Knowledge (XXG)

Enemies: How America's Foes Steal Our Vital Secrets – And How We Let It Happen

Source πŸ“

38: 406: 601: 410: 341: 606: 147:
had been damaged by negligence and incompetence. Gertz makes the claim that more high-level attention is needed, as well as more resources, better leadership and proactive programs.
37: 245: 591: 17: 126: 311: 586: 581: 596: 362: 390: 452: 241: 318: 230: 204: 277:
officer Brian Kelley and his family for nearly two years, while the real target of the mole hunt, FBI Agent
544: 498: 255:
How China has established a special, ultra-secret intelligence unit tasked with planting spies inside the
66: 345: 431: 499:"True Deceiver: How a Castro Spy Wrote the Pentagon's Playbook on Cuba - Foreign and Defense Policy" 274: 289: 219: 144: 121: 211: 394: 278: 200: 197: 575: 256: 193: 164:. Gertz argues that the US has allowed itself to be penetrated by China, Russia and 169: 388: 18:
Enemies: How America's Foes Steal Our Vital Secrets-And How We Let It Happen
456: 330: 304: 173: 80: 31:
Enemies: How America's Foes Steal Our Vital Secrets – And How We Let It Happen
523: 349: 322: 300: 161: 140: 136:
Enemies: How America's Foes Steal Our Vital Secrets – And How We Let It Happen
48: 326: 263: 249: 70: 293: 168:- and nominally friendly nations - due to negligence. Gertz reports on 226: 215: 565: 477: 282: 502: 334: 210:
New details on the technical intelligence-gathering spy ring of
165: 369: 270: 237: 189: 453:"Information Division, Taipei Economic and Cultural Office" 372:
General Overviews 2000s A-G favorably reviewed the book.
602:
Non-fiction books about the Central Intelligence Agency
218:, two brothers arrested for supplying China with vital 143:. In this book, Gertz brings to light instances where 120: 112: 104: 94: 86: 76: 62: 54: 44: 240:was informed in 1999 that at least three of its 184:The following topics are discussed in the book: 607:Books about the Federal Bureau of Investigation 310:How North Korea conducted intelligence-related 266:inside the US government code-named β€œMother”. 8: 225:How information compromised to China allows 30: 299:How weak counter-intelligence has allowed 36: 29: 321:and other agencies with high-level mole 281:, operated freely and passed secrets to 172:gathering in America by China, Cuba and 381: 432:"Enemies by Bill Gertz - Book - eBook" 7: 288:How Russia has dispatched scores of 248:, but the agency failed to find the 203:helped China obtain secrets on US 25: 592:Non-fiction books about espionage 501:. AEI. 2007-05-16. Archived from 312:abductions of Japanese nationals 292:to the United States, rivalling 244:officers were on the payroll of 409:. Efollett.com. Archived from 307:and gain access to US secrets. 1: 342:British military intelligence 455:. Taipei.org. Archived from 361:This book is a national and 319:Defense Intelligence Agency 262:How China ran a high-level 623: 348:with an agent code-named 344:penetrated the terrorist 231:Virginia class submarines 35: 587:American political books 393:January 7, 2009, at the 337:'s most important agent. 317:How Cuba penetrated the 205:electronic eavesdropping 290:intelligence operatives 273:mistakenly hounded CIA 27:2006 book by Bill Gertz 582:2006 non-fiction books 67:United States Politics 597:Books about terrorism 568:- Bill Gertz Homepage 549:Intelit.muskingum.edu 524:"Biographical sketch" 346:Irish Republican Army 325:, who spied to help 246:Chinese intelligence 275:counterintelligence 242:clandestine service 32: 357:Critical reception 303:to infiltrate the 220:defense technology 160:is a 2006 book by 139:is a 2006 book by 90:Three Rivers Press 296:levels of spying. 264:penetration agent 145:national security 132: 131: 127:978-0-307-33806-8 105:Publication place 100:19 September 2006 16:(Redirected from 614: 553: 552: 541: 535: 534: 532: 531: 520: 514: 513: 511: 510: 495: 489: 488: 486: 485: 480:. The Gertz File 478:"The Gertz File" 474: 468: 467: 465: 464: 449: 443: 442: 440: 439: 428: 422: 421: 419: 418: 403: 397: 386: 333:and then became 96:Publication date 40: 33: 21: 622: 621: 617: 616: 615: 613: 612: 611: 572: 571: 562: 557: 556: 551:. October 2012. 543: 542: 538: 529: 527: 526:. Gertzfile.com 522: 521: 517: 508: 506: 497: 496: 492: 483: 481: 476: 475: 471: 462: 460: 451: 450: 446: 437: 435: 430: 429: 425: 416: 414: 405: 404: 400: 395:Wayback Machine 387: 383: 378: 359: 182: 153: 97: 69: 28: 23: 22: 15: 12: 11: 5: 620: 618: 610: 609: 604: 599: 594: 589: 584: 574: 573: 570: 569: 566:The Gertz File 561: 560:External links 558: 555: 554: 536: 515: 490: 469: 444: 434:. Random House 423: 398: 380: 379: 377: 374: 364:New York Times 358: 355: 354: 353: 338: 315: 308: 297: 286: 279:Robert Hanssen 267: 260: 253: 234: 223: 208: 181: 178: 152: 149: 130: 129: 124: 118: 117: 114: 110: 109: 106: 102: 101: 98: 95: 92: 91: 88: 84: 83: 78: 74: 73: 64: 60: 59: 56: 52: 51: 46: 42: 41: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 619: 608: 605: 603: 600: 598: 595: 593: 590: 588: 585: 583: 580: 579: 577: 567: 564: 563: 559: 550: 546: 540: 537: 525: 519: 516: 505:on 2011-08-23 504: 500: 494: 491: 479: 473: 470: 459:on 2012-02-17 458: 454: 448: 445: 433: 427: 424: 413:on 2012-12-17 412: 408: 402: 399: 396: 392: 389: 385: 382: 375: 373: 371: 367: 365: 356: 351: 347: 343: 339: 336: 332: 328: 324: 320: 316: 313: 309: 306: 302: 298: 295: 291: 287: 284: 280: 276: 272: 268: 265: 261: 258: 257:US government 254: 251: 247: 243: 239: 235: 232: 228: 224: 221: 217: 213: 209: 206: 202: 199: 195: 194:Katrina Leung 191: 187: 186: 185: 179: 177: 175: 171: 167: 163: 159: 158: 150: 148: 146: 142: 138: 137: 128: 125: 123: 119: 115: 111: 108:United States 107: 103: 99: 93: 89: 85: 82: 79: 75: 72: 68: 65: 61: 57: 53: 50: 47: 43: 39: 34: 19: 548: 545:"FBI review" 539: 528:. Retrieved 518: 507:. Retrieved 503:the original 493: 482:. Retrieved 472: 461:. Retrieved 457:the original 447: 436:. Retrieved 426: 415:. Retrieved 411:the original 401: 384: 363: 360: 229:to track US 183: 170:intelligence 156: 155: 154: 135: 134: 133: 331:Sandinistas 305:US military 201:J. J. Smith 198:FBI handler 174:North Korea 81:non-fiction 576:Categories 530:2012-10-30 509:2012-10-30 484:2012-10-30 463:2012-10-30 438:2012-10-30 417:2012-10-30 376:References 366:Bestseller 350:Stakeknife 323:Ana Montes 301:terrorists 192:informant 162:Bill Gertz 151:Background 141:Bill Gertz 49:Bill Gertz 327:Nicaragua 87:Publisher 71:Terrorism 391:Archived 294:Cold War 269:How the 236:How the 196:and her 55:Language 407:"Sorry" 368:. The 227:Beijing 216:Chi Mak 212:Tai Mak 180:Content 157:Enemies 63:Subject 58:English 283:Moscow 45:Author 250:spies 113:Pages 77:Genre 340:How 335:Cuba 214:and 188:How 166:Cuba 122:ISBN 370:FBI 329:'s 271:FBI 238:CIA 190:FBI 116:304 578:: 547:. 176:. 533:. 512:. 487:. 466:. 441:. 420:. 352:. 314:. 285:. 259:. 252:. 233:. 222:. 207:. 20:)

Index

Enemies: How America's Foes Steal Our Vital Secrets-And How We Let It Happen

Bill Gertz
United States Politics
Terrorism
non-fiction
ISBN
978-0-307-33806-8
Bill Gertz
national security
Bill Gertz
Cuba
intelligence
North Korea
FBI
Katrina Leung
FBI handler
J. J. Smith
electronic eavesdropping
Tai Mak
Chi Mak
defense technology
Beijing
Virginia class submarines
CIA
clandestine service
Chinese intelligence
spies
US government
penetration agent

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑