Thwarting Enemies at Home and Abroad How to Be a Counterintelligence Officer

ISBN-10: 1589012550
ISBN-13: 9781589012554
Edition: 2009
List price: $26.95 Buy it from $14.93
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Originally published in 1987, Thwarting Enemies at Home and Abroad is a unique primer that teaches the principles, strategy, and tradecraft of counterintelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies,  More...

Used Starting from $14.93
New Starting from $32.86
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
History of Western Art Online content $4.95 $1.99
Add to cart
Study Briefs
History of World Philosophies Online content $4.95 $1.99
Add to cart
Study Briefs
American History Volume 1 Online content $4.95 $1.99
Add to cart
Study Briefs
History of Western Music Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $26.95
Copyright year: 2009
Publisher: Georgetown University Press
Publication date: 1/10/2009
Binding: Paperback
Pages: 240
Size: 6.50" wide x 8.50" long x 0.75" tall
Weight: 0.638
Language: English

Originally published in 1987, Thwarting Enemies at Home and Abroad is a unique primer that teaches the principles, strategy, and tradecraft of counterintelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations. Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.

After his retirement, Richard Helms lived in Washington, D.C. He died in October 2002. William Hood was born in Maine and entered the military in 1942. After serving in the Armored Force and military intelligence, he volunteered for the Office of Strategic Services; he was at the London headquarters of OSS until 1945, when he joined Allen Dulles in Switzerland. He remained in OSS carryover units until CIA was formed. He served abroad and as chief of station, with responsibilities involving Eastern Europe, the USSR, and Latin America, and was executive officer of the Counterintelligence Staff when he retired from CIA. He has published three novels and a nonfiction book, Mole. He divides his time among New York City, Maine, and East Hampton, New York. From the Hardcover edition.

Publisher's Note
Foreword
Introduction
What Is Couterintelligence?
Who Does into Counterintelligence, and Why?
What Is Peculiar about CI Officers?
CI Traits: Do You Have Them?
Conflicting Goals: Law Enforcement versus Mainpulation
Cops with a CI Job
Spymasters with a CI job
Cops and Spymasters, Mingle and Merge!
The Support Apparatus
The Roof and the Walls
Surveillance Teams
The Bug and Tap Shop
Safe Houses
The Forgery Shop
Vehicles
Photography
Drops: Live, Dead, Phone
Flaps and Seals, Microdot, Secret Ink
Weapons
Looks, Keys and Burglary
Disguises
Interrogation: How It Really Works
The Myth of Torture
The Compleat Interrogator
Pressure
The Schmidt Story
When the Tricks Don't Work
The Breaking Point
How to Manage the Polygraph
What the Polygraph Is
How the Polygraph Works
Why Do You React to the Polygraph?
What Your Reactions Mean
Known Lies and Surprise Question
When the Polygraph Works as a Lie Detector
When the Polygraph Does Not work
Can you Beat the Polygraph?
What the Polygraph Is Used For
How the Polygraph Is Misused
How to Manage Physical Surveillance
Local Conditions
Cover
Compartmentation
Communications
Vehicles
Cameras and Audio Gear
Weapons
The Half-Life of a Surveillance Team
How to Manage Technical Surveillance
Remember the Support Function
Know Your Technicians
Telephone Taps
Hidden Microphones
Photography through the Keyhole
Mail Intercept
Collatin the Information
Double Agents: What They Are Good For
Contact with the Enemy
he Playback Double: The Case of Janos Szmolka
Dangles-Controlled and Freelance
Levels of Contact with the Enemy
Allocation of resources
Double Agents: How to Get and Maintain a stable
Assessing Your Opponents
Collating Leads
Playbacks
Double Agents: Feeding and Care
Emotional Dependence
Physical Dependence
Testing
Termination
Double Agents: Passing, Information to the Enemy
The Doctrine of Layers
Passing the Enemy's Tests
Balancing Cost against Gain
The Bureaucratic Problem
The Build-Up Library
The Use of Collateral
Moles in the Enemy's Garden: Your Best Weapon
Strategic Planning
How to Get Penetrations
Arranging the Furniture
Research and Targeting
Planting the Seed
Motive: Is Ideology Dead?
Who Is in Charge?
Weaknesses
Michal Goleniewski
Training or Indoctrination?
Evacuation
Defectors: Your Second-Best Weapon
Inducement
Echelons of Handling
Be Prepared
Resettlement
Using "Friendly" Services, Foreign and Domestic
The Reasons for Liaison
How Liaison Works in Practice
Cooperation versus Competition
Liaison and Penetration
How to Manage Files
Chronological Files
Indexing by Name
Case Files
Dossiers and P-Files
Dossiers Numbers
Dossiers and Pivacy
The Collation of Counterintelligence
What Is Collation?
Categories for Collation
Using Computers
The Big Game: Deception
The Tools of Deception
The Practical Limits
The Rule of Unwitting Tools
The Secret Body Needs a Bodyguard of Lies
About the Author
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×