Strategic Intelligence: Counterintelligence and counterterrorism : defending the nation against hostile forces


Book Description

While several fine texts on intelligence have been published over the past decade, there is no complementary set of volumes that addresses the subject in a comprehensive manner for the general reader. This major set explains how the sixteen major U.S. intelligence agencies operate, how they collect information from around the world, the problems they face in providing further insight into this "raw" information through the techniques of analysis, and the difficulties that accompany the dissemination of intelligence to policymakers in a timely manner.




Strategic Intelligence


Book Description

While several fine texts on intelligence have been published over the past decade, there is no complementary set of volumes that addresses the subject in a comprehensive manner for the general reader. This major set explains how the sixteen major U.S. intelligence agencies operate, how they collect information from around the world, the problems they face in providing further insight into this raw information through the techniques of analysis, and the difficulties that accompany the dissemination of intelligence to policymakers in a timely manner. Further, in a democracy it is important to have accountability over secret agencies and to consider some ethical benchmarks in carrying out clandestine operations. In addition to intelligence collection and analysis and the subject of intelligence accountability, this set addresses the challenges of counterintelligence and counterterrorism, as well covert action. Further, it provides comparisons regarding the various approaches to intelligence adopted by other nations around the world. Its five volumes underscore the history, the politics, and the policies needed for a solid comprehension of how the U.S. intelligence community functions in the modern age of globalization, characterized by a rapid flow of information across national boundaries.




Roots of Counterterrorism


Book Description

The dominant narrative in intelligence studies portrays the evolution of intelligence from Cold War times to the present as one of increasing complexity. But Western intelligence and security services have countered terrorism before: terrorism became an important threat from the end of the 1960s onwards. Counterterrorism efforts before 9/11, however, differed from those employed post-9/11, not only in the way threats were perceived, but also in the repertoires of action that emerged to counter them. Using newly declassified primary sources, Roots of Counterterrorism puts into focus how the rise of terrorism in the 1970s challenged the existing perceived core functions of intelligence, specifically in the Netherlands. Constant Willem Hijzen analyses how the Dutch domestic security service Binnenlandse Veiligheidsdienst (BVD) scrutinized traces of terrorism from 1968, when Spanish anarchists bombed embassies in The Hague, until the South Moluccan attack of 1978, after which the threat of terrorism and political violence diminished. Unlike counterterrorism in the post-9/11 era, prevention was not the primary goal. Instead, the Dutch security service launched intelligence investigations into the suspected perpetrators of attacks, provided hands-on assistance during terrorist incidents, and advised the police and the Justice department. Roots of Counterterrorism sheds new light on Dutch intelligence history, but also on the dynamics of international intelligence cooperation, operational complexities, and more fundamental questions in intelligence and security studies about the essence and evolution of intelligence and intelligence organizations.




Intelligence Guide for First Responders


Book Description

This Interagency Threat Assessment and Coordination Group (ITACG) Intelligence Guide for First Responders is designed to assist state, local, tribal law enforcement, firefighting, homeland security, and appropriate private sector personnel in accessing and understanding Federal counterterrorism, homeland security, and weapons of mass destruction intelligence reporting. Most of the information contained in this guide was compiled, derived, and adapted from existing Intelligence Community and open source references. The ITACG consists of state, local, and tribal first responders and federal intelligence analysts from the Department of Homeland Security and the Federal Bureau of Investigation, working at the National Counterterrorism Center (NCTC) to enhance the sharing of federal counterterrorism, homeland security, and weapons of mass destruction information with state, local, and tribal consumers of intelligence.




Studies in Intelligence


Book Description







The Sword and the Shield


Book Description

The Sword and the Shield is based on one of the most extraordinary intelligence coups of recent times: a secret archive of top-level KGB documents smuggled out of the Soviet Union which the FBI has described, after close examination, as the "most complete and extensive intelligence ever received from any source." Its presence in the West represents a catastrophic hemorrhage of the KGB's secrets and reveals for the first time the full extent of its worldwide network. Vasili Mitrokhin, a secret dissident who worked in the KGB archive, smuggled out copies of its most highly classified files every day for twelve years. In 1992, a U.S. ally succeeded in exfiltrating the KGB officer and his entire archive out of Moscow. The archive covers the entire period from the Bolshevik Revolution to the 1980s and includes revelations concerning almost every country in the world. But the KGB's main target, of course, was the United States. Though there is top-secret material on almost every country in the world, the United States is at the top of the list. As well as containing many fascinating revelations, this is a major contribution to the secret history of the twentieth century. Among the topics and revelations explored are: The KGB's covert operations in the United States and throughout the West, some of which remain dangerous today. KGB files on Oswald and the JFK assassination that Boris Yeltsin almost certainly has no intention of showing President Clinton. The KGB's attempts to discredit civil rights leader in the 1960s, including its infiltration of the inner circle of a key leader. The KGB's use of radio intercept posts in New York and Washington, D.C., in the 1970s to intercept high-level U.S. government communications. The KGB's attempts to steal technological secrets from major U.S. aerospace and technology corporations. KGB covert operations against former President Ronald Reagan, which began five years before he became president. KGB spies who successfully posed as U.S. citizens under a series of ingenious disguises, including several who attained access to the upper echelons of New York society.




Surprise, Security, and the American Experience


Book Description

In this provocative book, a distinguished Cold War historian argues that September 11, 2001, was not the first time a surprise attack shattered American assumptions about national security and reshaped American grand strategy.




McWp 2-14 - Counterintelligence


Book Description

MCWP 2-14 describes aspects of CI operations across the spectrum of MAGTF, naval, joint and multinational operations, including doctrinal fundamentals, equipment, command and control, communications and information systems support, planning, execution, security, and training. MCWP 2-14 provides the information needed by Marines to understand, plan, and execute CI operations in support of the MAGTF across the spectrum of conflict.




National Security Intelligence


Book Description

National security intelligence is a vast, complicated, and important topic, made doubly hard for citizens to understand because of the thick veils of secrecy that surround it. This definitive introduction to the field guides readers skilfully through this hidden side of government. It not only explains the three primary missions of intelligence - information collection and analysis, counterintelligence, and covert action - it also explores the wider dilemmas posed by the existence of secret government organizations in 'open' societies. With over thirty-five years of experience studying intelligence agencies and their activities, Loch Johnson illuminates difficult questions such as why intelligence organizations make mistakes in assessing world events; why some intelligence officers decide to work against their own country on behalf of foreign regimes; and how agencies succumb to scandals, including spying on the very citizens they are meant to protect. National Security Intelligence is tailor-made to meet the interests of students and general readers who care about how nations protect themselves against threats through the establishment of intelligence organizations - and how they continue to strive for safeguards to prevent the misuse of this secret power.