Bridgland, Fred. Jonas Savimbi: A Key to Africa. New York: Paragon, 1987.
http://www.cloakanddagger.com/dagger: "More than a biography of Savimbi, this work vividly chronicles the changing social and political face of Africa."
Bridis, Ted. "The CIA Dept. of Quirky Tricks: Agency Reveals Gadgets, but You Can't See Them." Washington Post, 31 Dec. 2003, A17. [http://www.washingtonpost.com]
"The CIA's Directorate of Science and Technology is celebrating its 40th anniversary by revealing a few dozen secrets for a new museum inside its headquarters in Langley." In addition to a transmitter disguised as tiger dung (designed for use in the jungles of Vietnam), "the exhibits include a robotic catfish, a remote-controlled dragonfly and a camera strapped to the chests of pigeons released over enemy targets in the 1970s."
Bridis, Ted. "FBI Missed Internal Signs of Espionage." Associated Press, 17 Jan. 2006. [http://www.ap.org]
"By the government's own account, FBI analyst Leandro Aragoncillo was spying in plain sight. He rummaged through FBI computers for intelligence reports unrelated to his work and then e-mailed the classified documents to opposition leaders in the Philippines.... Aragoncillo's lawyers and prosecutors are trying to wrap up a plea deal that would secure a guilty plea and his cooperation.... He is not charged with espionage.... Instead, he's charged in court papers with conspiring to reveal government secrets, acting as a foreign agent and improperly using FBI computers."
Bridis, Ted. "White House Bows to Pressure from High-Tech Industry Over Encryption." Associated Press, 16 Sep. 1999.
On 16 September 1999, the White House agreed "to allow U.S. companies to sell the most powerful data-scrambling technology overseas with virtually no restrictions, a concession to America's high-tech industry over law enforcement and national security objections." See also, Peter S. Goodman and John Schwartz, "Curbs on Export of Secrecy Codes Ending," Washington Post, 17 Sep. 1999, A1; and Declan McCullagh, "Decoding the Crypto Policy Change," Wired News, 17 Sep. 1999.
Brigane, David V. "Credentials -- Bona Fide or False." Studies in Intelligence 4, no. 1 (Fall 1960): 37-49.
"As a tool in the investigation of enemy agents, document analysis can be used to great advantage not only in making an initial detection but in the handling of known agents, inducing them to talk and confirming or refuting their statements.... Document analysis ... can be equally valuable in determining the reliability of one's own agents and in assessing their reports and missions."
Briggs, Asa. Secret Days: Code-breaking in Bletchley Park. London: Frontline, 2011.
Christensen, Cryptologia 36.2 (Apr. 2011), notes that the author "was a codebreaker in Bletchley Park's Hut 6 (German Army and Air Force Enigma)." There are "no surprises" here and the book is not about the details of breaking Enigma. It us a book "about people and work and BP life."
Briggs, Ralph T. "The Day VADM Yamagata Joined His Honorable Ancestors." Cryptolog 10, no. 5 (1989): 1-14.
Petersen: "Also in Naval History 3, no. 2 (1989): 29-35." The shotdown of Yamagata's plane was accomplished on the basis of intelligence gathered by Fleet Radio Unit China, according to a letter signed by Emil Levine in NIPQ, Spring 1996.
Briggs, Thomas. "The Emperor's New Clothes." Intelligencer 10, no. 1 (Winter 1999): 1-2.
The author argues that the DO is disarray today because "[t]here are too many managers and not enough leaders." The better new recruits are leaving the DO because they become frustrated with the mediocre managers above them.
Briggs, Thomas Leo. Cash on Delivery: CIA Special Operations during the Secret War in Laos. Rockville, MD: Rosebank, 2009.
Goulden, Washington Times (12 Mar. 2010) and Intelligencer 17.3 (Winter-Spring 2010), notes that the author "served in Southeast Asia with Air America Inc. ...and then as an agency operations officer. His book is a highly readable account... Briggs offers a succinct (and unapologetic) definition of his work as a CIA special operations officer.... [H]e called in air strikes on enemy supply lines and tank parks, and arranged for ambushes of North Vietnamese troops on their trek south."
For Peake, Studies 54.2 (Jun. 2010) and Intelligencer 18.1 (Fall-Winter 2010), the author "gives vivid examples of how the roadwatch teams were trained and functioned.... Running the roadwatch teams required support and cooperation among several agencies and countries," and Briggs uses specific instances to "illustrate the level of cooperation required among the CIA, the Air Force, and the local nationals."
Wiant, AIJ 28, no. 1 (2010), finds that "[t]his uniquely personal account of Briggs' secret war running agents out of Pak Se Operational Base late in the war is a valuable contribution to the history of this shadow conflict." This book "has a great many strengths"; however, "its occasional whininess ... wears thin.... He charges windmills with some regularity and his acerbic comments about the bureaucratic layers above him periodically grate the reader."
To Jordan, historynet.com, 29 Jul. 2010, this book "gives a rare and valuable glimpse into American involvement in the little publicized secret war in southern Laos, Military Region III.... [C]overt U.S. and Lao activities around the strategic Bolovens Plateau has been largely unreported.... The book is not without flaws. Redundancy and restatement of previously reported information could have been trimmed.... Similarly, the author seems to have concentrated a little too solely on his own role and mission." Nonetheless, this book "should be read, especially by the intelligence professionals dealing with the complex, multifaceted conflicts of the 21st century."
Bright, Martin, Ed Vulliamy, and Peter Beaumont. "Revealed: US Dirty Tricks to Win Vote on Iraqi War." The Observer, 2 Mar. 2003.
An NSA memorandum "leaked to The Observer" reveals that the United States is conducting an "aggressive surveillance operation, which involves interception of the home and office telephones and the emails of UN delegates in New York." Clark comment: The purported NSA document is filled with easily identifiable "Briticisms."
Brinkley, David A., and Andrew W. Hull. Estimative Intelligence: A Textbook on the History, Products, Uses, and Writing of Intelligence Estimates. Columbus, OH: Batelle, 1979.
Brinkley, Douglas. "The Right Choice for the C.I.A.: Lake Is a Victim of the Far Right." New York Times, 10 Feb. 1997, A15 (N).
"Mr. Lake has been on the radical right's enemies list since 1970.... But if his detractors examined his record, they would see that he is not the ideological foe they portray him to be."
Brinkley, Joel. [arranged chronologically]
1. "C.I.A. Primer Tells Nicaraguans Rebels How to Kill." New York Times, 17 Oct. 1984, A1.
2. "Democrats Assail C.I.A. Primer for Latin Rebels." New York Times, 18 Oct. 1984, A6.
3. "President Orders 2 Investigations on C.I.A. Manual." New York Times, 19 Oct. 1984, A1.
4. "Nicaraguan Rebel Disputes U.S. Aide." New York Times, 20 Oct. 1984, A1-A3.
5. "Adviser Says Reagan Will Dismiss Officials Linked to Rebel Primer." New York Times, 22 Oct. 1984, A1, A10.
6. "Rebel Asserts C.I.A. Pledge Help in War Against Sandinistas." New York Times, 1 Nov. 1984, A1, A14.
7. "C.I.A. Chief Defends Manual for Nicaraguan Rebels." New York Times, 2 Nov. 1984, A3.
Brinkley, Joel. "Ex-C.I.A. Aides Say Iraq Leader Helped Agency in 90's Attacks." New York Times, 9 Jun. 2004. [http://www.nytimes.com]
According to "several former intelligence officials," Iraqi prime minister-designate Iyad Alawi "ran an exile organization [the Iraqi National Accord] intent on deposing Saddam Hussein that sent agents into Baghdad in the early 1990's to plant bombs and sabotage government facilities under the direction of the C.I.A."
Brinkley, Joel, and Philip Shenon. "Ridge Meeting Opposition from Agencies." New York Times, 6 Feb. 2002, A16.
Return to B Table of Contents
Return to Alphabetical Table of Contents