Encyclopedia of Cold War Espionage, Spies, and Secret by Robert L. Miller, Richard C. S. Trahair

By Robert L. Miller, Richard C. S. Trahair

Formerly unknown operations and new names proceed to floor within the Encyclopedia of chilly conflict Espionage, Spies, and mystery Operations. This new version includes up to date details on chilly battle spying, with over 350 A-Z major entries (over thirty of them new) biographical sketches, and an up to date bibliography. In aid of the entries the ebook contains important instruments: an entire chronology of important espionage actions; a word list of keywords and members; references to different resources, both in print or digital codecs; and a whole index. the newest Russian deep hide secret agent situations of 2010 and the sequel are a part of this version.

Show description

Read Online or Download Encyclopedia of Cold War Espionage, Spies, and Secret Operations PDF

Similar espionage books

Call to Treason (Tom Clancy's Op-Center, Book 11)

Tom Clancy's Op-Center: name to Treason is one more gripping addition to the bestselling sequence masterminded via Tom Clancy and Steve Pieczenik. The Op-Center's price range is slashed, leaving normal Mike Rodgers available in the market for a brand new task. whilst presidential candidiate Senator Donald Orr recruits Rodgers to behave as his army consultant, it appears like an ideal transition.

War of Numbers: An Intelligence Memoir

SAM ADAMS enjoyed intelligence paintings, and that enthusiasm shines all through this memoir of his years with the crucial Intelligence enterprise. His occupation was once ruled through an epic fight over Vietnam -- over army makes an attempt to conceal the genuine dimension of the enemy forces there, and over the integrity of the intelligence method.

Confidential: The Life of Secret Agent Turned Hollywood Tycoon- Arnon Milchan

Arnon Milchan has led a mystery double lifestyles. the type of existence one might examine in a John Le Carré undercover agent novel or in a film made by means of Hollywood colleagues Steven Spielberg or Oliver Stone. this can be the tale of a undercover agent, of nuclear proliferation, billion-dollar high-tech protection transactions, ideology, patriotism, love, heartbreak, and the awe inspiring Hollywood occupation of a mysterious wealthy person.

You're Stepping on My Cloak and Dagger

With a pointy eye and wry wit, Roger corridor recounts his studies as an American military officer assigned to the workplace of Strategic prone (OSS) in the course of global struggle II. First released in 1957 to severe and well known acclaim, his publication has develop into a cult favourite in intelligence circles. the tale follows Hall's reviews from a junior officer fleeing a tedious education project in Louisiana to his quirky and rigorous OSS education rituals within the usa, England, and Scotland.

Extra info for Encyclopedia of Cold War Espionage, Spies, and Secret Operations

Sample text

In each nation, counter-espionage work led to executions. In France, the infamous Mata Hari was convicted and shot in 1917 (despite her effectiveness as a spy being highly questionable). Two years earlier, the Russians executed an alleged spy, Sergei Myasoedov, on similarly dubious evidence. The Germans struggled to secure occupied territories and arrested thousands. They executed several hundred in both western and eastern Europe. In Britain, Vernon Kell’s organisation had identified a small web of German spies.

A system was required to investigate the richness of the trail people left online; even, perhaps, building a pattern of terrorist behaviour before asking a computer which individuals matched it. For instance, who was communicating between Britain and Pakistan while also viewing extremist websites? To identify targets whom MI5 could then investigate, such methods required access to both data and massive computing power. The world of spying had met the world of big data. And much of the data, especially in the US, was held by the private sector.

A system was required to investigate the richness of the trail people left online; even, perhaps, building a pattern of terrorist behaviour before asking a computer which individuals matched it. For instance, who was communicating between Britain and Pakistan while also viewing extremist websites? To identify targets whom MI5 could then investigate, such methods required access to both data and massive computing power. The world of spying had met the world of big data. And much of the data, especially in the US, was held by the private sector.

Download PDF sample

Rated 4.98 of 5 – based on 25 votes