Lyndon Johnson and Mac Wallace crossed paths only briefly; but Wallace's life, especially one violent episode and its intricate aftermath, illuminates the dark side of our 36th president.
Risk, Threats and the New Normal explains the new political and technological developments that created new domestic national security threats against the nation and the people of the United States.
In this book, one of America's leading analysts of cybersecurity policy presents an incisive, first-time examination of how President Trump's unique, often baffling governing style has collided with the imperatives of protecting the nation's cybersecurity.
In The Kremlin Playbook 2: The Enablers, the CSIS Europe Program and the Center for the Study of Democracy explored whether some of these jurisdictions and companies could be enabling forces that amplify Russian malign economic influence in some countries in Europe.
Partly Cloudy: Ethics in War, Espionage, Covert Action, and Interrogation explores a number of wrenching ethical issues and challenges faced by military and intelligence personnel.
This book reveals the covert operations of Mao''s public security organs through an examination of the recruitment of agents, their training and their operational activities.
Describes the creation and evolution of Chinese security and intelligence agencies as well as their role in influencing Chinese Communist Party politics throughout the party''s history.
Describes the creation and evolution of Chinese security and intelligence agencies as well as their role in influencing Chinese Communist Party politics throughout the party''s history.
American Spies is an entertaining, accessible, and sophisticated exposition of the existing laws and technologies that enable massive modern surveillance.
American Spies is an entertaining, accessible, and sophisticated exposition of the existing laws and technologies that enable massive modern surveillance.
We have taken on the challenge of asking AI (an artificial intelligence machine) uncomfortable questions and seeking answers that are both honest and insightful.
During World War II, Britain enjoyed spectacular success in the secret war between hostile intelligence services, enabling a substantial and successful expansion of British counter-espionage which continued to grow in the Cold War era.
Operation Barbarossa, Hitler's invasion of the Soviet Union in 1941, led to one of the most brutal campaigns of World War II: of the estimated 70 million people who died in World War II, over 30 million died on the Eastern Front.
The Soviet invasion of Afghanistan, in support of a Marxist-Leninist government, and the subsequent nine-year conflict with the indigenous Afghan Mujahedeen was one of the bloodiest conflicts of the Cold War.
First aired in 2001, "e;Alias"e; is a spy drama with a central action heroine, a complex narrative of moral twists, turns, lies and double-crosses, and an imaginative array of gadgets, gizmos and glamorous costumes.
Born out of the ashes of World War II, the covert action arm of the Central Intelligence Agency (CIA) was created to counter the challenge posed by the Soviet Union and its allies and bolster American interests worldwide.
A behind-the-scenes account of American foreign policymaking in the late twentieth centuryTom Hughes, assistant secretary of state for intelligence and research, made an ominous prediction in 1965.
Immediately after September 11, the Brookings Institution began a comprehensive, multidisciplinary project focused on the key policy challenge of these dangerous timesassessing and improving homeland defense.
A behind-the-scenes account of American foreign policymaking in the late twentieth centuryTom Hughes, assistant secretary of state for intelligence and research, made an ominous prediction in 1965.
Words of Intelligence: An Intelligence Professionals Lexicon for Domestic and Foreign Threats is intended for the intelligence and national security men and women at the federal, state, and local levels.
Signals Intelligence (SIGINT) encompasses the various disciplines of wireless interception, cryptanalysis, communications intelligence, electronic intelligence, direction-finding, and traffic analysis.
The A to Z of British Intelligence offers insight into the history and operations of British Intelligence through its more than 1,800 entries, covering a vast and varied cast of characters: the spies and their handlers, the moles and defectors, the political leaders, the top brass, the techniques and jargon, and the many different offices and organizations.
The defection of Igor Gouzenko in September 1945, more so than any other single event, alerted the West to the nature and scale of the Soviet espionage offensive being waged by the Kremlin.