Restricted Data

Restricted Data

Author: Alex Wellerstein

Publisher: University of Chicago Press

Published: 2021-04-09

Total Pages: 558

ISBN-13: 022602038X

DOWNLOAD EBOOK

"Nuclear weapons, since their conception, have been the subject of secrecy. In the months after the dropping of the atomic bombs on Hiroshima and Nagasaki, the American scientific establishment, the American government, and the American public all wrestled with what was called the "problem of secrecy," wondering not only whether secrecy was appropriate and effective as a means of controlling this new technology but also whether it was compatible with the country's core values. Out of a messy context of propaganda, confusion, spy scares, and the grave counsel of competing groups of scientists, what historian Alex Wellerstein calls a "new regime of secrecy" was put into place. It was unlike any other previous or since. Nuclear secrets were given their own unique legal designation in American law ("restricted data"), one that operates differently than all other forms of national security classification and exists to this day. Drawing on massive amounts of declassified files, including records released by the government for the first time at the author's request, Restricted Data is a narrative account of nuclear secrecy and the tensions and uncertainty that built as the Cold War continued. In the US, both science and democracy are pitted against nuclear secrecy, and this makes its history uniquely compelling and timely"--


Pax Transatlantica

Pax Transatlantica

Author: Jussi M. Hanhimäki

Publisher: Oxford University Press

Published: 2021

Total Pages: 209

ISBN-13: 0190922168

DOWNLOAD EBOOK

"Pax Transatlantica asserts that the recurrent transatlantic crises that have dominated headlines since the end of the Cold War, while not irrelevant, pale when set against the realities of shared interests and goals. It emphasizes three key factors. First, despite inflammatory and dismissive rhetoric, NATO continues to provide a solid security structure for its member states; an institutional framework of a Pax Transatlantica that has stood the test of time by expanding its remit and scope. Second, in a world concerned with the potential effects of trade wars (especially between the US and China) and the rise of economic nationalism, the transatlantic economic relationship stands apart as the richest, most closely integrated transcontinental economic space on the globe. Third, the book will trace the parallel evolution of domestic politics on both sides of the Atlantic with specific focus on the rise of populism. Rather than a sign of transatlantic 'drift,' the rise of populism - much like the emergence of so-called 'Third Way politics on both sides of the Atlantic in the 1990s - is evidence of a closely integrated transatlantic political space. In the end, while it is obvious that the history of the transatlantic relationship - even during the Cold War - was littered with crises, the relationship has endured. Conflicts have illustrated, time and again, the strength of the transatlantic community. The 'West', the book concludes, not only continues to exist. It is likely to thrive in the future"


Covert Regime Change

Covert Regime Change

Author: Lindsey A. O'Rourke

Publisher: Cornell University Press

Published: 2018-12-15

Total Pages: 329

ISBN-13: 1501730681

DOWNLOAD EBOOK

O'Rourke's book offers a onestop shop for understanding foreignimposed regime change. Covert Regime Change is an impressive book and required reading for anyone interested in understanding hidden power in world politics.― Political Science Quarterly States seldom resort to war to overthrow their adversaries. They are more likely to attempt to covertly change the opposing regime, by assassinating a foreign leader, sponsoring a coup d'état, meddling in a democratic election, or secretly aiding foreign dissident groups. In Covert Regime Change, Lindsey A. O'Rourke shows us how states really act when trying to overthrow another state. She argues that conventional focus on overt cases misses the basic causes of regime change. O'Rourke provides substantive evidence of types of security interests that drive states to intervene. Offensive operations aim to overthrow a current military rival or break up a rival alliance. Preventive operations seek to stop a state from taking certain actions, such as joining a rival alliance, that may make them a future security threat. Hegemonic operations try to maintain a hierarchical relationship between the intervening state and the target government. Despite the prevalence of covert attempts at regime change, most operations fail to remain covert and spark blowback in unanticipated ways. Covert Regime Change assembles an original dataset of all American regime change operations during the Cold War. This fund of information shows the United States was ten times more likely to try covert rather than overt regime change during the Cold War. Her dataset allows O'Rourke to address three foundational questions: What motivates states to attempt foreign regime change? Why do states prefer to conduct these operations covertly rather than overtly? How successful are such missions in achieving their foreign policy goals?


The Moscow Rules

The Moscow Rules

Author: Antonio J. Mendez

Publisher: PublicAffairs

Published: 2019-05-21

Total Pages: 272

ISBN-13: 1541762177

DOWNLOAD EBOOK

From the spymaster and inspiration for the movie Argo, discover the "real-life spy thriller" of the brilliant but under-supported CIA operatives who developed breakthrough spy tactics that helped turn the tide of the Cold War (Malcolm Nance). Antonio Mendez and his future wife Jonna were CIA operatives working to spy on Moscow in the late 1970s, at one of the most dangerous moments in the Cold War. Soviets kept files on all foreigners, studied their patterns, and tapped their phones. Intelligence work was effectively impossible. The Soviet threat loomed larger than ever. The Moscow Rules tells the story of the intelligence breakthroughs that turned the odds in America's favor. As experts in disguise, Antonio and Jonna were instrumental in developing a series of tactics -- Hollywood-inspired identity swaps, ingenious evasion techniques, and an armory of James Bond-style gadgets -- that allowed CIA officers to outmaneuver the KGB. As Russia again rises in opposition to America, this remarkable story is a tribute to those who risked everything for their country, and to the ingenuity that allowed them to succeed.


The Torment of Secrecy

The Torment of Secrecy

Author: Edward Shils

Publisher: Ivan R. Dee

Published: 1996-02-01

Total Pages: 264

ISBN-13: 1461720605

DOWNLOAD EBOOK

Edward Shils's The Torment of Secrecy is one of the few minor classics to emerge from the cold war years of anticommunism and McCarthyism in the United States. Mr. Shils's "torment" is not only that of the individual caught up in loyalty and security procedures; it is also the torment of the accuser and judge. This essay in sociological analysis and political philosophy considers the cold war preoccupation with espionage, sabotage, and subversion at home, assessing the magnitude of such threats and contrasting it to the agitation—by lawmakers, investigators, and administrators—so wildly directed against the "enemy." Mr. Shils's examination of a recurring American characteristic is as timely as ever. "Brief...lucid... brilliant."—American Political Science Review. "A fine, sophisticated analysis of American social metabolism."—New Republic. "An excitingly lucid and intelligent work on a subject of staggering importance...the social preconditions of political democracy."—Social Forces.


Ghost Wars

Ghost Wars

Author: Steve Coll

Publisher: Penguin UK

Published: 2005-03-03

Total Pages: 736

ISBN-13: 0141935790

DOWNLOAD EBOOK

The news-breaking book that has sent schockwaves through the White House, Ghost Wars is the most accurate and revealing account yet of the CIA's secret involvement in al-Qaeada's evolution. Prize-winning journalist Steve Coll has spent years reporting from the Middle East, accessed previously classified government files and interviewed senior US officials and foreign spymasters. Here he gives the full inside story of the CIA's covert funding of an Islamic jihad against Soviet forces in Afghanistan, explores how this sowed the seeds of bn Laden's rise, traces how he built his global network and brings to life the dramatic battles within the US government over national security. Above all, he lays bare American intelligence's continual failure to grasp the rising threat of terrrorism in the years leading to 9/11 - and its devastating consequences.


Victory

Victory

Author: Peter Schweizer

Publisher:

Published: 1994

Total Pages: 308

ISBN-13: 9780871136336

DOWNLOAD EBOOK

Describes the Reagan administration's covert campaign against the Soviet Union that increased stress on the Soviet economy.


Post-Cold War Conflict Deterrence

Post-Cold War Conflict Deterrence

Author: Naval Studies Board

Publisher: National Academies Press

Published: 1997-04-16

Total Pages: 244

ISBN-13: 0309553237

DOWNLOAD EBOOK

Deterrence as a strategic concept evolved during the Cold War. During that period, deterrence strategy was aimed mainly at preventing aggression against the United States and its close allies by the hostile Communist power centers--the Union of Soviet Socialist Republics (USSR) and its allies, Communist China and North Korea. In particular, the strategy was devised to prevent aggression involving nuclear attack by the USSR or China. Since the end of the Cold War, the risk of war among the major powers has subsided to the lowest point in modern history. Still, the changing nature of the threats to American and allied security interests has stimulated a considerable broadening of the deterrence concept. Post-Cold War Conflict Deterrence examines the meaning of deterrence in this new environment and identifies key elements of a post-Cold War deterrence strategy and the critical issues in devising such a strategy. It further examines the significance of these findings for the U.S. Navy and Marine Corps. Quantitative and qualitative measures to support judgments about the potential success or failure of deterrence are identified. Such measures will bear on the suitability of the naval forces to meet the deterrence objectives. The capabilities of U.S. naval forces that especially bear on the deterrence objectives also are examined. Finally, the book examines the utility of models, games, and simulations as decision aids in improving the naval forces' understanding of situations in which deterrence must be used and in improving the potential success of deterrence actions.