Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
Looking to rent a book? Rent Thwarting Enemies at Home and Abroad [ISBN: 9781589012554] for the semester, quarter, and short term or search our site for other textbooks by Johnson, William R.. Renting a textbook can save you up to 90% from the cost of buying.
Publisher's Note | p. ix |
Foreword | p. x |
Introduction | p. xiii |
What Is Couterintelligence? | p. 1 |
Who Does into Counterintelligence, and Why? | p. 4 |
What Is Peculiar about CI Officers? | p. 5 |
CI Traits: Do You Have Them? | p. 7 |
Conflicting Goals: Law Enforcement versus Mainpulation | p. 13 |
Cops with a CI Job | p. 14 |
Spymasters with a CI job | p. 15 |
Cops and Spymasters, Mingle and Merge! | p. 16 |
The Support Apparatus | p. 20 |
The Roof and the Walls | p. 20 |
Surveillance Teams | p. 21 |
The Bug and Tap Shop | p. 21 |
Safe Houses | p. 22 |
The Forgery Shop | p. 23 |
Vehicles | p. 24 |
Photography | p. 25 |
Drops: Live, Dead, Phone | p. 27 |
Flaps and Seals, Microdot, Secret Ink | p. 30 |
Weapons | p. 30 |
Looks, Keys and Burglary | p. 32 |
Disguises | p. 33 |
Interrogation: How It Really Works | p. 34 |
The Myth of Torture | p. 34 |
The Compleat Interrogator | p. 35 |
Pressure | p. 36 |
The Schmidt Story | p. 39 |
When the Tricks Don't Work | p. 42 |
The Breaking Point | p. 45 |
How to Manage the Polygraph | p. 46 |
What the Polygraph Is | p. 47 |
How the Polygraph Works | p. 48 |
Why Do You React to the Polygraph? | p. 50 |
What Your Reactions Mean | p. 51 |
Known Lies and Surprise Question | p. 55 |
When the Polygraph Works as a Lie Detector | p. 57 |
When the Polygraph Does Not work | p. 58 |
Can you Beat the Polygraph? | p. 59 |
What the Polygraph Is Used For | p. 60 |
How the Polygraph Is Misused | p. 64 |
How to Manage Physical Surveillance | p. 66 |
Local Conditions | p. 66 |
Cover | p. 69 |
Compartmentation | p. 70 |
Communications | p. 71 |
Vehicles | p. 76 |
Cameras and Audio Gear | p. 77 |
Weapons | p. 78 |
The Half-Life of a Surveillance Team | p. 78 |
How to Manage Technical Surveillance | p. 81 |
Remember the Support Function | p. 83 |
Know Your Technicians | p. 83 |
Telephone Taps | p. 84 |
Hidden Microphones | p. 86 |
Photography through the Keyhole | p. 88 |
Mail Intercept | p. 89 |
Collatin the Information | p. 89 |
Double Agents: What They Are Good For | p. 91 |
Contact with the Enemy | p. 92 |
he Playback Double: The Case of Janos Szmolka | p. 93 |
Dangles-Controlled and Freelance | p. 98 |
Levels of Contact with the Enemy | p. 99 |
Allocation of resources | p. 101 |
Double Agents: How to Get and Maintain a stable | p. 102 |
Assessing Your Opponents | p. 103 |
Collating Leads | p. 108 |
Playbacks | p. 109 |
Double Agents: Feeding and Care | p. 115 |
Emotional Dependence | p. 115 |
Physical Dependence | p. 117 |
Testing | p. 120 |
Termination | |
Double Agents: Passing, Information to the Enemy | p. 126 |
The Doctrine of Layers | p. 127 |
Passing the Enemy's Tests | p. 128 |
Balancing Cost against Gain | p. 128 |
The Bureaucratic Problem | p. 130 |
The Build-Up Library | p. 131 |
The Use of Collateral | p. 133 |
Moles in the Enemy's Garden: Your Best Weapon | p. 135 |
Strategic Planning | p. 136 |
How to Get Penetrations | p. 139 |
Arranging the Furniture | p. 141 |
Research and Targeting | p. 143 |
Planting the Seed | p. 144 |
Motive: Is Ideology Dead? | p. 145 |
Who Is in Charge? | p. 148 |
Weaknesses | p. 149 |
Michal Goleniewski | p. 150 |
Training or Indoctrination? | p. 151 |
Evacuation | p. 152 |
Defectors: Your Second-Best Weapon | p. 154 |
Inducement | p. 156 |
Echelons of Handling | p. 156 |
Be Prepared | p. 159 |
Resettlement | p. 162 |
Using "Friendly" Services, Foreign and Domestic | p. 165 |
The Reasons for Liaison | p. 166 |
How Liaison Works in Practice | p. 168 |
Cooperation versus Competition | p. 171 |
Liaison and Penetration | p. 172 |
How to Manage Files | p. 175 |
Chronological Files | p. 175 |
Indexing by Name | p. 177 |
Case Files | p. 179 |
Dossiers and P-Files | p. 180 |
Dossiers Numbers | p. 182 |
Dossiers and Pivacy | p. 183 |
The Collation of Counterintelligence | p. 185 |
What Is Collation? | p. 186 |
Categories for Collation | p. 187 |
Using Computers | p. 193 |
The Big Game: Deception | p. 196 |
The Tools of Deception | p. 198 |
The Practical Limits | p. 204 |
The Rule of Unwitting Tools | p. 207 |
The Secret Body Needs a Bodyguard of Lies | p. 208 |
About the Author | p. 209 |
Index | p. 211 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.