Title search results
Showing 461 - 480 of 1049 items
Femme Fatale: Love, Lies And The Unknown Life Of Mata Hari
By Pat Shipman. 2008
Biography of the most infamous woman of the early 20th century, the Dutch courtesan and alleged spy Margaretha Zelle (1876-1917),…
- Mata HariMata Hari was the prototype of the beautiful but unscrupulous female agent who used sexual allure to gain access to secrets, if she was indeed a spy. In 1917, the notorious dancer Mata Hari was arrested, tried, and executed for espionage. It was charged at her trial that the dark-eyed siren was responsible for the deaths of at least 50,000 gallant French soldiers. Irrefutably, she had been the mistress of many senior Allied officers and government officials, even the French Minister of War: a point viewed as highly suspicious. Worse yet, she spoke several European languages fluently and travelled widely in wartime Europe. But was she guilty of espionage?For all the publicity Mata Hari and her trial received, key questions remain unanswered. These questions concern not only her inadequate trial and her unproven guilt, but also the events in her personal life. What propelled Margaretha Zelle, destined to be a Dutch schoolteacher, to transform herself into Mata Hari, the most desirable woman in early 20th-century Paris? She danced before enthusiastic crowds in Paris, Berlin, Vienna, Madrid, Monte Carlo, Milan and Rome, inspiring admiration, jealousy, and bitter condemnation.Pat Shipman's brilliant biography pinpoints the powerful yet dangerous attributes that evoked such strong emotions in those who met Mata Hari, for hitherto the focus has been on espionage, not on exploring the events that shaped her life and caused her to transform herself from rural Dutch girl to international femme fatale.The War Magician: The man who conjured victory in the desert
By David Fisher. 2004
The incredible true story of the greatest illusionist of modern times and the man who altered the course of the…
second world war.Soon to be a major film starring Benedict CumberbatchPerfect for fans of OPERATION MINCEMEATJasper Maskelyne was a world famous magician and illusionist in the 1930s. When war broke out, he volunteered his services to the British Army and was sent to Egypt where the desert war had just begun. Here, he used his unique skills to save the vital port of Alexandria from German bombers and to 'hide' the Suez Canal from them. He invented all sorts of camouflage methods to make trucks look like tanks and vice versa. On Malta he developed 'the world's first portable holes': fake bomb craters used to fool the Germans into thinking they had hit their targets. His war culminated in the brilliant deception plan that won the Battle of El Alamein: the creation of an entire dummy army in the middle of the desert.This book examines the evolution of counter-terrorism (CT) policies in liberal democracies since 2001, with a specific focus on the…
case of Belgium. What is counter-terrorism (CT)? While the answer to this question may seem self-evident, it has become quite complicated to define the contours of a field that has expanded dramatically in the two decades since the 9/11 attacks. The development of "softer" policies, dealing with the prevention of radicalisation, has blurred the limits of CT. Through the use of public policy theory and an in-depth case study on Belgium, the book identifies the key factors influencing CT policy-making, both domestically and internationally, and offers an explanation for the development of a more comprehensive CT agenda across Europe. It provides an innovative theoretical approach and is also based on extensive interviews with key counter-terrorism officials and analysis of key policy documents. The book concludes by identifying some key drivers of change and offers an embryonic theory of CT policy-making. The book will be of much interest to students and practitioners of counter-terrorism, radicalisation, European politics and security studies.Techno-Geopolitics explores contemporary US-China relations and the future of global cyber-security through the prisms of geopolitics and financial-technological competition. It…
puts forward a new conceptual framework for an emerging field of digital statecraft and discusses a range of key issues including the controversies around 5G technology, policy regulations over TikTok and WeChat, the emergence of non-traditional espionage, and potential trends in post-pandemic foreign policy. Analysing the ramifications of the ongoing US-China trade standoff, this book maps the terrain of technological war and the race for global technological leadership and economic supremacy. It shows how China’s technological advancements have not only been the key to its national economic development but have also been the core focus of US intelligence. Further, it draws on US-China counter-intelligence cases sourced from the US Department of Justice and Federal Bureau of Investigation (FBI) to explore emerging patterns and techniques of China’s espionage practice. A cutting-edge study on the future of statecraft, this volume will be of great interest to scholars and researchers of international relations, security and intelligence studies, information technology and artificial intelligence, political science, especially US foreign policy and China studies. It will also be of great interest to policymakers, career bureaucrats, security and intelligence practitioners, technology regulators, and professionals working with think tanks and embassies.Secret Britain: A journey through the Second World War's hidden bases and battlegrounds
By Sinclair McKay. 2021
Discover the stories of the brave men and women who worked, trained and fought across the UK, from Bletchley Park…
in southern England all the way to Arisaig in northern Scotland, in an unbelievable effort to defeat the Nazis and win the Second World War .From the outset of the war, most of Britain felt like a mystery even to those who lived there. All road and railway signs were removed up and down the country to thwart potential enemy spies. An invisible web of cunning spread across the United Kingdom; secret laboratories were hidden in marshes, underground bases were built to conceal key strategic plans and grand country houses became secret and silent locations for eccentric boffins to do their confidential cryptography work.In Secret Britain, Sinclair McKay maps out the UK through the hidden bases and battlegrounds of WWII. These locations are full of history and intrigue, but if you don't know where to look, you might just miss them. Journeying through secret wildernesses, suburbs, underground tunnels and manor houses, Sinclair gives a glimpse into the stories of the incredible people behind the war effort, and shows how you might be able to visit these mysterious and evocative locations yourself.With his trademark warmth and compassion, Sinclair unearths the truths of the war that have remained under layers of secrecy since the war was won in 1945.Fallout: Spies, Superbombs, and the Ultimate Cold War Showdown
By Steve Sheinkin. 2021
New York Times bestselling author Steve Sheinkin presents a follow up to his award-winning book Bomb: The Race to Build--and…
Steal--the World's Most Dangerous Weapon, taking readers on a terrifying journey into the Cold War and our mutual assured destruction. As World War II comes to a close, the United States and the Soviet Union emerge as the two greatest world powers on extreme opposites of the political spectrum. After the United States showed its hand with the atomic bomb in Hiroshima, the Soviets refuse to be left behind. With communism sweeping the globe, the two nations begin a neck-and-neck competition to build even more destructive bombs and conquer the Space Race. In their battle for dominance, spy planes fly above, armed submarines swim deep below, and undercover agents meet in the dead of night.The Cold War game grows more precarious as weapons are pointed towards each other, with fingers literally on the trigger. The decades-long showdown culminates in the Cuban Missile Crisis, the world's close call with the third—and final—world war.The CIA's Greatest Hits
By Mark Zepezauer. 2012
Cold War Montana (Military)
By Ken Robison. 2021
Home to some of the most powerful nuclear missile systems in the world, Montana played an indispensable role in the…
war against Communism. Utilizing the Lend-Lease pipeline, Soviet spies ferried stolen nuclear and industrial secrets, loaded in diplomatic pouches, from Great Falls to the Soviet Union. Army nurse Lieutenant Diane Carlson served as "an angel of mercy" at the Pleiku Evacuation Hospital in the Central Highlands in Vietnam. Young Montana smokejumper "Hog" Daniels joined the CIA's secret war in Southeast Asia, becoming the principal advisor to General Vang Pao in his desperate fight against Communists. Captain Ken Robison (U.S. Navy, Ret.), award-winning author and Cold Warrior, reveals tales of Montanans who made their mark on this titanic struggle.Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare
By Andrew Jenkinson. 2022
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of…
9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff,and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The solarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. Teh book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.Equipping James Bond: Guns, Gadgets, and Technological Enthusiasm
By André Millard. 2018
James Bond’s amazing gadgets reveal both enthusiasm about technology and fear of its potential ramifications.The popularity of the 007 franchise…
depends on a seductive formula of sex, violence, and snobbery. Much of its appeal, too, lies in its gadgets: slick, somewhat improbable technological devices that give everyone’s favorite secret agent the edge over his adversaries. In Equipping James Bond, André Millard chronicles a hundred-year history of espionage technology through the lens of Ian Fleming’s infamous character and his ingenious spyware. Beginning with the creation of MI6, the British secret service, Millard traces the development of espionage technology from the advanced weaponry of the nineteenth century to the evolving threat of computer hacking and surveillance. Arguing that the gadgets in the books and films articulate the leading edge of technological awareness at the time, Millard describes how Bond goes from protecting 1950s England from criminal activity to saving a world threatened by nuclear bombs, poison gas, and attacks from space. As a modern and modernizing hero, Bond has to keep up with the times. His film franchise is committed to equipping both Bond and his adversaries with the latest technological gadgets. Simultaneously, Millard stresses, the villains and threats that Bond faces embody contemporary fears about the downside of technological change. Taking a wide-ranging look at factual (and fictional) technology, Millard views the James Bond universe as evidence for popular perceptions of technological development as both inevitably progressive and apocalyptically threatening.Taking Nazi Technology: Allied Exploitation of German Science after the Second World War
By Douglas M. O'Reagan. 2019
Intriguing, real-life espionage stories bring to life a comparative history of the Allies' efforts to seize, control, and exploit German…
science and technology after the Second World War.During the Second World War, German science and technology posed a terrifying threat to the Allied nations. These advanced weapons, which included rockets, V-2 missiles, tanks, submarines, and jet airplanes, gave troubling credence to Nazi propaganda about forthcoming "wonder-weapons" that would turn the war decisively in favor of the Axis. After the war ended, the Allied powers raced to seize "intellectual reparations" from almost every field of industrial technology and academic science in occupied Germany. It was likely the largest-scale technology transfer in history.In Taking Nazi Technology, Douglas M. O'Reagan describes how the Western Allies gathered teams of experts to scour defeated Germany, seeking industrial secrets and the technical personnel who could explain them. Swarms of investigators invaded Germany's factories and research institutions, seizing or copying all kinds of documents, from patent applications to factory production data to science journals. They questioned, hired, and sometimes even kidnapped hundreds of scientists, engineers, and other technical personnel. They studied technologies from aeronautics to audiotapes, toy making to machine tools, chemicals to carpentry equipment. They took over academic libraries, jealously competed over chemists, and schemed to deny the fruits of German invention to any other land—including that of other Allied nations. Drawing on declassified records, O'Reagan looks at which techniques worked for these very different nations, as well as which failed—and why. Most importantly, he shows why securing this technology, how the Allies did it, and when still matters today. He also argues that these programs did far more than spread German industrial science: they forced businessmen and policymakers around the world to rethink how science and technology fit into diplomacy, business, and society itself.Cork Wars: Intrigue and Industry in World War II
By David A. Taylor. 2018
The surprising story of cork and its critical role in US security and the war effort.Winner of the IPPY Book…
Award History (World), Silver of the Independent PublisherIn 1940, with German U-boats blockading all commerce across the Atlantic Ocean, a fireball at the Crown Cork and Seal factory lit the sky over Baltimore. The newspapers said that you could see its glow as far north as Philadelphia and as far south as Annapolis. Rumors of Nazi sabotage led to an FBI investigation and pulled an entire industry into the machinery of national security as America stood on the brink of war. In Cork Wars, David A. Taylor traces this fascinating story through the lives of three men and their families, who were all drawn into this dangerous intersection of enterprise and espionage. At the heart of this tale is self-made mogul Charles McManus, son of Irish immigrants, who grew up on Baltimore’s rough streets. McManus ran Crown Cork and Seal, a company that manufactured everything from bottle caps to oil-tight gaskets for fighter planes. Frank DiCara, as a young teenager growing up in Highlandtown, watched from his bedroom window as the fire blazed at the factory. Just a few years later, under pressure to support his family after the death of his father, DiCara quit school and got a job at Crown. Meanwhile, Melchor Marsa, Catalan by birth, managed Crown Cork and Seal’s plants in Spain and Portugal—and was perfectly placed to be recruited as a spy. McManus, DiCara, and Marsa were connected by the unique properties of a seemingly innocuous substance. Cork, unrivaled as a sealant and insulator, was used in gaskets, bomber insulation, and ammunition, making it crucial to the war effort. From secret missions in North Africa to 4-H clubs growing seedlings in America to secret intelligence agents working undercover in the industry, this book examines cork’s surprising wartime significance. Drawing on in-depth interviews with surviving family members, personal collections, and recently declassified government records, Taylor weaves this by turns beautiful, dark, and outrageous narrative with the drama of a thriller. From the factory floor to the corner office, Cork Wars reflects shifts in our ideas of modernity, the environment, and the materials and norms of American life. World War II buffs—and anyone interested in a good yarn—will be gripped by this bold and frightening tale of a forgotten episode of American history.National Security Intelligence and Ethics (Studies in Intelligence)
By Seumas Miller, Patrick F. Walsh, Mitt Regan. 2022
This volume examines the ethical issues that arise as a result of national security intelligence collection and analysis. Powerful new…
technologies enable the collection, communication, and analysis of national security data on an unprecedented scale. Data collection now plays a central role in intelligence practice, yet this development raises a host of ethical and national security problems, such as: privacy; autonomy; threats to national security and democracy by foreign states; and accountability for liberal democracies. This volume provides a comprehensive set of in-depth ethical analyses of these problems by combining contributions from both ethics scholars and intelligence practitioners. It provides the reader with a practical understanding of relevant operations, the issues that they raise, and analysis of how responses to these issues can be informed by a commitment to liberal democratic values. This combination of perspectives is crucial in providing an informed appreciation of ethical challenges that is also grounded in the realities of the practice of intelligence. This book will be of great interest to all students of intelligence studies, ethics, security studies, foreign policy, and International Relations.The Cuckoo's Egg
By Clifford Stoll. 1989
When computers exist hackers coexist. Cliff Stoll found that his system was being used by someone else. It took a…
while for him to realize that there was a hacker behind it. So he decided to unwind the mystery by some undercover work.Hybrid War: Attack on the West
By Mauro Voerzio. 2021
Disinformation is a bad virus for Democracies and a vaccine can never be discovered to render it harmless. With the…
help of everyone, however, we can contain it and make it less effective. The book talks about the techniques used by disinformers, the terminologies that are used every day by journalists and insiders whose meaning is often unknown, disinformation in history, the psychological aspects of disinformation, case studies, objectives that disinformation sets for itself. Disinformation is certainly one of the most important components of the new hybrid wars. A hybrid war is underway against the fundamental values of the West, a hybrid war that aims to collapse the project of the European Union, the largest peace project in history. Recognizing disinformation and disinformers will help us recognize our enemies, those who want to destroy the society we built, with not a few sacrifices, by our grandparents and our parents. As in all wars, in hybrid war, there are generals and soldiers. It is up to us to decide which side of the fence to stand on in this modern call to arms.This book provides an institutional costs framework for intelligence and security communities to examine the factors that can encourage or…
obstruct cooperation. The governmental functions of security and intelligence require various organisations to interact in a symbiotic way. These organisations must constantly negotiate with each other to establish who should address which issue and with what resources. By coupling adapted versions of transaction costs theories with socio-political perspectives, this book provides a model to explain why some cooperative endeavours are successful, whilst others fail. This framework is applied to counterterrorism and defence intelligence in the UK and the US to demonstrate that the view of good cooperation in the former and poor cooperation in the latter is overly simplistic. Neither is necessarily more disposed to behave cooperatively than the other; rather, the institutional costs created by their respective organisational architectures incentivise different cooperative behaviour in different circumstances. This book will be of much interest to students of intelligence studies, organisational studies, politics and security studies.Spymaster: The Man Who Saved MI6
By Helen Fry. 2021
The dramatic story of a man who stood at the center of British intelligence operations, the ultimate spymaster of World…
War Two: Thomas Kendrick Thomas Kendrick (1881–1972) was central to the British Secret Service from its beginnings through to the Second World War. Under the guise of "British Passport Officer," he ran spy networks across Europe, facilitated the escape of Austrian Jews, and later went on to set up the "M Room," a listening operation which elicited information of the same significance and scope as Bletchley Park. Yet the work of Kendrick, and its full significance, remains largely unknown. Helen Fry draws on extensive original research to tell the story of this remarkable British intelligence officer. Kendrick&’s life sheds light on the development of MI6 itself—he was one of the few men to serve Britain across three wars, two of which while working for the British Secret Service. Fry explores the private and public sides of Kendrick, revealing him to be the epitome of the "English gent"—easily able to charm those around him and scrupulously secretive.Terrorism, Intelligence And Homeland Security
By Charles Swanson, Robert Taylor. 2019
For courses covering terrorism. A historical and contemporary view of terrorism, both at home and abroad Terrorism, Intelligence and Homeland…
Security is a clear, concise introduction to domestic and foreign terrorism and international responses. Drawing on current research, it provides a balanced approach to understanding the issues we face as a nation, including securing the country from threats while still safeguarding civil and personal liberties. Simultaneously historical and contemporary, the text interrelates terrorism, intelligence, and homeland security by focusing on people, ideas, organizations, and movements as well as new issues in the field. The 2nd edition brings new attention to the Islamic State, new domestic threats, and new strategies for combating terrorism. Terrorism, Intelligence and Homeland Security, 2nd Edition, is also available via Revel™, an interactive learning environment that enables students to read, practice, and study in one continuous experience.Professional intelligence became a permanent feature of the French state as a result of the army&’s June 8, 1871, reorganization…
following France&’s defeat in the Franco-Prussian War. Intelligence practices developed at the end of the nineteenth century without direction or oversight from elected officials, and yet the information gathered had a profound influence on the French population and on pre–World War I Europe more broadly. In Marianne Is Watching Deborah Bauer examines the history of French espionage and counterespionage services in the era of their professionalization, arguing that the expansion of surveillance practices reflects a change in understandings of how best to protect the nation. By leading readers through the processes and outcomes of professionalizing intelligence in three parts—covering the creation of permanent intelligence organizations within the state; the practice of intelligence; and the place of intelligence in the public sphere—Bauer fuses traditional state-focused history with social and cultural analysis to provide a modern understanding of intelligence and its role in both state formation and cultural change. With this first English-language book-length treatment of the history of French intelligence services in the era of their inception, Bauer provides a penetrating study not just of the security establishment in pre–World War I France but of the diverse social climate it nurtured and on which it fed.Intelligence Analysis and Policy Making: The Canadian Experience
By Stephanie Carvin, Thomas Juneau. 2021
Canada is a key member of the world's most important international intelligence-sharing partnership, the Five Eyes, along with the US,…
the UK, New Zealand, and Australia. Until now, few scholars have looked beyond the US to study how effectively intelligence analysts support policy makers, who rely on timely, forward-thinking insights to shape high-level foreign, national security, and defense policy. Intelligence Analysis and Policy Making provides the first in-depth look at the relationship between intelligence and policy in Canada. Thomas Juneau and Stephanie Carvin, both former analysts in the Canadian national security sector, conducted seventy in-depth interviews with serving and retired policy and intelligence practitioners, at a time when Canada's intelligence community underwent sweeping institutional changes. Juneau and Carvin provide critical recommendations for improving intelligence performance in supporting policy—with implications for other countries that, like Canada, are not superpowers but small or mid-sized countries in need of intelligence that supports their unique interests.