In this Book

  • Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
  • Book
  • William R. Johnson. Foreword by William Hood
  • 2009
  • Published by: Georgetown University Press
summary

A Classic in Counterintelligence—Now Back in Print

Originally published in 1987, Thwarting Enemies at Home and Abroad is a unique primer that teaches the principles, strategy, and tradecraft of counterintelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations.

Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page, Copyright Page
  2. restricted access
    • Download PDF Download
  1. Contents
  2. restricted access
    • Download PDF Download
  1. Publisher’s Note
  2. p. ix
  3. restricted access
    • Download PDF Download
  1. Foreword
  2. pp. x-xii
  3. restricted access
    • Download PDF Download
  1. Introduction
  2. pp. xiii-xiv
  3. restricted access
    • Download PDF Download
  1. 1. What Is Counterintelligence?
  2. pp. 1-4
  3. restricted access
    • Download PDF Download
  1. 2. Who Goes into Counterintelligence, and Why?
  2. pp. 5-12
  3. restricted access
    • Download PDF Download
  1. 3. Conflicting Goals: Law Enforcement versus Manipulation
  2. pp. 13-19
  3. restricted access
    • Download PDF Download
  1. 4. The Support Apparatus
  2. pp. 20-33
  3. restricted access
    • Download PDF Download
  1. 5. Interrogation: How It Really Works
  2. pp. 34-45
  3. restricted access
    • Download PDF Download
  1. 6. How to Manage the Polygraph
  2. pp. 46-65
  3. restricted access
    • Download PDF Download
  1. 7. How to Manage Physical Surveillance
  2. pp. 66-80
  3. restricted access
    • Download PDF Download
  1. 8. How to Manage Technical Surveillance
  2. pp. 81-90
  3. restricted access
    • Download PDF Download
  1. 9. Double Agents: What They Are Good For
  2. pp. 91-101
  3. restricted access
    • Download PDF Download
  1. 10. Double Agents: How to Get and Maintain a Stable
  2. pp. 102-114
  3. restricted access
    • Download PDF Download
  1. 11. Double Agents: Feeding and Care
  2. pp. 115-125
  3. restricted access
    • Download PDF Download
  1. 12. Double Agents: Passing Information to the Enemy
  2. pp. 126-134
  3. restricted access
    • Download PDF Download
  1. 13. Moles in the Enemy’s Garden: Your Best Weapon
  2. pp. 135-153
  3. restricted access
    • Download PDF Download
  1. 14. Defectors: Your Second-Best Weapon
  2. pp. 154-164
  3. restricted access
    • Download PDF Download
  1. 15. Using “Friendly” Services, Foreign and Domestic
  2. pp. 165-174
  3. restricted access
    • Download PDF Download
  1. 16. How to Manage Files
  2. pp. 175-184
  3. restricted access
    • Download PDF Download
  1. 17. The Collation of Counterintelligence
  2. pp. 185-195
  3. restricted access
    • Download PDF Download
  1. 18. The Big Game: Deception
  2. pp. 196-208
  3. restricted access
    • Download PDF Download
  1. About the Author
  2. pp. 209-210
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 211-222
  3. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.