Résultats de recherche de titre
Articles 41 à 60 sur 124
Hitler's Nest of Vipers: The Rise Of The Abwehr
Par Nigel West. 2022
"...presents an excellent and concise narrative of the Abwehr's global intelligence network. West draws from hundreds of firsthand debriefing and…
summary reports including disclosed sources not previously available to scholars."—American Intelligence JournalModern historians have consistently condemned the Abwehr, Germany’s military intelligence service, and its SS equivalent, the Sicherheitsdienst (SD), as incompetent and even corrupt organizations. However, newly declassified MI5, CIA and US Counterintelligence Corps files shed a very different light on the structure, control and capabilities of the German intelligence machine in Europe, South America, the Mediterranean and the Middle East. It is usually stated that, under Admiral Canaris, the Abwehr neglected its main functions, its attention being focused more on trying to bring down Hitler. Yet Canaris greatly expanded the Abwehr from 150 personnel into a vast world-wide organisation which achieved many notable successes against the Allies. Equally, the SD’s tentacles spread across the Occupied territories as the German forces invaded country after country across Europe. In this in-depth study of the Abwehr’s rise to power, 1935 to 1943, its activities in Russia, the Baltic States, Ukraine, Japan, China, Manchuko and Mongolia are examined, as well as those in Thailand, French Indo-China, the Dutch East Indies, the Philippines, Iran, Turkey, Afghanistan, and the Arab nations. In this period, the Abwehr built a complex network of individual agents with transmitters operating from commercial, diplomatic and consular premises. Before, and in the early stages of the war, it later became apparent, the Abwehr was controlling a number of agents in Britain. Indeed, it was only after the war that the scale of the Abwehr’s activities became known, the organisation having of around 20,000 members. For the first time, the Abwehr’s development and the true extent of its operations have been laid bare, through official files and even of restored documents previously redacted. The long list of operations and activities of the Abwehr around the world includes the efforts of an agent in the USA who was arrested after a bizarre attempt to obtain a quantity of blank American passports by impersonating a senior State Department official, Edward Weston, an Under-Secretary of State. Also, former U.S. Marine, Kurt Jahnke, who was recruited to collect information about the American munitions production and send it on to Germany. These are just two of the numerous and absorbing accounts in this all-embracing study.Carrero: 50 años de un magnicidio maldito
Par Manuel Cerdán. 2023
¿Fue el asesinato de Carrero Blanco un magnicidio maldito? ¿Quiénes ganaron con la muerte del almirante y presidente del Gobierno?…
Cincuenta años después del atentado que hizo saltar por los aires el búnker franquista, seguimos sin conocer toda la verdad sobre la trama que arropó el magnicidio del presidente Carrero Blanco y que condicionó el devenir de la historia de España. La desaparición del delfín de Franco supuso un estoque inesperado para las aspiraciones de la facción inmovilista del régimen, al tiempo que impulsó los primeros pasos de la Transición, encarnada en las figuras de Juan Carlos I y Adolfo Suárez. Manuel Cerdán, periodista de investigación y autor de exitosos libros como Lobo, un topo en las entrañas de ETA o Paesa, el espía de las mil caras, ha tenido acceso en exclusiva a documentación inédita sobre el caso: desde el sumario completo, pasando por documentos de la CIA desclasificados por primera vez, así como entrevistas con los implicados en la organización terrorista. A través de sus testimonios, se adentra sin miedo, sin condicionantes, sin estereotipos y sin censura no sólo en el papel de ETA sino también en el de los servicios secretos españoles e internacionales. El resultado es una narración absorbente que revela una verdad incómoda: el episodio más oscuro de nuestra historia reciente se trató de una doble conspiración. La primera, para llevar a cabo el atentado; la segunda, para borrar el rastro de aquellos a quienes beneficiaba. Manuel Cerdán Alenda nació en Aspe, Alicante, ciudad en la que se inició en el reporterismo en 1975 desde las páginas del diario Informaciones. Ha vivido muy intensamente el tardofranquismo, el posfranquismo y la Transición, siempre desde la óptica del periodismo de investigación.Cuenta con una dilatada carrera que comprende los principales medios de comunicación de este país: desde la prensa escrita Interviú, Cambio 16, El Mundo u OkDiario; en la radio en programas como Buenos días, El Navegador e Informe Abierto, y también en la televisión al frente de El Objetivo en Telemadrid así como colaborador habitual en tertulias políticas de primer nivel.Sus trabajos de investigación han sacudido, en más de una ocasión, los cimientos del poder.The Liar: How a Double Agent in the CIA Became the Cold War's Last Honest Man
Par Benjamin Cunningham. 2022
The Cold War meets Mad Men in the form of Karel Koecher, a double agent whose shifting loyalties and over-the-top…
hedonism reverberated from New York to Moscow In the mid-1970s, the CIA and KGB watched Karel Koecher closely—they were both convinced he was working for the enemy. And they were both right. Traveling with his wife, Hana, Koecher posed as a Czechoslovak asylum seeker and arrived in the US as a Communist sleeper agent. After parlaying a doctorate from Columbia into a job at the CIA, Koecher proceeded to operate as a double agent at the height of the Cold War. Shunning a low profile, the Koechers embraced Manhattan&’s high life—with cocaine, swinging, and parties emblematic of the times and their penchant for risk. Hana, who was no more than a shy teenager when she arrived, grew into a sophisticated international diamond dealer who relayed messages to Karel&’s handlers. Riding a wave of euphoria, the Koechers felt unstoppable. But it was too good to last. Using newly declassified documents, interrogation tapes, and extraordinary firsthand accounts from the Koechers themselves, Cunningham reconstructs their double lives and the fading Cold War, where a strange moral fog made it hard to know what truth was being fought for, and to what end.Big Intel: How the CIA and FBI Went from Cold War Heroes to Deep State Villains
Par J. Michael Waller. 2024
Big Intel recounts the dramatic story of the rise and Cold War heroics of the CIA and the American intelligence…
apparatus followed by its unfortunate slide into Marxist-influenced Deep State dysfunction as BIG INTEL became BAD INTEL.How the Left Subverted the CIA and FBI Once upon a time, the FBI and the CIA fought America&’s enemies at home and abroad. Now they are tools of a growing police state, attacking the left&’s political enemies and spying on ordinary American citizens—even parents who push back against radical public schools. How did we get here? In this revealing and thoroughly documented book, a former CIA operative traces the origins of Big Intel to a loose network of Marxist academic agitators known as the Frankfurt School. Their ideology appealed to the Ivy League elites populating the CIA, but the subversion of the FBI took longer, impeded for a time by the bureau&’s staunchly anti-Communist director, J. Edgar Hoover. Eventually both institutions succumbed, and today Big Intel is controlled by the cultural Marxists. Chronicling the parasitic infiltration of the CIA and FBI, Big Intel shows how normal intelligence functions have given way to political correctness and never-ending &“pride&” propaganda, trap- ping agents in the &“diversity, equity, and inclusion&” house of mirrors. Most chilling of all is the emergence of the leftist security state. Big Intel has become Bad Intel. There are hard times ahead, but if Americans remember what freedom once was, we can still defang Big Intel and return our intelligence services to the service of democracy.Agent Josephine: American Beauty, French Hero, British Spy
Par Damien Lewis. 2022
The New Yorker, Best Books of 2022 Vanity Fair, Best Books of 2022 Booklist, Best Books of 2022 Singer. Actress.…
Beauty. Spy. During WWII, Josephine Baker, the world's richest and most glamorous entertainer, was an Allied spy in Occupied France. Prior to World War II, Josephine Baker was a music-hall diva renowned for her singing and dancing, her beauty and sexuality; she was the highest-paid female performer in Europe. When the Nazis seized her adopted city, Paris, she was banned from the stage, along with all &“negroes and Jews.&” Yet instead of returning to America, she vowed to stay and to fight the Nazi evil. Overnight, she went from performer to Resistance spy. In Agent Josephine, bestselling author Damien Lewis uncovers this little-known history of the famous singer&’s life. During the war years, as a member of the French Nurse paratroopers—a cover for her spying work—Baker participated in numerous clandestine activities and emerged as a formidable spy. In turn, she was a hero of the three countries in whose name she served—the US, France, and Britain. Drawing on a plethora of new historical material and rigorous research, including previously undisclosed letters and journals, Lewis upends the conventional story of Josephine Baker, explaining why she fully deserves her unique place in the French Panthéon.El jefe de los espías: El archivo secreto de Emilio A. Manglano, consejero del Rey y Director del CESID
Par Juan Fernández-Miranda, Javier Chicote Lerena. 2021
Una investigación explosiva que desvelará la historia de España,desde el 23-F y la caída de la UCD hasta el felipismo…
y la consolidación de José María Aznar. La fuente de este riguroso y minucioso trabajo de investigación periodística es el archivo personal de Emilio Alonso Manglano, director del CESID entre 1981 y 1995: sus agendas, sus cuadernos de notas y los informes de inteligencia que guardó: una investigación de varios años repleta de secretos y ocultismo sobre el contenido de más de 200 kilos de documentos que desentrañan la historia nunca contada de España. Personajes como el Rey Juan Carlos, Adolfo Suárez, Mario Conde, Felipe González o Margarita Robles son algunos de los muchos protagonistas de este libro. Reseñas:«Una contribución periodística e histórica de gran relevancia. Ofrece una perspectiva inédita de la España de los años 80 y 90 y arroja luz directa sobre momentos claves de nuestra Historia.»ABC «Un libro que cuestionará algunas de las versiones que se han tenido por ciertas de ese turbio periodo de la reciente historia de España que fue el felipismo.»Fernando Palmero, El Mundo«Los apuntes del militar ponen al desnudo la realidad incorrecta, miserable y en ocasiones delictiva, manejada por los gestores de la seguridad nacional.»Juan Luis Cebrián, El País «Un carboncillo muy bien hecho –porque la cosa es oscura– de las cloacas del felipismo. Está escritocomo en las películas: en equipo, de madrugada, con material exclusivo y el poder vigilando.»Daniel Ramírez, El Español «Un apasionante libro, una investigaciónde largo alcance que desvela oscuros capítulos de la historia de España.»Azahara Villacorta, El Comercio «El jefe de los espías causa a veces desasosiego, pero nunca indefensión. Nos deja un poco más solos y más huérfanos en su complejidad, pero nos distingue del rebaño de la humillación y saber lo que no sabíamos nos hace mejores y nos permite tener una visión más nítida y menos fanática de nuestra historia y de nosotros mismos.»Salvador Sostres, ABC«Lo recomiendo mucho.»Pilar Eyre, periodista y escritora «Es un libro de categoría donde hay reflexiones muy positivas y muy negativas de Manglano.»Luis María Anson «Tiene un índice suculento, con el que cualquiera quedaría enganchado.»Pedro J. Ramírez «Fernández-Miranday Chicote han hecho un gran servicio al país y, en particular, a los historiadores.»Javier Carrasco, Castellón Plaza «El enfrentamiento de Juan Carlos con Suárez y los fondos secretos que recibió de Arabia Saudí durante décadas quedan confirmados.»Iñigo Sáenz de Ugarte, eldiarioes «El libro es muy jugoso. Un repaso de la historia reciente de España.»Fernando de Haro, La tarde COPE«Un documento imprescindible para entender el presente.»Publishers Weekly «Una investigación que aporta datos inéditos de la historia de España.»Servimedia «El volumen saca a la luz el archivo secreto de Emilio Manglano, consejero del rey y director del CESID durante 14 años. Era el jefe del espionaje,el hombre más informado de España. Lo sabía todo. Y lo documentó todo.»Juan Luis Galiacho, El Cierre Digital «Apasionante libro.»Jorge Alacid, Las ProvinciasThe Nazis Next Door: How America Became a Safe Haven for Hitler's Men
Par Eric Lichtblau. 2014
A Newsweek Best Book of the Year: &“Captivating . . . rooted in first-rate research&” (The New York Times Book Review). In this…
New York Times bestseller, once-secret government records and interviews tell the full story of the thousands of Nazis—from concentration camp guards to high-level officers in the Third Reich—who came to the United States after World War II and quietly settled into new lives. Many gained entry on their own as self-styled war &“refugees.&” But some had help from the US government. The CIA, the FBI, and the military all put Hitler&’s minions to work as spies, intelligence assets, and leading scientists and engineers, whitewashing their histories. Only years after their arrival did private sleuths and government prosecutors begin trying to identify the hidden Nazis. Now, relying on a trove of newly disclosed documents and scores of interviews, Pulitzer Prize–winning investigative reporter Eric Lichtblau reveals this little-known and &“disturbing&” chapter of postwar history (Salon).The Secret War for the Union: The Untold Story of Military Intelligence in the Civil War
Par Edwin C. Fishel. 2014
&“A treasure trove for historians . . . A real addition to Civil War history&” (Kirkus Reviews, starred review). At the end…
of the American Civil War, most of the intelligence records disappeared—remaining hidden for over a century. As a result, little has been understood about the role of espionage and other intelligence sources, from balloonists to signalmen with their telescopes. When, at the National Archives, Edwin C. Fishel discovered long-forgotten documents—the operational files of the Army of the Potomac&’s Bureau of Military Information—he had the makings of this, the first book to thoroughly and authentically examine the impact of intelligence on the Civil War, providing a new perspective on this period in history. Drawing on these papers as well as over a thousand pages of reports by General McClellan&’s intelligence chief, the detective Allan Pinkerton, and other information, he created an account of the Civil War that &“breaks much new ground&” (The New York Times). &“The former chief intelligence reporter for the National Security Agency brings his professional expertise to bear in this detailed analysis, which makes a notable contribution to Civil War literature as the first major study to present the war&’s campaigns from an intelligence perspective. Focusing on intelligence work in the eastern theater, 1861–1863, Fishel plays down the role of individual agents like James Longstreet&’s famous &‘scout,&’ Henry Harrison, concentrating instead on the increasingly sophisticated development of intelligence systems by both sides. . . . Expertly written, organized and researched.&” —Publishers Weekly &“Fundamentally changes our picture of the secret service in the Civil War.&” —The Washington PostIntelligence and Strategic Culture
Par Duyvesteyn Isabelle. 2013
Reliable information on potential security threats is not just the result of diligent intelligence work but also a product of…
context and culture. The volume explores the nexus between the intelligence process and strategic culture. How can and does the strategic outlook of the United States and the United Kingdom in particular, influence the intelligence gathering, assessment and dissemination process? This book contains an assessment of how political agendas and ideological outlook have significant influence on both the content and process of intelligence. It looks in particular at the premise of hearts and minds policies, culture and intelligence gathering in counterinsurgency operations; at case studies from imperial Malaya and Iran in the 1950s and at instances of intelligence failure, e.g. the case of Iraq in 2003. How was intelligence, or the lack thereof, a product of political culture and how did it play a role in the political praxis? The book shows that political agendas and the ideological outlook have a significant influence upon both the content and process of intelligence. This book was originally published as a special issue of Intelligence and National Security.Breaking And Entering: The Extraordinary Story of a Hacker Called “Alien”
Par Jeremy N. Smith. 2020
A Bookish Must Read for 2019 An Amazon Best Book of the Month Featured on NBC's TODAY and Nightly News …
&“Smith&’s writing style…is crisp as he charts the course of Alien&’s life in a series of vignettes from uncertain undergraduate to successful business owner. The structure works because Smith is a lively storyteller.&” —The New York Times Book Review "Amusing and cautionary tale."—WORLD Magazine &“A fascinating look at hacking and the cybersecurity industry that has evolved. Alien is one bad-ass woman!&” —The Missoulian &“A book that reads like a fictional thriller while remaining solidly grounded in fact...effortless to read, Breaking and Entering is an engaging cautionary tale of security vulnerabilities and the constant threat of cyber attacks that businesses and institutions face on a daily basis. Knowing that our own personal security hangs in the balance, we can&’t help but feel glad that &“white hat hackers&” such as Alien are out there doing their best to stem the tide."—New York Journal of Books &“A novelistic tech tale that puts readers on the front lines of cybersecurity. For all whose lives and connections depend on the internet—nearly everyone—this biography of the pseudonymous &‘Alien&’ provides a fast-paced cautionary tale. Jeremy Smith has enough experience as a computer programmer to understand the technicalities of this world, but his storytelling makes it intelligible to general readers; indeed, the narrative is more character-driven than technology-driven.... Smith goes into great detail to demonstrate how Alien could penetrate the security of whomever was employing her, showing how a real criminal would do it, and makes fearfully clear that there is &‘no such thing as absolute security in this world, or any definitive and final fixes.&’ A page-turning real-life thriller, this is the sort of book that may leave readers feeling both invigorated and vulnerable.&” —Kirkus Reviews (starred review) "A fascinating and riveting account...like an espionage thriller, this account ensnares readers into the high-stakes world of computer security, told through Alien&’s emergence as a recognized expert in a male-dominate profession." —Library Journal "This riveting book follows Alien as she transforms herself from a young woman up for pretty much any challenge, no matter how dangerous, to a woman who is among the best in the world at what she does. Freelance journalist Smith writes with gusto, giving Alien&’s story the feel of a novel (or, perhaps, a movie along the lines of 1995&’s Hackers). The world of hacking and cybersecurity still carries a mystique; only the privileged few are permitted to learn the secrets that lie within the close-knit hacker community. This book opens the gates and invites readers inside." —Booklist &“Scintillating.... Alien&’s mindset and exploits epitomize the spirit of hacking—a dogged perseverance directed at outsmarting and outwitting barriers of any kind.... An unabashedly human and humane portrait of a brilliant hacker.&” —Gabriella Coleman, author of Hacker, Hoaxer, Whistleblower, Spy &“In Breaking and Entering, Jeremy Smith reveals the human side of cybersecurity. The book covers the vast spectrum of why and how hackers do what they do. A great thriller!&” —Paul de SouzaHomeland Security and Criminal Justice: Five Years After 9/11
Par Everette B. Penn. 2008
No event has shaped international events of recent years more than the terrorist attacks of September 11, 2001. Tragically, less…
than four years later, Hurricane Katrina devastated the Gulf Coast. In less than five years, the United States has experienced its worst terrorist attack and worst natural disaster, both in terms of the number of lives lost and in the costs needed for reconstruction. Both events have clearly indicated that there are tremendous threats to the security and well-being of Americans in their own country. Furthermore, these events have demonstrated the importance of criminal-justice agencies who are the first responders to threats to the United States. Since the threats of further terrorist attacks, natural disasters, epidemics, and cybercrime continue to lurk as potential dangers to the United States homeland, the American Criminal Justice System must be committed to mitigating, preparing for, responding to, and recovering from these tragic events. In addition, its commitment must be steadfast and ubiquitous. This highly topical book analyzes the nexus of homeland security to the discipline of criminal justice by addressing, in depth, issues and challenges facing criminal-justice students, practitioners, and faculty in the burgeoning field of homeland security.This book was previously published as a special issue of Criminal Justice Studies.Big Data, Emerging Technologies and Intelligence: National Security Disrupted (Studies in Intelligence)
Par Miah Hammond-Errey. 2024
This book sets out the big data landscape, comprising data abundance, digital connectivity and ubiquitous technology, and shows how the…
big data landscape and the emerging technologies it fuels are impacting national security. This book illustrates that big data is transforming intelligence production as well as changing the national security environment broadly, including what is considered a part of national security as well as the relationships agencies have with the public. The book highlights the impact of big data on intelligence production and national security from the perspective of Australian national security leaders and practitioners, and the research is based on empirical data collection, with insights from nearly 50 participants from within Australia’s National Intelligence Community. It argues that big data is transforming intelligence and national security and shows that the impacts of big data on the knowledge, activities and organisation of intelligence agencies is challenging some foundational intelligence principles, including the distinction between foreign and domestic intelligence collection. Furthermore, the book argues that big data has created emerging threats to national security; for example, it enables invasive targeting and surveillance, drives information warfare as well as social and political interference, and challenges the existing models of harm assessment used in national security. The book maps broad areas of change for intelligence agencies in the national security context and what they mean for intelligence communities, and explores how intelligence agencies look out to the rest of society, considering specific impacts relating to privacy, ethics and trust. This book will be of much interest to students of intelligence studies, technology studies, national security and International Relations.Narcotopia: In Search of the Asian Drug Cartel That Survived the CIA
Par Patrick Winn. 2024
The gripping true story of an indigenous people running the world&’s mightiest narco-state—and America&’s struggle to thwart them. In Asia&’s…
narcotics-producing heartland, the Wa reign supreme. They dominate the Golden Triangle, a mountainous stretch of Burma between Thailand and China. Their 30,000-strong army, wielding missiles and attack drones, makes Mexican cartels look like street gangs. Wa moguls are unrivaled in the region&’s $60 billion meth trade and infamous for mass-producing pink, vanilla-scented speed pills. Drugs finance Wa State, a bona fide nation with its own laws, anthems, schools, and electricity grid. Though revered by their people, Wa leaders are scorned by US policymakers as vicious &“kingpins&” who &“poison our society for profit.&” In Narcotopia, award-winning journalist Patrick Winn uncovers the truth behind Asia&’s top drug-trafficking organization, as told by a Wa commander turned DEA informant. This gripping narrative shreds drug war myths and leads to a chilling revelation: the Wa syndicate&’s origins are smudged with CIA fingerprints. This is a saga of native people tapping the power of narcotics to create a nation where there was none before — and covert US intelligence operations gone wrong.The NSA Report: Liberty and Security in a Changing World
Par President's Review Group on Intelligence and Communications Technologies, The, Richard A. Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R. Sunstein, Peter Swire. 2014
The official report that has shaped the international debate about NSA surveillance"We cannot discount the risk, in light of the…
lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA ReportThis is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.Secret Reports on Nazi Germany: The Frankfurt School Contribution to the War Effort
Par Franz Neumann, Herbert Marcuse, Otto Kirchheimer. 2013
A groundbreaking book that gathers key wartime intelligence reportsDuring the Second World War, three prominent members of the Frankfurt School—Franz…
Neumann, Herbert Marcuse, and Otto Kirchheimer—worked as intelligence analysts for the Office of Strategic Services, the wartime forerunner of the CIA. This book brings together their most important intelligence reports on Nazi Germany, most of them published here for the first time.These reports provide a fresh perspective on Hitler's regime and the Second World War, and a fascinating window on Frankfurt School critical theory. They develop a detailed analysis of Nazism as a social and economic system and the role of anti-Semitism in Nazism, as well as a coherent plan for the reconstruction of postwar Germany as a democratic political system with a socialist economy. These reports played a significant role in the development of postwar Allied policy, including denazification and the preparation of the Nuremberg Trials. They also reveal how wartime intelligence analysis shaped the intellectual agendas of these three important German-Jewish scholars who fled Nazi persecution prior to the war.Secret Reports on Nazi Germany features a foreword by Raymond Geuss as well as a comprehensive general introduction by Raffaele Laudani that puts these writings in historical and intellectual context.John Lisle reveals the untold story of the OSS Research and Development Branch—The Dirty Tricks Department—and its role in World…
War II.In the summer of 1942, Stanley Lovell, a renowned industrial chemist, received a mysterious order to report to an unfamiliar building in Washington, D.C. When he arrived, he was led to a barren room where he waited to meet the man who had summoned him. After a disconcerting amount of time, William “Wild Bill” Donovan, the head of the Office of Strategic Services (OSS), walked in the door. “You know your Sherlock Holmes, of course,” Donovan said as an introduction. “Professor Moriarty is the man I want for my staff…I think you’re it.”Following this life-changing encounter, Lovell became the head of a secret group of scientists who developed dirty tricks for the OSS, the precursor to the CIA. Their inventions included Bat Bombs, suicide pills, fighting knives, silent pistols, and camouflaged explosives. Moreover, they forged documents for undercover agents, plotted the assassination of foreign leaders, and performed truth drug experiments on unsuspecting subjects.Based on extensive archival research and personal interviews, The Dirty Tricks Department tells the story of these scheming scientists, explores the moral dilemmas that they faced, and reveals their dark legacy of directly inspiring the most infamous program in CIA history: MKULTRA.Great Power Cyber Competition: Competing and Winning in the Information Environment (Routledge Advances in Defence Studies)
Par David V. Gioe, Margaret W. Smith. 2024
This volume conceptualizes the threats, challenges, opportunities, and boundaries of great power cyber competition of the 21st century. This book…
focuses on a key dimension of contemporary great power competition that is often less understood due to its intangible character: the competition taking place in the cyber domain, including information and cyber operations. Democracies across the globe find themselves in an unrelenting competition with peer and near-peer competitors, with a prevailing notion that no state is "safe" from the informational contest. Adversarial powers, particularly China and Russia, recognize that most competition is principally non-kinetic but dominates the information environment and cyberspace, and the volume articulates the Russian and Chinese strategies to elevate cyber and information competition to a central position. Western governments and, in particular, the U.S. government have long conceived of a war–peace duality, but that perspective is giving way to a more nuanced perception of competition. This volume goes beyond analyzing the problems prevalent in the information space and offers a roadmap for Western powers to compete in and protect the global information environment from malicious actors. Its genesis is rooted in the proposition that it is time for the West to push back against aggression and that it needs a relevant framework and tools to do so. The book demonstrates that Western democratic states currently lack both the strategic and intellectual acumen to compete and win in the information and cyber domains, and argues that the West needs a strategy to compete with near-peer powers in information and cyber warfare. This book will be of much interest to students of cyber-warfare, information warfare, defense studies, and international relations in general, as well as practitioners.Cashing Out: The Flight of Nazi Treasure, 1945–1948
Par Neill Lochery. 2023
When Nazis looked to flee Europe with stolen art, gems, and gold in tow, certain &“neutral&” countries were all too…
willing to assist them. By the end of January 1945, it was clear to Germany that the war was lost. The Third Reich was in freefall, and its leaders, apart from those clustered around Hitler in his Berlin bunker, sought to abscond before they were besieged. But they wanted to take their wealth with them. Their escape routes were diverse: Sweden and Switzerland boasted proximity, banking, and industrial closeness, while Spain and Portugal offered an inviting Atlantic coastline and shipping routes to South America. And in various ways, each of these so-called neutral nations welcomed the Nazi escapees, along with the clandestine wealth they carried. Cashing Out tells the riveting history of the race to intercept the stolen assets before they disappeared, and before the will to punish Germany was replaced by the political considerations of the fast-approaching Cold War. Bestselling author Neill Lochery here brilliantly recounts the flight of the Nazi-looted riches—the last great escape of World War II—and the Allied quest for justice.Ethical Hacking (Law, Technology and Media)
Par Alana Maurushat. 2019
How will governments and courts protect civil liberties in this new era of hacktivism? Ethical Hacking discusses the attendant moral…
and legal issues. The first part of the 21st century will likely go down in history as the era when ethical hackers opened governments and the line of transparency moved by force. One need only read the motto “we open governments” on the Twitter page for Wikileaks to gain a sense of the sea change that has occurred. Ethical hacking is the non-violent use of a technology in pursuit of a cause—political or otherwise—which is often legally and morally ambiguous. Hacktivists believe in two general but spirited principles: respect for human rights and fundamental freedoms, including freedom of expression and personal privacy; and the responsibility of government to be open, transparent and fully accountable to the public. How courts and governments will deal with hacking attempts which operate in a grey zone of the law and where different ethical views collide remains to be seen. What is undisputed is that Ethical Hacking presents a fundamental discussion of key societal questions. A fundamental discussion of key societal questions. This book is published in English. - La première moitié du XXIe siècle sera sans doute reconnue comme l’époque où le piratage éthique a ouvert de force les gouvernements, déplaçant les limites de la transparence. La page twitter de Wikileaks enchâsse cet ethos à même sa devise, « we open governments », et sa volonté d’être omniprésent. En parallèle, les grandes sociétés de technologie comme Apple se font compétition pour produire des produits de plus en plus sécuritaires et à protéger les données de leurs clients, alors même que les gouvernements tentent de limiter et de décrypter ces nouvelles technologies d’encryption. Entre-temps, le marché des vulnérabilités en matière de sécurité augmente à mesure que les experts en sécurité informatique vendent des vulnérabilités de logiciels des grandes technologies, dont Apple et Google, contre des sommes allant de 10 000 à 1,5 million de dollars. L’activisme en sécurité est à la hausse. Le piratage éthique est l’utilisation non-violence d’une technologie quelconque en soutien d’une cause politique ou autre qui est souvent ambigue d’un point de vue juridique et moral. Le hacking éthique peut désigner les actes de vérification de pénétration professionnelle ou d’experts en sécurité informatique, de même que d’autres formes d’actions émergentes, comme l’hacktivisme et la désobéissance civile en ligne. L’hacktivisme est une forme de piratage éthique, mais également une forme de militantisme des droits civils à l’ère numérique. En principe, les adeptes du hacktivisme croient en deux grands principes : le respect des droits de la personne et les libertés fondamentales, y compris la liberté d’expression et à la vie privée, et la responsabilité des gouvernements d’être ouverts, transparents et pleinement redevables au public. En pratique, toutefois, les antécédents comme les agendas des hacktivistes sont fort diversifiés. Il n’est pas clair de quelle façon les tribunaux et les gouvernements traiteront des tentatives de piratage eu égard aux zones grises juridiques, aux approches éthiques conflictuelles, et compte tenu du fait qu’il n’existe actuellement, dans le monde, presque aucune exception aux provisions, en matière de cybercrime et de crime informatique, liées à la recherche sur la sécurité ou l’intérêt public. Il sera également difficile de déterminer le lien entre hacktivisme et droits civils. Ce livre est publié en anglais.A Woman of No Importance: The Untold Story of Virginia Hall, WWII's Most Dangerous Spy
Par Sonia Purnell. 2019
'A METICULOUS HISTORY THAT READS LIKE A THRILLER' BEN MACINTYRE, TEN BEST BOOKS TO READ ABOUT WORLD WAR II An…
astounding story of heroism, spycraft, resistance and personal triumph over shocking adversity. 'A rousing tale of derring-do' THE TIMES * 'Riveting' MICK HERRON * 'Superb' IRISH TIMES THE NEW YORK TIMES BESTSELLERIn September 1941, a young American woman strides up the steps of a hotel in Lyon, Vichy France. Her papers say she is a journalist. Her wooden leg is disguised by a determined gait and a distracting beauty. She is there to spark the resistance.By 1942 Virginia Hall was the Gestapo's most urgent target, having infiltrated Vichy command, trained civilians in guerrilla warfare and sprung soldiers from Nazi prison camps. The first woman to go undercover for British SOE, her intelligence changed the course of the war - but her fight was still not over. This is a spy history like no other, telling the story of the hunting accident that disabled her, the discrimination she fought and the secret life that helped her triumph over shocking adversity.'A cracking story about an extraordinarily brave woman' TELEGRAPH'Gripping ... superb ... a rounded portrait of a complicated, resourceful, determined and above all brave woman' IRISH TIMESWINNER of the PLUTARCH AWARD FOR BEST BIOGRAPHY