Covert Action in the Cold War

Covert Action in the Cold War PDF Author: James Callanan
Publisher: Bloomsbury Publishing
ISBN: 1350170836
Category : History
Languages : en
Pages : 287

Get Book Here

Book Description
Born out of the ashes of World War II, the covert action arm of the Central Intelligence Agency (CIA) was created to counter the challenge posed by the Soviet Union and its allies and bolster American interests worldwide. It evolved rapidly into an eclectic, well-resourced organization whose activities provided a substitute for overt military action and afforded essential backup when the Cold War turned hot in Korea and Vietnam. This comprehensive examination of a still controversial subject sheds valuable new light on the undercover operations mounted by the CIA during the Cold War. Using a wide range of unpublished government records and documents, James Callanan traces the growth of the agency chronologically as it forged a covert action mission that sought to advance US foreign and defense policy in all corners of the globe. Offering a powerful perspective on a pivotal period in American history, "Covert Action in the Cold War" makes a crucial contribution to our understanding of global politics during the Cold War.

Covert Action in the Cold War

Covert Action in the Cold War PDF Author: James Callanan
Publisher: Bloomsbury Publishing
ISBN: 1350170836
Category : History
Languages : en
Pages : 287

Get Book Here

Book Description
Born out of the ashes of World War II, the covert action arm of the Central Intelligence Agency (CIA) was created to counter the challenge posed by the Soviet Union and its allies and bolster American interests worldwide. It evolved rapidly into an eclectic, well-resourced organization whose activities provided a substitute for overt military action and afforded essential backup when the Cold War turned hot in Korea and Vietnam. This comprehensive examination of a still controversial subject sheds valuable new light on the undercover operations mounted by the CIA during the Cold War. Using a wide range of unpublished government records and documents, James Callanan traces the growth of the agency chronologically as it forged a covert action mission that sought to advance US foreign and defense policy in all corners of the globe. Offering a powerful perspective on a pivotal period in American history, "Covert Action in the Cold War" makes a crucial contribution to our understanding of global politics during the Cold War.

A Covert Action: Reagan, the CIA, and the Cold War Struggle in Poland

A Covert Action: Reagan, the CIA, and the Cold War Struggle in Poland PDF Author: Seth G. Jones
Publisher: W. W. Norton & Company
ISBN: 0393247015
Category : History
Languages : en
Pages : 372

Get Book Here

Book Description
“A tale of victory for peace, for freedom, and for the CIA— a trifecta rare enough to make for required reading.” —Steve Donoghue, Spectator USA In 1981, the Soviet-backed Polish government declared martial law to crush a budding democratic opposition movement. Moscow and Washington were on a collision course. It was the most significant crisis of Ronald Reagan’s fledgling presidency. Reagan authorized a covert CIA operation codenamed QRHELPFUL to support dissident groups, particularly the trade union Solidarity. The CIA provided money that helped Solidarity print newspapers, broadcast radio programs, and conduct an information campaign against the government. This gripping narrative reveals the little-known history of one of America’s most successful covert operations through its most important characters—spymaster Bill Casey, CIA officer Richard Malzahn, Solidarity leader Lech Walesa, Pope John Paul II, and the Polish patriots who were instrumental to the success of the program. Based on in- depth interviews and recently declassified evidence, A Covert Action celebrates a decisive victory over tyranny for US intelligence behind the Iron Curtain, one that prefigured the Soviet collapse.

US Covert Operations and Cold War Strategy

US Covert Operations and Cold War Strategy PDF Author: Sarah-Jane Corke
Publisher: Routledge
ISBN: 113410412X
Category : History
Languages : en
Pages : 286

Get Book Here

Book Description
Based on recently declassified documents, this book provides the first examination of the Truman Administration’s decision to employ covert operations in the Cold War. Although covert operations were an integral part of America’s arsenal during the late 1940s and early 1950s, the majority of these operations were ill conceived, unrealistic and ultimately doomed to failure. In this volume, the author looks at three central questions: Why were these types of operations adopted? Why were they conducted in such a haphazard manner? And, why, once it became clear that they were not working, did the administration fail to abandon them? The book argues that the Truman Administration was unable to reconcile policy, strategy and operations successfully, and to agree on a consistent course of action for waging the Cold War. This ensured that they wasted time and effort, money and manpower on covert operations designed to challenge Soviet hegemony, which had little or no real chance of success. US Covert Operations and Cold War Strategy will be of great interest to students of US foreign policy, Cold War history, intelligence and international history in general.

Covert Regime Change

Covert Regime Change PDF Author: Lindsey A. O'Rourke
Publisher: Cornell University Press
ISBN: 1501730681
Category : History
Languages : en
Pages : 329

Get Book Here

Book Description
O'Rourke's book offers a onestop shop for understanding foreignimposed regime change. Covert Regime Change is an impressive book and required reading for anyone interested in understanding hidden power in world politics.― Political Science Quarterly States seldom resort to war to overthrow their adversaries. They are more likely to attempt to covertly change the opposing regime, by assassinating a foreign leader, sponsoring a coup d'état, meddling in a democratic election, or secretly aiding foreign dissident groups. In Covert Regime Change, Lindsey A. O'Rourke shows us how states really act when trying to overthrow another state. She argues that conventional focus on overt cases misses the basic causes of regime change. O'Rourke provides substantive evidence of types of security interests that drive states to intervene. Offensive operations aim to overthrow a current military rival or break up a rival alliance. Preventive operations seek to stop a state from taking certain actions, such as joining a rival alliance, that may make them a future security threat. Hegemonic operations try to maintain a hierarchical relationship between the intervening state and the target government. Despite the prevalence of covert attempts at regime change, most operations fail to remain covert and spark blowback in unanticipated ways. Covert Regime Change assembles an original dataset of all American regime change operations during the Cold War. This fund of information shows the United States was ten times more likely to try covert rather than overt regime change during the Cold War. Her dataset allows O'Rourke to address three foundational questions: What motivates states to attempt foreign regime change? Why do states prefer to conduct these operations covertly rather than overtly? How successful are such missions in achieving their foreign policy goals?

Regulating Covert Action

Regulating Covert Action PDF Author: William Michael Reisman
Publisher: Yale University Press
ISBN: 9780300050592
Category : Law
Languages : en
Pages : 264

Get Book Here

Book Description
Covert activity has always been a significant element of international politics. This book attempts to assess the lawfulness of covert action under US and international law and faces the implications for democratic states that covert operations pose.

In the Shadow of International Law

In the Shadow of International Law PDF Author: Michael Poznansky
Publisher: Oxford University Press
ISBN: 0190096616
Category : Political Science
Languages : en
Pages : 288

Get Book Here

Book Description
Secrecy is a staple of world politics and a pervasive feature of political life. Leaders keep secrets as they conduct sensitive diplomatic missions, convince reluctant publics to throw their support behind costly wars, and collect sensitive intelligence about sworn enemies. In the Shadow of International Law explores one of the most controversial forms of secret statecraft: the use of covert action to change or overthrow foreign regimes. Drawing from a broad range of cases of US-backed regime change during the Cold War, Michael Poznansky develops a legal theory of covert action to explain why leaders sometimes turn to covert action when conducting regime change, rather than using force to accomplish the same objective. He highlights the surprising role international law plays in these decisions and finds that once the nonintervention principle-which proscribes unwanted violations of another state's sovereignty-was codified in international law in the mid-twentieth century, states became more reluctant to pursue overt regime change without proper cause. Further, absent a legal exemption to nonintervention such as a credible self-defense claim or authorization from an international body, states were more likely to pursue regime change covertly and concealing brazen violations of international law. Shining a light on the secret underpinnings of the liberal international order, the conduct of foreign-imposed regime change, and the impact of international law on state behavior, Poznansky speaks to the potential consequences of America abandoning its role as the steward of the postwar order, as well as the promise and peril of promoting new rules and norms in cyberspace.

Secret and Sanctioned

Secret and Sanctioned PDF Author: Stephen F. Knott
Publisher: Oxford University Press, USA
ISBN: 0195100980
Category : History
Languages : en
Pages : 274

Get Book Here

Book Description
This eye-opening account reveals that covert intelligence operations in the U.S. date much farther back than most people realize--back to the Founding Fathers. Detailing clandestine, unscrupulous operations that took place under such presidents as Washington, Jefferson, Polk, and Lincoln, Knott reveals that presidents have rarely consulted Congress before engaging in such operations.

A Companion to Dwight D. Eisenhower

A Companion to Dwight D. Eisenhower PDF Author: Chester J. Pach
Publisher: John Wiley & Sons
ISBN: 1119027675
Category : History
Languages : en
Pages : 755

Get Book Here

Book Description
A Companion to Dwight D. Eisenhower brings new depth to the historiography of this significant and complex figure, providing a comprehensive and up-to-date depiction of both the man and era. Thoughtfully incorporates new and significant literature on Dwight D. Eisenhower Thoroughly examines both the Eisenhower era and the man himself, broadening the historical scope by which Eisenhower is understood and interpreted Presents a complete picture of Eisenhower’s many roles in historical context: the individual, general, president, politician, and citizen This Companion is the ideal starting point for anyone researching America during the Eisenhower years and an invaluable guide for graduate students and advanced undergraduates in history, political science, and policy studies Meticulously edited by a leading authority on the Eisenhower presidency with chapters by international experts on political, international, social, and cultural history

The CIA and Third Force Movements in China during the Early Cold War

The CIA and Third Force Movements in China during the Early Cold War PDF Author: Roger B. Jeans
Publisher: Lexington Books
ISBN: 1498570062
Category : History
Languages : en
Pages : 343

Get Book Here

Book Description
When the Chinese Communists defeated the Chinese Nationalists and occupied the mainland in 1949–1950, U.S. policymakers were confronted with a dilemma. Disgusted by the corruption and, more importantly, failure of Chiang Kai-shek’s Nationalist armies and party and repelled by the Communists’ revolutionary actions and violent class warfare, in the early 1950s the U.S. government placed its hopes in a Chinese “third force.” While the U.S. State Department reported on third forces, the CIA launched a two-prong effort to actively support these groups with money, advisors, and arms. In Japan, Okinawa, and Saipan, the agency trained third force troops at CIA bases. The Chinese commander of these soldiers was former high-ranking Nationalist General Cai Wenzhi. He and his colleagues organized a political group, the Free China Movement. His troops received parachute training as well as other types of combat and intelligence instruction at agency bases. Subsequently, several missions were dispatched to Manchuria—the Korean War was raging then—and South China. All were failures and the Chinese third force agents were killed or imprisoned. With the end of the Korean War, the Americans terminated this armed third force movement, with the Nationalists on Taiwan taking in some of its soldiers while others moved to Hong Kong. The Americans flew Cai to Washington, where he took a job with the Department of Defense. The second prong of the CIA’s effort was in Hong Kong. The agency financially supported and advised the creation of a third force organization called the Fighting League for Chinese Freedom and Democracy. It also funded several third force periodicals. Created in 1951 and 1952, in 1953 and 1954 the CIA ended its financial support. As a consequence of this as well as factionalism within the group, in 1954 the League collapsed and its leaders scattered to the four winds. At the end, even the term “third force” was discredited and replaced by “new force.” Finally, in the early 1950s, the CIA backed as a third force candidate a Vietnamese general. With his assassination in May 1955, however, that effort also came to naught.

Foreign Relations of the United States, 1945-1950

Foreign Relations of the United States, 1945-1950 PDF Author: United States. Department of State
Publisher:
ISBN:
Category : Intelligence service
Languages : en
Pages : 1184

Get Book Here

Book Description