Restricted Data


Book Description

"Nuclear weapons, since their conception, have been the subject of secrecy. In the months after the dropping of the atomic bombs on Hiroshima and Nagasaki, the American scientific establishment, the American government, and the American public all wrestled with what was called the "problem of secrecy," wondering not only whether secrecy was appropriate and effective as a means of controlling this new technology but also whether it was compatible with the country's core values. Out of a messy context of propaganda, confusion, spy scares, and the grave counsel of competing groups of scientists, what historian Alex Wellerstein calls a "new regime of secrecy" was put into place. It was unlike any other previous or since. Nuclear secrets were given their own unique legal designation in American law ("restricted data"), one that operates differently than all other forms of national security classification and exists to this day. Drawing on massive amounts of declassified files, including records released by the government for the first time at the author's request, Restricted Data is a narrative account of nuclear secrecy and the tensions and uncertainty that built as the Cold War continued. In the US, both science and democracy are pitted against nuclear secrecy, and this makes its history uniquely compelling and timely"--







Covert Regime Change


Book Description

O'Rourke's book offers a onestop shop for understanding foreignimposed regime change. Covert Regime Change is an impressive book and required reading for anyone interested in understanding hidden power in world politics.― Political Science Quarterly States seldom resort to war to overthrow their adversaries. They are more likely to attempt to covertly change the opposing regime, by assassinating a foreign leader, sponsoring a coup d'état, meddling in a democratic election, or secretly aiding foreign dissident groups. In Covert Regime Change, Lindsey A. O'Rourke shows us how states really act when trying to overthrow another state. She argues that conventional focus on overt cases misses the basic causes of regime change. O'Rourke provides substantive evidence of types of security interests that drive states to intervene. Offensive operations aim to overthrow a current military rival or break up a rival alliance. Preventive operations seek to stop a state from taking certain actions, such as joining a rival alliance, that may make them a future security threat. Hegemonic operations try to maintain a hierarchical relationship between the intervening state and the target government. Despite the prevalence of covert attempts at regime change, most operations fail to remain covert and spark blowback in unanticipated ways. Covert Regime Change assembles an original dataset of all American regime change operations during the Cold War. This fund of information shows the United States was ten times more likely to try covert rather than overt regime change during the Cold War. Her dataset allows O'Rourke to address three foundational questions: What motivates states to attempt foreign regime change? Why do states prefer to conduct these operations covertly rather than overtly? How successful are such missions in achieving their foreign policy goals?




Government Secrecy After the Cold War


Book Description




Abuse of Power


Book Description

Athan Theoharis, long a respected authority on surveillance and secrecy, established his reputation for meticulous scholarship with his work on the loyalty security program developed under Truman and McCarthy. In Abuse of Power, Theoharis continues his investigation of U.S. government surveillance and historicizes the 9/11 response. Criticizing the U.S. government's secret activities and policies during periods of "unprecedented crisis," he recounts how presidents and FBI officials exploited concerns about foreign-based internal security threats. Drawing on information sequestered until recently in FBI records, Theoharis shows how these secret activities in the World War II and Cold War eras expanded FBI surveillance powers and, in the process, eroded civil liberties without substantially advancing legitimate security interests. Passionately argued, this timely book speaks to the costs and consequences of still-secret post-9/11 surveillance programs and counterintelligence failures. Ultimately, Abuse of Power makes the case that the abusive surveillance policies of the Cold War years were repeated in the government's responses to the September 11 attacks.




The Moscow Rules


Book Description

From the spymaster and inspiration for the movie Argo, discover the "real-life spy thriller" of the brilliant but under-supported CIA operatives who developed breakthrough spy tactics that helped turn the tide of the Cold War (Malcolm Nance). Antonio Mendez and his future wife Jonna were CIA operatives working to spy on Moscow in the late 1970s, at one of the most dangerous moments in the Cold War. Soviets kept files on all foreigners, studied their patterns, and tapped their phones. Intelligence work was effectively impossible. The Soviet threat loomed larger than ever. The Moscow Rules tells the story of the intelligence breakthroughs that turned the odds in America's favor. As experts in disguise, Antonio and Jonna were instrumental in developing a series of tactics -- Hollywood-inspired identity swaps, ingenious evasion techniques, and an armory of James Bond-style gadgets -- that allowed CIA officers to outmaneuver the KGB. As Russia again rises in opposition to America, this remarkable story is a tribute to those who risked everything for their country, and to the ingenuity that allowed them to succeed.




Ghost Wars


Book Description

The news-breaking book that has sent schockwaves through the White House, Ghost Wars is the most accurate and revealing account yet of the CIA's secret involvement in al-Qaeada's evolution. Prize-winning journalist Steve Coll has spent years reporting from the Middle East, accessed previously classified government files and interviewed senior US officials and foreign spymasters. Here he gives the full inside story of the CIA's covert funding of an Islamic jihad against Soviet forces in Afghanistan, explores how this sowed the seeds of bn Laden's rise, traces how he built his global network and brings to life the dramatic battles within the US government over national security. Above all, he lays bare American intelligence's continual failure to grasp the rising threat of terrrorism in the years leading to 9/11 - and its devastating consequences.




The Torment of Secrecy


Book Description

Edward Shils's The Torment of Secrecy is one of the few minor classics to emerge from the cold war years of anticommunism and McCarthyism in the United States. Mr. Shils's "torment" is not only that of the individual caught up in loyalty and security procedures; it is also the torment of the accuser and judge. This essay in sociological analysis and political philosophy considers the cold war preoccupation with espionage, sabotage, and subversion at home, assessing the magnitude of such threats and contrasting it to the agitation—by lawmakers, investigators, and administrators—so wildly directed against the "enemy." Mr. Shils's examination of a recurring American characteristic is as timely as ever. "Brief...lucid... brilliant."—American Political Science Review. "A fine, sophisticated analysis of American social metabolism."—New Republic. "An excitingly lucid and intelligent work on a subject of staggering importance...the social preconditions of political democracy."—Social Forces.




Post-Cold War Conflict Deterrence


Book Description

Deterrence as a strategic concept evolved during the Cold War. During that period, deterrence strategy was aimed mainly at preventing aggression against the United States and its close allies by the hostile Communist power centers--the Union of Soviet Socialist Republics (USSR) and its allies, Communist China and North Korea. In particular, the strategy was devised to prevent aggression involving nuclear attack by the USSR or China. Since the end of the Cold War, the risk of war among the major powers has subsided to the lowest point in modern history. Still, the changing nature of the threats to American and allied security interests has stimulated a considerable broadening of the deterrence concept. Post-Cold War Conflict Deterrence examines the meaning of deterrence in this new environment and identifies key elements of a post-Cold War deterrence strategy and the critical issues in devising such a strategy. It further examines the significance of these findings for the U.S. Navy and Marine Corps. Quantitative and qualitative measures to support judgments about the potential success or failure of deterrence are identified. Such measures will bear on the suitability of the naval forces to meet the deterrence objectives. The capabilities of U.S. naval forces that especially bear on the deterrence objectives also are examined. Finally, the book examines the utility of models, games, and simulations as decision aids in improving the naval forces' understanding of situations in which deterrence must be used and in improving the potential success of deterrence actions.