King's Research Portal
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front. -
The Spies That Founded America: How the War for Independence Revolutionized American Espionage
Portland State University PDXScholar Young Historians Conference Young Historians Conference 2020 Apr 27th, 9:00 AM - 10:00 AM The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Clackamas High School Follow this and additional works at: https://pdxscholar.library.pdx.edu/younghistorians Part of the History Commons, Political Science Commons, and the Sociology Commons Let us know how access to this document benefits ou.y Lew, Masaki, "The Spies that Founded America: How the War for Independence Revolutionized American Espionage" (2020). Young Historians Conference. 19. https://pdxscholar.library.pdx.edu/younghistorians/2020/papers/19 This Event is brought to you for free and open access. It has been accepted for inclusion in Young Historians Conference by an authorized administrator of PDXScholar. Please contact us if we can make this document more accessible: [email protected]. The Spies that Founded America: How the War for Independence Revolutionized American Espionage Masaki Lew Humanities Western Civilization 102 March 16, 2020 1 Continental Spy Nathan Hale, standing below the gallows, spoke to his British captors with nothing less than unequivocal patriotism: “I only regret that I have but one life to lose for my country.”1 American History idolizes Hale as a hero. His bravery as the first pioneer of American espionage willing to sacrifice his life for the growing colonial sentiment against a daunting global empire vindicates this. Yet, behind Hale’s success as an operative on -
Wilson, MI5 and the Rise of Thatcher Covert Operations in British Politics 1974-1978 Foreword
• Forward by Kevin McNamara MP • An Outline of the Contents • Preparing the ground • Military manoeuvres • Rumours of coups • The 'private armies' of 1974 re-examined • The National Association for Freedom • Destabilising the Wilson government 1974-76 • Marketing the dirt • Psy ops in Northern Ireland • The central role of MI5 • Conclusions • Appendix 1: ISC, FWF, IRD • Appendix 2: the Pinay Circle • Appendix 3: FARI & INTERDOC • Appendix 4: the Conflict Between MI5 and MI6 in Northern Ireland • Appendix 5: TARA • Appendix 6: Examples of political psy ops targets 1973/4 - non Army origin • Appendix 7 John Colin Wallace 1968-76 • Appendix 8: Biographies • Bibliography Introduction This is issue 11 of The Lobster, a magazine about parapolitics and intelligence activities. Details of subscription rates and previous issues are at the back. This is an atypical issue consisting of just one essay and various appendices which has been researched, written, typed, printed etc by the two of us in less than four months. Its shortcomings should be seen in that light. Brutally summarised, our thesis is this. Mrs Thatcher (and 'Thatcherism') grew out of a right-wing network in this country with extensive links to the military-intelligence establishment. Her rise to power was the climax of a long campaign by this network which included a protracted destabilisation campaign against the Liberal and Labour Parties - chiefly the Labour Party - during 1974-6. We are not offering a conspiracy theory about the rise of Mrs Thatcher, but we do think that the outlines of a concerted campaign to discredit the other parties, to engineer a right-wing leader of the Tory Party, and then a right-wing government, is visible. -
A Rumour Exists Among Cambridge Students
A rumour exists among Cambridge students – that they may be discretely and mysteriously tapped on the shoulder during their time there, meaning they have been invited to become a spy. It’s difficult to determine if this is still true; presumably the new spies would be too secretive to let it slip. But many students live in hope for the day they will become the next James Bond. Cambridge has a long-running association with secret intelligence, which has helped, and hindered, Britain through times of war and peace. Reach Cambridge students live and learn in the same university that has been home to many infamous spies – not bad for a residential summer school! We’ll take a look at some of the most famous spies associated with the city. Christopher Marlowe Marlowe is more widely known as a famous playwright, with some suggesting that he is the true author of Shakespeare’s plays. He studied at Corpus Christi College, Cambridge, and it is alleged that it was during this time that he was recruited to be a spy. Elizabeth I presided over the first British Secret Services, used during her reign to gather intelligence against Catholics. Some evidence that Marlowe was involved in these activities is that he left Cambridge for long stretches of time that the university would usually not allow, and when he was in college, he bought much more food and drink than he would have been able to afford on his scholarship money alone. It was apparently the extra money he earned from being a government spy throughout his life which supplemented his income, allowing him to continue writing. -
Steganography- a Data Hiding Technique
International Journal of Computer Applications (0975 – 8887) Volume 9– No.7, November 2010 Steganography- A Data Hiding Technique Arvind Kumar Km. Pooja Assistant Professor Vankateshwara institute of computer Vidya College of engineering, Meerut, India Science and technology, Meerut, India ABSTRACT In steganography, the possible cover carriers are innocent looking Steganography is the art of hiding information and an effort to carriers (images, audio, video, text, or some other digitally conceal the existence of the embedded information. It serves as a representative code) which will hold the hidden information. A better way of securing message than cryptography which only message is the information hidden and may be plaintext, cipher text, conceals the content of the message not the existence of the message. images, or anything that can be embedded into a bit stream. Together Original message is being hidden within a carrier such that the the cover carrier and the embedded message create a stego-carrier. changes so occurred in the carrier are not observable. In this paper we Hiding information may require a stego key which is additional secret will discuss how digital images can be used as a carrier to hide information, such as a password, required for embedding the messages. This paper also analyses the performance of some of the information. For example, when a secret message is hidden within a steganography tools. Steganography is a useful tool that allows covert cover image, the resulting product is a stego-image. transmission of information over an over the communications A possible formula of the process may be represented as: cover channel. -
H-Diplo Article Roundtable Review, Vol. X, No. 24
2009 h-diplo H-Diplo Article Roundtable Roundtable Editors: Thomas Maddux and Diane Labrosse Roundtable Web Editor: George Fujii Review Introduction by Thomas Maddux www.h-net.org/~diplo/roundtables Reviewers: Bruce Craig, Ronald Radosh, Katherine A.S. Volume X, No. 24 (2009) Sibley, G. Edward White 17 July 2009 Response by John Earl Haynes and Harvey Klehr Journal of Cold War Studies 11.3 (Summer 2009) Special Issue: Soviet Espoinage in the United States during the Stalin Era (with articles by John Earl Haynes and Harvey Klehr; Eduard Mark; Gregg Herken; Steven T. Usdin; Max Holland; and John F. Fox, Jr.) http://www.mitpressjournals.org/toc/jcws/11/3 Stable URL: http://www.h-net.org/~diplo/roundtables/PDF/Roundtable-X-24.pdf Contents Introduction by Thomas Maddux, California State University, Northridge.............................. 2 Review by Bruce Craig, University of Prince Edward Island ..................................................... 8 Review by Ronald Radosh, Emeritus, City University of New York ........................................ 16 Review by Katherine A.S. Sibley, St. Josephs University ......................................................... 18 Review by G. Edward White, University of Virginia School of Law ........................................ 23 Author’s Response by John Earl Haynes, Library of Congress, and Harvey Klehr, Emory University ................................................................................................................................ 27 Copyright © 2009 H-Net: Humanities and Social Sciences Online. H-Net permits the redistribution and reprinting of this work for non-profit, educational purposes, with full and accurate attribution to the author(s), web location, date of publication, H-Diplo, and H-Net: Humanities & Social Sciences Online. For other uses, contact the H-Diplo editorial staff at [email protected]. H-Diplo Roundtable Reviews, Vol. -
Biographyelizabethbentley.Pdf
Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 1 of 284 QUEEN RED SPY Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 2 of 284 3 of 284 6655 Olmsted / RED SPY QUEEN / sheet RED SPY QUEEN A Biography of ELIZABETH BENTLEY Kathryn S.Olmsted The University of North Carolina Press Chapel Hill and London Tseng 2003.10.24 14:06 4 of 284 © 2002 6655 Olmsted / RED SPY QUEEN / sheet The University of North Carolina Press All rights reserved Set in Charter, Champion, and Justlefthand types by Tseng Information Systems, Inc. Manufactured in the United States of America The paper in this book meets the guidelines for permanence and durability of the Committee on Production Guidelines for Book Longevity of the Council on Library Resources. Library of Congress Cataloging-in-Publication Data Olmsted, Kathryn S. Red spy queen : a biography of Elizabeth Bentley / by Kathryn S. Olmsted. p. cm. Includes bibliographical references and index. isbn 0-8078-2739-8 (cloth : alk. paper) 1. Bentley, Elizabeth. 2. Women communists—United States—Biography. 3. Communism—United States— 1917– 4. Intelligence service—Soviet Union. 5. Espionage—Soviet Union. 6. Informers—United States—Biography. I. Title. hx84.b384 o45 2002 327.1247073'092—dc21 2002002824 0605040302 54321 Tseng 2003.10.24 14:06 5 of 284 To 6655 Olmsted / RED SPY QUEEN / sheet my mother, Joane, and the memory of my father, Alvin Olmsted Tseng 2003.10.24 14:06 Tseng 2003.10.24 14:06 6655 Olmsted / RED SPY QUEEN / sheet 6 of 284 7 of 284 Contents Preface ix 6655 Olmsted / RED SPY QUEEN / sheet Acknowledgments xiii Chapter 1. -
Researching Soviet/Russian Intelligence in America: Bibliography (Last Updated: October 2018)
Know Your FSB From Your KGB: Researching Soviet/Russian Intelligence in America: Bibliography (Last updated: October 2018) 1. Federal Government Sources A. The 2016 US Presidential Election Assessing Russian Activities and Intentions in Recent US Elections. Office of the Director of National intelligence, January 6, 2017. Committee Findings on the 2017 Intelligence Community Assessment. Senate Select Committee on Intelligence, July 3, 2018. Disinformation: Panel I, Panel II. A Primer in Russian Active Measures and Influence Campaigns: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Thursday, March 30, 2017. (Y 4.IN 8/19: S.HRG.115-40/) Link: http://purl.fdlp.gov/GPO/gpo86393 FACT SHEET: Actions in Response to Russian Malicious Cyber Activity and Harassment. White House Office of the Press Secretary, December 29, 2016. Grand Jury Indicts 12 Russian Intelligence Officers for Hacking Offenses Related to the 2016 Election. Department of Justice Office of Public Affairs, July 13, 2018. Grizzly Steppe: Russian Malicious Cyber Activity. U.S. Department of Homeland Security, and Federal Bureau of Investigation, December 29, 2016. Information Warfare: Issues for Congress. Congressional Research Service, March 5, 2018. Minority Views: The Minority Members of the House Permanent Select Committee on Intelligence on March 26, 2018, Submit the Following Minority Views to the Majority-Produced "Report on Russian active Measures, March 22, 2018." House Permanent Select Committee on Intelligence, March 26, 2018. Open Hearing: Social Media Influence in the 2016 U.S. Election: Hearing Before the Select Committee on Intelligence of the United States Senate, One Hundred Fifteenth Congress, First Session, Wednesday, November 1, 2017. -
Historical Dictionary of Russian and Soviet Intelligence
Russia • Military / Security Historical Dictionaries of Intelligence and Counterintelligence, No. 5 PRINGLE At its peak, the KGB (Komitet Gosudarstvennoy Bezopasnosti) was the largest HISTORICAL secret police and espionage organization in the world. It became so influential DICTIONARY OF in Soviet politics that several of its directors moved on to become premiers of the Soviet Union. In fact, Russian president Vladimir V. Putin is a former head of the KGB. The GRU (Glavnoe Razvedvitelnoe Upravleniye) is the principal intelligence unit of the Russian armed forces, having been established in 1920 by Leon Trotsky during the Russian civil war. It was the first subordinate to the KGB, and although the KGB broke up with the dissolution of the Soviet Union in 1991, the GRU remains intact, cohesive, highly efficient, and with far greater resources than its civilian counterparts. & The KGB and GRU are just two of the many Russian and Soviet intelli- gence agencies covered in Historical Dictionary of Russian and Soviet Intelligence. Through a list of acronyms and abbreviations, a chronology, an introductory HISTORICAL DICTIONARY OF essay, a bibliography, and hundreds of cross-referenced dictionary entries, a clear picture of this subject is presented. Entries also cover Russian and Soviet leaders, leading intelligence and security officers, the Lenin and Stalin purges, the gulag, and noted espionage cases. INTELLIGENCE Robert W. Pringle is a former foreign service officer and intelligence analyst RUSSIAN with a lifelong interest in Russian security. He has served as a diplomat and intelligence professional in Africa, the former Soviet Union, and Eastern Europe. For orders and information please contact the publisher && SOVIET Scarecrow Press, Inc. -
Introduction Chapter 1
Notes Introduction 1. Thomas S. Kuhn, The Structure of Scientific Revolutions, 2nd ed. (Chicago: Univer- sity of Chicago Press, 1970). 2. Ralph Pettman, Human Behavior and World Politics: An Introduction to International Relations (New York: St. Martin’s Press, 1975); Giandomenico Majone, Evidence, Argument, and Persuasion in the Policy Process (New Haven, CT: Yale University Press, 1989), 275– 76. 3. Bernard Lewis, “The Return of Islam,” Commentary, January 1976; Ofira Seliktar, The Politics of Intelligence and American Wars with Iraq (New York: Palgrave Mac- millan, 2008), 4. 4. Martin Kramer, Ivory Towers on Sand: The Failure of Middle Eastern Studies in Amer- ica (Washington, DC: Washington Institute for Near East Policy, 2000). 5. Bernard Lewis, “The Roots of Muslim Rage,” Atlantic Monthly, September, 1990; Samuel P. Huntington, “The Clash of Civilizations,” Foreign Affairs 72 (1993): 24– 49; Huntington, The Clash of Civilizations and the Remaking of the World Order (New York: Simon & Schuster, 1996). Chapter 1 1. Quoted in Joshua Muravchik, The Uncertain Crusade: Jimmy Carter and the Dilemma of Human Rights (Lanham, MD: Hamilton Press, 1986), 11– 12, 114– 15, 133, 138– 39; Hedley Donovan, Roosevelt to Reagan: A Reporter’s Encounter with Nine Presidents (New York: Harper & Row, 1985), 165. 2. Charles D. Ameringer, U.S. Foreign Intelligence: The Secret Side of American History (Lexington, MA: Lexington Books, 1990), 357; Peter Meyer, James Earl Carter: The Man and the Myth (New York: Simon & Schuster, 1978), 18; Michael A. Turner, “Issues in Evaluating U.S. Intelligence,” International Journal of Intelligence and Counterintelligence 5 (1991): 275– 86. 3. Abram Shulsky, Silent Warfare: Understanding the World’s Intelligence (Washington, DC: Brassey’s [US], 1993), 169; Robert M. -
Download Chapman Pincher: Dangerous to Know Free Ebook
CHAPMAN PINCHER: DANGEROUS TO KNOW DOWNLOAD FREE BOOK Harry Chapman Pincher | 400 pages | 14 Feb 2014 | Biteback Publishing | 9781849546515 | English | London, United Kingdom Chapman Pincher - obituary Aitken, using information from retired CIA counterespionage chief James Jesus Angletonwrote a highly confidential letter in early to British Prime Minister Margaret Thatcheroutlining Angleton's suspicions of Hollis acting as a double agent. A reprint of the first edition in He won awards as Journalist of the Year inand Reporter of the Decade in Henry Chapman Pincher British journalist. His father's family was from north Yorkshire and his father was serving in the Northumberland Fusiliers Chapman Pincher: Dangerous to Know Chapman was born. Because he didn't want her to know. Sign up here to see what happened On This Dayevery day in Chapman Pincher: Dangerous to Know inbox! His most cherished professional compliment came from his political opposite, the left-wing historian E. He died with his family by his side, talking about his time in espionage and the power it gave him in his career. BBC News. Inbunden Engelska, In this he was as assiduous as he was ruthless in exploiting and careful in protecting them. Enlarge cover. Be on the lookout for your Britannica newsletter to get trusted stories delivered right to your inbox. During a stint in the army in the Second Chapman Pincher: Dangerous to Know War, Pincher developed an interest in weapons and how they worked — an interest which opened the door to an unexpected and exciting career. A good lunch". It was only the start of a career in which his name became synonymous with high-level exclusives from the most secret corners of government. -
Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia