-
Recent Posts
Recent Comments
Stanton | Intelligen… on Dictionary of Espionage fredslibrary on Frontier Spies Susan Brooke on Frontier Spies Top 242 Software Arc… on Deadly Embrace Lost Kingdom | Intel… on Red Famine Archives
- January 2018
- December 2017
- November 2017
- October 2017
- September 2017
- August 2017
- July 2017
- June 2017
- May 2017
- April 2017
- March 2017
- February 2017
- January 2017
- December 2016
- November 2016
- October 2016
- September 2016
- August 2016
- July 2016
- June 2016
- May 2016
- April 2016
- March 2016
- February 2016
- January 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- July 2015
- June 2015
- May 2015
- April 2015
- March 2015
- February 2015
- January 2015
- December 2014
- November 2014
- October 2014
- September 2014
- August 2014
- July 2014
- June 2014
- May 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- August 2013
- July 2013
- June 2013
- May 2013
- April 2013
- March 2013
- February 2013
- January 2013
- December 2012
- November 2012
- October 2012
- September 2012
- August 2012
- July 2012
- June 2012
- May 2012
- August 2011
- July 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
Categories
- 9/11
- Abraham Lincoln
- Abwehr
- Accountability
- acronyms
- aerial espionage
- Afghanistan
- AFL/CIO
- Africa
- African Americans
- agent provocateur
- Al Qaeda
- Alan Turing
- Albania
- Alger Hiss
- Algeria
- American communists
- American History
- American Radicals
- American Revolution
- American spies
- analysis
- Arab thinking
- Arab World
- Arms control
- Army Security Agency
- assassination
- Atomic Bomb
- Atomic Spies
- Australia
- Austro-Hungary
- Baltic States
- Benjamin Franklin
- Bioterrorism
- Border Security
- Bosnia
- British Intelligence
- British Navy
- British Spies
- business
- C3I
- Cambodia
- Cambridge Spies
- Canada
- Change and response
- chaos
- Chile
- China
- Chinese Intelligence
- CIA
- Civil War
- classified material
- Coata Rica
- Codebreaking
- Cold War
- Communism
- Computer history
- computing
- Congo
- Congressional oversight
- Contras
- counterinsurgency
- Counterintelligence
- Counterterrorism
- Covert Ops
- Crime investigations
- Crisis management
- Crypotography
- cryptography
- Cuba
- Cuban Missile Crisis
- Cybercrime
- Cybersecurity
- Czechoslovakia
- DC
- Deception
- Decision Making
- Defectors
- democracy
- Denmark
- deterrence
- Disasters
- Double Cross
- Drones
- East Berlin
- East Germany
- Economic Intelligence
- Egypt
- Electronic surveillance
- Electronics
- Elizabeth I
- Enigma
- Escape and evasion
- Espionage History
- Espionage literature
- Espionage operations
- Expert judgment
- FBI
- FDR
- Foreign Affiars
- foreign agents
- France
- French revolution
- General and Background
- German Intelligence
- German scientists
- Germany
- Great Britain
- Greece
- Guy Burgess
- Hamas
- History of Espionage
- Homeland Security
- Honey Trap
- HUAC
- India
- Indonesia
- Information operations
- insurgencies
- Insurgency
- Intelligence Agencies
- Intelligence Analysis
- Intelligence and Policy
- Intelligence Reform
- Intelligence Sources
- Intelligence Studies – General
- interrogation
- Iran
- Iraq
- Ireland
- ISIS
- Islam
- Islamic fundamentalism
- Israel
- Israeli Intelligence
- Italian Intelligence
- J. Edgar Hoover
- Japan
- JFK
- Jihad
- KGB
- Kim Philby
- Korea
- Laos
- Latin America
- law enforcement
- Leaks
- Lone Wolf
- Lybia
- Markus Wolf
- McCarthyism
- Mercenaries
- Mexico
- MI5
- MI6
- MI9
- Middle East
- Military attachés
- military ethics
- Military Intelligence
- Misperception
- Mossad
- National Security
- Naval Intelligence
- Nazi Germany
- Netherlands
- Nigel West
- North Korea
- Norway
- NSA
- Nuclear War
- Nuclear weapons
- Oppenheimer
- Orlov
- OSS
- Oversight
- Pakistan
- Palestine
- Philipines
- Philippines
- Photoreconaissance
- Poland
- Police
- Policy Analysis
- Polish Intelligence
- Post Communism
- President Eisenhower
- Proliferation
- Propaganda
- Psychological Warfare
- Red Scare
- Religion
- Remote Sensing
- Revolutionary War
- Richard Nixon
- Robert S. McNamara
- Romania
- Ronald Reagan
- Rules of War
- Russia
- Russian Revolution
- Sacco and Vanzetti
- Scandinavia
- Science and Technology
- Seals
- Secrecy
- Secret Service
- Secret State
- Security
- Sex and Espionage
- SIGINT
- slavery
- Somalia
- South Africa
- Soviet Intelligence
- Soviet Navy
- Soviet Spies
- Soviet Union
- Spain
- Special Ops
- Spy novel
- Spy Planes
- Spycraft
- Spying
- Stalin
- Statistics
- Strategic Bombing
- Strategic intelligence
- Strategy
- Student activism
- Submarine spying
- Subversive Activity
- Surprise
- Surveillance
- Survival
- Sweden
- Switzerland
- Technical Intelligence
- Technology and War
- Terrorism
- Thailand
- Tibet
- Torture
- tradecraft
- transnational war
- Treason
- U. S. Intelligence
- U.S. State Department
- U2
- UK politics
- Ukraine
- Ultra
- UN
- Uncategorized
- US UK special relationship
- Vatican
- VENONA
- Vietnam
- War
- Warfighting
- Warning Intelligence
- Winston Churchill
- WMD
- Women in Science
- Women Spies
- World War II
- WWI
- Yugoslavia
Meta
Monthly Archives: April 2013
The Armies of Ignorance
Title: The Armies of Ignorance Author: William R. Corson Corson, William R. (1977). The Armies of Ignorance. The Rise of The American Intelligence Empire. New York: Dial Pres LCCN: 77088822 JK468.I6 C66 Subjects Intelligence service–United States. Date Updated: April … Continue reading
The War on Terrorism
Title: The War on Terrorism Author: Thomas A. Johnson Johnson, Thomas A. (2009). The War on Terrorism: a Collision of Values, Strategies, and Societies. Boca Raton: CRC Press. LOC: 2008044160 HV6431 .J64 2009 Date Posted: April 29, 2013 The … Continue reading
Alan Turing’s Automatic Computing Engine
Title: Alan Turing’s Automatic Computing Engine Author: B. Jack Copeland Copeland, B. J. (2005), ed. Alan Turing’s Automatic Computing Engine: The Master Codebreaker’s Struggle to Build the Modern Computer. New York: Oxford University Press. LOC: 2005298940 QA75 .C638 2005 … Continue reading
Colossus
Title: Colossus Author: B. Jack Copeland Copeland, B. Jack (2005) and others (Copeland, ed.). Colossus: Breaking the German “Tunny” Code at Bletchley Park. An Illustrated History. New York: Oxford University Press LOC: 2005030993 D810.C88 C66 2006 Date Posted: December … Continue reading
Blond Ghost
Title: Blond Ghost Author: David Corn Corn, David (1994). Blond Ghost: Ted Shackley and the CIA’S Crusades. New York: Simon and Schuster LOC: 94021932 E839.8.S53 C67 1994 Date Posted: April 28, 2013 The following is an extract of a … Continue reading
Flawed Patriot
Title: Flawed Patriot Author: Bayard Stockton Stockton, Bayard (2006). Flawed Patriot: The Rise And Fall of CIA Legend Bill Harvey. Washington, DC: Potomac Books LOC: 2006012651 JK468.I6 S75 2006 Date Posted: April 28, 2013 William K. Harvey was the … Continue reading
American Spy
Title: American Spy Author: E. Howard Hunt Hunt, E. Howard (2007) with Greg Aunapu; foreword by William F. Buckley, Jr. American Spy: My Secret History in The CIA, Watergate, And Beyond. Hoboken, NJ : John Wiley & Sons LOC: … Continue reading