A FLOURISHING CRAFT: TEACHING INTELLIGENCE STUDIES Joint
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Émigrés and Anglo-American Intelligence Operations in the Early Cold War Cacciatore, F
WestminsterResearch http://www.westminster.ac.uk/westminsterresearch “Their Need Was Great”: Émigrés and Anglo-American Intelligence Operations in the Early Cold War Cacciatore, F. This is an electronic version of a PhD thesis awarded by the University of Westminster. © Mr Francesco Cacciatore, 2018. The WestminsterResearch online digital archive at the University of Westminster aims to make the research output of the University available to a wider audience. Copyright and Moral Rights remain with the authors and/or copyright owners. Whilst further distribution of specific materials from within this archive is forbidden, you may freely distribute the URL of WestminsterResearch: ((http://westminsterresearch.wmin.ac.uk/). In case of abuse or copyright appearing without permission e-mail [email protected] “Their Need Was Great”: Émigrés and Anglo-American Intelligence Operations in the Early Cold War Francesco Alexander Cacciatore March 2018 A thesis submitted in partial fulfilment of the requirements of the University of Westminster for the degree of Doctor of Philosophy Abstract Covert action during the Cold War has been the subject of much historiography. This research, however, is based for the most part on primary sources, specifically on the records declassified in the United States in 2007 as a consequence of the Nazi War Crimes Disclosure Act. The majority of the historiography on this topic either predates or neglects these records. The study of covert operations inside the Iron Curtain during the early Cold War, sponsored by Western states using émigré agents, usually ends with the conclusion that these operations were a failure, both in operational terms and from the point of view of the intelligence gathered. -
Geheimdienste
1 | 2016 Preis: GLOBAL 3,– Euro VIEWUnabhängiges Magazin der Österreichischen Gesellschaft für Außenpolitik und die Vereinten Nationen (ÖGAVN) und des Akademischen Forums für Außenpolitik (AFA) Geheimdienste http://www.globalview.at ISSN: 1992-9889 DVR: 0875538 Nr.1/2016; global view cover 1/2016.indd 1 11.04.16 09:57 Mit einem Beitrag von Rudolf Hundstorfer Bitte gehen Sie wählen! Die Bundespräsidenten Wahl naht und wir möchten an Sie appellieren, von Ihrem Wahl- recht Gebrauch zu machen. Gehen Sie zur Wahl und bestimmen Sie mit, wer die nächsten 6 Jah- re unser Staatsoberhaupt sein soll. Weder das AFA noch die ÖGAVN können aufgrund Ihrer Überparteilichkeit eine Wahlempfehlung abge- ben, aber Sie zumindest bitten, Ihrer demokra- tischen Pflicht nachzukommen und wählen zu gehen. Wir möchten Ihnen hier auch einige Bücher von den Kandidatinnen und Kandidaten bzw. ein Buch, in dem zwei Kandidaten einen Beitrag verfasst haben, präsentieren. Zudem natürlich auch die Bücher unseres amtierenden Staats- oberhaupts und seiner „First Lady“. Liebe Leserin! Lieber Leser! Dear Readers! Jeder kennt ihn, viele begehren ihn, viele fürch- gehrten James-Bond-Filmen, entsprechen ver- ten ihn: Die Rede ist von Mr. Bond, James Bond. mutlich (noch) nicht der Realität, aber dennoch Der wohl bekannteste Geheimagent der Welt ist werfen wir einen Blick auf das Land, in dem ei- zwar nur Fiktion in Ian Flemmings Geschichten, ner der Nobelkarosen unseres Vorzeigeagenten, aber der Stereotyp eines „Geheimdienstlers“ ein BMW, produziert wird, und beleuchten den ist geschaffen. Gut aussehend, charmant, stark Waffenhandel der Bundesrepublik Deutschland. und den Bösewichten immer um einen Schritt Den so wertvollen Treibstoff für diese Autos pro- voraus. -
There Are Other Ossenkos
• TAMPA, FLORIDA TRIBUNE m. 150,478 S. 164,063 Front Edif* 0 that, P.g. Pa :,,,:+91 1, 2 1964 Date: FEB 1. There Are Other Ossenkos . Whether or not Yuri Ivanovich er notable examples are Igor Gou- Ossenko. Russian secret police zenko in Canada, 1947; Nikolay! staff officer who has sought Khokhlov, West Germany, Juri! asylum in the U.S., knows secrets Rastvorov, Japan, Peter Deriabin,' of Soviet nuclear weapons produc- Vienna, and Vadimir Petrov, Aus-: tion, as some Western sources spe- tralia, all in 1954; and Bogdon Sta. culate, his defection is a hard blow shinski, West Germany, in 1961. to Red intelligence. „CIA. Director Allen Dulles, in The idea that he may have in- his recent book, "The Craft of In- formation on atomic weapons telligence," noted that the prin- arises from the fact that Ossenko cipal value of such 'defectors was; was serving as security officer for that "one such intelligence 'volun-J the Red delegation at the Geneva teer' can literally paralyze the disarmament parley at the time of service he left behind for months his defection. to come" because of what he knows. and tells of policies, plans, current. Based on the previous pattern 9perations and secret agents. of Russian delegations to confer- That Ossenko's - value: to the ences in other countries, this meant is even greater than simply that Ossenko was a highly trusted his knOwledge of Soviet nuclear. agent detailed to keep close rein capabilities should be comforting' on the actual members of the dele- to all citizens of the U.S. -
“Why Protest? I've Got Nothing to Hide” Collective Action Against And
“Why protest? I’ve got nothing to hide” Collective Action against and Chilling Effects of Internet Mass Surveillance A Master’s Dissertation presented to the Faculty of Politics and International Relations, University of Kent and the Faculty of Social Science and Philosophy, Philipps-Universität Marburg in fulfilment of the requirements for the Degree Master of Arts in Peace and Conflict Studies (International Double Award) by Dipl.-Psych. Johannes Nau Marburg August 2014 ! “Why protest? I’ve got nothing to hide” - Collective Action against and Chilling Effects of Internet Mass Surveillance A Master’s Dissertation presented to the Faculty of Politics and International Relations, University of Kent and the Faculty of Social Science and Philosophy, Philipps-Universität Marburg in fulfilment of the requirements for the Degree Master of Arts in Peace and Conflict Studies (International Double Award) Word Count: 14790 Copyright © 2014 Johannes Nau This work is licensed under a Creative Commons Attribution – Non-commercial 4.0 International License (CC BY-NC 4.0) The content of this master’s dissertation may be used, shared and copied on the condition that appropriate credit is given to the author, indication of changes are made and the material is used for non-commercial purposes only. The full-length legal code / license can be accessed under: https://creativecommons.org/licenses/by-nc/4.0/legalcode ! Acknowledgments In preparation for this thesis, I have received support from various people whom I would like to thank. First of all I want to give credit to my supervisors from Marburg and Canterbury Prof Dr Wagner and Dr Morgan-Jones for the friendly, competent and reliable supervision and support. -
Report on the Democratic Oversight of the Security Services
Strasbourg, 15 December 2015 CDL-AD(2015)010 Or. Engl. Studies no. 388 / 2006 and no.719/2013 EUROPEAN COMMISSION FOR DEMOCRACY THROUGH LAW (VENICE COMMISSION) REPORT ON THE DEMOCRATIC OVERSIGHT OF THE SECURITY SERVICES Adopted by the Venice Commission at its 71st Plenary Session (Venice, 1-2 June 2007) On the basis of comments by Mr Iain Cameron (Substitute member, Sweden) Mr Olivier Dutheillet de Lamothe (Substitute member, France) Mr Jan Helgesen (Member, Norway) Mr Valery Zorkin (Member, Russian Federation) Mr Ian Leigh (Expert, United Kingdom) Mr Franz Matscher (Expert, Austria) Updated by the Venice Commission at its 102nd Plenary Session (Venice, 20-21 March 2015) On the basis of comments by Mr Iain Cameron (Member, Sweden) This document will not be distributed at the meeting. Please bring this copy. http://venice.coe.int CDL-AD(2015)010 - 2 - TABLE OF CONTENTS Executive Summary .................................................................................................................... 4 The need to control security services .......................................................................................... 4 Accountability .............................................................................................................................. 4 Parliamentary Accountability ....................................................................................................... 5 Judicial review and authorisation ................................................................................................ 6 -
Security and Society in the Information Age Vol. 3
SECURITY Katarzyna MANISZEWSKA, Paulina PIASECKA Editors AND SOCIETY IIt is our pleasure to present a third scholarly volume bringing together a unique series of research papers by talented students – participants in the Security and Society in the Information Age program held at Collegium Civitas University in AGE IN THE INFORMATION Warsaw, Poland. In 2020, due to the pandemic, the program was held for first time online and included a component on the security-related implications of Covid-19. The students took part in a fully-fledged online course followed by an online research internship at the Terrorism Research Center. This book presents the results of their SECUR TY work – research papers devoted to contemporary security threats. The contributors not only analyzed the issues but also looked for solutions and these papers include recommendations for policy makers. We hope you will find this book interesting and valuable and we cordially invite you to learn more about the Security and Society in the Information Age program at: www. AND securityandsociety.org Volume 3 SOCIETY IN THE INFORMATION AGE Volume 3 ISBN 978-83-66386-15-0 9 788366 386150 Volume 3 COLLEGIUM CIVITAS „Security and Society in the Information Age. Volume 3” publication is licensed under the Creative Commons Attribution-ShareAlike 4.0 International License under the following terms – you must keep this information and credit Collegium Civitas as the holder of the copyrights to this publication. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/4.0/ Reviews: Daniel Boćkowski, PhD, University of Bialystok Marek Jeznach, PhD, an independent security researcher Editors: Katarzyna Maniszewska, PhD ( https://orcid.org/0000-0002-8021-8135) and Paulina Piasecka, PhD ( https://orcid.org/0000-0003-3133-8154) Proofreader: Vanessa Tinker, PhD e-ISBN: 978-83-66386-15-0 ISBN-print: 978-83-66386-16-7 DOI 10.6084/m9.figshare.13614143 Publisher: Collegium Civitas Press Palace of Culture and Science, XI floor 00-901 Warsaw, 1 Defilad Square tel. -
Surveillance by Intelligence Services: Fundamental Rights Safeguards And
FREEDOMS FRA Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU and remedies safeguards rights fundamental services: intelligence by Surveillance Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks This report addresses matters related to the respect for private and family life (Article 7), the protection of personal data (Article 8) and the right to an effective remedy and a fair trial (Article 47) falling under Titles II ‘Freedoms’ and VI ‘Justice’ of the Charter of Fundamental Rights of the European Union. Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) The information given is free, as are most calls (though some operators, phone boxes or hotels may charge you). Photo (cover & inside): © Shutterstock More information on the European Union is available on the Internet (http://europa.eu). FRA – European Union Agency for Fundamental Rights Schwarzenbergplatz 11 – 1040 Vienna – Austria Tel. +43 158030-0 – Fax +43 158030-699 fra.europa.eu – [email protected] Luxembourg: Publications Office of the European Union, 2015 Paper: 978-92-9239-944-3 10.2811/678798 TK-04-15-577-EN-C PDF: 978-92-9239-943-6 10.2811/40181 TK-04-15-577-EN-N © European Union Agency for Fundamental Rights, 2015 Reproduction is authorised, provided the source is acknowledged. Printed in Luxembourg Printed on process chlorine-free recycled paper (PCF) Surveillance by intelligence services: fundamental rights safeguards and remedies in the EU Mapping Member States’ legal frameworks Foreword Protecting the public from genuine threats to security and safeguarding fundamental rights involves a delicate bal- ance, and has become a particularly complex challenge in recent years. -
Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S
Strategic Latency: Red, White, and Blue Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February 2018 Disclaimer: This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Lawrence Livermore National Security, LLC, nor any of their employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or Lawrence Livermore National Security, LLC. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes. LLNL-BOOK-746803 Strategic Latency: Red, White, and Blue: Managing the National and International Security Consequences of Disruptive Technologies Zachary S. Davis and Michael Nacht, editors Center for Global Security Research Lawrence Livermore National Laboratory February -
Anhang A: Übersicht Über Die Wichtigsten Geheimdienste
Anhang A: Übersicht über die wichtigsten Geheimdienste Afghanistan NDS – National Directorate of Security Ägypten GIS – Jihaz al-Mukhabarat al-Amma Argentinien SIDE – Secretaria de Inteligencia del Estado Australien ASIS – Australian Secret Intelligence Service DSD – Defense Signals Directorate Belgien SGR – Service Generale des Renseingnements Brasilien ABIN – Angecia Brasiliera de Inteligencia Bulgarien NSS – Natsionalja Sluzhba za Sigurnost NIS – Natsionalja Informatsionna Sluzhba Pri Minister- kiya S’vet Chile ANI – Agencia Nacional de Inteligencia China MSS – Guojia Anaquaanbu MID – Zhong Chan Er Bu 3VBA – Zhong Chan San Bu Dänemark FE – Forsvarets Efterretningstjeneste PET – Politiets Efterretningstjeneste Deutschland BND – Bundesnachrichtendienst BfV – Bundesamt für Verfassungsschutz MAD – Militärischer Abschirmdienst BSI – Bundesamt für Sicherheit in der Informationstech- nik IKTZ der Bundespolizei Das BKA – Bundeskriminalamt und die LKAs – Landeskriminalämter müsste man in Deutschland eigentlich schon mit zu den Diensten zählen. Da unsere verfassungsrechtliche Lage immer stärker aufgeweicht wird von z.B. Politikern wie Wolfgang Schäuble als Minister des Inneren a.D., der das Trennungsgebot von Polizei und Diensten zu umgehen versucht, sehen Kritiker in den Reformen des BKA-Gesetzes eine Aufweichung dieses Grundsatzes, da polizeiliche Maß- nahmen zur Extremismus- und Gefahrenabwehr im Vorfeld exekutiver Maß- nahmen immer stärker den präventiven Beobachtungsauftrag der Verfassungs- schutzbehörden berühren. Hier kann sich das Legalitätsprinzip -
Jahrbuch Netzpolitik 2014
Jahrbuch Netzpolitik 2014 Jahrbuch Netzpolitik 2014 netzpolitik.org Hrsg. Markus Beckedahl, Anna Biselli und Andre Meister Jahrbuch Netzpolitik 2014 1. Auflage, Buch, Dezember 2014 Herausgeber: Markus Beckedahl, Anna Biselli und Andre Meister Redaktion: Markus Beckedahl, Anna Biselli und Andre Meister Paul Berschick, Susanne Eiswirt, Justin Hanney, Matthias ‘wetterfrosch’ Mehldau, Nadine Schildhauer Titelbild: Melanie Twele Satz: Anna Biselli Verlag: epubli Berlin ISBN: 978-3-7375-1489-7 (E-Book) ISBN: 978-3-7375-1490-3 (Print) URL: https://netzpolitik.org/jahrbuch-2014/ Alle Beiträge – sofern nicht anders deklariert – stehen unter der Creative Commons „Namensnennung – Weitergabe unter gleichen Bedingungen“-Lizenz 3.0 DE. Jeder darf: • Teilen – das Material in jedwedem Format oder Medium vervielfältigen und weiterverbreiten • Bearbeiten – das Material remixen, verändern und darauf aufbauen und zwar für beliebige Zwecke, auch kommerziell. Unter folgenden Bedingungen: Namensnennung: Es müssen angemessene Urheber- und Rechteangaben gemacht, ein Link zur Lizenz beigefügt und angeben werden, ob Änderungen vorgenommen wurden. Diese Angaben dürfen in jeder angemessenen Art und Weise gemacht wer- den, allerdings nicht so, dass der Eindruck entsteht, der Lizenzgeber unterstütze gerade den Lizenznehmer oder seine Nutzung besonders. Weitergabe unter gleichen Bedingungen: Wenn das Material geremixt, verändert oder anderweitig direkt darauf aufgebaut wird, dürfen die Beiträge nur unter der- selben Lizenz wie das Original verbreitet werden. https://creativecommons.org/licenses/by-sa/3.0/de/ -
Making International Intelligence Cooperation Accountable
Making International Intelligence Cooperation Accountable Hans Born, Ian Leigh, Aidan Wills DCAF DCAF a centre for security, development and the rule of law Making International Intelligence Cooperation Accountable Hans Born, Ian Leigh, Aidan Wills DCAF DCAF a centre for security, development and the rule of law Authors: Hans Born, Ian Leigh and Aidan Wills Editorial assistants: Youngchan Kim and William McDermott Designer: Alice Lake-Hammond Cover photograph: Tobias Schwarz/AFP/Getty Images Cover photograph description: German intelligence service (BND) chief Gerhard Schindler arrives at the enquiry commission of the German Bundestag on the US intelligence agency NSA in Berlin, on 21 May 2015 Background cover image: polygraphus/Shutterstock.com This publication has been made possible by the generous support of the Norwegian Parliamentary Intelligence Oversight Committee. Published by: Printing Office of the Parliament of Norway Disclaimer: The opinions expressed in this publication are those of the authors and do not necessarily reflect the institutional positions of either DCAF or the Norwegian Parliamentary Intelligence Oversight Committee. Neither DCAF nor the Norwegian Parliamentary Intelligence Oversight Committee are responsible for either the views expressed or the accuracy of facts and other forms of information contained in this publication. Reproduction and translation, except for commercial purposes, are authorized, provided the source is acknowledged and provided DCAF is given prior notice and supplied with a copy. ©2015 DCAF -
Intelligence Gathering in Postwar Austria P
MASTERARBEIT / MASTER´S THESIS Titel der Masterarbeit / Title of the Master´s Thesis US-led stay behind networks in Austria A tale from the Cold War: shady deals, dubious loyalties, and underground arms caches. verfasst von / submitted by Lorenzo Cottica, BA angestrebter akademischer Grad / in partial fulfilment of the requirements for the degree of Master (MA) Wien, 2017 / Vienna 2017 Studienkennzahl lt. Studienblatt / A 066 805 degree program code as it appears on the student record sheet: Studienrichtung lt. Studienblatt / Masterstudium Globalgeschichte degree program as it appears on the student record sheet: Betreut von / Supervisor: Uni.-Prof. Mag. DDr. Oliver Rathkolb “A pensar male degli altri si fa peccato, ma spesso ci si indovina.1” (Thinking ill of others is a sin, but it often turns out good guesses.) 1 One of the most famous aphorisms credited to Giulio Andreotti, [undated], cited from ilsole24ore.com. Link. II Acknowledgments First and foremost, I want to express my sincere gratitude to the supervisor of this project, Prof. Oliver Rathkolb who, aside from assisting me throughout the research process, also granted me access to his private archive of copied source-material. Almost a third of all primary sources on which this thesis is founded upon, were thereby sponsored by prof. Rathkolb. I likewise want to thank General Horst Pleiner, for granting me the possibility to conduct and record an interesting interview of over an hour, thereby enriching the research with his expert perspective. III Abstract After dealing with a handful of editorial notes in chapter one, in chapter two, the thesis moves on to a description of the technical and methodological elements of the research itself, such as the terminology used, a critique of the main sources and an overview of the current state of research in this particular field.