Thwarting Enemies at Home and Abroad
How to be a Counterintelligence Officer
Samenvatting
A Classic in Counter intelligence - Now Back in Print . Originally published in 1987, "Thwarting Enemies at Home and Abroad" is a unique primer that teaches the principles, strategy, and tradecraft of counter-intelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture.
As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations. Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counter-intelligence and the characteristics that make a good CI officer.
Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.
Specificaties
Inhoudsopgave
Foreword by William Hood
Introduction
1. What Is Counterintelligence?
2. Who Goes into Counterintelligence, and Why?
What Is Peculiar about CI Officers
CI Traits: Do You Have Them?
3. Conflicting Goals: Law Enforcement versus Manipulation
Cops with a CI Job
Spymasters with a CI Job
Cops and Spymasters, Mingle and Merge!
4. The Support Apparatus
The Roof and the Walls
Surveillance Teams
The Bug and Tap Shop
Safe Houses
The Forgery Shop
Vehicles
Photography
Drops: Live, Dead, Phone
Flaps and Seals, Microdot, Secret Ink
Weapons
Locks, Keys and Burglary
Disguise
5. Interrogation: How It Really Works
The Myth of Torture
The Compleat Interrogator
Pressure
The Schmidt Story
When the Tricks Don't Work
The Breaking Point
6. How to Manage the Polygraph
What the Polygraph Is
How the Polygraph Works
Why Do You React to the Polygraph?
What Your Reactions Mean
Known Lies and Surprise Questions
When the Polygraph Works as a Lie Detector
When the Polygraph Does Not Work
Can You Beat the Polygraph?
What the Polygraph Is Used For
How the Polygraph Is Misused
7. How to Manage Physical Surveillance
Local Conditions
Cover
Compartmentation
Communications
Vehicles
Cameras and Audio Gear
Weapons
The Half-Life of a Surveillance Team
8. How to Manage Technical Surveillance
Remember the Support Function
Know Your Technicians
Telephone Taps
Hidden Microphones
Photography through the Keyhole
Mail Intercept
Collating the Information
9. Double Agents: What They Are Good For
Contact with the Enemy
The Playback Double: The Case of Janos Szmolka
Dangles—Controlled and Freelance
Levels of Contact with the Enemy
Allocation of Resources
10. Double Agents: How to Get and Maintain a Stable
Assessing Your Opponents
Collating Leads
Playbacks
11. Double Agents: Feeding and Care
Emotional Dependence
Physical Dependence
Testing
Termination
12. Double Agents: Passing Information to the Enemy
The Doctrine of Layers
Passing the Enemy's Tests
Balancing Cost against Gain
The Bureaucratic Problem
The Build-Up Library
The Use of Collateral
13. Moles in the Enemy's Garden: Your Best Weapon
Strategic Planning
How to Get Penetrations
Arranging the Furniture
Research and Targeting
Planting the Seed
Motive: Is Ideology Dead?
Who Is in Charge?
Weaknesses
Michal Goleniewski
Training or Indoctrination?
Evacuation
14. Defectors: Your Second-Best Weapon
Inducement
Echelons of Handling
Be Prepared
Resettlement
15. Using "Friendly" Services, Foreign and Domestic
The Reasons for Liaison
How Liaison Works in Practice
Cooperation versus Competition
Liaison and Penetration
16. How to Manage Files
Chronological Files
Indexing by Name
Case Files
Dossiers and P-Files
Dossier Numbers
Dossiers and Privacy
17. The Collation of Counterintelligence
What is Collation?
Categories for Collation
Using Computers
18. The Big Game: Deception
The Tools of Deception
The Practical Limits
The Rule of Unwitting Tools
The Secret Body Needs a Bodyguard of Lies
About the Author
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht