S - Sak


Sabine, David B. "Pinkerton's 'Operative': Timothy Webster." Civil War Times Illustrated 12, no. 5 (1973): 32-38.


Sachse, William L. "Our Naval Attaché System: Its Origins and Developments to 1917." U.S. Naval Institute Proceedings 72 (May 1946): 661-672. [Calder]


Sacquety, Troy J.

1. The OSS in Burma: Jungle War against the Japanese. Lawrence, KS: University Press of Kansas, 2013.

From publisher: The author recounts the story of OSS's Detachment 101 "with a depth of detail that makes the ... Burmese theater come ... alive. He describes the organizational evolution of Detachment 101 and shows how the unit's flexibility allowed it to evolve to meet the changing battlefield environment. He depicts the Detachment's two sharply contrasting field commanders: headstrong Colonel Carl Eifler,... and the more measured Colonel William Peers.... He also highlights the heroic Kachin tribesmen, fierce fighters defending their tribal homeland."

2. ed. "Behind Japanese Lines in Burma." Studies in Intelligence 11 (Fall-Winter 2001): 67-79.

The editor introduces and presents a letter from OSS Detachment 101's legendary chief, Carl F. Eifler, to Carl Hoffman, head of OSS activities in the CBI theater. In the letter, Eifler describes flying into one of the Detachment's isolated bases, losing his plane, and then walking back through the Burmese countryside and Japanese lines.


Sadler, Brent. "In the Sights of a Joystick Killing Machine: CNN Gets Rare Up-close Look at Predator Drones." CNN, 9 Jun. 2006. [http://www.cnn.com]

The MQ-1L Predator has a 48.7-foot wingspan, cruises at 80 miles an hour, and can fly for 20 hours with a range of 450 miles on 100 gallons of fuel. It carries an array of cameras and sensors in a nose pod, and its video camera has both electric optic and infrared capability. Predators fly over Afghanistan, "but they are hands-on controlled by pilots and sensor operators at Nellis Air Force Base through a satellite KU band link. Kandahar's ground controllers launch and recover the Predators."


Sadler, Lori M. [COL/USMC] "Improving National Intelligence Support to Marine Corps Expeditionary Forces." American Intelligence Journal 13, no. 3 (Summer 1992): 49-51.


Safford, Laurance F.

Safire, William. "CIA-ese." In Safire's Political Dictionary, 115-118. New York: Random House, 1979. [Petersen]


Safire, William. "I Remember Larry." New York Times, 2 Jan. 1997, A19.

Safran, Nadav. "Trial by Ordeal: The Yom Kippur War, October 1973." International Security 2, no. 2 (Fall 1977): 133-170.

Calder finds that this article provides an "especially insightful discussion."


Sagar, Rahul. Secrets and Leaks: The Dilemma of State Secrecy. Princeton, NJ: Princeton University Press, 2013.

Manosevitz, Studies 58.3 (Sep. 2014), says the author "provides a thoughtful and well-researched analysis of the regulation of intelligence activities.... [H]e takes care to address the vast literature dealing with US intelligence programs....The chapters read like short, self-contained lectures." Sagar argues that whistleblowers, anonymous leakers, and the press are "the most effective [actors] in keeping the executive in check because they galvinize the judiciary and Congress into action."


Sage, Adam. "France 'Did Deal' to Capture Jackal." Times (London), 16 Oct. 1999. [http:// www.the-times.co.uk]

"Fresh evidence emerged [on 15 October 1999] to support claims that France secured the 1994 capture of Carlos the Jackal through a secret deal to supply military equipment to Sudan."


Sage, Adam. "French to Sue US and Britain over Network of Spies." Times (London), 10 Feb. 2000. [http://www.the-times.co.uk]

French lawyers "are planning a class action" against the U.S. and British governments over the Echelon monitoring system.

[France/00; NSA/Echelon]

Sageman, Marc. Leaderless Jihad: Terror Networks in the Twenty-first Century. Philadelphia: University of Pennsylvania Press, 2008.

Hoffman, FA 87.3 (May-Jun. 2008), takes issue with the author's premise that the "true menace" to the United States and the West "is not a revived al Qaeda" but "loose-knit cells of Western-born Muslims or Muslim immigrants studying and working in the West." The reviewer believes that this is a "fundamental misreading of the al Qaeda threat." This work "founders precisely" on what its author "claims are its strengths: the empirical data on which his analysis is based and his technique of examining terrorism as a social movement."

For Sinai, Intelligencer 16.1 (Spring 2008), the author's "research is unique in the field of al Qaeda studies ... because of his 'evidence-based' approach." This is a "masterpiece," but it "is not perfect in all aspects. Some of [Sageman's] arguments are insufficiently explained or inadequately sourced." In addition, his "use of citations is sometimes clumsy." Nonetheless, "Sagemen's incisive observations based on carefully examined evidence, astute insights and scholarship make Leaderless Jihad the gold standard in al Qaeda studies."

Peake, Studies 52.3 (Sep. 2008), finds that the author provides "an insightful chapter [on] the way networks communicate using the Internet to sustain their motivation and to plan operations." The path that Sageman prescribes for countering the al Qaeda threat "makes sense and is deserving of serious attention."

After acknowledging criticisms directed at Leaderless Jihad by others, Goodwin, Perspectives on Politics 6.4 (Dec. 2008) and 7.1 (Mar. 2009), concludes that the work "is a very interesting and thoughtful study," and argues that "it is one of the most important works available on the transnational movement." However, there are "some ambiguities" with the author's data; and "he never presents his data in any standard tabular form."


Sageman, Marc. Understanding Terror Networks. Philadelphia: University of Pennsylvania Press, 2004.

Pinkley, Studies 49.2 (2005), finds that this work has sufficient limitations that readers "are advised to proceed with caution." Nevertheless, the author manages "to make some useful observations working exclusively with unclassified information, despite its flaws." For Hoffman, FA 87.3 (May-Jun. 2008), this is "an important work" that "provocatively challenged the conventional wisdom that victory in the war on terrorism would be achieved by killing and capturing" al Qaeda's leadership.


Sager, John. Uncovered: My Half-Century with the CIA. Bloomington, IN: WestBow Press, 2013

For Peake, Studies 57.4 (Dec. 2013), readers of this memoir will no longer have to imagine what life in the CIA before the Internet was like. The author served from the 1950s until 1991, and he "provides a useful glimpse of a valuable career."


St. John, Peter. "Canada's Accession to the Allied Intelligence Community 1940-1945." Conflict Quarterly 4, no. 4 (1984): 5-21. [Petersen]


Sakakida, Richard, and Wayne S. Kiyosaki. A Spy in Their Midst: The World War II Struggle of a Japanese-American Hero. Lanham, MD: University Press of America, 1995.

According to Surveillant 4.4/5, Sakakida was captured by the Japanese while working as a U.S. Army spy in the Philippines. He "narrowly escaped a death sentence and was assigned to the office of a Japanese official, where he gained valuable military information for MacArthur and engineered a daring prison break that freed a Filipino guerrilla leader and hundreds of his followers." Mercado, IJI&C 12.2, finds that Dr. Kiyosaki "paints a colorful portrait of Sakakida as a CIC agent..., [but] leaves too many gaps in the story." Nonetheless, it is an "inspiring story of perseverance in duty."

[WWII/FEPac/Nisei & Philippines]

Sakharov, Vladimir, and Umberto Tosi. High Treason. New York: Putnam's, 1980. New York: Ballantine, 1981. [pb]

Sakkas, Peter E. "Espionage and Sabotage in the Computer World." International Journal of Intelligence and Counterintelligence 5, no. 2 (Summer 1991): 155-202.

The focus here is on the vulnerability of computers to various kinds of attack.


Sakmyster, Thomas. Red Conspirator: J. Peters and the American Communist Underground. Urbana, IL: University of Illinois Press, 2011.

Adams, IJI&C 25.1 (Spring 2012), finds that "the meticulous research and evenhanded narrative" of the author has provided a more accurate assessment of Peters' life work. This is an "authoritative account." For Chambers, Intelligencer 18.3 (Summer-Fall 2011), "[t]he book's approach and tone are scholarly. The findings are electrifying, particularly the author's main conclusion: J. Peters operated his own infiltration networks." Peake, Studies 56.2 (Jun. 2012), believes that "Red Conspirator fills a gap in the story of communist agents and activity in America. It is an important contribution to counterintelligence history."


Return to S Table of Contents

Return to Alphabetical Table of Contents