respond to developments in international politics, such as the emergence of nimble terrorist networks while reconciling national security requirements with the rights and liberties of American citizens.
Decision makers matching wits with an adversary want intelligence—good, relevant information to help them win. Intelligence can gain these advantages through directed research and analysis, agile collection, and the timely use of guile and theft. Counterintelligence is the art and practice of defeating these endeavors. Its purpose is the same as that of positive intelligence—to gain advantage—but it does so by exploiting, disrupting, denying, or manipulating the intelligence activities of others. The tools of counterintelligence include security systems, deception, and disguise: vaults, mirrors, and masks.
In one indispensable volume, top practitioners and scholars in the field explain the importance of counterintelligence today and explore the causes of—and practical solutions for—U.S. counterintelligence weaknesses. These experts stress the importance of developing a sound strategic vision in order to improve U.S. counterintelligence and emphasize the challenges posed by technological change, confused purposes, political culture, and bureaucratic rigidity. Vaults, Mirrors, and Masks skillfully reveals that robust counterintelligence is vital to ensuring America's security.
Published in cooperation with the Center for Peace and Security Studies and the George T. Kalaris Memorial Fund, Edmund A. Walsh School of Foreign Service, Georgetown University.
READERS
Browse our collection.
PUBLISHERS
See BiblioVault's publisher services.
STUDENT SERVICES
Files for college accessibility offices.
UChicago Accessibility Resources
home | accessibility | search | about | contact us
BiblioVault ® 2001 - 2025
The University of Chicago Press