Intelligence Espionage

Courting Disaster: How the CIA Kept America Safe and How by Marc A. Thiessen

By Marc A. Thiessen

White condo speechwriter Marc Thiessen was once locked in a safe room and given entry to the main delicate intelligence while he used to be tasked to write down President George W. Bush’s 2006 speech explaining the CIA’s interrogation software and why Congress should still authorize it. Few be aware of extra approximately those CIA operations than Thiessen, and in his new publication, relationship catastrophe, he records simply how powerful the CIA’s interrogations have been in foiling assaults on the US, penetrating al-Qaeda’s excessive command, and supplying our army with actionable intelligence. Thiessen additionally exhibits how reckless President Obama has been in shutting down the CIA’s application and freeing mystery records that experience aided our enemies. relationship catastrophe proves:How the CIA software thwarted particular lethal assaults opposed to the U.S.Why “enhanced interrogation” used to be now not torture through any average felony or ethical standardHow the knowledge received via “enhanced interrogation” couldn't were got the other wayHow President Obama’s activities considering that taking place of work have left the United States even more at risk of attackIn chilling aspect, Thiessen unearths how shut the terrorists got here to remarkable back, how intelligence won from “enhanced interrogation” again and again stymied their plots, and the way President Obama’s dismantling of this CIA software is inviting catastrophe for the USA.

Show description

Read or Download Courting Disaster: How the CIA Kept America Safe and How Barack Obama Is Inviting the Next Attack PDF

Similar intelligence & espionage books

Building Partner Capabilities For Coalition Operations

Ongoing operations and rising undertaking standards position a heavy burden on military assets, leading to potential gaps that the military is not able to fill on its own. One resolution is to construct definitely the right functions in allies and companion armies via targeted safeguard cooperation. to do that, military planners desire a extra complete figuring out of the aptitude gaps and a approach for matching these gaps with candidate associate armies.

Our Man in Yugoslavia (Studies in Intelligence)

As an absolutely documented research of a moment international struggle mystery Intelligence provider (SIS) operative, Our guy in Yugoslavia is admittedly special. Its topic is Owen Reed, a military officer recruited into SIS in the summertime of 1943 after which parachuted in to German-occupied Croatia to paintings with Tito's Partisans and different Allied mystery firms.

SAS Ultimate Guide to Combat: How to Fight and Survive in Modern Warfare

'I'm not likely to coach you the way to outlive in snowy mountains with just a tea bag; this e-book will train you ways to struggle and continue to exist battle within the twenty first century. '--Robert Stirling, from the IntroductionIn the culture of John 'Lofty' Wiseman's SAS Survival instruction manual comes a brand new strive against instruction manual from a professional speical forces soldier.

The World Was Going Our Way: The KGB and the Battle for The Third World, Vol. 2

In 1992 the British mystery Intelligence carrier exfiltrated from Russia a defector whose presence within the West remained a mystery until eventually the booklet of The Sword and the guard in 1999. That guy was once Vasili Mitrokhin, the KGB's so much senior archivist. Unknown to his superiors, Mitrokhin had spent over a decade making notes and transcripts of hugely labeled documents which, at huge, immense own danger, he smuggled out of the KGB information.

Extra info for Courting Disaster: How the CIA Kept America Safe and How Barack Obama Is Inviting the Next Attack

Example text

What Rivkin and Lowry did not know at the time was that theCIA had not, in fact, been that stupid. The walling described by theterrorists in the ICRC report was nothing like the actual techniquethe CIA had employed (although Abu Zubaydah's descriptionhinted at the truth). Then, a few weeks after the ICRC report leaked, PresidentObama released the Office of Legal Counsel memos whichdescribed in detail the approved techniquesincluding how"walling" actually took place: For walling, a flexible false wall will be constructed.

He says, "I was in all the briefings from the beginning. These people who were reporting backwere career people, they weren't bullshitters. When they weren'tgetting something from a detainee, they would say it. They werethrilled by what they were getting from Zubaydah. " Zubaydah began to provide information on key al Qaeda operatives, including information that helped the CIA find and capturemore of those responsible for the 9/11 attacks. '-'Bin al-Shibh was a big catch. According to the Office of theDirector of National Intelligence,23 he was the primary communications intermediary between the 9/11 hijackers in the United Statesand the al Qaeda leadership in Afghanistan and Pakistanrelayingorders from al Qaeda senior operatives to the lead hijacker,Mohammed Atta, via email and phone.

CIA officials went to Khan's celland confronted him with this information from KSM. a. Zubair. Khan then provided both aphysical description and a contact number for Zubair. This was a vital breakthrough. The contact number not only gaveofficials the ability to track down and capture Zubair, it also gavethe National Security Agency the opportunity to begin using signalsintelligence to track the JI network behind the plot. " McConnell says,"When someone's running a network-[for example] a drug business, you've got a drug king pin, and he's running some coordinationeffort to get the poppies, turn it into cocaine, get it distributed, get itdelivered, get it in the street, and get it sold.

Download PDF sample

Rated 4.78 of 5 – based on 27 votes