Soviet Active Measures and U.S. Covert Action programs
The focus of this essay is to explore, compare and contrast the U.S. Covert Action programs with the Soviet Active Measures of the same time period. The United States uses the Covert Action prog Continue Reading...
To ensure Allende never came to power, before resorting to "jackals," the United States, through the CIA, spend three million dollars campaigning against him, mostly through radio and print social marketing. Allende had a warm relationship with Cuba Continue Reading...
On the other hand, Whittaker Chambers was "a contributing editor of Time (...) from 1925 to April 1938, (he) had been a Communist, a writer of radical literature, an editor of the Communist Daily Worker. He had also been what was then vaguely known Continue Reading...
Those officials who did look at the question of Japanese intentions decided that Japan would never attack, because to do so would be irrational. Yet what might seem irrational to one country may seem perfectly logical to another country that has dif Continue Reading...
Espionage
Burds, Chapter 19
Golden Age of Soviet "Illegals"
Cambridge Five: Burgess, Blunt, Maclean, Philby and Cairncross
These five were all discovered to be spying for the Soviets.
Cairncross was never caught. He supplied Stalin with secrets Continue Reading...
nytimes.com/2006/05/02/books/02bett.html [26 Apr 2013]]
The main criticism levied against Kinzer's work is the question: where was the American public during these escapades? After all, if America is a democracy, do they not have responsibility for Continue Reading...
The historical experiences of Cuba, Chile, Turkey, and even the Iran Contra affair fueled the discussions over a tighter control exercised over the Agency's structure and strategies. However, the Cold War demanded for secret operations especially ta Continue Reading...
Cuban Missile Crisis
There are two views, as with any conflict or issue, on the reasons and reactions of the major players in the Cuban Missile Crisis that took place at the end of October 1962. The crisis pitted two world powers, the United States Continue Reading...
American History
Role of the United States in Europe After WWII
This essay attempts to present the role of the United States of America in the reconstruction of post World War II Europe. This report also attempts to provide information regarding th Continue Reading...
Iran-Contra Affair
Historical Background of the Iran-Contra Affair
Events Surrounding the Decision.
Nicaraguan context. In the 1970s, dissatisfaction with a manipulative and corrupt government was escalating. All socio-economic classes were impact Continue Reading...
Al-Qaeda
Developing a Coherent Strategy for a Long War with Al-Qaeda
The phrase 'War on Terror' would have been a very uncommon phenomena if it was discussed somewhere near the 1970s. Till then, wars had only been fought amongst nations for the rac Continue Reading...
Fundamentally, the insurgents are fighting an enemy with superior weaponry, technology, and resources, so therefore, must seek avenues to mitigate these disadvantages. In other words, insurgent forces out vastly outdone in the traditional aspects of Continue Reading...
aid President George W. Bush in policy formulation. It is an all-inclusive paper dealing with a wide range of issues such as the American economy in general- discussing issues such as budget deficits, tax cuts, medical assistance and benefits for re Continue Reading...
HOW EARLY EFFORTSAT DEVELOPINGA COUNTERINTELLIGENCEPROGRAMINTHE 1950s AND 1960s INFLUENCED CURRENT USCOUNTERINTELLIGENCE POLICIESA Master ThesisSubmitted to the FacultyofAmerican Public University SystembyAlexgardo OrriolaIn Partial Fulfillment of th Continue Reading...
CI FinalAbstractThis thesis describes the need for an ethical standard in counterintelligence (CI) so as to facilitate collaboration among the various CI agencies and the private sector. It conducts an analysis of the formation of the counterintellig Continue Reading...
According to Stefanie Olson (2001), the Act provides government with increased electronic surveillance, search and data gathering power. Under the guise of tracking down "potential" terrorists, the expansion of Internet eavesdropping technology prov Continue Reading...