Stober, Dan, and Ian Hoffman. A Convenient Spy: Wen Ho Lee and the Politics of Nuclear Espionage. New York: Simon & Schuster, 2001.
Epstein, Wall Street Journal, 16 Jan. 2002, says that Stober and Hoffman "brilliantly unravel" this "curious case." However, the question of why Wen Ho Lee copied what he did onto his computer is not answered, although the authors "find implausible [his] claim that he wanted to protect the data from computer failure." To Marston, Baltimore Sun, 19 Jan. 2002, this book, "like the Lee probe itself, struggles -- and mostly succeeds -- in making immensely complex scientific concepts understandable to a lay reader. Despite the collapse of the government's case, however, the authors are unconvinced of Lee's innocence."
For Panofsky, American Scientist, Jul.-Aug. 2002, the authors "offer an excellent sequential account of [a] complex series of events. They also cover facets of China's nuclear weapons program, emphasizing in particular that the Chinese have been much more forthcoming than they are given credit for.... [This] excellent, sober and factual account is well worth reading for the light it sheds on murky events." Bamford, Washington Post, 20 Jan. 2002, sees A Convenient Spy as "a well-written cautionary tale that dissects what can happen when race, ambition and politics mix with espionage, criminal law and foreign policy."
Stockinger, Edwin. "Five Weeks at Phalane." Studies in Intelligence 17, no. 1 (Spring 1973): 11-19.
Laotian paramilitary units fight North Vietnamese regulars for Muang Phalane in 1971.
Stockton, Bayard. Flawed Patriot: The Rise and Fall of CIA Legend Bill Harvey. Dulles, VA: Potomac, 2006.
Click for reviews.
1. "Policing During the Malayan Emergency." In Policing and Decolonisation: Nationalism, Politics and the Police, 1917-1965, eds. David M. Anderson and David Killingray, 105-126. Manchester: Manchester University Press 1992.
2. ed. Malaya: Part II: The Communist Insurrection, 1948-53. London: HMSO, 1995.
Stockwell, John. After the Cold War: The CIA and the National Security State. Boston: South End Press, 1990.
Is this the same book noted in an advertisement? The Praetorian Guard: The U.S. Role in the New World Order (Boston: South End Press). From advertisement: "Ex-CIA agent John Stockwell analyzes the CIA and other institutional forces shaping U.S. domestic and foreign policy. Includes a selected bibliography on the national security state."
Stockwell, John. In Search of Enemies: A CIA Story. New York: Norton, 1979.
Pforzheimer identifies this book as an attack on the CIA -- particularly the clandestine services -- by a disaffected former case officer who headed the CIA's Angola Task Force in 1975-1976. Constantinides sees Stockwell providing a view of the CIA's "personnel, administration, and mental outlook that stemmed from first-hand experience." The book's allegations were overshadowed by the legal wrangling surrounding his failure to submit the book for the CIA's prepublication review.
To Blum, NameBase, the book "chronicles the political evolution of a CIA officer that culminated in his resignation from the Agency.... The book deals primarily with Angola and is most instructive about the world of mercenaries and about Joseph Mobutu, the notoriously unscrupulous leader of Zaire and CIA comrade-in-arms."
Stokes, David R. "The Tunnel Time Forgot." Intelligencer 16, no. 1 (Spring 2008): 67-68.
This is a brief review of circumstances surrounding the Berlin Tunnel.
Stolberg, Sheryl Gay, and Mark Mazzetti. "Suicide Bombing Puts a Rare Face on C.I.A.'s Work." New York Times, 7 Jan. 2010. [http://www.nytimes.com]
Following the suicide bombing at a CIA base in the remote mountains of Afghanistan, "details of the lives of the victims -- five men and two women, including two C.I.A. contractors... -- have begun to trickle out, despite the secretive nature of their work.... Their deaths were a significant blow to the agency, crippling a team responsible for collecting information about militant networks in Afghanistan and Pakistan and plotting missions to kill the networks' top leaders."
Stoll, Clifford. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage. New York: Doubleday, 1989. London: Bodley Head, 1990.
Surveillant 1.1 says this is the "well-told story of the discovery of a clever computer system interloper in search of defense secrets for ... the KGB." It received the Best American Intelligence Book award for 1989, given by NISC. Petersen sees it as an "[i]nteresting but overpublicized account of low-level computer spying."
Stolyarova, Galina. "Professors Go On Trial for Espionage." St. Petersburg Times, 7 Sep. 2011. [http://www.times.spb.ru]
"Yevgeny Afanasiev and Svyatoslav Bobyshev are professors at the city's State Military Mechanical University who both spent several months in China in 2009, lecturing at the Polytechnical University in Harbin. Prosecutors now allege that in April and May 2009, both professors passed classified information and revealed state secrets to the Chinese secret service."
Stolz, Barbara Ann. "The Foreign Intelligence Surveillance Act of 1978: The Role of Symbolic Politics." Law & Policy 24, no. 3 (Sep. 2002): 269-298.
From Abstract: "Since 1978, the Foreign Intelligence Surveillance Act (FISA) has governed United States intelligence gathering for national security purposes.... FISA established a statutory framework for national security surveillance. Understanding FISA contributes to the study of criminal justice policymaking because law enforcement and intelligence communities view it as an important tool for combatting espionage and terrorism. This article examines the enactment of FISA from the perspective of symbolic politics."
Stolz, Richard. "A Case Officer's First Tour: Assignment Trieste." Studies in Intelligence 37, no. 5 (1994): 53-58.
The former DDO remembers: "[N]ow, even after 40 years, I have strong memories of our first post.... It was the beginning of my lifelong love affair with the men and women of the CIA."
Storrs, Christopher. "Intelligence and the Formulation of Policy and Strategy in Early Modern Europe: The Spanish Monarchy in the Reign of Charles II (1665-1700)." Intelligence and National Security 21, no. 4 (Aug. 2006): 493-519.
From abstract: "There was nothing particularly distinctive about Spain's intelligence machinery. Nor was it always effective.... [However,] intelligence contributed to the remarkable resilience of the Spanish Monarchy in an age of supposed Spanish decline."
Story, Paula. "Accused Spy Flies Home for Holiday." Washington Post, 26 Dec. 1997, A26.
Stouder, Michael D., and Scott Gallagher. "Counterintelligence Outreach: Building a Strategic Capability." International Journal of Intelligence and CounterIntelligence 28, no. 1 (Spring 2015): 143-155.
Return to S Table of Contents
Return to Alphabetical Table of Contents