Download Free The Case For Counterintelligence Book in PDF and EPUB Free Download. You can read online The Case For Counterintelligence and write the review.

"[Melchior] makes history an exciting adventure."S.L. Stebel, author of The Collaborator
Discussing the challenges terrorist groups face as they multiply and plot international attacks, while at the same time providing a framework for decoding the strengths and weaknesses of their counter-intelligence, Blake W. Mobley offers an indispensable text for the intelligence, military, homeland security, and law enforcement fields.
In To Catch a Spy: The Art of Counterintelligence, former Chief of CIA counterintelligence James M. Olson offers a wake-up call for the American public, showing how the US is losing the intelligence war and how our country can do a better job of protecting its national security and trade secrets.
A Classic in Counterintelligence—Now Back in Print Originally published in 1987, Thwarting Enemies at Home and Abroad is a unique primer that teaches the principles, strategy, and tradecraft of counterintelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations. Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.
In their Second Edition of Cases in Intelligence Analysis: Structured Analytic Techniques in Action, accomplished instructors and intelligence practitioners Sarah Miller Beebe and Randolph H. Pherson offer robust, class-tested cases studies of events in foreign intelligence, counterintelligence, terrorism, homeland security, law enforcement, and decision-making support. Designed to give analysts-in-training an opportunity to apply structured analytic techniques and tackle real-life problems, each turnkey case delivers a captivating narrative, discussion questions, recommended readings, and a series of engaging analytic exercises.
Counterintelligence Theory and Practice explores issues relating to national security, military, law enforcement, and corporate, as well as private affairs. Hank Prunckun uses his own experience as a counterintelligence professional to provide both a theoretical base and practical explanations for counterintelligence.
A veteran counterintelligence agent presents a revealing chronicle of his State Department investigations into intelligence leaks and spying on US soil. On October 7th, 1974, Robert D. Booth swore an oath to support and uphold the United States Constitution as a special agent of the State Department’s Office of Security. As a member of the Special Investigations Branch, he investigated numerous information leaks, losses of classified documents, and instances of espionage. Now, in State Department Counterintelligence, Booth reveals some of the most egregious leaks, spies, and lies that have adversely affected national security over his decades-long career. Booth tells the story of his pivotal role in three major counterespionage assignments as well as numerous investigations into unauthorized disclosures—including the unmasking of Fidel Castro’s most damaging US citizen spy. With the narrative style of a political thriller, Booth brings readers inside the real world of counterintelligence.
Each business day, some 35,000 executives, scientists, consultants, and lawyers pass through the nation's airports to destinations across the globe. They carry, along with proprietary documents and computer files, the latest in personal electronic gear. However, carefully watching most of those travelers—beginning the moment they arrive at the airport and often sooner—are uncounted numbers of espionage operatives. These individuals work for foreign intelligence services and economic concerns and seek to separate international business travelers from their trade secrets. To succeed, they use many time-tested techniques to lure unsuspecting travelers into vulnerable or compromising positions. They also employ the latest electronic means to steal business information often at a distance from their prey. This is the 21st century, after all, and economic and industrial espionage have become multibillion-dollar enterprises, utilizing a wide array of the most sophisticated means to obtain proprietary information. Luke Bencie is a veteran of this struggle. He knows intimately the threats business travelers face and how to combat those threats. In Among Enemies: Counter-Espionage for the Business Traveler, Bencie provides everything you need to know to protect yourself and your company from attempted espionage.
Examines the United States- efforts to create and project a strong counterintelligence capability both at home and abroad during the 1930s. Several federal agencies, governmental departments, and military divisions vied for that role before it was eventually handed to the FBI. The author, a former FBI agent, chronicles the evolution, achievements, and failure of that effort.
Established in the 1940s, the Five Eyes intelligence network consists of Australia, Britain, Canada, New Zealand, and the United States. The alliance was integral to shaping domestic and international security decisions during the Cold War, yet much of the intelligence history of these countries remains unknown. In The Bridge in the Parks, intelligence scholars from across the Five Eyes come together to present case studies detailing the varied successes and struggles their countries experienced in the world of Cold War counter-intelligence. The case studies draw on newly declassified documents on a variety of topics, including civil liberties, agent handling, wiretapping, and international relations. Collectively, these studies highlight how Cold War intelligence history is more nuanced than it has often been portrayed – and much like in the world of intelligence, nothing is ever entirely as it seems.