Thwarting Enemies at Home and Abroad

How to be a Counterintelligence Officer

Specificaties
Paperback, 240 blz. | Engels
Georgetown University Press | e druk, 2009
ISBN13: 9781589012554
Georgetown University Press e druk, 2009 9781589012554
Verwachte levertijd ongeveer 11 werkdagen

Samenvatting

A Classic in Counter intelligence - Now Back in Print . Originally published in 1987, "Thwarting Enemies at Home and Abroad" is a unique primer that teaches the principles, strategy, and tradecraft of counter-intelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture.

As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations. Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counter-intelligence and the characteristics that make a good CI officer.

Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.

Specificaties

ISBN13:9781589012554
Taal:Engels
Bindwijze:paperback
Aantal pagina's:240
Verschijningsdatum:13-1-2009

Inhoudsopgave

Publisher's Note
Foreword by William Hood
Introduction

1. What Is Counterintelligence?

2. Who Goes into Counterintelligence, and Why?
What Is Peculiar about CI Officers
CI Traits: Do You Have Them?

3. Conflicting Goals: Law Enforcement versus Manipulation
Cops with a CI Job
Spymasters with a CI Job
Cops and Spymasters, Mingle and Merge!

4. The Support Apparatus
The Roof and the Walls
Surveillance Teams
The Bug and Tap Shop
Safe Houses
The Forgery Shop
Vehicles
Photography
Drops: Live, Dead, Phone
Flaps and Seals, Microdot, Secret Ink
Weapons
Locks, Keys and Burglary
Disguise

5. Interrogation: How It Really Works
The Myth of Torture
The Compleat Interrogator
Pressure
The Schmidt Story
When the Tricks Don't Work
The Breaking Point

6. How to Manage the Polygraph
What the Polygraph Is
How the Polygraph Works
Why Do You React to the Polygraph?
What Your Reactions Mean
Known Lies and Surprise Questions
When the Polygraph Works as a Lie Detector
When the Polygraph Does Not Work
Can You Beat the Polygraph?
What the Polygraph Is Used For
How the Polygraph Is Misused

7. How to Manage Physical Surveillance
Local Conditions
Cover
Compartmentation
Communications
Vehicles
Cameras and Audio Gear
Weapons
The Half-Life of a Surveillance Team

8. How to Manage Technical Surveillance
Remember the Support Function
Know Your Technicians
Telephone Taps
Hidden Microphones
Photography through the Keyhole
Mail Intercept
Collating the Information

9. Double Agents: What They Are Good For
Contact with the Enemy
The Playback Double: The Case of Janos Szmolka
Dangles—Controlled and Freelance
Levels of Contact with the Enemy
Allocation of Resources

10. Double Agents: How to Get and Maintain a Stable
Assessing Your Opponents
Collating Leads
Playbacks

11. Double Agents: Feeding and Care
Emotional Dependence
Physical Dependence
Testing
Termination

12. Double Agents: Passing Information to the Enemy
The Doctrine of Layers
Passing the Enemy's Tests
Balancing Cost against Gain
The Bureaucratic Problem
The Build-Up Library
The Use of Collateral

13. Moles in the Enemy's Garden: Your Best Weapon
Strategic Planning
How to Get Penetrations
Arranging the Furniture
Research and Targeting
Planting the Seed
Motive: Is Ideology Dead?
Who Is in Charge?
Weaknesses
Michal Goleniewski
Training or Indoctrination?
Evacuation

14. Defectors: Your Second-Best Weapon
Inducement
Echelons of Handling
Be Prepared
Resettlement

15. Using "Friendly" Services, Foreign and Domestic
The Reasons for Liaison
How Liaison Works in Practice
Cooperation versus Competition
Liaison and Penetration

16. How to Manage Files
Chronological Files
Indexing by Name
Case Files
Dossiers and P-Files
Dossier Numbers
Dossiers and Privacy

17. The Collation of Counterintelligence
What is Collation?
Categories for Collation
Using Computers

18. The Big Game: Deception
The Tools of Deception
The Practical Limits
The Rule of Unwitting Tools
The Secret Body Needs a Bodyguard of Lies

About the Author

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Thwarting Enemies at Home and Abroad