USD. Free Shipping Worldwide!
A History Of The US Intelligence And Espionage Empire From World War I To The Climax Of The Cold War In A Four Part TV Documentary Series Hosted By Bill Kurtis, Featuring Exclusive Interviews With The Those Chiefly Responsible For The Events Described, Some Of Whom Have Only Given Such Interviews In This TV Series, Presented In The Highest DVD Quality MPG Video Format Of 9.1 MBPS In An Archival Quality 2 Disc All Regions Format DVD Set, MP4 Video Download Or USB Flash Drive (Color, 1992, 4 Episodes Of 58 Minutes Each.) #Intelligence #USIntelligence #Espionage #USEspionage #BillKurtis #WorldWarI #FBI #JEdgarHoover #Codebreaking #WildBillDonovan #FDR #AttackOnPearlHarbor #WorldWarII #OSS #CIA #NSA #ColdWar #Ike #BananaRepublics #BayOfPigsInvasion #JFK #FidelCastro #VietnamWar #MLK #LBJ #RichardNixon #WatergateScandal #ChurchCommittee #TheEnterprise #ReaganAdministration #IranContraScandal #GHWBushAdministration #ArchimedesPatti #WilliamCasey #ElliotRoosevelt #RayCline #WilliamColby #RichardHelms #EHowardHunt #RichardBissell #KermitRoosevelt #DavidAtleePhillips #DeanRusk #ArthurMSchlesingerJr #EugenioMartinez #BernardBarker #JohnMcCone #GGordonLiddy #JohnEhrlichman #CarthaDeLoach #JamesSchlesinger #PhilipAgee #SeymourHersh #TadSzulc #JohnTower #AndrewYoung #BobWoodward #WalterMondale #StansfieldTurner #ZbigniewBrzezinski #ArthurLiman #WildBillDonovan #RFK #Mafia #TheEnterprise #TV #Documentaries #DVD #VideoDownload #USBFlashDrive
Epi. 1: The Only Rule Is To Win: World War I, The FBI, J. Edgar Hoover, Code Breaking, Wild Bill Donovan, FDR, Pearl Harbor Attack, The OSS, The NSA (w/Archimedes Patti, William J. Casey, Elliot Roosevelt, Ray Cline, William Colby, Richard Helms, more) | Epi. 2: Intervention: CIA, Cold War, Ike, Latin America, The Bay Of Pigs Invasion (w/E. Howard Hunt, Richard M. Bissell Jr., Kermit Roosevelt, Richard Helms, David Atlee Phillips, Dean Rusk, Arthur M. Schlesinger Jr., more) | Epi. 3: Learning To Say No: JFK, Castro, RFK, The Mafia, Vietnam, MLK, LBJ, Nixon, Watergate, Church Committee (w/Eugenio Martinez, Bernard Barker, John McCone, G. Gordon Liddy, John Ehrlichman, Cartha DeLoach, James Schlesinger, Philip Agee, Seymour Hersh, Tad Szulc, John Tower, Andrew Young, David Atlee Phillips, Richard Helms, William Colby, Bob Woodward, Walter Mondale, Arthur M. Schlesinger Jr., more) | Epi. 4: The Enterprise: Reagan Administration, Iran-Contra Scandal, Incoming Bush Administration (w/Stansfield Turner, Zbigniew Brzezinski, Willliam J. Casey, Bob Woodward, Seymour Hersh, Arthur Liman, more)
Espionage, also known as spying or intelligence gathering, is the act of obtaining secret or confidential information from non-disclosed sources or divulging of the same without the permission of the holder of the information. A person who commits espionage is called an espionage agent or spy. Any individual or spy ring (a cooperating group of spies), in the service of a government, company or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law. Espionage is often part of an institutional effort by a government or commercial concern. However, the term tends to be associated with state spying on potential or actual enemies for military purposes. Spying involving corporations is known as industrial espionage. One of the most effective ways to gather data and information about a targeted organization is by infiltrating its ranks. This is the job of the spy (espionage agent). Spies can then return information such as the size and strength of enemy forces. They can also find dissidents within the organization and influence them to provide further information or to defect. In times of crisis, spies steal technology and sabotage the enemy in various ways. Counterintelligence is the practice of thwarting enemy espionage and intelligence-gathering. Almost all nations have strict laws concerning espionage and the penalty for being caught is often severe. However, the benefits gained through espionage are often so great that most governments and many large corporations make use of it.
A clandestine operation is an intelligence or military operation carried out in such a way that the operation goes unnoticed by the general population or specific enemy forces. Until the 1970s, clandestine operations were primarily political in nature, generally aimed at assisting groups or nations favored by the sponsor. Examples include U.S. intelligence involvement with German and Japanese war criminals after World War II. Today these operations are numerous and include technology-related clandestine operations. The bulk of clandestine operations are related to the gathering of intelligence, typically by both people (clandestine human intelligence) and by hidden sensors. Placement of underwater or land-based communications cable taps, cameras, microphones, traffic sensors, monitors such as sniffers, and similar systems require that the mission go undetected and unsuspected. Clandestine sensors may also be on unmanned underwater vehicles, reconnaissance (spy) satellites (such as Misty), low-observability unmanned aerial vehicles (UAV), or unmanned detectors (as in Operation Igloo White and its successors), or hand-placed by clandestine human operations. The terms clandestine and covert are not synonymous. As noted in the definition (which has been used by the United States and NATO since World War II) in a covert operation the identity of the sponsor is concealed, while in a clandestine operation the operation itself is concealed. Put differently, clandestine means "hidden", where the aim is for the operation to not be noticed at all. Covert means "deniable", such that if the operation is noticed, it is not attributed to a group. The term stealth refers both to a broad set of tactics aimed at providing and preserving the element of surprise and reducing enemy resistance. It can also be used to describe a set of technologies (stealth technology) to aid in those tactics. While secrecy and stealthiness are often desired in clandestine and covert operations, the terms secret and stealthy are not used to formally describe types of missions. Some operations may have both clandestine and covert aspects, such as the use of concealed remote sensors or human observers to direct artillery attacks and airstrikes. The attack is obviously overt (coming under attack alerts the target that he has been located by the enemy), but the targeting component (the exact method that was used to locate targets) can remain clandestine. In World War II, targets found through cryptanalysis of radio communication were attacked only if there had been aerial reconnaissance in the area, or, in the case of the shootdown of Admiral Isoroku Yamamoto, where the sighting could be attributed to the Coastwatchers. During the Vietnam War, trucks attacked on the Ho Chi Minh trail were completely unaware of some sensors, such as the airborne Black Crow device that sensed their ignition. They could also have been spotted by a clandestine human patrol. Harassing and interdiction (H&I) or free-fire zone rules can also cause a target to be hit for purely random reasons.
A covert operation is a military operation intended to conceal the identity of (or allow plausible denial by) the operation. Covert operations should not be confused with clandestine operations, which are performed in secret. Covert operations aim to secretly fulfill their mission objectives without anyone knowing who sponsored or carried out the operation, or in some cases, without anyone knowing that the operation has even occurred.