JCU Logo

JOHN CABOT UNIVERSITY

COURSE CODE: "PL 290"
COURSE NAME: "Moles, Spies and Terrorists"
SEMESTER & YEAR: Fall 2014
SYLLABUS

INSTRUCTOR: Lawrence Gray
EMAIL: [email protected]
HOURS: TTH 6:00 PM 7:15 PM
TOTAL NO. OF CONTACT HOURS: 45
CREDITS: 3
PREREQUISITES:
OFFICE HOURS:

COURSE DESCRIPTION:

This course will examine the history, policy use, and likely future of espionage as practiced by  the United States government during recent and contemporary periods.  Extensive use of case studies will be made.  The time frame covered by the course will be from the immediate pre-World War II years up through the present. 

 

Espionage was once defined as “the collection of secret information from foreign countries by illegal means”.  The author of this definition was Kim Philby, who presumably knew something about the subject since he was a senior British intelligence official who defected to the Soviet Union in the 1950s.  The statement seems to be a useful one.

 

The information must be “secret” or protected from disclosure in the normal course of events.  Intelligence must have some strategic significance and should require “action” by policy makers. The information must come from foreign countries.  However, the course will briefly deal with domestic snooping as the Patriot Act, the mandates of the Department of Homeland Security (DHS), and the recent scandals of espionage against American citizens by the National Security Agency (NSA),  brings to our attention the collection of information on alleged terrorist threats within the United States. For the most part however the focus will be on the more traditional collection and use of intelligence information from foreign sources.  Finally, the information must be acquired by “illegal means”.  The owner or creator of the information does not want to give it up.  It has to be stolen.

 

The course will examine the modern use of “human source intelligence” or HUMINT, in the bafflegab of spy bureaucracies as well as “signals intelligence” or SIGINT.  HUMINT is information obtained from human agents, or spies, usually under an arrangement in which the agents participate wittingly or willingly.  SIGINT is the world of codebreaking and technical sourcing.  Historically, the crowning achievements of SIGINT were the decryption of the German Enigma code machines in 1939 and the cracking of the Japanese naval codes prior to the decisive naval battles of Midway in 1942.

 

Attention will be given to case studies of covert action (CA) which largely involves human agents  and is more action-oriented as opposed to information-oriented.  CA may be as simple as disseminating unattributable information or “black propaganda” or as big as coup plotting, assassination planning, sabotage, or waging guerrilla warfare or counter-insurgency campaigns.  The principal feature of CA is that the hand of the perpetrator is intended not to be shown.  Indeed, US intelligence invented the seemingly benign term “plausible deniability”.

 

The course will examine the qualities and “tradecraft techniques” needed and used to bring about success in classic espionage operations.  Such operations are often at war with the boldness and manipulative techniques needed for a successful covert action operation.  By definition, spy operations designed to collect intelligence information are carried out clandestinely and often over a long period of time.  Their very success depends upon maintaining secrecy.  For example, Iraq is never to know if the Central Intelligence Agency (CIA) ever penetrated Saddam’s inner circle.  By contrast, covert action is intended to produce a visible outcome.  Only its true sponsorship is intended to remain a secret.

 

The collection of information from foreign countries by illegal means presupposes that nations that do not wish to have their secrets stolen will combat the theft—by counterintelligence (CI).  The course will identify and discuss the use of “counterintelligence”, those efforts made to protect one’s own secrets and the measures taken to penetrate a rival intelligence service to learn its secrets.

 

In the early part of the course attention will be given to the role of the spy, often the protagonist of intelligence adventures and misadventures.  The spy is the one on the ground who does the dirty work and assumes the greatest risks.  From the example of the talented Soviet spy Richard Sorge to the wily American traitor Aldrich Ames the business of spying is about the adventures of the spy.  The course will also cover organizations like the CIA created to run or catch spies.  Here the focus will be on the case officers or spy runners who manage or pursue spies.

 

The course will also examine the policy process underscoring the important relationship between the input of intelligence to the design and focus of foreign policy.  Here the focus will begin on the Cold War, a time when intelligence was a central element; never before was intelligence so extensive, institutionalized and prized in peacetime.  After the fall of the Berlin Wall espionage was expected to fall back into a more modest category, as part of what was widely expected to be a “peace dividend”. But it became increasingly clear in the course of the 1990s that intelligence was a major element in the new, turbulent, globalized world of diverse and swiftly changing threats, challenges and responses.

 

Finally, some attention will be given to how the advent of international terrorism and the events of September 11, 2001 have permanently affected intelligence.  While there have been many post-mortems on the “failure of intelligence” prior to and after 9/11 the likely result will be that espionage will continue to inherit an enhanced status.  If international terrorism was already a priority target during the Cold War, the events of 9/11 insured that it would transcend all other targets in subsequent years.

SUMMARY OF COURSE CONTENT:
  1. Mid-term examination.
  2. One research paper  of 10 pages due on the last day of class before the final exam.  The subject of the paper will be the following:  “In the post World War II years has the US intelligence community failed in its responsibility to warn against surprise attack?”  Sources for the paper will be the readings available in the library.
  3. A film review essay of 3 pages covering a film from the attached list that is due on the last day of class before the final exam.      
  4. A book review essay of 3 pages due on the last day of class before the final exam. Students must select a book from those included on the Book Review list.
  5. At least one tutorial will be held with each student during the term to discuss progress in reading and writing assignments.
  6. Final Exam. 
LEARNING OUTCOMES:
The methodology is to isolate the prominent elements of espionage operations, beginning where any consideration of the subject ought to start—the recruitment of spies—and observe how the subject is treated in the literature.  Several celebrated studies of actual cases will be discussed and analyzed. Student-directed discussions of class themes will be organized on a bi-weekly basis. On occasion the class will view together classic espionage films.
TEXTBOOK:
Book TitleAuthorPublisherISBN numberLibrary Call NumberCommentsFormatLocal BookstoreOnline Purchase
PLEASE REFER TO THE COURSE SCHEDULE...     
REQUIRED RESERVED READING:
Book TitleAuthorPublisherISBN numberLibrary Call NumberComments
PLEASE REFER TO THE COURSE SCHEDULE...  

RECOMMENDED RESERVED READING:
Book TitleAuthorPublisherISBN numberLibrary Call NumberComments
PLEASE REFER TO THE COURSE SCHEDULE...  
GRADING POLICY
-ASSESSMENT METHODS:
AssignmentGuidelinesWeight
Mid-term 20%
Research Paper  20%
End Quiz 30%
Book review 10%
Film review  10%
Class discussion  10%

-ASSESSMENT CRITERIA:
AWork of this quality directly addresses the question or problem raised and provides a coherent argument displaying an extensive knowledge of relevant information or content. This type of work demonstrates the ability to critically evaluate concepts and theory and has an element of novelty and originality. There is clear evidence of a significant amount of reading beyond that required for the course.
BThis is highly competent level of performance and directly addresses the question or problem raised.There is a demonstration of some ability to critically evaluatetheory and concepts and relate them to practice. Discussions reflect the student’s own arguments and are not simply a repetition of standard lecture andreference material. The work does not suffer from any major errors or omissions and provides evidence of reading beyond the required assignments.
CThis is an acceptable level of performance and provides answers that are clear but limited, reflecting the information offered in the lectures and reference readings.
DThis level of performances demonstrates that the student lacks a coherent grasp of the material.Important information is omitted and irrelevant points included.In effect, the student has barely done enough to persuade the instructor that s/he should not fail.
FThis work fails to show any knowledge or understanding of the issues raised in the question. Most of the material in the answer is irrelevant.

-ATTENDANCE REQUIREMENTS:
Please refer to the University policies.    
ACADEMIC HONESTY
As stated in the university catalog, any student who commits an act of academic dishonesty will receive a failing grade on the work in which the dishonesty occurred. In addition, acts of academic dishonesty, irrespective of the weight of the assignment, may result in the student receiving a failing grade in the course. Instances of academic dishonesty will be reported to the Dean of Academic Affairs. A student who is reported twice for academic dishonesty is subject to summary dismissal from the University. In such a case, the Academic Council will then make a recommendation to the President, who will make the final decision.
STUDENTS WITH LEARNING OR OTHER DISABILITIES
John Cabot University does not discriminate on the basis of disability or handicap. Students with approved accommodations must inform their professors at the beginning of the term. Please see the website for the complete policy.

SCHEDULE

A breakdown of the subject by theme corresponding to the number of class sessions we will have during the summer term will include the following:

 Lessons 1 and 2 and 3:  Introduction:  A shady profession? Intelligence studies and international relations. The origin and evolution of American intelligence.  (REQUIRED READING:   Chapter 1:  “What Is ‘Intelligence’?, pp. 1 – 10 and Chapter 2: “The Development of US Intelligence” in Mark M. Lowenthal, Intelligence. From Secrets to Policy;  Chapter 1:  “As Subtle and Deep as Hell Itself:  Nathan Hale and the Spying Game”, pp. 1 – 35 in Alexander Rose, Washington’s Spies;  Part One “New Requirements”, pp. 3 – 63 in Jennifer E. Sims and Burton Gerber, eds.,  Transforming US Intelligence;  Chapter 1 “Espionage in the 1930s” in Katherine A.S. Sibley, Red Spies in America.   ADDITIONAL  READING:    “Foreward” and Chaper 1: “The State Department Code Room”, pp.l – 36 in Herbert O. Yardley, The American Black Chamber; Chapter 2:  “From Washington to the Twentieth Century”, pp. 6-30 and Chapter 3: “The First World War and After:  From Woodrow Wilson to Herbert Hoover”, pp. 30 to 75,  in Christopher Andrew, For the President’s Eyes Only; and “Introduction:  The Study of Espionage”, pp. 1 – 14 by Wesley Wark and Chapter 1:  “Epistemic Communities:  Intelligence Studies and International Relations”, pp. 14-29 by Michael G.  Fry and Miles Hochstein in Wesley Wark, ed., Espionage:  Past, Present, Future.)

Lessons 4 and 5:  Intelligence and the onset of World War II.  Pearl Harbor.  Knowing the enemy.  Recruitment and betrayal.  Tradecraft.  ( REQUIRED READING: Chapters 1 – 14, pp. 1 – 181 in William H. MacArthur, Memoirs of a Cold War Colonel;  Chapters 1 – 3, pp. 1-64, in S. J. Hamrick, Deceiving the Deceivers;  Chapter 3: “Franklin D. Roosevelt:  The Path to Pearl Harbor”, pp. 75-123 in Andrew, For the President’s Eyes Only.  ADDITIONAL  READING:    Chapter 7:  “Intelligence and the Onset of War”, pp. 103-123 and Chapter 8: “Spies and Counterspies”, pp. 124-144 in Jeffrey Richelson, A Century of Spies;   Chapter 3: “The Intelligence Community:  Who Does What”, pp. 41-54 and “Collection”, pp. 54-80 in Pat M. Holt, Secret Intelligence and Public Policy.)

Lessons 6 and 7:  The genesis of the Office of Strategic Services (OSS), the first major US intelligence organization. General “Wild Bill” Donovan and the pioneers of OSS. The relations between FDR and Churchill on intelligence matters. (REQUIRED READING:  Part Two “War” pp. 83 – 341 in Douglas Waller, Wild Bill Donovan; Chapters 1 – 8 in Tom Moon, This Grim and Savage Game;   Chapter 4:  “Roosevelt at War”, pp. 123-149, in Andrew, For the President’s Eyes Only;  Chapters 3, 4 and 5, pp. 34 – 97 in S. J. Hamrick, Deceiving the Deceivers; Chapters 6,7,8 and 9, pp. 47 – 111, in Judith L Pearson, The Wolves At The Door;  ADDITIONAL  READING:    Chapter 1:  “Secrets in an Open Society”, pp. 2-19 and Chapter 2: “Origins and Evolution of American Intelligence”, pp. 20-39 in Holt, Secret Intelligence and Public Policy.)

Lessons 8 and 9:  Allen Dulles and the creation of the CIA.  American intelligence strategies from Truman to Bush.  Spies and Sex. Heroes.  Assassins.  Villains.  Fabricators.  (REQUIRED READING:  Chapters 3 – 12 pp. 25 – 159 in Robert Wallace and H. Keith Melton, Spycraft; Chapters 1 – 6  pp. 1 – 79 in Jefferson Morley, Our Man in Mexico; Chapter 5: “Harry S. Truman”, pp. 149-199, in Andrew, For the President’s Eyes Only;  Chapter 2: “Essential Dogma and Useful Buzzwords”, pp. 8 – 53 in William E. Odom, Fixing Intelligence.  ADDITIONAL  READING:    Chapter 9: “The Wrecking Crews”, pp. 145-157 and Chapter 12:  “Knowing the Enemy”, pp. 197-211 in Richelson, A Century of Spies.)

Lessons 10 and 11:  The Cold War era as seen from the perspective of secret intelligence.  Penetrations.    Superpower espionage.  What was the value of the Western effort throughout those years.  (REQUIRED READING:
Chapters 1 – 6 pp. 3 – 231 in Herbert Romerstein and Eric Breindel, The Venona Secrets;  Chapters 5 – 16 pp. 81 – 237 in Clarence Ashley, CIA Spymaster; Chapters 7 – 16 pp. 99 – 299 in Robert J. Lamphere, The FBI-KGB War; Introduction and Chapter 1: “The Defection” pp. 1 – 44 in Amy Knight, How The Cold War Began;  Chapter 1, 2 and 3, pp. 1 – 62 in Hamrick, Deceiving the Deceivers.   ADDITIONAL  READING:   Introduction and Chapter 1: “Innocents’ Clubs: The Origins of the CIA Front” pp. 1 – 29 in Hugh Wilford, The Mighty Wurlitzer;  Chapter 6:  “Dwight D. Eisenhower”, pp. 199-257 in Andrew, For the President’s Eyes Only;  Section 1: “What Was at Stake for the “Losers”?”, pp. 3 – 49 in Raffaele D’Agata and Lawrence Gray, eds., One More “Lost Peace”?;  “The Cold War:  Did Intelligence Make a Difference?”, pp. 159-164 and Chapter 12:  “Collectors,  Analysts, and Customers in the Cold War”, pp. 191-201 in Michael Herman,  Intelligence Services in the Information Age.)

Lesson 12:  Mid-term exam

Lessons 13:   Covert action (CA).  What it is.  How it works.  The philosophy, “romance”, discipline and pitfalls of CA.  Covert action programs and who decides them.  (REQUIRED READINGS:  Chapters 20 – 25 pp. 363 – 465 in Wallace and Melton, Spycraft; Chapter 7: “Spying to Know:  Human Intelligence”, pp. 142 – 167 in Odom, Fixing Intelligence;   Part Two, “New Capabilities”, pp. 63 – 149 in Sims and Gerber, Transforming US Intelligence; Part I: pp. 13 – 237 in Ismael Jones, The Human Factor. Inside the CIA’s Dysfunctional Intelligence Culture; Chapters 3 – 7, pp. 33 – 89 in Melissa Boyle Mahle, Denial and Deception;  Chapters 1 – 10: pp. 9 – 194 in John Prados, PresidentsSecret Wars; Chapter 3: “Clandestine Human Intelligence Collection” pp. 51 – 91 and Chapter 4: “Humint and Its Consumers” pp. 99 – 207 in H. Bradford Westerfield, ed.,  Inside CIA’s Private World.  ADDITIONAL  READING:  Chapters 1 – 4, pp. 1 – 91 in John Koehler, Spies in the Vatican;  Chapter 1: “The Martyr”, pp. 7-32, Chapter 2: “The Sporting Club”, pp. 32-60, Chapter 3: “The Founder”, pp. 60-84, in Lawrence Wright, The Looming Tower;  Chapter 8: “Covert Action”, pp. 157 – 174, in Lowenthal, Intelligence. From Secrets to Policy.)

Lesson 14:  The spy community as a bureaucracy.  Relations between the intelligence community and the President and Congress.  Public “uses” and “misuses” of the intelligence product.  (REQUIRED READINGS:  Chapters 1 – 6 pp. 13 – 119 in Ishmael Jones, The Human Factor; Chapter 3: “Making Dollars Yield Useful Intelligence” in Odom, Fixing Intelligence;  Chapters 15 and 16, pp. 167 – 189 in Mahle,  Denial and Deception; Chapter  4: “The Intelligence Process” pp. 55 – 68 , Chapter 10: “Oversight and Accountability” pp. 191 – 220 in Lowenthal, Intelligence. From Secrets to Policy.  ADDITIONAL  READING:   Chapter 4: “Change”, pp. 84-99, Chapter 5: “The Miracles”, pp. 99-121, Chapter 6:  “The Base”, pp. 121-145, in Wright, The Looming Tower.)

Lesson 15:  Counterintelligence. (REQUIRED READING:  Chapters 1 – 15, pp. 1 – 223 in Tennent H. Bagley, Spymaster; Chapter 8:  “Spying on Spies:  Counterintelligence”, pp. 167 – 185 in Odom, Fixing Intelligence; Chapter 6: “Fundamentals of Tradecraft” pp. 363 – 465 in Robert Wallace and H. Keith Melton, Spycraft;  Chapters 1 – 11 pp. 11 – 307 in Victor Cherkashin, Spy Handler; Chapter 7: “ Counterespionage” pp. 379 – 479 in Westerfield, ed., Inside CIA’s Private World.   ADDITIONAL  READING:  Chapters 1 – 31, pp. 3 – 295 in David Wise, Spy; Chapter 7: “Counterintelligence” pp. 145 – 157 in Lowenthal, Intelligence. From Secrets to Policy; Chapter 6:  “Counterintelligence”, pp. 109-135 in Holt, Secret Intelligence and Public Policy; Chapter 7: “Return of the Hero”, pp. 145-163, Chapter 8: “Paradise”, pp. 163-176, Chapter 9: “The Silicon Valley”, pp. 176-187, in Wright, The Looming Tower;   Chapter 6: “Counterintelligence”, pp. 109 – 135 in Holt, Secret Intelligence and Public Policy.)

Lesson 16:   Domestic surveillance. The use of intelligence operatives within the United States against American citizens.  Public knowledge of and about  the intelligence process.  The media.   Secrets in an open society.  Special rules to cater to the needs of the intelligence community?  (REQUIRED READING: Chapter 2:  “The Family Jewels” pp. 22 – 35, Chapter 3: “Domestic Surveillance” pp. 35 – 65, and Chapter 4: “Surveillance II”, p. 65 – 113 in John Prados, The Family Jewels;  Chapters 11 – 28 pp. 194 – 396 in Prados, Presidents’ Secret Wars; Chapter 9: “The Role of the Policy Maker”, pp. 174 – 191, and Chapter 13: “Ethical and Moral Issues in Intelligence” in Mark M. Lowenthal,  Intelligence. From Secrets to Policy.  ADDITIONAL  READING:    Chapter 8:  “The Media”, pp. 171-189, in Holt, Secret Intelligence and Public Policy;  Chapter 10: “Paradise Lost”, pp. 187-202, Chapter 11: “The Prince of Darkness”, pp. 202-213, Chapter 12: “The Boy Spies”, pp. 213-224, in Wright, The Looming Tower. )

Lesson 17:   Intelligence and terrorism:  beyond the Cold War.  The new adversary:  the international terrorist.  The terrorist as the most difficult “hard” target.  The organizational culture and individual qualities needed for counter-terrorist operations.

(REQUIRED READING:   Part One, pp. 3 – 111 in Fred Burton, Ghost. Confessions of A Counterrorism Agent;  Chapters 7 – 11 pp. 173 – 299 in Melvin Goodman, Failure of Intelligence; Chapters 1 – 9 pp. 11 – 219 in James Risen, State of War; Chapters 23 and 24, pp. 269 – 307 in Mahle, Denial and Deception; Chapter 11: “The Legacy of the Cold War” pp. 220 – 232 and Chapter 12: “The New Intelligence Agenda” pp. 232 – 255 in Lowenthal, Intelligence. From Secrets to Policy.  ADDITIONAL  READING:    Chapter 13: “Hijira”, pp. 224-237. Chapter 14: “Going Operational”, pp. 237-245, Chapter 15: “Bread and Water”, pp. 245-262, in Wright, The Looming Tower. )

 

Lesson 18: Terrorism and 9/11 in Historical Perspective. American relations with allied intelligence agencies. Spying on friends and allies.  Case study:  intelligence services of the Vatican.  (REQUIRED READING:  Chapters 1 – 5, pp. 1 – 175 in Bruce Hoffman, Inside Terrorism; Section “US Attitudes Towards Spying”, pp. 33 – 46 in James M. Olson, Fair Play; Chapter 9: “What It All Means”, pp. 185 – 195 in Odom,   Fixing Intelligence.   ADDITIONAL  READING:  Chapter 16: “Now It Begins”, pp. 262-287, Chapter 17: “The New Millennium”, pp.  287-301, Chapter 18: “Boom”, pp. 301-333, Chapter 19: “The Big Wedding”, pp. 333-362, Chapter 20: “Revelations”, pp. 362-375 in Wright, The Looming Tower;  Chapters 4 to 6, pp. 69- 149 in Richard L. Russell, Sharpening Strategic Intelligence.)

Lesson 19:  Secret intelligence in the context of foreign policy.  What does intelligence do for international security and the quality of international society?  Does it make for a better world or a worse one?  (REQUIRED READING: Chapter 11:  “The Future. What Next?”, pp. 237 – 251 in Holt, Secret Intelligence and Public Policy.   ADDITIONAL  READING: Chapter 14: “Intelligence Reform”, pp. 274 – 290 in Lowenthal, Intelligence. From Secrets to Policy; Chapters 1 to 3, pp. 1 – 69, in Richard L. Russell, Sharpening Strategic Intelligence.)

Lessons 20 and 21:   The future of intelligence:  a real American century?  A new world disorder?  (REQUIRED READING: Chapter 1, “Strategic Intelligence and American Statecraft” pp. 1 – 29 in Richard L. Russell, Sharpening Strategic Intelligence; Chapters 12 and 13 pp. 299 – 357 in Goodman, Failure of Intelligence;  Part Three, “Management Challenges”, pp. 149 – 259 in Sims and Gerber,  Transforming US Intelligence.  ADDITIONAL  READING:  Chapter 7: “Facing Future Strategic Intelligence Challenges”, pp. 149 – 171 in Russell, Sharpening Strategic Intelligence;   Chapter 14:  “Conclusion:  Intelligence After the Cold War”, pp. 537-543 in Andrew, For the President’s Eyes Only; Chapter 26:  “A New World Disorder”, pp. 416-431 in Richelson, A Century of Spies)

Core Texts:

Assignments will be made from the following core texts which students may order from Amazon.

Kenneth Daigler, Spies, Patriots, Traitors;  Rhodri Jeffrey-Jones, In Spies We Trust; Michael Sulick, American Spies; Raymond Batvinis, Hoover’s Secret War Against Axis Spies; Thai Jones, A Radical Line. 

 

 

Reserve Texts:

(** highly recommended texts)

 Randall B. Woods, Shadow Warrior:  William Egan Colby and the CIA; Sandra Grimes and Jeanne Vertefeuille, Circle of Treason:  A CIA Account of Traitor Aldrich Ames and the Men He Betrayed; Michael J. Sulick, Spying in America:  Espionage from the Revolutionary War to the Dawn of the Cold War; S. J. Hamrick, Deceiving the Deceivers: Kim Philby, Donald Maclean, and Guy Burgess;  **Michael Holzman, James Jesus Angleton, the CIA and the Craft of Counterintelligence;  **Duane R. Claridge, A Spy For All Seasons; Thomas Slawson, In Pursuit Of Shadows; William Odom, Fixing Intelligence:  For A More Secure America;  Robert Wallace, Spycraft;  **Allen Dulles, The Craft of Intelligence;  Melissa Boyle Mahle, Denial and Deception; **Victor Cherkashin, Spy Handler; Melvin A. Goodman, Failure of Intelligence;  **Jennifer Sims and Burton Gerber, eds., Vaults, Mirrors, and Masks:  Rediscovering US Counterintelligence;  **Chapman Pincher, Treachery:  Betrayals, Blunders, and Cover-Ups:  Six Decades of Espionage Against America and Great Britain; **John Earl Haynes, Harvey Klehr, and Alexander Vassiliev, Spies:  The Rise and Fall of the KGB in America;  **Robert Baer, See No Evil;  **Christopher Andrew, For the President’s Eyes Only;  **Thomas Sakmupter, Red Conspirator:  J. Peters and the American Communist Underground;  **Henry Crumpton, The Art of Intelligence;  **M. Stanton Evans, Stalin’s Secret Agents:  The Subversion of Roosevelt’s Government;   **Sarah-Jane Cooke, US Covert Operations and Cold War Strategy;  **James Callanan, Covert Action in the Cold War.

 

 

Additional Readings:

James Risen, State of War;  David Wise, Spy;  Robert Lamphere, The FBI – KGB War; John Prados, Presidents’ Secret Wars; H. Bradford Westerfield, Inside CIA’s Private World; Ronald J. Olive, Capturing Johathan Pollard;  Mark M. Lowenthal, Intelligence. From Secrets to Policy,  Hugh Wilford, The Mighty Wurlitzer,  Richard Russell, Sharpening Strategic Intelligence,   Lawrence Wright, The Looming Tower,   David Kahn, The Reader of Gentlemen’s Mail,  Herbert O. Yardley, The American Black Chamber, Ted Shackley,. Bayard Stockton, Flawed Patriot, Herbert Romerstein and Eric Breindel, The Venona Secrets;  Bruce Paige, David Leitch, Tom Moon, This Grim and Savage Game; Antonio and Jonna Mendez, Spy Dust; George Friedman, America’s Secret War; Jeffrey T. Richelson, The Wizards of Langley; Daniel Benjamin and Steven Simon, The Age of Sacred Terror; Richard Aldrich, The Hidden Hand:  Britain, America and Cold War Intelligence;  Rhodi Jeffrey Jones and Christopher Andrew, eds., Fifty Years of CIA Eternal Vigilance;  Genrikh Borovik, The Philby Files; John Jacob Nutter, The CIA’s Black Ops:  Covert Action, Foreign Policy, and Democracy.   

 

Book Review List: 

Tim Milne, Kim Philby: The Unknown Story of the KGB’s Master Spy; Kai Bird, The Good Spy, Phillip Knightley, The Philby Conspiracy;  Sam Tanenhaus, Whittaker Chambers; Melvin A. Goodman, Failure of Intelligence;  Robert Wallace and H. Keith Melton, Spycraft; Melissa Boyle Mahle, Denial and Deception;   Sarah Helm, A Life in Secrets;  Ishmael Jones, The Human Factor;  Allen Dulles, The Craft of Intelligence;  Lawrence Wright, The Looming Tower;  David Kahn, The Reader of Gentlemen’s Mail;  Christopher Andrew, For the Presidents Eyes Only;  Milt Bearden and James Risen, The Main Enemy;  Jeffrey T. Richelson, A Century of Spies;  Joseph J. Trento, The Secret History of the CIA;  Tim Weiner, Legacy of Ashes;  William Colby, Honorable Men; Stephen  Ambrose, Ike’s Spies;  Duane R. Claridge, A Spy For All  Seasons;  Robert Gates, From the Shadows;  Richard Helms, A Look Over My Shoulder;  David Wise, Spy; John Prados, Presidents’ Secret Wars;   Hugh Wilford, The Mighty Wurlitzer;  Herbert Romerstein and Eric Breindel, The Venona Secrets;  Robert Baer, See No Evil; Bob Woodward, Veil;  James Risen, State of War;  Jeffrey Richelson, The Wizards of Langley;  David Alvarez, Spies in the Vatican; George Friedman, America’s Secret War; Victor Cherkashin, Spy Handler; Jefferson Morley, Our Man in Mexico;  Herbert O. Yardley, The American Black Chamber; Calder Walton, Empire of Secrets;  Macintyre, A Spy Among Friends, John Nagy, Dr. Benjamin Church, Spy; Bradley, A Very Principled Boy, and Alexander Rose, Washington’s Spies.

 

Films:

The course will make use of a number of films that have treated the subjects of espionage and counterintelligence and will be the subject of class reports, papers as well as lecture aids.  Among the films to be selected are the following arranged by broad subject category:   WORLD WAR II:   “The Counterfeit Traitor”, “Spies”,  “Soldier of Orange”, “The Man Who Never Was”,  “Black Book”, “Decision Before Dawn”, “The Third Man”, “Operation Amsterdam”,  ; COLD WAR:  “The Manchurian Candidate”, “Philby, Burgess, and Maclean”, “Blunt, the Fourth Man”, “Master Spy”, “Cambridge Spies”, “A Family of Spies”, “Tinker, Tailor, Soldier, Spy”, “Nosenko: Double Agent”, “Night Flight From Moscow”,  “Smiley’s People”,  “A Perfect Spy”, “The Spy Who Came In From The Cold”, “The Falcon and the Snowman”,  “The Whistle Blower”,  “The Quiet American”,  “The Looking Glass War”, “Double” ; TERRORISM: “Sneakers”, “Enemy of the State”, “A Few Days in September”, “The Kingdom”, “Charlie Wilson’s War”, “Sword of the Gideon”,   “Syriana”, “The Siege”, “Spy Game”, “The Day of the Jackel”,  “The Terrorist”, “Rendition”, “Dirty War”, “Battle in Seattle” and “Paradise Now”. DOCUMENTARY AND VIDEO NEWS REPORTS:  “Speaking Freely, vol. 3: Ray McGovern on the Corruption of US Intelligence”,  “Julian Assnge: A Modern Day Hero?”, “Secrecy”, “War on Whistleblowers”, “Freedom Archives:  Cointelpro 101”,  “Dateline NBC:  I Spy”,  A&E presentation  of CIA, “Secret Files”,  BBC special “The CIA”, History Channel “Spies Among Us”, History Channel “The Dark Art of Interrogation”,  “Chasing the Sleeper Cell”,  “One Day in September”,  “9/11 Mysteries”,  “9/11 Myth and Reality”, “Oswald’s Ghost”,