Résultats de recherche de titre
Articles 1 à 20 sur 67
Beverly hills spy: The double-agent war hero who helped japan attack pearl harbor
Par Ronald Drabkin. 2024
In the spirit of Ben Macintyre's greatest spy nonfiction, the truly unbelievable and untold story of Frederick Rutland—a debonair British…
WWI hero, flying ace, fixture of Los Angeles society, and friend of Golden Age Hollywood stars—who flipped to become a spy for Japan in the lead-up to the attack on Pearl Harbor. Frederick Rutland was an accomplished aviator, British WWI war hero, and real-life James Bond. He was the first pilot to take off and land a plane on a ship, a decorated warrior for his feats of bravery and rescue, was trusted by the admirals of the Royal Navy, had a succession of aeronautical inventions, and designed the first modern aircraft carrier. He was perhaps the most famous early twentieth-century naval aviator. Despite all of this, and due mostly to class politics, Rutland was not promoted in the new Royal Air Force in the wake of WWI. This ignominy led the disgruntled Rutland to become a spy for the Japanese navy. Plied with riches and given a salary ten times the highest-paid admiral, shuttled between Los Angeles and Tokyo where he lived in large mansions in both Beverly Hills and Yokohama, and insinuating himself into both LA high society and Japan's high command, Rutland would go on to contribute to the Japanese navy with both strategic and technical intelligence. This included scouting trips to Pearl Harbor, investigations of military preparedness, and aircraft technology. All this while living a double life, frequenting private California clubs and hosting lavish affairs for Hollywood stars and military dignitaries in his mansion on the Los Angeles Bird Streets. Supported by recently declassified FBI files and by incorporating unique and rare research through MI5 and Japanese Naval archives that few English speakers have access to, author Ronald Drabkin pieces together to completion, for the first time, this stranger-than-fiction story of one of the most fascinating and enigmatic characters of espionage history. Supplemental enhancement PDF accompanies the audiobookBig Data, Emerging Technologies and Intelligence: National Security Disrupted (Studies in Intelligence)
Par Miah Hammond-Errey. 2024
This book sets out the big data landscape, comprising data abundance, digital connectivity and ubiquitous technology, and shows how the…
big data landscape and the emerging technologies it fuels are impacting national security. This book illustrates that big data is transforming intelligence production as well as changing the national security environment broadly, including what is considered a part of national security as well as the relationships agencies have with the public. The book highlights the impact of big data on intelligence production and national security from the perspective of Australian national security leaders and practitioners, and the research is based on empirical data collection, with insights from nearly 50 participants from within Australia’s National Intelligence Community. It argues that big data is transforming intelligence and national security and shows that the impacts of big data on the knowledge, activities and organisation of intelligence agencies is challenging some foundational intelligence principles, including the distinction between foreign and domestic intelligence collection. Furthermore, the book argues that big data has created emerging threats to national security; for example, it enables invasive targeting and surveillance, drives information warfare as well as social and political interference, and challenges the existing models of harm assessment used in national security. The book maps broad areas of change for intelligence agencies in the national security context and what they mean for intelligence communities, and explores how intelligence agencies look out to the rest of society, considering specific impacts relating to privacy, ethics and trust. This book will be of much interest to students of intelligence studies, technology studies, national security and International Relations.Narcotopia: In Search of the Asian Drug Cartel That Survived the CIA
Par Patrick Winn. 2024
The gripping true story of an indigenous people running the world&’s mightiest narco-state—and America&’s struggle to thwart them. In Asia&’s…
narcotics-producing heartland, the Wa reign supreme. They dominate the Golden Triangle, a mountainous stretch of Burma between Thailand and China. Their 30,000-strong army, wielding missiles and attack drones, makes Mexican cartels look like street gangs. Wa moguls are unrivaled in the region&’s $60 billion meth trade and infamous for mass-producing pink, vanilla-scented speed pills. Drugs finance Wa State, a bona fide nation with its own laws, anthems, schools, and electricity grid. Though revered by their people, Wa leaders are scorned by US policymakers as vicious &“kingpins&” who &“poison our society for profit.&” In Narcotopia, award-winning journalist Patrick Winn uncovers the truth behind Asia&’s top drug-trafficking organization, as told by a Wa commander turned DEA informant. This gripping narrative shreds drug war myths and leads to a chilling revelation: the Wa syndicate&’s origins are smudged with CIA fingerprints. This is a saga of native people tapping the power of narcotics to create a nation where there was none before — and covert US intelligence operations gone wrong.The NSA Report: Liberty and Security in a Changing World
Par President's Review Group on Intelligence and Communications Technologies, The, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire. 2014
The official report that has shaped the international debate about NSA surveillance"We cannot discount the risk, in light of the…
lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.Secret Reports on Nazi Germany: The Frankfurt School Contribution to the War Effort
Par Franz Neumann, Herbert Marcuse, Otto Kirchheimer. 2013
A groundbreaking book that gathers key wartime intelligence reportsDuring the Second World War, three prominent members of the Frankfurt School—Franz…
Neumann, Herbert Marcuse, and Otto Kirchheimer—worked as intelligence analysts for the Office of Strategic Services, the wartime forerunner of the CIA. This book brings together their most important intelligence reports on Nazi Germany, most of them published here for the first time.These reports provide a fresh perspective on Hitler's regime and the Second World War, and a fascinating window on Frankfurt School critical theory. They develop a detailed analysis of Nazism as a social and economic system and the role of anti-Semitism in Nazism, as well as a coherent plan for the reconstruction of postwar Germany as a democratic political system with a socialist economy. These reports played a significant role in the development of postwar Allied policy, including denazification and the preparation of the Nuremberg Trials. They also reveal how wartime intelligence analysis shaped the intellectual agendas of these three important German-Jewish scholars who fled Nazi persecution prior to the war.Secret Reports on Nazi Germany features a foreword by Raymond Geuss as well as a comprehensive general introduction by Raffaele Laudani that puts these writings in historical and intellectual context.John Lisle reveals the untold story of the OSS Research and Development Branch—The Dirty Tricks Department—and its role in World…
War II.In the summer of 1942, Stanley Lovell, a renowned industrial chemist, received a mysterious order to report to an unfamiliar building in Washington, D.C. When he arrived, he was led to a barren room where he waited to meet the man who had summoned him. After a disconcerting amount of time, William “Wild Bill” Donovan, the head of the Office of Strategic Services (OSS), walked in the door. “You know your Sherlock Holmes, of course,” Donovan said as an introduction. “Professor Moriarty is the man I want for my staff…I think you’re it.”Following this life-changing encounter, Lovell became the head of a secret group of scientists who developed dirty tricks for the OSS, the precursor to the CIA. Their inventions included Bat Bombs, suicide pills, fighting knives, silent pistols, and camouflaged explosives. Moreover, they forged documents for undercover agents, plotted the assassination of foreign leaders, and performed truth drug experiments on unsuspecting subjects.Based on extensive archival research and personal interviews, The Dirty Tricks Department tells the story of these scheming scientists, explores the moral dilemmas that they faced, and reveals their dark legacy of directly inspiring the most infamous program in CIA history: MKULTRA.Great Power Cyber Competition: Competing and Winning in the Information Environment (Routledge Advances in Defence Studies)
Par David V. Gioe, Margaret W. Smith. 2024
This volume conceptualizes the threats, challenges, opportunities, and boundaries of great power cyber competition of the 21st century. This book…
focuses on a key dimension of contemporary great power competition that is often less understood due to its intangible character: the competition taking place in the cyber domain, including information and cyber operations. Democracies across the globe find themselves in an unrelenting competition with peer and near-peer competitors, with a prevailing notion that no state is "safe" from the informational contest. Adversarial powers, particularly China and Russia, recognize that most competition is principally non-kinetic but dominates the information environment and cyberspace, and the volume articulates the Russian and Chinese strategies to elevate cyber and information competition to a central position. Western governments and, in particular, the U.S. government have long conceived of a war–peace duality, but that perspective is giving way to a more nuanced perception of competition. This volume goes beyond analyzing the problems prevalent in the information space and offers a roadmap for Western powers to compete in and protect the global information environment from malicious actors. Its genesis is rooted in the proposition that it is time for the West to push back against aggression and that it needs a relevant framework and tools to do so. The book demonstrates that Western democratic states currently lack both the strategic and intellectual acumen to compete and win in the information and cyber domains, and argues that the West needs a strategy to compete with near-peer powers in information and cyber warfare. This book will be of much interest to students of cyber-warfare, information warfare, defense studies, and international relations in general, as well as practitioners.Cashing Out: The Flight of Nazi Treasure, 1945–1948
Par Neill Lochery. 2023
When Nazis looked to flee Europe with stolen art, gems, and gold in tow, certain &“neutral&” countries were all too…
willing to assist them. By the end of January 1945, it was clear to Germany that the war was lost. The Third Reich was in freefall, and its leaders, apart from those clustered around Hitler in his Berlin bunker, sought to abscond before they were besieged. But they wanted to take their wealth with them. Their escape routes were diverse: Sweden and Switzerland boasted proximity, banking, and industrial closeness, while Spain and Portugal offered an inviting Atlantic coastline and shipping routes to South America. And in various ways, each of these so-called neutral nations welcomed the Nazi escapees, along with the clandestine wealth they carried. Cashing Out tells the riveting history of the race to intercept the stolen assets before they disappeared, and before the will to punish Germany was replaced by the political considerations of the fast-approaching Cold War. Bestselling author Neill Lochery here brilliantly recounts the flight of the Nazi-looted riches—the last great escape of World War II—and the Allied quest for justice.Ethical Hacking (Law, Technology and Media)
Par Alana Maurushat. 2019
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral…
and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto “we open governments” on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause—political or otherwise—which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La première moitié du XXIe siècle sera sans doute reconnue comme l’époque où le piratage éthique a ouvert de force les gouvernements, déplaçant les limites de la transparence. La page twitter de Wikileaks enchâsse cet ethos à même sa devise, « we open governments », et sa volonté d’être omniprésent. En parallèle, les grandes sociétés de technologie comme Apple se font compétition pour produire des produits de plus en plus sécuritaires et à protéger les données de leurs clients, alors même que les gouvernements tentent de limiter et de décrypter ces nouvelles technologies d’encryption. Entre-temps, le marché des vulnérabilités en matière de sécurité augmente à mesure que les experts en sécurité informatique vendent des vulnérabilités de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 à 1,5 million de dollars. L’activisme en sécurité est à la hausse. Le piratage éthique est l’utilisation non-violence d’une technologie quelconque en soutien d’une cause politique ou autre qui est souvent ambigue d’un point de vue juridique et moral. Le hacking éthique peut désigner les actes de vérification de pénétration professionnelle ou d’experts en sécurité informatique, de même que d’autres formes d’actions émergentes, comme l’hacktivisme et la désobéissance civile en ligne. L’hacktivisme est une forme de piratage éthique, mais également une forme de militantisme des droits civils à l’ère numérique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertés fondamentales, y compris la liberté d’expression et à la vie privée, et la responsabilité des gouvernements d’être ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les antécédents comme les agendas des hacktivistes sont fort diversifiés. Il n’est pas clair de quelle façon les tribunaux et les gouvernements traiteront des tentatives de piratage eu égard aux zones grises juridiques, aux approches éthiques conflictuelles, et compte tenu du fait qu’il n’existe actuellement, dans le monde, presque aucune exception aux provisions, en matière de cybercrime et de crime informatique, liées à la recherche sur la sécurité ou l’intérêt public. Il sera également difficile de déterminer le lien entre hacktivisme et droits civils. Ce livre est publié en anglais.A Woman of No Importance: The Untold Story of Virginia Hall, WWII's Most Dangerous Spy
Par Sonia Purnell. 2019
'A METICULOUS HISTORY THAT READS LIKE A THRILLER' BEN MACINTYRE, TEN BEST BOOKS TO READ ABOUT WORLD WAR II An…
astounding story of heroism, spycraft, resistance and personal triumph over shocking adversity. 'A rousing tale of derring-do' THE TIMES * 'Riveting' MICK HERRON * 'Superb' IRISH TIMES THE NEW YORK TIMES BESTSELLERIn September 1941, a young American woman strides up the steps of a hotel in Lyon, Vichy France. Her papers say she is a journalist. Her wooden leg is disguised by a determined gait and a distracting beauty. She is there to spark the resistance.By 1942 Virginia Hall was the Gestapo's most urgent target, having infiltrated Vichy command, trained civilians in guerrilla warfare and sprung soldiers from Nazi prison camps. The first woman to go undercover for British SOE, her intelligence changed the course of the war - but her fight was still not over. This is a spy history like no other, telling the story of the hunting accident that disabled her, the discrimination she fought and the secret life that helped her triumph over shocking adversity.'A cracking story about an extraordinarily brave woman' TELEGRAPH'Gripping ... superb ... a rounded portrait of a complicated, resourceful, determined and above all brave woman' IRISH TIMESWINNER of the PLUTARCH AWARD FOR BEST BIOGRAPHYA former FBI Special Agent and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake…
news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our country against them.Clint Watts electrified the nation when he testified in front of the House Intelligence Committee regarding Russian interference in the 2016 election. In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.Spooked: The Trump Dossier, Black Cube, and the Rise of Private Spies
Par Barry Meier. 2021
A Pulitzer Prize winning investigative journalist’s journey into a billon-dollar secret industry that is shaping our world – the booming…
business of private spying, operatives-for-hire retained by companies, political parties and the powerful to dig up dirt on their enemies and, if need be, destroy them. For decades, private eyes from Allan Pinkerton, who formed the first detective agency in the U.S., to Jules Kroll, who transformed the investigations business by giving it a corporate veneer, private spies were content to stand in the shadows. Now, that is all changing. High-profile stories grabbing recent headlines – the Steele Dossier, Black Cube, the Theranos scandal, Harvey Weinstein’s attacks on his accusers – all share a common thread, the involvement of private spies. Today, operatives-for-hire are influencing presidential elections, the news media, government policies and the fortunes of companies.. They are also peering into our personal lives as never before, using off-the shelf technology to listen to our phone calls, monitor our emails, and decide what we see on social media. Private spying has never been cheaper and the business has never been more lucrative—just as its power has never been more pervasive. Spooked is a fast-paced, disturbing and, at times, hilarious tour through the shadowlands of private spying and its inhabitants, a grab-bag collection of ex-intelligence operatives, former journalists and lost souls. In this hidden world, information is currency, double-crosses are commonplace, and hacking can be standard procedure. Drawing on his journalistic expertise and unique access to sources, Barry Meier uncovers the secrets private spies want to keep hidden.Inside British Intelligence: 100 Years of MI5 and MI6
Par Gordon Thomas. 2013
“Rollicking, readable new history of Britain’s famous spy organization.” —Los Angeles TimesA complete and up-to-date account of the two oldest…
and still the most powerful, secretive intelligence services in the world: MI5, the security service, and MI6, the secret intelligence service, which have been in existence for over a century. This is a story of spectacular triumphs, treachery, their frigid relationship, their untold work with the CIA, Mossad and the spy services of Europe, and their part in the fight against terror. It is also the story of two agencies led by men who are enigmatic, eccentric and controversial and who ruthlessly control their spies. From the unique partnership between Mossad and MI6, how MI5 and MI6 became a breeding ground for Soviet spies post-war, their exploitation of the collapse of the Soviet Union and their role in biological warfare, and including how both services monitor the spies of every nation based in London, it reads like fiction. But it’s not.Based on prodigious research and interviews with significant players Inside British Intelligence is packed with new and startling information.“An irresistible picture of an age of global terrorism, drug trafficking and economic warfare.” —Sunday Telegraph“ . . . a fascinating cast of moles and double agents, whistle-blowers and politicians. For the ambience of the closed world that inspired James Bond and George Smiley, this book is a winner.” —Publishers Weekly“A well-written page-turner.” —Kirkus Reviews“Thomas brings to the agencies histories a high level of expertise, a fluent style, accessible to lay reader and expert alike.” —BooklistBut I Trusted You: And Other True Cases (Ann Rule's Crime Files #14)
Par Ann Rule. 2009
In this chilling volume of New York Times bestselling author Ann Rule&’s Crime Files, discover unforgettable cases of a spouse,…
lover, family member or helpful stranger who is totally trusted—until it&’s too late.Whether driven to extreme violence by greed or jealousy, passion or rage, the calculating sociopaths in this true crime collection targeted those closest to them—unwitting victims whose last disbelieving words could well have been &“but I trusted you....&”Headlining this page-turning anthology is the case of middle-school counselor Chuck Leonard, found shot to death outside his Washington State home on an icy February morning. A complicated mix of family man and wild man, Chuck played hard and loved many...but who crossed the line by murdering him in cold blood? And why? The revelation is as stunning as the shattering crime itself, powerfully illuminating how those we think we know can ingeniously hide their destructive and homicidal designs.Along with other shocking cases, immaculately detailed and sharply analyzed by America&’s #1 true crime writer, this fourteenth Crime Files volume is essential reading for getting inside the mind of the hidden killers among us.But I Trusted You: And Other True Cases (Ann Rule's Crime Files #14)
Par Ann Rule. 2009
In this chilling volume of New York Times bestselling author Ann Rule&’s Crime Files, discover unforgettable cases of a spouse,…
lover, family member or helpful stranger who is totally trusted—until it&’s too late.Whether driven to extreme violence by greed or jealousy, passion or rage, the calculating sociopaths in this true crime collection targeted those closest to them—unwitting victims whose last disbelieving words could well have been &“but I trusted you....&”Headlining this page-turning anthology is the case of middle-school counselor Chuck Leonard, found shot to death outside his Washington State home on an icy February morning. A complicated mix of family man and wild man, Chuck played hard and loved many...but who crossed the line by murdering him in cold blood? And why? The revelation is as stunning as the shattering crime itself, powerfully illuminating how those we think we know can ingeniously hide their destructive and homicidal designs.Along with other shocking cases, immaculately detailed and sharply analyzed by America&’s #1 true crime writer, this fourteenth Crime Files volume is essential reading for getting inside the mind of the hidden killers among us.Beverly Hills Spy: The Double-Agent War Hero Who Helped Japan Attack Pearl Harbor
Par Ronald Drabkin. 1936
"A beguiling tale of espionage and double-dealing in the years leading up to World War II. ... Strap in for…
a narrative that demands a suspension of disbelief—and richly rewards it." —Kirkus Reviews (starred review); Best Books of February SelectionThe untold story of the World War I hero who became a fixture of high society in Golden Age Hollywood—all while acting as a double agent for the Japanese Empire as it prepared to attack Pearl HarborFrederick Rutland’s story is a rags-to-riches coup for the ages—a lower-class boy from England bootstraps his way up the ranks of the British military, becoming a World War I pilot, father of the modern aircraft carrier, cosmopolitan businessman, and Hollywood A-list insider. He oversaw this small empire from his mansion on the fabled Bird Streets of Beverly Hills. Snubbed for promotion in the Royal Air Force due to little more than jealousy and class politics, Rutland—to all appearances—continued to spin gold from straw, living an enviably lavish lifestyle that included butlers, wild parties, private clubs, and newsworthy living . . .. . . and it was all funded by the Japanese Empire.Beverly Hills Spy reveals the story of Rutland’s life of espionage on behalf of the Axis, selling secrets about fleet and aircraft design to the Japanese Imperial Navy that would be instrumental in its ability to attack Pearl Harbor, while collecting a salary ten times larger than the best-paid Japanese admirals. Based on recently declassified FBI files and until-now untranslated documents from Japanese intelligence, Ronald Drabkin brings the scope of this unforgettable tale into full focus for the first time. Rutland hides in plain sight, rubbing elbows with Amelia Earhart and hosting galas and fundraisers with superstars like Charlie Chaplin and Boris Karloff, while simultaneously passing information to Japan through spy networks across North and Central America. Countless opportunities to catch Rutland in the act are squandered by the FBI, British Intelligence, and US Naval Intelligence alike as he uses his cunning and charm to misdirect and cast shadows of doubt over his business dealings, allowing him to operate largely unfettered for years.In the end, whether he fully intends to or not, Rutland sets in motion world events that are so monumental, their consequences are still being felt today.Beverly Hills Spy is a masterpiece of research on spy craft, a shocking narrative about an unknown but pivotal figure in history, and brings new information to light that helps us understand how Pearl Harbor happened—and how it could have been prevented.In True Face: A Woman's Life in the CIA, Unmasked
Par Jonna Mendez. 2024
The bestselling coauthor of The Moscow Rules and Argo tells her riveting, courageous story of being a female spy at…
the height of the Cold War Jonna Hiestand Mendez began her CIA career as a &“contract wife&” performing secretarial duties for the CIA as a convenience to her husband, a young officer stationed in Europe. She needed his permission to open a bank account or shut off the gas to their apartment. Yet Mendez had a talent for espionage, too, and she soon took on bigger and more significant roles at the Agency. She parlayed her interest in photography into an operational role overseas, an unlikely area for a woman in the CIA. Often underestimated, occasionally undermined, she lived under cover and served tours of duty all over the globe, rising first to become an international spy and ultimately to Chief of Disguise at CIA&’s Office of Technical Service.In True Face recounts not only the drama of Mendez&’s high-stakes work—how this savvy operator parlayed her &“everywoman&” appeal into incredible subterfuge—but also the grit and good fortune it took for her to navigate a misogynistic world. This is the story of an incredible spy career and what it took to achieve it.The dramatic story of how the superpowers collected secrets and used intelligence to build an advantage during the Cold War,…
the longest and most dangerous confrontation of the twentieth century.The Cold War, which lasted from the end of the Second World War to the collapse of the Soviet Union in 1991, was fought mostly in the shadows, with the superpowers maneuvering for strategic advantage in an anticipated global armed confrontation that thankfully never happened. How did the intelligence organizations of the major world powers go about their work? What advantages were they looking for? Did they succeed? By examining some of the famous, infamous, or lesser-known intelligence operations from both sides of the Iron Curtain, this book explains how the superpowers went about gathering intelligence on each other, examines the type of information they were looking for, what they did with it, and how it enabled them to stay one step ahead of the opposition. Possession of these secrets threatened a Third World War, but also helped keep the peace for more than four decades. With access to previously unreleased material, the author explores how the intelligence organizations, both civilian and military, took advantage of rapid developments in technology, and how they adapted to the changing threat. The book describes the epic scale of some of these operations, the surprising connections between them, and how they contributed to a complex multi-layered intelligence jigsaw which drove decision making at the highest level. On top of all the tradecraft, gadgets and ‘cloak and dagger’, the book also looks at the human side of espionage: their ideologies and motivations, the winners and losers, and the immense courage and frequent betrayal of those whose lives were touched by the Secrets of the Cold War.Before Bletchley Park: The Codebreakers of the First World War
Par Paul Gannon. 2022
The story of Bletchley Park’s codebreaking operations in the Second World War is now well known, but its counterparts in…
the First World War – Room 40 & MI1(b) – remain in the shadows, despite their involvement in and influence on most of the major events of that war. From the First Battle of the Marne, the shelling of Scarborough, the battles of Jutland and the Somme in 1916, to the battles on the Western Front in 1918, the German naval mutiny and the Zimmermann Telegram, this cast of characters – several of them as eccentric as anyone from Bletchley Park in the Second World War – secretly guided the outcome of the ‘Great War’ from the confines of a few smoke-filled rooms.Using hundreds of intercepted and decrypted German military, naval and diplomatic messages, bestselling author Paul Gannon reveals the fascinating story of British codebreaking operations. By drawing on many newly discovered archival documents that challenge misleading stories about Room 40 & MI1(b), he reveals a sophisticated machine in operation.The Last Cambridge Spy: John Cairncross, Bletchley Park Mole and Soviet Agent
Par Chris Smith. 2019
‘A riveting read.’ – Professor Richard Aldrich‘The Last Cambridge Spy is not just a fascinating, well-paced book about an interesting…
individual, but it also invites us to re-appraise the very idea of the “Cambridge spy ring”.’ – Sir Dermot TuringJohn Cairncross was among the most damaging spies of the twentieth century. A member of the infamous Cambridge Ring of Five, he leaked highly sensitive documents from Bletchley Park, MI6 and the Treasury to the Soviet Union – including the first atomic secrets and raw decrypts from Enigma and Tunny that influenced the outcome of the Battle of Kursk in 1943.In 2014, Cairncross appeared as a secondary, though key, character in the biopic of Alan Turing’s life, The Imitation Game. While the other members of the Cambridge Ring of Five have been the subject of extensive biographical study, Cairncross has largely been overlooked by both academic and popular writers. Despite clear interest, he has remained a mystery – until now.The Last Cambridge Spy is the first ever biography of John Cairncross, using recently released material to tell the story of his life and espionage.