Contact us on (02) 8445 2300
For all customer service and order enquiries

Woodslane Online Catalogues

9781589012554 Add to Cart Academic Inspection Copy

Thwarting Enemies at Home and Abroad

How to Be a Counterintelligence Officer
Description
Table of
Contents
Google
Preview
A Classic in Counter intelligence - Now Back in Print . Originally published in 1987, "Thwarting Enemies at Home and Abroad" is a unique primer that teaches the principles, strategy, and tradecraft of counter-intelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations. Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counter-intelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.
Publisher's NoteForeword by William HoodIntroduction1. What Is Counterintelligence? 2. Who Goes into Counterintelligence, and Why?What Is Peculiar about CI OfficersCI Traits: Do You Have Them? 3. Conflicting Goals: Law Enforcement versus ManipulationCops with a CI JobSpymasters with a CI JobCops and Spymasters, Mingle and Merge! 4. The Support ApparatusThe Roof and the WallsSurveillance TeamsThe Bug and Tap ShopSafe HousesThe Forgery ShopVehiclesPhotographyDrops: Live, Dead, PhoneFlaps and Seals, Microdot, Secret InkWeaponsLocks, Keys and BurglaryDisguise 5. Interrogation: How It Really WorksThe Myth of TortureThe Compleat InterrogatorPressureThe Schmidt StoryWhen the Tricks Don't WorkThe Breaking Point 6. How to Manage the PolygraphWhat the Polygraph IsHow the Polygraph WorksWhy Do You React to the Polygraph?What Your Reactions MeanKnown Lies and Surprise QuestionsWhen the Polygraph Works as a Lie DetectorWhen the Polygraph Does Not WorkCan You Beat the Polygraph?What the Polygraph Is Used ForHow the Polygraph Is Misused7. How to Manage Physical SurveillanceLocal ConditionsCoverCompartmentationCommunicationsVehiclesCameras and Audio GearWeaponsThe Half-Life of a Surveillance Team8. How to Manage Technical SurveillanceRemember the Support FunctionKnow Your TechniciansTelephone TapsHidden MicrophonesPhotography through the KeyholeMail InterceptCollating the Information9. Double Agents: What They Are Good ForContact with the EnemyThe Playback Double: The Case of Janos SzmolkaDangles-Controlled and FreelanceLevels of Contact with the EnemyAllocation of Resources10. Double Agents: How to Get and Maintain a StableAssessing Your OpponentsCollating LeadsPlaybacks11. Double Agents: Feeding and CareEmotional DependencePhysical DependenceTestingTermination12. Double Agents: Passing Information to the EnemyThe Doctrine of LayersPassing the Enemy's TestsBalancing Cost against GainThe Bureaucratic ProblemThe Build-Up LibraryThe Use of Collateral13. Moles in the Enemy's Garden: Your Best WeaponStrategic PlanningHow to Get PenetrationsArranging the FurnitureResearch and TargetingPlanting the SeedMotive: Is Ideology Dead?Who Is in Charge?WeaknessesMichal GoleniewskiTraining or Indoctrination?Evacuation14. Defectors: Your Second-Best WeaponInducementEchelons of HandlingBe PreparedResettlement15. Using "Friendly" Services, Foreign and DomesticThe Reasons for LiaisonHow Liaison Works in PracticeCooperation versus CompetitionLiaison and Penetration16. How to Manage FilesChronological FilesIndexing by NameCase FilesDossiers and P-FilesDossier NumbersDossiers and Privacy17. The Collation of CounterintelligenceWhat is Collation?Categories for CollationUsing Computers18. The Big Game: DeceptionThe Tools of DeceptionThe Practical LimitsThe Rule of Unwitting ToolsThe Secret Body Needs a Bodyguard of Lies About the Author
Google Preview content