Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Social sciences > Politics & government > International relations > Espionage & secret services
Downsizing, outsourcing, and intensifying performance management have become common features of corporate restructuring. They have also helped to drive up job insecurity and inequality. Under what conditions do companies take alternative approaches to restructuring that balance market demands for profits with social demands for high quality jobs? In Exit, Voice, and Solidarity, Doellgast compares strategies to reorganize service jobs in the US and European telecommunications industries. Market liberalization and shareholder pressure pushed employers to adopt often draconian cost cutting measures, while labor unions pushed back with creative collective bargaining and organizing campaigns. Their success depended on the intersection of three factors: constraints on employer exit, support for collective worker voice, and strategies of inclusive labor solidarity. Together, these proved to be crucial sources of worker power in fights to keep high quality jobs within core employers, while extending decent pay and conditions across increasingly complex networks of subsidiaries, subcontractors, and temporary agencies. Based on research at incumbent telecom companies in Denmark, Sweden, Austria, Germany, France, Italy, UK, US, Czech Republic, and Poland, this book provides an original framework for analyzing cross-national differences in restructuring strategies and outcomes.
Agents of Subversion reconstructs the remarkable story of a botched mission into Manchuria, showing how it fit into a wider CIA campaign against Communist China and highlighting the intensity-and futility-of clandestine operations to overthrow Mao. In the winter of 1952, at the height of the Korean War, the CIA flew a covert mission into China to pick up an agent. Trained on a remote Pacific island, the agent belonged to an obscure anti-communist group known as the Third Force based out of Hong Kong. The exfiltration would fail disastrously, and one of the Americans on the mission, a recent Yale graduate named John T. Downey, ended up a prisoner of Mao Zedong's government for the next twenty years. Unraveling the truth behind decades of Cold War intrigue, John Delury documents the damage that this hidden foreign policy did to American political life. The US government kept the public in the dark about decades of covert activity directed against China, while Downey languished in a Beijing prison and his mother lobbied desperately for his release. Mining little-known Chinese sources, Delury sheds new light on Mao's campaigns to eliminate counterrevolutionaries and how the chairman of the Chinese Communist Party used captive spies in diplomacy with the West. Agents of Subversion is an innovative work of transnational history, and it demonstrates both how the Chinese Communist regime used the fear of special agents to tighten its grip on society and why intellectuals in Cold War America presciently worried that subversion abroad could lead to repression at home.
This revealing selection of highly classified material provides a fascinating inside look at the workings and the thinking of the KGB. The informative commentary by Christopher Andrew is based on joint analysis of the documents with Oleg Gordievsky, a former KGB colonel who had been working as a double agent for British intelligence.
James Lockhart blends Chilean, inter-American and transatlantic national, regional and world-historical trends into a century-long Cold War narrative. He argues that Chileans made their own history as highly engaged internationalists while reassessing American and other foreign-directed intelligence, surveillance and secret warfare operations in Chile and southern South America. The book transcends a well-known, US-centred historiography while offering a more equitable and global interpretation of Chile's Cold War experience than previously possible. This advances research that has progressively expanded the framework of Chile's Cold War experience since the arrest of General Augusto Pinochet in the UK for human rights violations more than 20 years ago.
In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking their movements and transactions with public and private institutions. The state is becoming like a one-way mirror, where it can see more of what its citizens do and say, while citizens see less and less of what the state does, owing to high levels of secrecy around surveillance. In this book, Jane Duncan assesses the relevance of Snowden’s revelations for South Africa. In doing so she questions the extent to which South Africa is becoming a surveillance society governed by a surveillance state. Duncan challenges members of civil society to be concerned about and to act on the ever-expanding surveillance capacities of the South African state. Is surveillance used for the democratic purpose of making people safer, or is it being used for the repressive purpose of social control, especially of those considered to be politically threatening to ruling interests? She explores the forms of collective action needed to ensure that unaccountable surveillance does not take place and examines what does and does not work when it comes to developing organised responses. This book is aimed at South African citizens, academics as well as the general reader, who care about our democracy and the direction it is taking.
Intelligence and Espionage: Secrets and Spies provides a global introduction to the role of intelligence - a key, but sometimes controversial, aspect of ensuring national security. Separating fact from fiction, the book draws on past examples to explore the use and misuse of intelligence, examine why failures take place and address important ethical issues over its use. Divided into two parts, the book adopts a thematic approach to the topic, guiding the reader through the collection and analysis of information and its use by policymakers, before looking at intelligence sharing. Lomas and Murphy also explore the important associated activities of counterintelligence and the use of covert action, to influence foreign countries and individuals. Topics covered include human and signals intelligence, the Cuban Missile Crisis, intelligence and Stalin, Trump and the US intelligence community, and the Soviet Bloc. This analysis is supplemented by a comprehensive documents section, containing newly released documents, including material from Edward Snowden's leaks of classified material. Supported by images, a comprehensive chronology, glossary, and 'who's who' of key figures, Intelligence and Espionage is an invaluable resource for anyone interested in the role of intelligence in policymaking, international relations and diplomacy, warfighting and politics to the present day.
MI6 is one of Britain’s most elusive organisations. Its head, Richard Dearlove, is virtually unknown – a contemporary photograph has never appeared in the press. Britain’s Secret Intelligence Service clamps down on any dissident reports of its activities and despite the architectural prominence of its London headquarters at Vauxhall Cross, its operations and structures remain veiled from scrutiny. Even its true budget is a secret. To write about MI6 risks harassment and prosecution, as former members and current commentators know to their cost. It is impossible, under the laws presently shielding MI6 and its sister service, MI5, to write about its daily activities: there is no right to know what is undertaken abroad today in the name of Britain’s security. But MI6 has a history, and that reveals a great deal. Stephen Dorril is a meticulous observer and chronicler of the security services, and in this portrait he offers the fullest possible vision of MI6’s motives, character and, crucially, what it has done and where it has been most influential. At the beginning of the Cold War, Britain was a global power literally dividing up the world. By 1992 influence abroad had been lost in the Middle East, most of Africa and large swathes of Asia, and even in Europe Britain seemed exiled and isolated. What had MI6 been doing? MI6’s post-war activities were grounded in pre-war attitudes and practices, at home in the clubs of Pall Mall and St James but little suited to a retreating post-imperial power. Britain’s management of the Cold War was in the itching hands of a mixture of frustrated former members of the wartime SOE, desperate for active military engagements, anxious reactionaries who saw more to fear from Clement Attlee’s Labour Party than from any red menace abroad, and a few socialist devotees for whom communism was the future and spying the career of choice. Here for the first time is an operational history of MI6’s activities and attitudes in action. It is at times stirring, at other times full of bathos or low farce. Symbolic of the entire period is the lengthy and expensive operation to dig a tunnel under East Berlin to intercept Soviet information. The tunnel took years to dig, and was known to the East Germans before it became operational. When it finally went live it intercepted such a vast amount of data that it took decoders in the UK three years to sift through all the information – by which time those items that were not faked were out of date. MI6 is a vital, essential arm of the state. It is Britain’s player at the chessboard of international intelligence-gathering. Dorril’s is a searching story of the characters and situations in which the games have been played, from the back streets of Aden to the Brandenburg Gate, the mountains of Albania to the shores of the Black Sea. This is a discreet history of half a century of international political intriguing, spying and thuggery – all in the name of intelligence.
A unique theory of what happens when leaders fear a revolution abroad will spread to their own country and how that affects international relations. When do leaders fear that a revolution elsewhere will spread to their own polities, and what are the international effects of this fear? In Revolutionary Contagion, Chad E. Nelson develops and tests a theory that explains how states react to ideological-driven revolutions that have occurred in other nations. To do this, he analyzes four key revolutionary movements over two centuries-liberalism, communism, fascism, and Islamism. He further explains that the key to understanding the response to revolutions lies in focusing on the extent to which leaders fear upheaval in their own countries. According to the theory, Nelson argues, fear of contagion is driven more by the characteristics of the host rather than the activities of the infecting agents. In other words, leaders will fear revolutionary contagion when they have significant revolutionary opposition movements that have an ideological affinity with the revolutionary state. A powerful theory of the profound effects revolutions have on international relations, this book shows why one simply cannot make sense of international politics-including patterns of alliances and wars-in certain situations without considering the fear of contagion.
A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace. Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates the exploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace.
Winston Churchill authorised the creation of a new wartime secret service, the Special Operations Executive(SOE), with the order "And now set Europe ablaze". On behalf of the Secret WW2 Network, an educational charity dedicated to revealing hitherto-secret operations to the current generation, Paul McCue tells a main story of four Brighton and Hove-born agents honoured with blue plaques. He details the organisation's creation and post-war demise, its training methods and the missions of the four chief subjects. He also covers three other agents, a special duties RAF pilot and the inspiration for 'Q', the inspired 'boffin' of the James Bond books and films - all of whom had links with the city.Some enjoyed great success, others were doomed to failure and death, but all displayed the volunteer spirit and courage that saw Britain through the darkest days of the Second World War. Their stories, largely little known,deserve to be told.
*** The Sunday Times bestseller *** 'Vividly imagined and prodigiously researched' Helen Davies, Sunday Times, Books of the Year 'Such a rewarding read' John Preston, Daily Mail, Books of the Year 'This odd, secretive man is brought to life', Robbie Millen, The Times, Books of the Year Maxwell Knight was a paradox. A jazz obsessive and nature enthusiast (he is the author of the definitive work on how to look after a gorilla), he is seen today as one of MI5's greatest spymasters, a man who did more than any other to break up British fascism during the Second World War - in spite of having once belonged to the British Fascisti himself. He was known to his agents and colleagues simply as M, and was rumoured to be part of the inspiration for the character M in the James Bond series. Knight became a legendary spymaster despite an almost total lack of qualifications. What set him apart from his peers was a mercurial ability to transform almost anyone into a fearless secret agent. He was the first in MI5 to grasp the potential of training female agents. M is about more than just one man however. In its pages, Hemming reveals for the first time in print the names and stories of seven men and women recruited by Knight, on behalf of MI5, and then asked to infiltrate the most dangerous political organizations in Britain at that time. Until now, their identities have been kept secret outside MI5. Drawn from every walk of life, they led double lives-often at great personal cost-in order to protect the country they loved. With the publication of this book, it will be possible at last to celebrate the lives of these courageous, selfless individuals. Drawing on declassified documents, private family archives and interviews with retired MI5 officers as well as the families of MI5 agents, M reveals not just the shadowy world of espionage but a brilliant, enigmatic man at its centre.
When Edward Snowden began leaking NSA documents in June 2013, his actions sparked impassioned debates about electronic surveillance, national security, and privacy in the digital age. The Snowden Reader looks at Snowden's disclosures and their aftermath. Critical analyses by experts discuss the historical, political, legal, and ethical issues raised by the disclosures. Over forty key documents related to the case are included, with introductory notes explaining their significance: documents leaked by Snowden; responses from the NSA, the Obama administration, and Congress; statements by foreign leaders, their governments, and international organizations; judicial rulings; findings of review committees; and Snowden's own statements. This book provides a valuable introduction and overview for anyone who wants to go beyond the headlines to understand this historic episode.
State secrecy is increasingly used as the explanation for the shrinking of public discussion surrounding national security issues. The phrase that's classified" is increasingly used not to protect national secrets from legitimate enemies, but rather to stifle public discourse regarding national security. Washington today is inclined to see secrecy as a convenient cure to many of its problems. But too often these problems are not challenges to national security, they involve the embarrassment of political figures, disclosure of mismanagement, incompetence and corruption and even outright criminality.For national security issues to figure in democratic deliberation, the public must have access to basic facts that underlie the issues. The more those facts disappear under a cloak of state secrecy, the less space remains for democratic process and the more deliberation falls into the hands of largely unelected national security elites. The way out requires us to think much more critically and systematically about secrecy and its role in a democratic state.
Presents evidence suggesting collusion between US and Israeli intelligence in the attack on a US naval surveillance vessel during the Six-Day War and the more than fifty-year long cover-up. On June 8, 1967, the USS Liberty, an unarmed intelligence ship reporting to the Joint Chiefs of Staff under the auspices of the National Security Agency, was positioned in international waters off the coast of Egypt when it was attacked with deadly violence by unmarked jet planes firing rockets and machine guns and throwing napalm onto its deck. This ambush was followed by a torpedo strike that blew a forty-foot hole in the starboard side of the ship. Lacking the capacity to defend themselves, thirty-four sailors were killed and 174 wounded, many for life. By the end of the day, Israel had confessed to having been the aggressor, simultaneously arguing that the attack had been an "accident" and a "mistake." The facts said otherwise. So intense and sustained was the attack - it lasted for nearly an hour and a half - so specific was the aiming for the antennae and satellite dish on deck, that it was scarcely credible that Israel's aggression was not deliberate; such was the view of Marshall Carter, the director of the National Security Agency, his deputy director Louis Tordella, and Richard Helms, the Director of Central Intelligence. Based on interviews with more than forty survivors, knowledgeable political insiders, and Soviet archives of the period, investigative writer Joan Mellen presents evidence suggesting complicity between US and Israeli intelligence in the attack on Liberty and the more than fifty-year long cover-up. What were the underlying motives? Was this a false flag operation conducted in the midst of the Six-Day War? Was it conceivable that Israel would have initiated such an operation without a green light from the United States? For the sake of justice, truth and the murdered and surviving sailors, this is a story demanding to be told.
Revolutionary War officer Nathan Hale, one of America's first spies, said, "Any kind of service necessary to the public good becomes honorable by being necessary." A statue of Hale stands outside CIA headquarters, and the agency often cites his statement as one of its guiding principles. But who decides what is necessary for the public good, and is it really true that any kind of service is permissible for the public good? These questions are at the heart of James M. Olson's book, "Fair Play: The Moral Dilemmas of Spying," Olson, a veteran of the CIA's clandestine service, takes readers inside the real world of intelligence to describe the difficult dilemmas that field officers face on an almost daily basis. Far from being a dry theoretical treatise, this fascinating book uses actual intelligence operations to illustrate how murky their moral choices can be. Readers will be surprised to learn that the CIA provides very little guidance on what is, or is not, permissible. Rather than empowering field officers, the author has found that this lack of guidelines actually hampers operations. Olson believes that U.S. intelligence officers need clearer moral guidelines to make correct, quick decisions. Significantly, he believes these guidelines should come from the American public, not from closed-door meetings inside the intelligence community. "Fair Play" will encourage a broad public debate about the proper moral limits on U.S. intelligence activities.
Venice, 1522. Intelligence arrives from the east confirming Europe's greatest fear: the vastly rich Ottoman Sultan has all he needs to wage total war - and his sights are set on Rome. With Christendom divided, Suleyman the Magnificent has his hand on its throat. From the palaces of Istanbul to the blood-soaked fields of central Europe and the scorched coasts of north Africa, The Lion House pioneers a bold new style of eye-witness history to tell a true story of power at its most glittering, personal and perilous: Suleyman's rise to become the most feared and powerful man of the sixteenth century. It is a journey built on brutal choices and intimate relationships - with the Greek slave who becomes his closest friend, the Venetian plutocrat who sells him gems and wins him allies, the Russian consort who steals his heart. Within a decade, Suleyman has mastery over millions of souls, from Baghdad to the walls of Vienna, while his pirate admiral Barbarossa dominates the Mediterranean. And yet the real drama takes place in small rooms and whispered conversations: as the Sultan exchanges love letters with his own vizier; as he awakes in terror after dreaming of his own assassination. The Lion House is not just the story of two civilisations in an existential duel and of one of the most consequential lives in world history. It is a tale of the timeless pull of power, dangerous to live with, deadly to live without.
By shifting American security policy away from maximizing military power for the United States and toward maximizing human security for all, policymakers and citizens can also maximize national security for the United States and sustainable peace for the world. Why do war and political violence persist? Political realists argue that violent conflict and the struggle for power are inherent in the international system, and there is little we can do but manage it. However, as Robert Johansen argues in this path-breaking work, there are other ways forward. In Where the Evidence Leads, Johansen develops an "empirical realist" theory to enable the United Sates to respond more effectively to rising security threats. Together, peace research and security studies show that more security benefits are likely to result from maximizing the "causes" or correlates of peace than from maximizing military power. Ironically, a global grand strategy for human security, with national security folded into it, is likely to produce more security for the United States than a national security strategy. Peace reigns when states implement peace correlates, which range from addressing all nations' security fears to making life more predictable through better global governance. This approach, respectful of forgotten insights from Hans Morgenthau and others, revolutionizes thinking about national security policy by bringing it into a human security framework. The analysis shows that the anarchic, militarized balance-of-power system can be gradually changed with help from enhanced lawmaking, enforcement, and governance capacities. This thought-provoking book builds bridges between past policies-many of which have failed-and more deft ways of handling new realities that focus on building peace. In a world of threats, this book opens doors onto a future of sustainable peace, security, and hope.
He was the son of a hereditary peer, one of the wealthiest men in Britain. His childhood was privileged; at Cambridge, he flourished. At the age of 21, he founded The Film Society, and became a pioneering standard-bearer for film as art. He was a collaborator of Alfred Hitchcock, rescuing The Lodger and later producing his ground-breaking British thrillers The Man Who Knew Too Much, The 39 Steps, Secret Agent and Sabotage. He directed comedies from stories by H.G. Wells, worked in Hollywood with Eisenstein, and made documentaries in Spain during the Civil War. He lobbied for Trotsky to be granted asylum in the UK, and became a leading propagandist for the anti-fascist and Communist cause. Under the nose of MI5, who kept him under constant surveillance, he became a secret agent of the Comintern and a Soviet spy. He was a man of high intelligence and moral concern, yet he was blind to the atrocities of the Stalin regime. This is the remarkable story of Ivor Montagu, and of the burgeoning cinematic culture and left-wing politics of Britain between the wars. It is a story of restless energy, generosity of spirit, creative achievement and intellectual corruption.
When Edward Snowden began leaking NSA documents in June 2013, his actions sparked impassioned debates about electronic surveillance, national security, and privacy in the digital age. The Snowden Reader looks at Snowden's disclosures and their aftermath. Critical analyses by experts discuss the historical, political, legal, and ethical issues raised by the disclosures. Over forty key documents related to the case are included, with introductory notes explaining their significance: documents leaked by Snowden; responses from the NSA, the Obama administration, and Congress; statements by foreign leaders, their governments, and international organizations; judicial rulings; findings of review committees; and Snowden's own statements. This book provides a valuable introduction and overview for anyone who wants to go beyond the headlines to understand this historic episode.
'One of the biggest intelligence coups in recent years' The Times For years KGB operative Vasili Mitrokhin risked his life hiding top-secret material from Russian secret service archives beneath his family dacha. When he was exfiltrated to the West he took with him what the FBI called 'the most complete and extensive intelligence ever received from any source'. This extraordinary bestselling book is the result. 'Co-authored in a brilliant partnership by Christopher Andrew and the renegade Soviet archivist himself ... This is a truly global expose of major KGB penetrations throughout the Western world' The Times 'This tale of malevolent spymasters, intricate tradecraft and cold-eyed betrayal reads like a cold war novel' Time 'Sensational ... the most informed and detailed study of Soviet subversive intrigues worldwide' Spectator 'The most comprehensive addition to the subject ever published' Sunday Telegraph
Why Spy? is the result of Brian Stewart's seventy years of working in, and studying the uses and abuses of, intelligence in the real world. Few books currently available to those involved either as professionals or students in this area have been written by someone like the present author, who has practical experience both of field work and of the intelligence bureaucracy at home and abroad. It relates successes and failures via case studies, and draws conclusions that should be pondered by all those concerned with the limitations and usefulness of the intelligence product, as well as with how to avoid the tendency to abuse or ignore it when its conclusions do not fit with preconceived ideas. It reminds the reader of the multiplicity of methods and organisations and the wide range of talents making up the intelligence world.The co-author, scholar Samantha Newbery, examines such current issues as the growth of intelligence studies in universities, and the general emphasis throughout the volume is on the necessity of embracing a range of sources, including police, political, military and overt, to ensure that secret intelligence is placed in as wide a context as possible when decisions are made.
To what extent do cyberspace operations increase the risks of escalation between nation-state rivals? Scholars and practitioners have been concerned about cyber escalation for decades, but the question remains hotly debated. The issue is increasingly important for international politics as more states develop and employ offensive cyber capabilities, and as the international system is increasingly characterized by emergent multipolarity. In Escalation Dynamics in Cyberspace, Erica D. Lonergan and Shawn W. Lonergan tackle this question head-on, presenting a comprehensive theory that explains the conditions under which cyber operations may lead to escalation. In doing so, they challenge long-held assumptions about strategic interactions in cyberspace, arguing that cyberspace is not as dangerous as the conventional wisdom might suggest. In some cases, cyber operations could even facilitate the de-escalation of international crises. To support their claims, Lonergan and Lonergan test their theory against a range of in-depth case studies, including strategic interactions between the United States and key rivals; a series of case studies of the role of cyber operations in international crises; and plausible future scenarios involving cyber operations during conflict. They then apply their analytical insights to policymaking, making the case that skepticism is warranted about the overall efficacy of employing cyber power for strategic ends. By exploring the role of cyber operations in routine competition, crises, and warfighting, Escalation Dynamics in Cyberspace presents nuanced insights about how cyberspace affects international politics.
This volume examines the ethical issues generated by recent developments in intelligence collection and offers a comprehensive analysis of the key legal, moral and social questions thereby raised. Intelligence officers, whether gatherers, analysts or some combination thereof, are operating in a sea of social, political, scientific and technological change. This book examines the new challenges faced by the intelligence community as a result of these changes. It looks not only at how governments employ spies as a tool of state and how the ultimate outcomes are judged by their societies, but also at the mind-set of the spy. In so doing, this volume casts a rare light on an often ignored dimension of spying: the essential role of truth and how it is defined in an intelligence context. This book offers some insights into the workings of the intelligence community and aims to provide the first comprehensive and unifying analysis of the relevant moral, legal and social questions, with a view toward developing policy that may influence real-world decision making. The contributors analyse the ethics of spying across a broad canvas - historical, philosophical, moral and cultural - with chapters covering interrogation and torture, intelligence's relation to war, remote killing, cyber surveillance, responsibility and governance. In the wake of the phenomena of WikiLeaks and the Edward Snowden revelations, the intelligence community has entered an unprecedented period of broad public scrutiny and scepticism, making this volume a timely contribution. This book will be of much interest to students of ethics, intelligence studies, security studies, foreign policy and IR in general.
What makes a good missionary makes a good American spy, or so thought Office of Special Services (OSS) founder "Wild" Bill Donovan when he recruited religious activists into the first ranks of American espionage. Called upon to serve Uncle Sam, Donovan's recruits saw the war as a means of expanding their godly mission, believing an American victory would guarantee the safety of their fellow missionaries and their coreligionists abroad. Drawing on never-before-seen archival materials, acclaimed historian Matthew Sutton shows how religious activists proved to be true believers in Franklin Roosevelt's crusade for global freedom of religion. Sutton focuses on William Eddy, a warrior for Protestantism who was fluent in Arabic; Stewart Herman, a young Lutheran minister rounded up by the Nazis while pastoring in Berlin; Stephen B. L. Penrose, Jr., who left his directorship over missionary schools in the Middle East to join the military rank and file; and John Birch, a fundamentalist missionary in China. Donovan chose these men because they already had the requisite skills for good intelligence analysis, espionage, and covert operations, skills that allowed them to seamlessly blend into different environments. Working for eternal rewards rather than temporal spoils, they proved willing to sacrifice and even to die for their country during the conflict, becoming some of the United States' most loyal secret soldiers. Acutely aware of how their actions conflicted with their spiritual calling, these spies nevertheless ran covert operations in the centers of global religious power, including Mecca, the Vatican, and Palestine. In the end, they played an outsized role in leading the US to victory in WWII: Eddy laid the groundwork for the Allied invasion of North Africa, while Birch led guerilla attacks against the Japanese and, eventually, Chinese Communists. After the war, some of them -- those who survived -- helped launch the Central Intelligence Agency, so that their nation, and American Christianity, could maintain a strong presence throughout the rest of the world. Surprising and absorbing at every turn, Double Crossedis an untold story of World War II spycraft and a profound account of the compromises and doubts that war forces on those who wage it. |
You may like...
Wicked Problems - The Ethics of Action…
Austin Choi-Fitzpatrick, Douglas Irvin-Erickson, …
Hardcover
R2,472
Discovery Miles 24 720
A Research Agenda for Intelligence…
Robert Dover, Huw Dylan, …
Hardcover
R2,873
Discovery Miles 28 730
Personnel Management in Secret Service…
Barbara Czarniawska, Sabina Siebert, …
Hardcover
R2,178
Discovery Miles 21 780
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von
Paperback
R768
Discovery Miles 7 680
|