![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > Military intelligence
In the 2010 federal election, independent candidate Andrew Wilkie grabbed headlines after winning the seat of Denison, and with it a key role in deciding who would form the next government of Australia.Before he was a politician, however, Wilkie was Australia's most talked-about whistleblower. In March 2003, Wilkie resigned from Australia's peak intelligence agency in protest over the looming war in Iraq. He was the only serving intelligence officer from the 'coalition of the willing' - the US, the UK and Australia - to do so, and his dramatic move was reported throughout the world. Wilkie's act of conscience put him on a collision course with the Australian government. Why was he willing to risk his career and reputation to tell the truth? What happened when he decided to take a stand? In Axis of Deceit, Wilkie tells his story. He exposes how governments skewed, spun and fabricated intelligence advice. And he offers a rare glimpse into the world of international intelligence and life as a spook. With a brand-new preface, this is the fascinating inside story of a man now set to play a pivotal role in our public life.
As the fifth full year of America's global war on terrorism continues, statistics concerning terrorist attacks show a disturbing trend: from a twenty-one-year high in 2003, attacks tripled in 2004 and then doubled in 2005. And as the incidence of terrorist attacks increased, so has the number of terrorists. While the primary leaders of the Taliban, al Qaeda, and al Qaeda in Iraq remain at large, a 2006 Department of Defense study reportedly identified thirty new al Qaeda-affiliated terrorist groups that have been created since September 11, 2001. We may not have metrics that measure our success in the war on terrorism, but these realities certainly illuminate our failures.In "Thinking Like a Terrorist," former FBI counterterrorism agent Mike German contends that the overarching problem is a fundamental failure to understand the terrorists-namely, what they want and how they intend to get it. When our counterterrorism policies are driven by misunderstanding and misperception, we shouldn't be surprised at the results. Today's terrorists have a real plan-a blueprint that has brought them victory in the past-that they are executing to perfection; moreover, their plan is published and available to anyone who bothers to read it. Once the terrorists' plan is understood, we can develop and implement more effective counterterrorism strategies.A former undercover agent who infiltrated neo-Nazi terrorist groups in the United States, German explains the terrorist's point of view and discusses ways to counter the terrorism threat. Based on his unusual experience in the field, "Thinking Like a Terrorist" provides unique insights into why terrorism is such a persistent and difficult problem and whythe U.S. approach to counterterrorism isn't working.
As the world prepared for war in the 1930s, the United States discovered that it faced the real threat of foreign spies stealing military and industrial secrets-and that it had no established means to combat them. Into that breach stepped J. Edgar Hoover and the FBI. Although the FBI's expanded role in World War II has been well documented, few have examined the crucial period before Pearl Harbor when the Bureau's powers secretly expanded to face the developing international emergency. Former FBI agent Raymond Batvinis now tells how the Bureau grew from a small law enforcement unit into America's first organized counterespionage and counterintelligence service. Batvinis examines the FBI's emerging new roles during the two decades leading up to America's entry into World War II to show how it cooperated and competed with other federal agencies. He takes readers behind the scenes, as the State Department and Hoover fought fiercely over the control of counterintelligence, and tells how the agency combined its crime-fighting expertise with its new wiretapping authority to spy on foreign agents. Based on newly declassified documents and interviews with former agents, Batvinis's account reconstructs and greatly expands our understanding of the FBI's achievements and failures during this period. Among these were the Bureau's mishandling of the 1938 Rumrich/Griebl spy case, which Hoover slyly used to broaden his agency's powers; its cracking of the Duquesne Espionage Case in 1941, which enabled Hoover to boost public and congressional support to new heights; and its failure to understand the value of Soviet agent Walter Krivitsky, which slowed Bureau efforts to combat Soviet espionage in America. In addition, Batvinis offers a new view of the relationship between the FBI and the military, cites the crucial contributions of British intelligence to the FBI's counterintelligence education, and reveals the agency's ultra-secret role in mining financial records for the Treasury Department. He also reviews the early days of the top-secret Special Intelligence Service, which quietly dispatched FBI agents posing as businessmen to South America to spy on their governments. With an insider's knowledge and a storyteller's skill, Batvinis provides a page-turning history narrative that greatly revises our views of the FBI--and also resonates powerfully with our own post-9/11 world.
If you loved American Sniper you will love Not a Good Day to Die: The Untold Story of Operation Anaconda. Award-winning journalist Sean Naylor, an eyewitness to the action, vividly portrays the fight for Afghanistan's most hostile battleground. At dawn on March 2, 2002, the first major battle of the 21st Century began. Over 200 soldiers of the 101st Airborne and 10th Mountain Divisions flew into Afghanistan's Shahikot valley - and into the mouth of a buzz-saw. They were about to pay a bloody price for strategic, higher-level miscalculations that underestimated the enemy's strength and willingness to fight. After the attacks of September 11, 2001, Coalition forces quickly toppled the Taliban regime from the seat of government. But, believing the war to be all but over, the Pentagon and US Central Command refused to commit the forces required to achieve total victory in Afghanistan. Instead, they delegated responsibility for fighting the war's biggest battle to a tangle of untested units thrown together at the last moment. Then the world watched as Anaconda seemed to unravel. Denied the extra infantry, artillery and close air support with which they trained to go to war, the soldiers of this airborne assault fought for survival in brutal high-altitude combat. Backed up by a small, but crucial, team of special forces, they were all that stood between the Coalition and a military disaster. Perfect for fans of Black Hawk Down, Zero Dark Thirty, Chris Ryan, and Andy McNab. About the author: Sean Naylor is a senior writer for the Army Times. He has covered the Afghan mujahideen's war against the Soviets, and American military operations in Somalia, Haiti, Bosnia, Afghanistan, and Iraq. Named one of the 22 "unsung" influential print reporters in Washington by American Journalism Review in May 2002, he earned the White House Correspondents' Association's prestigious Edgar A. Poe Award for his coverage of Operation Anaconda.
"The Lost Oasis" tells the true story behind "The English Patient," An extraordinary episode in World War II, it describes the Zerzura Club, a group of desert explorers and adventurers who indulged in desert travel by early-model-motor cars and airplanes, and who searched for lost desert oases and ancient cities of vanished civilizations. In reality, they were mapping the desert for military reasons and espionage. The club's members came from countries that soon would be enemies: England and the Allied Forces v. Italy and Germany. When war erupted in 1939, Ralph Bagnold founded the British Long Range Desert Group to spy on and disrupt Rommel's advance on Cairo, while a fellow club member, Hungarian Count Almasy, succeeded in placing German spies there. Ultimately, the British prevailed. Saul Kelly's riveting history draws on interviews with survivors and previously unknown documentary material in England, Italy, Germany, Hungary, and Egypt. His book reads like a thriller - with one key difference: it's all true.
Through in-depth research and interviews with veterans, William Fowler has produced the most complete history of this elite and elusive unit to date. Out of Africa 1941 - 1943 Into Italy 1943 - 1945 Overlord and Europe 1944 - 1945 Post War Phoenix Malaya 1948 - 1960 The Confrontation 1962 - 1966 Oman 1970 - 1976 The Cold War 1945 - 1990 The Falklands Interlude 1982 The First Gulf War 1990 - 1991 Back to Africa 1981 - 2000 Balkan interlude 1994 - Afghanistan 2001 - The Second Gulf War 2003 C Squadron to 1 SAS Regiment (Rhodesia) 1951 - 1980 Enter the Kiwis 1954 - The Australian Experience 1957 - The Future
This system-level resource specifically applies knowledge management principles, practices and technologies to the intelligence domain. Designed for those responsible for the management of an intelligence enterprise operation and its delivery of reliable intelligence to key decision-makers, the text describes the essential principles of intelligence, from collection, processing and analysis to dissemination, for both national intelligence and business applications. The author aims to provide a balanced treatment of the organizational and architectural components of knowledge management, offering an understanding of the system infrastructure, tools and technologies necessary to implement the intelligence enterprise. He explores real-world applications and presents a detailed example of competitive intelligence unit design. Including over 80 illustrations, the volume offers a practical description of enterprise architecture design methodology, and covers the full range of national, military, business and competitive intelligence.
The part played by code-cracking in World War II has been revealed in popular film and has also inspired several accounts by code-crackers. Much less well-known is how code-cracking was used in operational situations. In this account the "Silent Service" speaks through the voice of a young and inexperienced naval officer whose rites of passage to manhood required him to act as a seagoing eavesdropper, a role calling not only for quick intelligence but also for facing up to excitement and danger. Sir Alan Peacock's story is interlaced with graphic accounts of life on the lower deck, being torpedoed in a Channel action, and how to contribute to intelligence information that was required to foil enemy attacks on Russian convoys whilst facing atrocious weather conditions. The influence this intense experience exerted on Peacock's subsequent career in economics is also discussed.
Khe Sanh remains to this day, an extremely controversial and emotional aspect of the war in Vietnam. The U.S. Armed Forces fought to defend Khe Sanh in early 1968 and then abandoned the base after a 77-day siege by the North Vietnamese. This book contains fromerly Top Secret messages to President Lyndon Johnson from National Security Advisor W.W. "Walt" Rostow, Gen. William Westmoreland and many others. The siege and loss of Khe Sanh is the tragedy of the war in Vietnam in microcosm.
"Of all the books on Native American service in the U.S. armed forces, this is the best.... Readers will find the story of the Comanche Code Talkers compelling, humorous, thought-provoking, and inspiring." -- Tom Holm, author of Strong Hearts, Wounded Souls: Native American Veterans of the Vietnam War Among the allied troops that came ashore in Normandy on D-Day, June 6, 1944, were thirteen Comanches in the 4th Infantry Division, 4th Signal Company. Under German fire they laid communications lines and began sending messages in a form never before heard in Europe-- coded Comanche. For the rest of World War II, the Comanche Code Talkers played a vital role in transmitting orders and messages in a code that was never broken by the Germans. This book tells the full story of the Comanche Code Talkers for the first time. Drawing on interviews with all surviving members of the unit, their original training officer, and fellow soldiers, as well as military records and news accounts, William C. Meadows follows the group from their recruitment and training to their active duty in World War II and on through their postwar lives up to the present. He also provides the first comparison of Native American code talking programs, comparing the Comanche Code Talkers with their better-known Navajo counterparts in the Pacific and with other Native Americans who used their languages, coded or not, for secret communication. Meadows sets this history in a larger discussion of the development of Native American code talking in World Wars I and II, identifying two distinct forms of Native American code talking, examining the attitudes of the American military toward Native American codetalkers, and assessing the complex cultural factors that led Comanche and other Native Americans to serve their country in this way.
Packed with the technological details and insights into military strategy that fans of Tom Clancy relish, The Silent War is a riveting look at the darkest days of the Cold War. It reveals, in gripping detail, the espionage, innovative high technology, and heroic seafaring the United States employed against the Soviet Union in the battle for nuclear and military supremacy. John Piña Craven, who shared management responsibility for the submarine-borne Polaris missile system, captures the excitement and the dangers of the times as he recounts the true stories behind some of the century's most shocking headlines and reveals harrowing episodes kept hidden from the public. Craven describes for the first time the structural problems that almost caused the destruction of the Nautilus, the world's first nuclear-powered submarine, and presents startling information about the race to recover a hydrogen bomb from the B-52 bomber that went down off the coast of Spain. In a report no fan of The Hunt for Red October will want to miss, he provides a fascinating, authoritative perspective on the Navy's reaction to the rogue Soviet submarine and its mission. A major contribution to Cold War history and literature, The Silent War will appeal to military buffs and fans of nonstop adventure thrillers alike.
While the Second World War raged in Europe, demanding most of Canada's military effort, an equally fierce war with Japan was going on in the Far East. Army, navy, and air force signals units in Canada kept watch on the enemy's vital radio communications. To be more effective, Number One Canadian Special Wireless Group of the Royal Canadian Signals Corps was formed to go to the Southwest Pacific war theatre for close-in radio eavesdropping. Murray describes the often zany career of the only complete signals unit Canada sent to the War in the Pacific, and the significant part it played in the Allied signals intelligence operation known as "Magic."
New threats require new thinking. State attacks involving long-range missiles or conventional military forces are not the only threat to the U.S. homeland. Covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals-and even by residents of the United States-are significant issues for future U.S. security. In this comprehensive work, Cordesman offers a range of recommendations, from reevaluating what constitutes a threat and bolstering homeland defense measures, to improving resource allocation and sharpening intelligence. There is a wide spectrum of potential threats to the U.S. homeland that do not involve overt attacks by states using long-range missiles or conventional military forces. Such threats include covert attacks by state actors, state use of proxies, independent terrorist and extremist attacks by foreign groups or individuals, and independent terrorist and extremist attacks by residents of the United States. These threats are currently limited in scope and frequency, but are emerging as potentially significant issues for future U.S. security. In this comprehensive work, Cordesman argues that new threats require new thinking, and offers a range of recommendations, from expanding the understanding of what constitutes a threat and bolstering Homeland defense measures, to bettering resource allocation and improving intelligence gathering and analysis. No pattern of actual attacks on U.S. territory has yet emerged that provides a clear basis for predicting how serious any given form of attack might be in the future, what means of attack might be used, or how lethal new forms of attack might be. As a result, there is a major ongoing debate over the seriousness of the threat and how the U.S. government should react. This work is an invaluable contribution to that debate.
This book-length poem by one of the major poets of our era is structured as a series of messages transmitted by a master spy to the director of spy operations and to a number of his fellow spies. The spy speaks of his own alienation and sense of purposelessness as a secret agent-a metaphor for a human existence committed to ordering, deciphering, and making sense of a world of random signs. First published in 1974, the book is now reprinted with a substantial introduction by the author that elaborates on the genesis of the poem, the literary figures who inspired some of the characters, the poem's reception, and other matters. Reviews of the earlier edition: "These poems can be read and admired for their fluidity, their wonderful diversity of significance. . . . Many delights."-Richard Poirier, Los Angeles Times "Hollander's arch and subtle long poem allegorizes the mirror closeness between raveller and unraveller."-George Steiner, New Yorker "Hollander explores with wit and virtuosity the pleasures of poetry (encipherment) and the trials of the workaday world (one's 'cover.') . . . A rich, intelligent poem . . . a special pleasure for those with an ear for allusions, parodies, and puns."-Library Journal
How has the end of the Cold War affected America's intelligence agencies? When are aggressive clandestine operations justifiable, and who should be responsible for deciding to proceed with them? Should the United States engage in more aggressive economic espionage? These are just a few of the issues Loch Johnson examines in this thoughtful assessment of strategic intelligence and its vital role in modern governments. Johnson draws on historical data, more than five hundred interviews, and his own experience working for Congressional committees on intelligence. He begins by defining the functions of intelligence: espionage, counterintelligence, and covert action. He then provides an overview of America's secret operations abroad, assesses the moral implications of clandestine operations, and offers guidelines for a more ethical approach to the use of secret power. Johnson explores the question of intelligence accountability, looking closely at how well intelligence agencies have been monitored through the forum of Congressional hearings. He compares America's approach to intelligence with that of other nations, discusses the degree to which intelligence agencies should provide information about foreign businesses, and evaluates how well the U.S. intelligence agencies fared during the Cold War against the USSR. Secret agencies have the capacity not only to safeguard democracy but also to subvert it, says Johnson. As such, they deserve both our support and our scrutiny.
This highly acclaimed book-hailed as the definitive account of the Julius and Ethel Rosenberg case-now includes a new introduction that discusses the most recent evidence. It provides information from the Khrushchev and Molotov memoirs, the Venona papers, and material contained in a Discovery Channel documentary that was first aired in March 1997.
The names, we sometimes say, have been changed "to protect the innocent". As regards those agents in KGB networks in the U.S. during and following World War II, their presence and their deeds (or misdeeds) were known, but their names were not. The FBI-KGB War is the exciting, true (which often really is stranger than fiction), and authentic story of how those names became known and how the not-so-innocent persons to whom those names belonged were finally called to account. Following World War II, FBI Special Agent Robert J. Lamphere set out to uncover the extensive American networks of the KGB. Lamphere used a large file of secret Russian messages intercepted during the war. The FBI-KGB War is the detailed (but never boring) story of how those messages were finally decoded and made to reveal their secrets, secrets that led to persons with such now-infamous names as Judith Coplon, Klaus Fuchs, Harry Gold, and Ethel and Julius Rosenberg.
The CIA and its World War II predecessor, the Office of Strategic Services (OSS), were for many years largely populated by members of Ivy League colleges, particularly Yale. In this highly acclaimed book, Robin Winks explores the underlying bonds between the university and the intelligence communities, introducing a fascinating cast of characters that include safe-crackers and experts in Azerbaijani as well as such social luminaries as Paul Mellon, David Bruce, John P. Marquand, Jr., and William Vanderbilt. This edition of the book includes a new preface by Winks. Reviews of the first edition: "One of the best studies of intelligence in recent years."-Edward Jay Epstein, Los Angeles Times Book Review "The most original book yet written on the interpenetration of counter-intelligence and campus."-Andrew Sinclair, Sunday Times (London) "Winks writes a lively compound of analysis and anecdote to illuminate the bonds between academe and the intelligence community. His book is a towering achievement."-Robert W. Smith, Chicago Sun-Times "Among the more important contributions to the history of Anglo-American espionage to appear this or any other year. . . . Moves with an unfolding pace that any thriller writer might envy."-Tom Dowling, San Francisco Examiner "A brilliant book."-Sallie Pisani, Journal of American History
Cracking the enemy's radio code is a task so urgent and so difficult that it demands the military's best minds and most sophisticated technology. But when the coded messages are in a language as complex as Japanese, decoding problems multiply dramatically. It took the U.S. Army a full two years after the attack on Pearl Harbor to break the codes of the Japanese Imperial Army. But by 1944 the U.S. was decoding more than 20,000 messages a month filled with information about enemy movements, strategy, fortifications, troop strengths, and supply convoys. In "MacArthur's ULTRA," historian Edward Drea recounts the story behind the Army's painstaking decryption operation and its dramatic breakthrough. He demonstrates how ULTRA (intelligence from decrypted Japanese radio communications) shaped MacArthur's operations in New Guinea and the Philippines and its effect on the outcome of World War II. From sources on both sides of the Pacific and national security agency declassified records, Drea has compiled a detailed listing of the ULTRA intelligence available to MacArthur. By correlating the existing intelligence with MacArthur's operational decisions, Drea shows how MacArthur usedand misusedintelligence information. He tells for the first time the story behind MacArthur's bold leap to Hollandia in 1944 and shows how ULTRA revealed the massive Japanese mobilization for what might have been (had it occurred) the bloodiest and most protracted engagement of the entire war the Allied invasion of Japan. Drea also clarifies the role of ULTRA in Truman's decision to drop atomic bombs on Japan in 1945, and concludes that ULTRA shortened the war by six to ten months.
The exposure of two senior republicans as informers for British intelligence in 2005 led to a popular perception that the IRA had 'lost' the intelligence war and was pressurised into peace. In this first in-depth study across the entire conflict, Thomas Leahy re-evaluates the successes and failures of Britain's intelligence activities against the IRA, from the use of agents and informers to special-forces, surveillance and electronic intelligence. Using new interview material alongside memoirs and Irish and UK archival materials, he suggests that the IRA was not forced into peace by British intelligence. His work sheds new light on key questions in intelligence and security studies. How does British intelligence operate against paramilitaries? Is it effective? When should governments 'talk to terrorists'? And does regional variation explain the outcome of intelligence conflicts? This is a major contribution to the history of the conflict and of why peace emerged in Northern Ireland.
Why Spy? is the result of Brian Stewart's seventy years of working in, and studying the uses and abuses of, intelligence in the real world. Few books currently available to those involved either as professionals or students in this area have been written by someone like the present author, who has practical experience both of field work and of the intelligence bureaucracy at home and abroad. It relates successes and failures via case studies, and draws conclusions that should be pondered by all those concerned with the limitations and usefulness of the intelligence product, as well as with how to avoid the tendency to abuse or ignore it when its conclusions do not fit with preconceived ideas. It reminds the reader of the multiplicity of methods and organisations and the wide range of talents making up the intelligence world.The co-author, scholar Samantha Newbery, examines such current issues as the growth of intelligence studies in universities, and the general emphasis throughout the volume is on the necessity of embracing a range of sources, including police, political, military and overt, to ensure that secret intelligence is placed in as wide a context as possible when decisions are made.
A new, fully uncensored edition of the definitive insider's account of the War on Terror 'A former FBI agent's memoir on the War on Terror is declassified after 9 years' Time 'One of the most valuable and detailed accounts of its subject to appear in the past decade' Economist The ultimate insider's account of the battle against terrorism, Ali Soufan's revelatory account of his history-making decade as the FBI's lead investigator into al-Qaeda shaped our understanding of counter-terror operations - and led to hard questions being asked of American and British leaders. When The Black Banners was first published in 2011, significant portions of the text were redacted. After a CIA review those restrictions have been lifted, and the result is this explosive new edition, The Black Banners (Declassified). Alongside a new foreword by Soufan, the declassified documents uncover shocking details on the use of torture on terror suspects, how these 'enhanced interrogation techniques' failed to secure reliable intelligence, and in fact actively derailed the fight against al-Qaeda. By contrast we see Soufan at work using empathy and intelligent questioning - not force or violence - to extract some of the most important confessions in the war. Taking us from the interrogation rooms where Soufan would share food and films with the suspects so he could bond with them, to the hideouts of bin Laden, Ali Soufan reveals with intimate, first-hand knowledge the unbelievable truth about America's security agencies, 9/11, and the global 'War on Terror'.
As of early 2010, more than two million U.S. troops have served in Iraq and Afghanistan. Yet the American public is neither much engaged in the issues of these two wars nor particularly knowledgeable about the troops experiences, which have ranged from positive and energizing to searing and debilitating. Based on scores of interview--some culled from the Library of Congress Veterans History Project and others conducted by the author himself--"Through Veterans Eyes" presents a composite narrative of the experiences of U.S. service personnel in Iraq and Afghanistan. Minear quotes more than 175 veterans by name and includes a dozen of their own photos from the conflict theaters. Thematic chapters cover duty and service, politics, cultural and ethical challenges, relationships to local populations, and reentry into American society. Neither pro-war nor anti-war, Minear s approach encourages veterans to express their views on issues critical to the nation. What has motivated U.S. military personnel to enlist? What specific challenges have they faced in Iraq and Afghanistan? What have been the impacts of deployment on their families and communities? Is their experience changing their views of their country and the world? What lessons may be learned from their stories? Veterans candid responses to these and other probing questions deserve pondering.
Over Iran an RAF Canberra flies a feint towards the Soviet border, to provoke Soviet air defence radar operators to reveal their location. He will not deliberately enter Soviet airspace, but the possibilities for miscalculation, or misunderstanding leading to tragedy are always there. These flights cost the lives of over 150 US airmen by the end of the Cold War. Also cruising nearby in Iranian airspace, is a heavily modified US Air Force C-130 transport aircraft. Onboard 10 Special Equipment Operators are listening through their headphones for Soviet radio and radar activity. Hearing Soviet ground controllers scramble fighters to intercept the Canberra. The US operators alert the British aircraft to the closing MiG's and it quickly alters course away from the border. This was the life of crews involved in Cold War intelligence collection flights. Enormous resources were committed to these operations and they shaped the structure of much modern military intelligence collection, analysis and sharing. This book explores their scope, conduct, plus the politics and new technologies behind these operations that started in the dying embers of World War Two. It examines how these often complex missions were planned, coordinated and flown and is supported by first-hand accounts from pilots, aircrews and intelligence analysts. It utilises recently declassified British and US archive material and is illustrated with a wide range of images. The author examines European and Far East operations and a number of topics not previously covered in depth elsewhere. These include authorisation and coordination arrangements for conduct of overflight and peripheral missions; plus the part played by key third party states in operations in Scandinavia, Turkey and others. He looks at why Tyuratam complex was of such major intelligence interest and details the many resources targeted against it. He looks at some of the less explored elements of U-2 operations, including British involvement, plus the development of powerful lenses intended to enable very long range peripheral photography and why the long mythologised `Kapustin Yar' overflight probably never took place with new details and analysis. This comprehensive book links together the realities of flying, advanced technology and politics to provide a detailed and illustrated examination of Cold War aerial intelligence collection. |
You may like...
Destined for War - Can America and China…
Graham Allison
Paperback
(1)
Strategic Intelligence Management…
Babak Akhgar, Simeon Yates
Paperback
R1,598
Discovery Miles 15 980
An Intelligence Studies Anthology…
Richard M. Denholm II
Paperback
Keeping Us Safe - Secret Intelligence…
Arthur S. Hulnick
Hardcover
The Central Intelligence Agency…
Athan G. Theoharis, Richard H. Immerman, …
Hardcover
Spies in Uniform - British Military and…
Matthew S. Seligmann
Hardcover
R5,475
Discovery Miles 54 750
|