![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
The debate over cyber technology has resulted in new considerations for national security operations. States find themselves in an increasingly interconnected world with a diverse threat spectrum and little understanding of how decisions are made within this amorphous domain. With The Decision to Attack, Aaron Franklin Brantly investigates how states decide to employ cyber in military and intelligence operations against other states and how rational those decisions are. In his examination, Brantly contextualizes broader cyber decision-making processes into a systematic expected utility-rational choice approach to provide a mathematical understanding of the use of cyber weapons at the state level.
The highly eccentric Alfred Dillwyn Knox, known simply as 'Dilly', was one of the leading figures in the British codebreaking successes of the two world wars. During the first, he was the chief codebreaker in the Admiralty, breaking the German Navy's main flag code, before going on to crack the German Enigma ciphers during the Second World War at Bletchley Park.Here, he enjoyed the triumphant culmination of his life's work: a reconstruction of the Enigma machine used by the Abwehr, the German Secret Service. This kept the British fully aware of what the German commanders knew about Allied plans, allowing MI5 and MI6 to use captured German spies to feed false information back to the Nazi spymasters.Mavis Batey was one of 'Dilly's girls', the young female codebreakers who helped him to break the various Enigma ciphers. She was called upon to advise Kate Winslet, star of the film Enigma, on what it was like to be one of the few female codebreakers at Bletchley Park. This gripping new edition of Batey's critically acclaimed book reveals the vital part Dilly played in the deception operation that ensured the success of the D-Day landings, altering the course of the Second World War.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analyzed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Applicants to the Central Intelligence Agency often asked Edward Mickolus what they might expect in a career there. Mickolus, who was a CIA intelligence officer, whose duties also included recruiting and public affairs, never had a simple answer. If applicants were considering a life in the National Clandestine Service, the answer was easy. Numerous memoirs show the lives of operations officers collecting secret intelligence overseas, conducting counterintelligence investigations, and running covert action programs. But the CIA isn't only about case officers in far-flung areas of the world, recruiting spies to steal secrets. For an applicant considering a career as an analyst, a support officer, a scientist, or even a secretary, few sources provide reliable insight into what a more typical career at the CIA might look like. This collection of the exploits and insights of twenty-nine everyday agency employees is Mickolus's answer. From individuals who have served at the highest levels of the agency to young officers just beginning their careers, Stories from Langley reveals the breadth of career opportunities available at the CIA and offers advice from agency officers themselves. "Stories from Langley provides an invaluable behind-the-scenes look at professional life inside the CIA. While many have written about great operational exploits, few have focused on the daily lives and challenges of analysts, support officers, and engineers, members of the organization whose work is as essential if not as glamorous in the public eye. Young men and women wondering about what to expect in these varied CIA careers will find the book fascinating, revealing, and perhaps even enticing."-George Tenet, former director of Central Intelligence for the CIA "One of the most difficult aspects of intelligence is trying to convey to outsiders what that life-especially as an analyst-is really like. Most fiction is overblown and inevitably focuses on operations and spying. Stories from Langley is a delightful foray into the actual experiences of a broad range of intelligence officers and fills an important gap in our intelligence literature. Anyone interested in the nuts and bolts of an intelligence career will find this a useful and worthwhile read."-Mark Lowenthal, former assistant director of Central Intelligence for Analysis& Production for the CIA and author of Intelligence: From Secrets to Policy
Strategy in the Missile Age first reviews the development of modern military strategy to World War II, giving the reader a reference point for the radical rethinking that follows, as Dr. Brodie considers the problems of the Strategic Air Command, of civil defense, of limited war, of counterforce or pre-emptive strategies, of city-busting, of missile bases in Europe, and so on. The book, unlike so many on modern military affairs, does not present a program or defend a policy, nor is it a brief for any one of the armed services. It is a balanced analysis of the requirements of strength for the 1960's, including especially the military posture necessary to prevent war. A unique feature is the discussion of the problem of the cost of preparedness in relation to the requirements of the national economy, so often neglected by other military thinkers. Originally published in 1959. The Princeton Legacy Library uses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These editions preserve the original texts of these important books while presenting them in durable paperback and hardcover editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
The book is relevant to all those who wish to know why and how terrorism shifted from West Asia to South and Southeast Asia and Africa. This significant shift needs to be studied in depth for policy formulation and future strategy. The book will reveal that the so called Islamic Terrorism is traceable to Pakistan from concept to reality. Pakistan as a state has provided the platform for outward and inward march of Jihadis. For this to happen, the ISI has been playing the principal role. Thus, the focus in this book is on ISI as an instrument of spreading jihadi culture in Pakistan and elsewhere.
This book covers a vast canvas historically as regards Indian Intelligence, and gives an adequate insight into the functioning of the important intelligence agencies of the world. The author has analysed the current functioning of Indian Intelligence agencies in great detail, their drawbacks in the structure and coordination and has come out with some useful suggestions.
Over Iran an RAF Canberra flies a feint towards the Soviet border, to provoke Soviet air defence radar operators to reveal their location. He will not deliberately enter Soviet airspace, but the possibilities for miscalculation, or misunderstanding leading to tragedy are always there. These flights cost the lives of over 150 US airmen by the end of the Cold War. Also cruising nearby in Iranian airspace, is a heavily modified US Air Force C-130 transport aircraft. Onboard 10 Special Equipment Operators are listening through their headphones for Soviet radio and radar activity. Hearing Soviet ground controllers scramble fighters to intercept the Canberra. The US operators alert the British aircraft to the closing MiG's and it quickly alters course away from the border. This was the life of crews involved in Cold War intelligence collection flights. Enormous resources were committed to these operations and they shaped the structure of much modern military intelligence collection, analysis and sharing. This book explores their scope, conduct, plus the politics and new technologies behind these operations that started in the dying embers of World War Two. It examines how these often complex missions were planned, coordinated and flown and is supported by first-hand accounts from pilots, aircrews and intelligence analysts. It utilises recently declassified British and US archive material and is illustrated with a wide range of images. The author examines European and Far East operations and a number of topics not previously covered in depth elsewhere. These include authorisation and coordination arrangements for conduct of overflight and peripheral missions; plus the part played by key third party states in operations in Scandinavia, Turkey and others. He looks at why Tyuratam complex was of such major intelligence interest and details the many resources targeted against it. He looks at some of the less explored elements of U-2 operations, including British involvement, plus the development of powerful lenses intended to enable very long range peripheral photography and why the long mythologised `Kapustin Yar' overflight probably never took place with new details and analysis. This comprehensive book links together the realities of flying, advanced technology and politics to provide a detailed and illustrated examination of Cold War aerial intelligence collection.
Recent disclosures concerning the size and scope of the National Security Agency's (NSA's) surveillance activities both in the United States and abroad have prompted a flurry of congressional activity aimed at reforming the foreign intelligence gathering process. While some measures would overhaul the substantive legal rules of the USA PATRIOT Act or other provisions of the Foreign Intelligence Surveillance Act (FISA), there are a host of bills designed to make procedural and operational changes to the Foreign Intelligence Surveillance Court (FISC), a specialised Article III court that hears applications and grants orders approving of certain foreign intelligence gathering activities, and the Foreign Intelligence Surveillance Court of Review, a court that reviews rulings of the FISC. This book will explore a selection of these proposals and address potential legal questions such proposals may raise.
A highly valuable resource for students of intelligence studies, strategy and security, and foreign policy, this volume provides readers with an accessible and comprehensive exploration of U.S. espionage activities that addresses both the practical and ethical implications that attend the art and science of spying. Essentials of Strategic Intelligence investigates a subject unknown to or misunderstood by most American citizens: how U.S. foreign and security policy is derived from the information collection operations and data analysis by the sixteen major U.S. intelligence agencies. The essays in this work draw back the curtain on the hidden side of America's government, explaining the roles of various intelligence missions, justifying the existence of U.S. intelligence agencies, and addressing the complex moral questions that arise in the conduct of secret operations. After an introductory overview, the book presents accessibly written essays on the key topics: intelligence collection-and-analysis, counterintelligence, covert action, and intelligence accountability. Readers will understand how intelligence directly informs policymakers and why democracies need secret agencies; learn how the CIA has become deeply involved in the war-like assassination operations that target suspected foreign terrorists, even some individuals who are American citizens; and appreciate how the existence of-and our reliance on-these intelligence agencies poses challenges for democratic governance. Provides a comprehensive, up-to-date examination of all aspects of intelligence by experts in the field, from collection-and-analysis and counterintelligence to covert action and accountability Probes into how the United States' intelligence agencies attempt to protect the nation from cyberattacks by foreign nations and terrorist groups-and documents the successes and failures Documents the involvement of the National Security Agency (NSA) in bulk "metadata" collection of information on the telephone records and social media communications of American citizens Examines the effects that have resulted from major leaks in the U.S. government, from Wikileaks to the NSA Snowden leaks
This book presents the final report of the review group on intelligence and communications technologies. Recommendations are provided that are designed to protect national security and maintain intelligence capabilities while also respecting our longstanding commitment to privacy, civil liberties, and the trust of allies abroad, with due consideration of reducing the risk of unauthorised disclosures.
Command, Control, Communications and Intelligence form the backbone of the Army's operating system. But while much attention has been given in the literature to the other three elements, Communications in the British Army during World War II have been widely ignored. This book rectifies the omission. It shows that failures in front line communications contributed to several of the set backs suffered by the Army but also that ultimate victory was only achieved after a successful communications system was in place. It explains how the outcome of the main campaigns in Europe and North Africa depended on communications, how the system operated and how it evolved from a relatively primitive and inadequately supplied state at Dunkirk to a generally effective system at the time of the Rhine crossings. Problems still occurred however, for example at infantry platoon level and famously with paratrooper communications at Arnhem, often simply due to the shortcomings of existing technology. The book concludes that it is only very recently that advances in technology have allowed those problems to be solved.
Israel's flawed intelligence assessment in October 1973 has been studied intensively and been the subject of much public and professional debate. This book adds a unique dimension to previously disclosed material, as its author served as head of the Research Branch of Israeli Military Intelligence on the eve of and during the Yom Kippur War and as such was responsible for the national intelligence assessment at the time. Drawing on his personal records, and on interviews and extensive research conducted in the intervening decades, Aryeh Shalev examines the preconceptions and common beliefs that prevailed among Israeli intelligence officials and ultimately contributed to their flawed assessment: the excessive self-confidence in Israel's prowess, particularly in the aftermath of the Six Day War; the confidence that any surprise attack could be repelled with the regular army until the reserves were mobilised; the accepted profile of Sadat as a weak leader with limited powers and initiative; and the belief in Israel's correct understanding of Egyptian and Syrian operational plans . . . Beyond explaining where Israeli intelligence erred, the book probes expectations of military intelligence in general and the relationship between military and political assessments. It considers what kind of assessment an intelligence branch is capable of producing with a great degree of certainty, and conversely, what kind of assessment it should not be asked to produce. Based on the intelligence failure of the Yom Kippur War, this book also reviews possible organisational changes and methodological improvements to guard as much as possible against surprise attacks in the future, relevant not only to Israel's circumstances but to all countries with enemies capable of launching an attack. Published in association with the Institute for National Strategic Studies.
Written by the renowned expert Nigel West, this book exposes the operations of Britain's overseas intelligence-gathering organisation, the famed Secret Intelligence Service, MI6, and traces its origins back to its inception in 1909. In this meticulously researched account, its activities and structure are described in detail, using original secret service documents. The main body of the book concerns MI6's operations during the Second World War, and includes some remarkable successes and failures, including how MI6 financed a glamorous confidant of the German secret service; how a suspected French traitor was murdered by mistake; how Franco's military advisors were bribed to keep Spain out of the war; how members of the Swedish secret police were blackmailed into helping the British war effort; how a sabotage operation in neutral Tangiers enabled the Allied landings in North Africa to proceed undetected; and how Britain's generals ignored the first ULTRA decrypts because MI6 said that the information had come from a well-placed source called BONIFACE'. In this new edition, operations undertaken by almost all of MI6's overseas stations are recounted in extraordinary detail. They will fascinate both the professional intelligence officer and the general reader. The book includes organisational charts to illustrate MI6's internal structure and its wartime network of overseas stations. Backed by numerous interviews with intelligence officers and their agents, this engaging inside story throws light on many wartime incidents that had previously remained unexplained.
Strategic Intelligence for the 21st Century: The Mosaic Method provides an industry insider's assessment of current intelligence methods and offers a new strategic model, directed toward the police, military, and intelligence agencies. The birth of the internet, the advent of 24 hour news and the rise of social media is evidence of how governments and those dealing in intelligence commodities struggle not only to access but also to limit the information that is out there. At the same time, recent terrorist atrocities, such as 9/11 and the July 7th bombings in London, have highlighted the need for intelligence cooperation on a global scale - but how can this be achieved? Serving as a call to break from traditional models and forge more deeply and continuously inter-linked relationships, Strategic Intelligence for the 21st Century advocates more fluid, networked operating methods, incorporating far more open-sourced information and data in analysis. Featuring contributions from key figures in the industry, including Sir Colin McColl, R. James Woolsey, and Sir David Phillips, this book presents a history of intelligence developments alongside the current challenges, analysing the impact on society - both from within and due to propaganda and covert action - and the influence wrought by technological innovations. With discussion of the Deep Web, the post-9/11 era, and the resulting impact on civil liberty and police operations, Strategic Intelligence for the 21st Century offers a revolutionary new approach to intelligence analysis and global collaborations.
The amount of publicly and often freely available information is
staggering. Yet, the intelligence community still continues to
collect and use information in the same manner as during WWII, when
the OSS set out to learn as much as possible about Nazi Germany and
Imperial Japan by scrutinizing encyclopedias, guide books, and
short-wave radio. Today, the supply of information is greater than
any possible demand, and anyone can provide information. In effect,
intelligence analysts are drowning in information.
On January 26, 1993, a young Palestinian man named Abdel Nasser Zaben was arrested and incarcerated in New York City for kidnapping and robbery. Just thirty days later, while he remained locked up, radical Islamic fundamentalists detonated a bomb in the World Trade Center. These two events, connected by common threads, signaled the coming of jihad to America. From the seemingly insulated environment of prison, this same young man, thought to have been merely a common criminal, swore allegiance to Osama bin Laden and began to convert other young minds to the cause. A dangerous terrorist recruitment cell had been born. How did it happen?Through the story of Abdel Nasser Zaben s recruitment efforts in prison, "The Fertile Soil of Jihad" explores in vivid detail how the American prison subculture fosters terrorism. Dunleavy shows how Zaben carefully and knowingly selected the most likely candidates for conversion to his cause. He reveals how Zaben used his apprentice role in the prison chaplain s office as a cover for his work and how prison resources were used in the service of terrorism. This book yields invaluable insights for intelligence and corrections professionals as well as informed citizens eager to learn what progress the U.S. government is making in countering terrorism.
The post-9/11 world has witnessed a rebirth of irregular and asymmetrical warfare, which, in turn, has led to an increase in conflicts between conventional armies and non-state armed groups. In their haste to respond to the threat from insurgencies, nations often fail to plan effectively not only for combat operations but also for withdrawal, which is inevitable, win or lose. In order to answer the question of how to withdraw from engagement with an insurgency, Gleis examines how insurgencies are conducted and what, if anything, is unique about an Islamist insurgency. He then proposes ways to combat these groups successfully and to disentangle one’s military forces from the war once strategic objectives have been met—or once it is clear that they cannot be. Because this type of warfare is dynamic and ever-changing, this book is not meant to suggest a set of cookie-cutter solutions for how to withdraw from insurgencies. Rather, the author analyzes six counterinsurgency operations that have taken place in the past, with the intention of gleaning from them as many lessons as possible to better prepare for future withdrawals.The literature on how wars end has failed to explore irregular warfare.This much needed reexamination serves as an indispensable starting point.
In the 2010 federal election, independent candidate Andrew Wilkie grabbed headlines after winning the seat of Denison, and with it a key role in deciding who would form the next government of Australia.Before he was a politician, however, Wilkie was Australia's most talked-about whistleblower. In March 2003, Wilkie resigned from Australia's peak intelligence agency in protest over the looming war in Iraq. He was the only serving intelligence officer from the 'coalition of the willing' - the US, the UK and Australia - to do so, and his dramatic move was reported throughout the world. Wilkie's act of conscience put him on a collision course with the Australian government. Why was he willing to risk his career and reputation to tell the truth? What happened when he decided to take a stand? In Axis of Deceit, Wilkie tells his story. He exposes how governments skewed, spun and fabricated intelligence advice. And he offers a rare glimpse into the world of international intelligence and life as a spook. With a brand-new preface, this is the fascinating inside story of a man now set to play a pivotal role in our public life.
The twenty-first century has brought the perfect storm of conditions to create substantive global instability. This contemporary operating environment (COE) is characterized by complexity, ambiguity, volatility, and constant danger. It is a human invention that requires a human solution. Special operations forces (SOF), a group comprised of highly trained personnel with the ability to deploy rapidly and apply special skills in a variety of environments and circumstances, is the logical force of choice to achieve success in the COE. Increasing their effectiveness is cultural intelligence (CQ) – the ability to recognize the shared beliefs, values, attitudes, and behaviours of a group of people and then apply that knowledge toward a specific goal. Empowered by CQ, SOF are positioned to dominate in the COE. Solving the People Puzzle makes a convincing argument for the powerful union of the "force of choice" with the "tool of choice." This book will inspire and inform.
Israel's flawed intelligence assessment in October 1973 has been studied intensively and been the subject of much public and professional debate. This book adds a unique dimension to previously disclosed material, as its author served as head of the Research Branch of Israeli Military Intelligence on the eve of and during the Yom Kippur War and as such was responsible for the national intelligence assessment at the time. Drawing on his personal records, and on interviews and extensive research conducted in the intervening decades, Aryeh Shalev examines the preconceptions and common beliefs that prevailed among Israeli intelligence officials and ultimately contributed to their flawed assessment: the excessive self-confidence in Israel's prowess, particularly in the aftermath of the Six Day War; the confidence that any surprise attack could be repelled with the regular army until the reserves were mobilised; the accepted profile of Sadat as a weak leader with limited powers and initiative; and the belief in Israel's correct understanding of Egyptian and Syrian operational plans . . . Beyond explaining where Israeli intelligence erred, the book probes expectations of military intelligence in general and the relationship between military and political assessments. It considers what kind of assessment an intelligence branch is capable of producing with a great degree of certainty, and conversely, what kind of assessment it should not be asked to produce. Based on the intelligence failure of the Yom Kippur War, this book also reviews possible organisational changes and methodological improvements to guard as much as possible against surprise attacks in the future, relevant not only to Israel's circumstances but to all countries with enemies capable of launching an attack. Published in association with the Institute for National Strategic Studies.
As the fifth full year of America's global war on terrorism continues, statistics concerning terrorist attacks show a disturbing trend: from a twenty-one-year high in 2003, attacks tripled in 2004 and then doubled in 2005. And as the incidence of terrorist attacks increased, so has the number of terrorists. While the primary leaders of the Taliban, al Qaeda, and al Qaeda in Iraq remain at large, a 2006 Department of Defense study reportedly identified thirty new al Qaeda-affiliated terrorist groups that have been created since September 11, 2001. We may not have metrics that measure our success in the war on terrorism, but these realities certainly illuminate our failures.In "Thinking Like a Terrorist," former FBI counterterrorism agent Mike German contends that the overarching problem is a fundamental failure to understand the terrorists-namely, what they want and how they intend to get it. When our counterterrorism policies are driven by misunderstanding and misperception, we shouldn't be surprised at the results. Today's terrorists have a real plan-a blueprint that has brought them victory in the past-that they are executing to perfection; moreover, their plan is published and available to anyone who bothers to read it. Once the terrorists' plan is understood, we can develop and implement more effective counterterrorism strategies.A former undercover agent who infiltrated neo-Nazi terrorist groups in the United States, German explains the terrorist's point of view and discusses ways to counter the terrorism threat. Based on his unusual experience in the field, "Thinking Like a Terrorist" provides unique insights into why terrorism is such a persistent and difficult problem and whythe U.S. approach to counterterrorism isn't working.
In 1942, with a black-market chicken under his arm, Leo Marks left his father's famous bookshop, 84 Charing Cross Road, and went to war. He was twenty-two and a cryptopgraher of genius. In Between Silk and Cyanide, his critically acclaimed account of his time in SOE, Marks tells how he revolutionised the code-making techniques of the Allies, trained some of the most famous agents dropped into France including Violette Szabo and 'the White Rabbit', and why he wrote haunting verse including his 'The Life that I have' poem. He reveals for the first time the disastrous dimensions of the code war between SOE and the Germans in Holland; how the Germans were fooled into thinking a Secret Army was operating in the Fatherland itself, and how and why he broke General de Gaulle's secret code. Both thrilling and poignant, Marks's book is truly one of the last great Second World War memoirs.
As the world prepared for war in the 1930s, the United States discovered that it faced the real threat of foreign spies stealing military and industrial secrets-and that it had no established means to combat them. Into that breach stepped J. Edgar Hoover and the FBI. Although the FBI's expanded role in World War II has been well documented, few have examined the crucial period before Pearl Harbor when the Bureau's powers secretly expanded to face the developing international emergency. Former FBI agent Raymond Batvinis now tells how the Bureau grew from a small law enforcement unit into America's first organized counterespionage and counterintelligence service. Batvinis examines the FBI's emerging new roles during the two decades leading up to America's entry into World War II to show how it cooperated and competed with other federal agencies. He takes readers behind the scenes, as the State Department and Hoover fought fiercely over the control of counterintelligence, and tells how the agency combined its crime-fighting expertise with its new wiretapping authority to spy on foreign agents. Based on newly declassified documents and interviews with former agents, Batvinis's account reconstructs and greatly expands our understanding of the FBI's achievements and failures during this period. Among these were the Bureau's mishandling of the 1938 Rumrich/Griebl spy case, which Hoover slyly used to broaden his agency's powers; its cracking of the Duquesne Espionage Case in 1941, which enabled Hoover to boost public and congressional support to new heights; and its failure to understand the value of Soviet agent Walter Krivitsky, which slowed Bureau efforts to combat Soviet espionage in America. In addition, Batvinis offers a new view of the relationship between the FBI and the military, cites the crucial contributions of British intelligence to the FBI's counterintelligence education, and reveals the agency's ultra-secret role in mining financial records for the Treasury Department. He also reviews the early days of the top-secret Special Intelligence Service, which quietly dispatched FBI agents posing as businessmen to South America to spy on their governments. With an insider's knowledge and a storyteller's skill, Batvinis provides a page-turning history narrative that greatly revises our views of the FBI--and also resonates powerfully with our own post-9/11 world.
If you loved American Sniper you will love Not a Good Day to Die: The Untold Story of Operation Anaconda. Award-winning journalist Sean Naylor, an eyewitness to the action, vividly portrays the fight for Afghanistan's most hostile battleground. At dawn on March 2, 2002, the first major battle of the 21st Century began. Over 200 soldiers of the 101st Airborne and 10th Mountain Divisions flew into Afghanistan's Shahikot valley - and into the mouth of a buzz-saw. They were about to pay a bloody price for strategic, higher-level miscalculations that underestimated the enemy's strength and willingness to fight. After the attacks of September 11, 2001, Coalition forces quickly toppled the Taliban regime from the seat of government. But, believing the war to be all but over, the Pentagon and US Central Command refused to commit the forces required to achieve total victory in Afghanistan. Instead, they delegated responsibility for fighting the war's biggest battle to a tangle of untested units thrown together at the last moment. Then the world watched as Anaconda seemed to unravel. Denied the extra infantry, artillery and close air support with which they trained to go to war, the soldiers of this airborne assault fought for survival in brutal high-altitude combat. Backed up by a small, but crucial, team of special forces, they were all that stood between the Coalition and a military disaster. Perfect for fans of Black Hawk Down, Zero Dark Thirty, Chris Ryan, and Andy McNab. About the author: Sean Naylor is a senior writer for the Army Times. He has covered the Afghan mujahideen's war against the Soviets, and American military operations in Somalia, Haiti, Bosnia, Afghanistan, and Iraq. Named one of the 22 "unsung" influential print reporters in Washington by American Journalism Review in May 2002, he earned the White House Correspondents' Association's prestigious Edgar A. Poe Award for his coverage of Operation Anaconda. |
You may like...
The Oxford Handbook of Roman Sculpture
Elise A Friedland, Melanie Grunow Sobocinski, …
Hardcover
R5,458
Discovery Miles 54 580
The Composer's Point of View - Essays on…
Robert Stephen Hines
Hardcover
|