Knowledge (XXG)

Enemies: How America's Foes Steal Our Vital Secrets – And How We Let It Happen

Source πŸ“

27: 395: 590: 399: 330: 595: 136:
had been damaged by negligence and incompetence. Gertz makes the claim that more high-level attention is needed, as well as more resources, better leadership and proactive programs.
26: 234: 580: 115: 300: 575: 570: 585: 351: 379: 441: 230: 307: 219: 193: 266:
officer Brian Kelley and his family for nearly two years, while the real target of the mole hunt, FBI Agent
533: 487: 244:
How China has established a special, ultra-secret intelligence unit tasked with planting spies inside the
55: 334: 420: 488:"True Deceiver: How a Castro Spy Wrote the Pentagon's Playbook on Cuba - Foreign and Defense Policy" 263: 278: 208: 133: 110: 200: 383: 267: 189: 186: 564: 245: 182: 153:. Gertz argues that the US has allowed itself to be penetrated by China, Russia and 158: 377: 445: 319: 293: 162: 69: 20:
Enemies: How America's Foes Steal Our Vital Secrets – And How We Let It Happen
512: 338: 311: 289: 150: 129: 125:
Enemies: How America's Foes Steal Our Vital Secrets – And How We Let It Happen
37: 315: 252: 238: 59: 282: 157:- and nominally friendly nations - due to negligence. Gertz reports on 215: 204: 554: 466: 271: 491: 323: 199:
New details on the technical intelligence-gathering spy ring of
154: 358: 259: 226: 178: 442:"Information Division, Taipei Economic and Cultural Office" 361:
General Overviews 2000s A-G favorably reviewed the book.
591:
Non-fiction books about the Central Intelligence Agency
207:, two brothers arrested for supplying China with vital 132:. In this book, Gertz brings to light instances where 109: 101: 93: 83: 75: 65: 51: 43: 33: 229:was informed in 1999 that at least three of its 173:The following topics are discussed in the book: 596:Books about the Federal Bureau of Investigation 299:How North Korea conducted intelligence-related 255:inside the US government code-named β€œMother”. 8: 214:How information compromised to China allows 19: 288:How weak counter-intelligence has allowed 25: 18: 310:and other agencies with high-level mole 270:, operated freely and passed secrets to 161:gathering in America by China, Cuba and 370: 421:"Enemies by Bill Gertz - Book - eBook" 7: 277:How Russia has dispatched scores of 237:, but the agency failed to find the 192:helped China obtain secrets on US 14: 581:Non-fiction books about espionage 490:. AEI. 2007-05-16. Archived from 301:abductions of Japanese nationals 281:to the United States, rivalling 233:officers were on the payroll of 398:. Efollett.com. Archived from 296:and gain access to US secrets. 1: 331:British military intelligence 444:. Taipei.org. Archived from 350:This book is a national and 308:Defense Intelligence Agency 251:How China ran a high-level 612: 337:with an agent code-named 333:penetrated the terrorist 220:Virginia class submarines 24: 576:American political books 382:January 7, 2009, at the 326:'s most important agent. 306:How Cuba penetrated the 194:electronic eavesdropping 279:intelligence operatives 262:mistakenly hounded CIA 16:2006 book by Bill Gertz 571:2006 non-fiction books 56:United States Politics 586:Books about terrorism 557:- Bill Gertz Homepage 538:Intelit.muskingum.edu 513:"Biographical sketch" 335:Irish Republican Army 314:, who spied to help 235:Chinese intelligence 264:counterintelligence 231:clandestine service 21: 346:Critical reception 292:to infiltrate the 209:defense technology 149:is a 2006 book by 128:is a 2006 book by 79:Three Rivers Press 285:levels of spying. 253:penetration agent 134:national security 121: 120: 116:978-0-307-33806-8 94:Publication place 89:19 September 2006 603: 542: 541: 530: 524: 523: 521: 520: 509: 503: 502: 500: 499: 484: 478: 477: 475: 474: 469:. The Gertz File 467:"The Gertz File" 463: 457: 456: 454: 453: 438: 432: 431: 429: 428: 417: 411: 410: 408: 407: 392: 386: 375: 322:and then became 85:Publication date 29: 22: 611: 610: 606: 605: 604: 602: 601: 600: 561: 560: 551: 546: 545: 540:. October 2012. 532: 531: 527: 518: 516: 515:. Gertzfile.com 511: 510: 506: 497: 495: 486: 485: 481: 472: 470: 465: 464: 460: 451: 449: 440: 439: 435: 426: 424: 419: 418: 414: 405: 403: 394: 393: 389: 384:Wayback Machine 376: 372: 367: 348: 171: 142: 86: 58: 17: 12: 11: 5: 609: 607: 599: 598: 593: 588: 583: 578: 573: 563: 562: 559: 558: 555:The Gertz File 550: 549:External links 547: 544: 543: 525: 504: 479: 458: 433: 423:. Random House 412: 387: 369: 368: 366: 363: 353:New York Times 347: 344: 343: 342: 327: 304: 297: 286: 275: 268:Robert Hanssen 256: 249: 242: 223: 212: 197: 170: 167: 141: 138: 119: 118: 113: 107: 106: 103: 99: 98: 95: 91: 90: 87: 84: 81: 80: 77: 73: 72: 67: 63: 62: 53: 49: 48: 45: 41: 40: 35: 31: 30: 15: 13: 10: 9: 6: 4: 3: 2: 608: 597: 594: 592: 589: 587: 584: 582: 579: 577: 574: 572: 569: 568: 566: 556: 553: 552: 548: 539: 535: 529: 526: 514: 508: 505: 494:on 2011-08-23 493: 489: 483: 480: 468: 462: 459: 448:on 2012-02-17 447: 443: 437: 434: 422: 416: 413: 402:on 2012-12-17 401: 397: 391: 388: 385: 381: 378: 374: 371: 364: 362: 360: 356: 354: 345: 340: 336: 332: 328: 325: 321: 317: 313: 309: 305: 302: 298: 295: 291: 287: 284: 280: 276: 273: 269: 265: 261: 257: 254: 250: 247: 246:US government 243: 240: 236: 232: 228: 224: 221: 217: 213: 210: 206: 202: 198: 195: 191: 188: 184: 183:Katrina Leung 180: 176: 175: 174: 168: 166: 164: 160: 156: 152: 148: 147: 139: 137: 135: 131: 127: 126: 117: 114: 112: 108: 104: 100: 97:United States 96: 92: 88: 82: 78: 74: 71: 68: 64: 61: 57: 54: 50: 46: 42: 39: 36: 32: 28: 23: 537: 534:"FBI review" 528: 517:. Retrieved 507: 496:. Retrieved 492:the original 482: 471:. Retrieved 461: 450:. Retrieved 446:the original 436: 425:. Retrieved 415: 404:. Retrieved 400:the original 390: 373: 352: 349: 218:to track US 172: 159:intelligence 145: 144: 143: 124: 123: 122: 320:Sandinistas 294:US military 190:J. J. Smith 187:FBI handler 163:North Korea 70:non-fiction 565:Categories 519:2012-10-30 498:2012-10-30 473:2012-10-30 452:2012-10-30 427:2012-10-30 406:2012-10-30 365:References 355:Bestseller 339:Stakeknife 312:Ana Montes 290:terrorists 181:informant 151:Bill Gertz 140:Background 130:Bill Gertz 38:Bill Gertz 316:Nicaragua 76:Publisher 60:Terrorism 380:Archived 283:Cold War 258:How the 225:How the 185:and her 44:Language 396:"Sorry" 357:. The 216:Beijing 205:Chi Mak 201:Tai Mak 169:Content 146:Enemies 52:Subject 47:English 272:Moscow 34:Author 239:spies 102:Pages 66:Genre 329:How 324:Cuba 203:and 177:How 155:Cuba 111:ISBN 359:FBI 318:'s 260:FBI 227:CIA 179:FBI 105:304 567:: 536:. 165:. 522:. 501:. 476:. 455:. 430:. 409:. 341:. 303:. 274:. 248:. 241:. 222:. 211:. 196:.

Index


Bill Gertz
United States Politics
Terrorism
non-fiction
ISBN
978-0-307-33806-8
Bill Gertz
national security
Bill Gertz
Cuba
intelligence
North Korea
FBI
Katrina Leung
FBI handler
J. J. Smith
electronic eavesdropping
Tai Mak
Chi Mak
defense technology
Beijing
Virginia class submarines
CIA
clandestine service
Chinese intelligence
spies
US government
penetration agent
FBI

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑