210
Views
0
CrossRef citations to date
0
Altmetric
Article

One size does not fit all: rollback orthodoxy and Anglo-American covert action in Albania and Ukraine in the early Cold War

Pages 599-619 | Received 13 Sep 2023, Accepted 16 Nov 2023, Published online: 24 Nov 2023

Bibliography

Archives and Primary Sources

  • The CIA Records Search Tool (CREST).
  • Dwight, D. Eisenhower Presidential Library, Abilene, Kansas (DDEL).
  • National Archives and Records Administration, College Park, MA, United States (NARA).
  • The National Archives, Kew, United Kingdom (TNA).
  • Nelson, A. K., ed. The State Department Policy Planning Staff Papers, 1947–9. Vols. I–III. New York: Garland Publishing, 1983.
  • US Department of State. FRUS 1948, General; the United Nations, Volume 1 Part 2 (Washington: United States Government Printing Office, 1976).
  • US Department of State. FRUS 1950, National Security Affairs; Foreign Economic Policy, Vol. 1 (Washington: United States Government Printing Office, 1977).
  • US Department of State. Foreign Relations of the U.S., 1945–1950, Emergence of the Intelligence Establishment (Washington: United States Government Printing Office, 1996).

Secondary Sources

  • [Author redacted]. “James J. Angleton, Anatoliy Golitsyn, and the ‘Monster Plot’: Their Impact on CIA Personnel and Operations.” Studies in Intelligence 55, no. 4 (2011): 39–55.
  • Bethell, N. The Great Betrayal: The Untold Story of Kim Philby’s Biggest Coup. London: Hodder and Stoughton, 1984.
  • Bethell, N., R. Elsie, and B. Destani, eds. The Albanian Operation of the CIA and MI6, 1949-1953: Conversations with Participants in a Venture Betrayed. Jefferson, NC: McFarland, 2016.
  • Burds, J. “Agentura: Soviet Informants’ Networks & the Ukrainian Underground in Galicia, 1944-48.” East European Politics and Societies 11, no. 1 (1996): 89–130.
  • Burds, J. The Early Cold War in Soviet West Ukraine, 1944-1948. Pittsburgh: Russian and East European Studies Program, University of Pittsburgh, 2001.
  • Callanan, J. Covert Action in the Cold War: US Policy, Intelligence, and CIA Operations. London; New York: I.B. Tauris, 2010.
  • Corke, S.-J. US Covert Operations and Cold War Strategy: Truman, Secret Warfare and the CIA, 1945-53. London; New York: Routledge, 2007.
  • Cormac, R. “The Pinprick Approach: Whitehall’s Top-Secret Anti-Communist Committee and the Evolution of British Covert Action Strategy.” Journal of Cold War Studies 16, no. 3 (2014): 5–28. doi:10.1162/JCWS_a_00469.
  • Cormac, R. Disrupt and Deny: Spies, Special Forces, and the Secret Pursuit of British Foreign Policy. Oxford: Oxford University Press, 2018.
  • Dervishi, K. Sigurimi I Shtetit, 1944-1991: Historia e Policisë Politike të Regjimit Kommunist [History of the Political Police of the Communist Regime]. Tirana: Shtëpia Botuese 55, 2012.
  • Evangelista, M. “Stalin’s Postwar Army Reappraised.” International Security 7, no. 3 (1982): 110–138. doi:10.2307/2538554.
  • Evangelista, M. “Commentary. The ‘Soviet Threat’: Intentions, Capabilities, and Context.” Diplomatic History 22, no. 3 (1998): 439–449.
  • Felix, C., and (pseudonym for James McCargar). A Short Course in the Secret War. New York; Oxford: Lanham, 2001.
  • Grose, P. Operation Rollback: America’s Secret War Behind the Iron Curtain. Boston: Houghton Mifflin, 2000.
  • Hoxha, E. The Anglo-American Threat to Albania: Memoirs of the National Liberation War. Tirana: 8 Nëntori, 1982.
  • Jeffery, K. The Secret History of MI6, 1909-1949. New York: Penguin, 2010.
  • Jeffreys-Jones, R. In Spies We Trust: The Story of Western Intelligence. Oxford: Oxford University Press, 2013.
  • Long, S. The CIA and the Soviet Bloc: Political Warfare, the Origins of the CIA and Countering Communism in Europe. London, New York: I.B. Tauris, 2014.
  • Long, S. “CIA-MI6 Psychological Warfare and the Subversion of Communist Albania in the Early Cold War.” Intelligence & National Security 35, no. 6 (2020): 787–807. doi:10.1080/02684527.2020.1754711.
  • Long, S. “‘Inexpensive to Us and Yet Very Valuable to the Impoverished Albanian people’: Covert Foreign Aid and the Anglo-American Subversion of Albania, 1951-55.” Cold War History (in press).
  • Macintyre, B. A Spy Among Friends: Kim Philby and the Great Betrayal. London: Bloomsbury, 2014.
  • Markus, U. “Soviet Counterinsurgency: A Case Study of the Guerrilla Wars in Lithuania and Western Ukraine, 1944-1953.” PhD thesis., University of London, 1992.
  • Mitrovich, G. Undermining the Kremlin: America’s Strategy to Subvert the Soviet Bloc, 1947–1956. London; Ithaca: Cornell University Press, 2000.
  • O’Rourke, L. A. Covert Regime Change: America’s Secret Cold War. Ithaca; London: Cornell University Press, 2018.
  • Pearson, O. Albania as Dictatorship and Democracy: From Isolation to the Kosovo War, 1946-1998. New York: I.B. Tauris, 2006.
  • Roberts, J. “State Preferences, Viable Alternatives, and American Covert Action, 1946-1989.” Intelligence & National Security 38, no. 4 (2023): 501–524. doi:10.1080/02684527.2022.2123937.
  • Rositzke, H. The Cia’s Secret Operations. New York: Reader’s Digest Press, 1977.
  • Shanto, P. ‘Bora Filloi’ E Vërteta Mbi Radiologën ‘Liqeni I Vajkalit’ [‘The Snow Started’ and the Truth About the ‘Lake Vajkal’ Radio Operation]. Tirana: Filara, 2008.
  • Totrov, Y. “Western Intelligence Operations in Eastern Europe, 1945-1954.” Journal of Intelligence History 5, no. 1 (2005): 71–80.
  • Tromly, B. “The Making of a Myth: The National Labor Alliance, Russian Émigrés, and Cold War Intelligence Activities.” Journal of Cold War Studies 18, no. 1 (2016): 80–111. doi:10.1162/JCWS_a_00620.
  • Tudda, C. ‘The Truth is Our Weapon’: The Rhetorical Diplomacy of Dwight D. Eisenhower and John Foster Dulles. Baton Rouge: Louisiana State University Press, 2006.
  • Viatrovych, V. The Ukrainian Insurgent Army: A History of Ukraine’s Unvanquished Freedom Fighters. Lviv: Center for Liberation Movement Research, 2008.
  • Weiner, T. Legacy of Ashes: The History of CIA. New York: Anchor, 2007.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.