Thwarting Enemies has earned classic status for the same reasons. In the 18 chapters that follow, Johnson begins by discussing what counterintelligence is and how it differs from counterespionage. The chapter on interrogation stresses the futility of torture as a CI practice and the techniques that do work.
There are two chapters on surveillance: one covering managing human surveillance, the other describing the use of technical means—wire taps, photography, and the like. The final chapters cover working with other intelligence services or liaison, the importance of files, the analysis of the data collected, and the important role of deception. Originally published in and long out of print, Thwarting Enemies has been used as a text in various introductory CI courses including those at the National Defense Intelligence College.
With his characteristic bumper sticker simplicity, Johnson provides short case studies to illustrate his points with a sense of humor that is evident throughout. But for those interested in what counterintelligence is and the essential tradecraft that gets the job done, Thwarting Enemies has no competition—a genuine classic. Indian journalist Anuj Dhar has capitalizes on this phenomenon in his three-part book, which purports to reveal CIA activities in South Asia since But the page first part discusses only Agency declassification policies and history, in that curious order.
Based almost entirely on American sources, it contains some author commentary, little analysis, and no conclusions. The majority of the book—some pages—consists of 72 declassified CIA assessments dealing with various policies and events in South Asia between and This part has three surprising features. And though the redacted sections are indicated in the narrative, Dhar gives no description of what he left out.
Second, the author provides no introductory analysis to explain why an assessment was selected, how it relates to what follows, and in some cases who wrote it. In the end, readers are left to make what sense they can from this collection of documents that at best provides a less than comprehensive glimpse of some potentially formative factors in US policy toward South Asia.
All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be construed as asserting or implying US government endorsement of its factual statements and interpretations. We read every letter, fax, or e-mail we receive, and we will convey your comments to CIA officials outside OPA as appropriate.
However, with limited staff and resources, we simply cannot respond to all who write to us. Submit questions or comments online. Contact the Office of Privacy and Civil Liberties.
Contact the Office of Inspector General. Contact the Employment Verification Office.
Please check our site map , search feature, or our site navigation on the left to locate the information you seek. We do not routinely respond to questions for which answers are found within this Web site.
Employment : We do not routinely answer questions about employment beyond the information on this Web site, and we do not routinely answer inquiries about the status of job applications. Recruiting will contact applicants within 45 days if their qualifications meet our needs. People from nearly every country share information with CIA, and new individuals contact us daily.
If you have information you think might interest CIA due to our foreign intelligence collection mission, there are many ways to reach us. If you know of an imminent threat to a location inside the U. For threats outside the U. Embassy or Consulate and ask for the information to be passed to a U. Please know, CIA does not engage in law enforcement. In addition to the options below, individuals contact CIA in a variety of creative ways.
The best method depends on your personal situation. We will work to protect all information you provide, including your identity, and our interactions with you will be respectful and professional. Depending on what you provide, we may offer you compensation. We cannot guarantee a response to every message.
We reply first to messages of greater interest to us and to those with more detail. Our response will occur via a secure method.
Olson takes the listener into the arcane world of counterintelligence as he lived it during his year career in the CIA. Dulles Narrated by: L. Ghost: Confessions of a Counterterrorism Agent. Who was your favorite character and why? Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. The first describes how we think.
Internet: Send a message here. Or, you can send us a message using the Tor browser at ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad. We go to great lengths to keep these channels secure, but any communication via the internet poses some risk.
Book Description Georgetown University Press, New Book. Shipped from UK. Established seller since Seller Inventory GB Book Description Georgetown University Press , Book Description Georgetown University Press. New copy - Usually dispatched within 2 working days. Seller Inventory B CI is often misunderstood and narrowly equated with security and catchin. William R. Publisher: Georgetown University Press , This specific ISBN edition is currently not available.
View all copies of this ISBN edition:. Review : Only a respected CI pro like [Johnson] could have described so clearly our arcane business of dangles, doubles, defectors, and deception.
Buy New Learn more about this copy. About AbeBooks. Other Popular Editions of the Same Title. Search for all books with this author and title. Customers who bought this item also bought. Stock Image. New Quantity Available: 2. Speedy Hen London, United Kingdom. Seller Rating:. New Paperback Quantity Available: 1. Published by Georgetown University Press Johnson, William Hood.