This is an unusual book, telling a story which has hitherto remained hidden from history: the surveillance by the British security service MI5 of anti-Nazi refugees who came to Britain fleeing political persecution in Germany and Austria.
Drawing on recently released documents and private papers, this is the first book-length study to examine the intimate relationship between the Attlee government and Britain's intelligence and security services at the start of the Cold War.
This is an unusual book, telling a story which has hitherto remained hidden from history: the surveillance by the British security service MI5 of anti-Nazi refugees who came to Britain fleeing political persecution in Germany and Austria.
The official report that has shaped the international debate about NSA surveillance"e;We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking.
Risk, Threats and the New Normal explains the new political and technological developments that created new domestic national security threats against the nation and the people of the United States.
NOW IN PAPERBACKwith a new preface by the authorAn insider's account of why the CIA is ill-prepared to protect America, and why it must be replaced without delay*';A devastating portrait of the agency's culturewith details that only an insider would know.
Signals Intelligence (SIGINT) encompasses the various disciplines of wireless interception, cryptanalysis, communications intelligence, electronic intelligence, direction-finding, and traffic analysis.
In a surprising number of espionage cases sex has played a significant role_often only in the background_possibly as a reason why a particular individual has lived beyond his means and is in desperate need of cash.
"e;A fascinating account"e; of the secret Virginia facility code-named PO Box 1142, where the US gathered intelligence and interrogated German prisoners (Journal of Counterterrorism & Homeland Security International).
Engineering Communism is the fascinating story of Joel Barr and Alfred Sarant, dedicated Communists and members of the Rosenberg spy ring, who stole information from the United States during World War II that proved crucial to building the first advanced weapons systems in the USSR.
"e;This book should be required reading not only for intelligence professionals but also for senior leaders making decisions on force structure so they better appreciate the impact our counterintelligence force can make when properly resourced.
A riveting combination of war memoir and analysis providing "e;valuable insights"e; into the role of military intelligence in Vietnam (International Journal of Intelligence and Counterintelligence).
The first full history of the highly trained and ruthless civilian volunteers secretly trained across Britain to be deployed in the case of a German invasion.
An in-depth analysis of why COVID-19 warnings failed and how to avert the next disasterEpidemiologists and national security agencies warned for years about the potential for a deadly pandemic, but in the end global surveillance and warning systems were not enough to avert the COVID-19 disaster.
A fresh perspective on statecraft in the cyber domainThe idea of cyber war has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain.
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "e;what"e; but also addressing the "e;why"e; behind China's focus on establishing information dominance as a key component of its military efforts.
'Ground-breaking' - Daily Mail'In explaining the rise to power of Kim Yo Jong, Lee displays his deep knowledge and understanding of North Korea's extreme, ruthless and self-obsessed dynastic autocracy, the creators and rulers of a de-facto nuclear weapon state.
A fresh examination of the life and crimes of the highest-ranking federal official ever tried for treason and espionageAmerican Traitor examines the career of the notorious Gen.
The Cold War was a sophisticated conflict fought by the west, principally the United States, Great Britain, Canada, Australia and New Zealand, with support from NATO, CENTO and SEATO, to confront the Kremlin and its Warsaw Pact satellites.
This textbook introduces students to the critical role of the US intelligence community within the wider national security decision-making and political process.
Tras el suicidio de un inspector de policía belga que había avisado de la posibilidad de los ataques yihadistas de París, los servicios de seguridad del Estado movilizan todos sus esfuerzos para evitar algo similar en España, la denominada Operación Protector, con ramificaciones entre terroristas, las mafias de la Costa del Sol y los traficantes de armas.
The history of secret intelligence, like secret intelligence itself, is fraught with difficulties surrounding both the reliability and completeness of the sources, and the motivations behind their release-which can be the product of ongoing propaganda efforts as well as competition among agencies.
The A to Z of British Intelligence offers insight into the history and operations of British Intelligence through its more than 1,800 entries, covering a vast and varied cast of characters: the spies and their handlers, the moles and defectors, the political leaders, the top brass, the techniques and jargon, and the many different offices and organizations.
The defection of Igor Gouzenko in September 1945, more so than any other single event, alerted the West to the nature and scale of the Soviet espionage offensive being waged by the Kremlin.
A frank and refreshing evaluation of several Chief Executives, their Directors of Central Intelligence, and even some lower in the hierarchy, Executive Secrets shines light on the development and execution of foreign policy through the understanding of the tools available, of which covert action may be least known and understood.
The years 1909-1918 can be regarded as formative for MI5, an era in which it developed from a small counterespionage bureau into an established security intelligence agency.
Using espionage as a test case, The End of Intelligence criticizes claims that the recent information revolution has weakened the state, revolutionized warfare, and changed the balance of power between states and non-state actors-and it assesses the potential for realizing any hopes we might have for reforming intelligence and espionage.
A compelling examination of the establishment of the secret police in Communist Poland, Czechoslovakia, and Eastern Germany This book examines the history of early secret police forces in Poland, Czechoslovakia, and East Germany in the aftermath of the Second World War.
Andrei Sakharov (1921–1989), a brilliant physicist and the principal designer of the Soviet hydrogen bomb, later became a human rights activist and—as a result—a source of profound irritation to the Kremlin.
An illuminating study tracing the evolution of drone technology and counterterrorism policy from the Reagan to the Obama administrations This eye-opening study uncovers the history of the most important instrument of U.