Defiance against Chinese oppression has been a defining characteristic of Tibetan life for more than four decades, symbolized most visibly by the much revered Dalai Lama. But the story of Tibetan resistance weaves a far richer tapestry than anyone might have imagined. Kenneth Conboy and James Morris[...]
March 1968: three miles below the stormy surface of the North Pacific, a Soviet submarine lay silent as a tomb-its crew dead, its payload of nuclear missiles, once directed toward strategic targets in Hawaii, inoperable. No longer a real threat, the sub still presented an alluring target and it was [...]
Dubbed the "Year of Intelligence," 1975 was not a good year for the Central Intelligence Agency (CIA). Caught spying on American citizens, the agency was under investigation, indicted in shocking headlines, its future covert operations at risk. Like so many others caught up in public scandal, the CI[...]
Shortly after it was founded in 1947, the CIA launched a secret effort to win the Cold War allegiance of the British left. Hugh Wilford traces the story of this campaign from its origins in Washington DC to its impact on Labour Party politicians, trade unionists, and Bloomsbury intellectuals[...]
A middle aged-attorney named Jonathon Miracle is suddenly tapped by the CIA to try a case in Jerusalem. He reluctantly agrees, realizing later that he will have to make public MK-ULTRA, the covert CIA operation which introduced LSD into the U.S. population. Next, his curiosity and stubbornness prope[...]
James Risen has broken story after story on the abuses of power of the Bush administration.
From warrantless wiretapping to secret financial data mining to the CIA's rogue operations, he has shown again and again that the executive branch has dangerously overreached, repudiated checks and balan[...]
Bob Woodward, the best investigative reporter in the country, spent six years examining the CIA using hundreds of inside sources and secret documents to paint a picture of the world's largest espionage apparatus.[...]
From clothesline codes to surveillance satellites and cyber espionage, Paul B. Janeczko uncovers two centuries worth of true spy stories in U.S. history.
Ever since George Washington used them to help topple the British, spies and their networks have helped and hurt America at key moments in his[...]
CIA Spy Flights over China from Taiwan 19511969. After Maos communists took control of mainland China in 1949, the U.S. Central Intelligence Agency developed an uneasy partnership with the nationalist Chinese government on Taiwan for covert air operations over the mainland dropping agents and propag[...]
Chocolate and candy making today is undergoing a renaissance in public awareness and status. This comprehensive book combines artisan confectionery techniques with accessible explanations of the theory and science as well as formulas for use in production. Fundamental information for the confectione[...]
The press called him a "real-life James Bond." Fidel Castro called him "the most dangerous CIA agent." History remembers him as a Watergate burglar, yet the Watergate break-in was his least perilous mission.Frank Sturgis using more than thirty aliases and code names trained guerilla armies in twelve[...]
Former CIA Personnel Director F.W.M. Janney once wrote, "It is absolutely essential that the Agency have available to it the greatest single source of expertise: the American academic community." To this end, the Central Intelligence Agency has poured tens of millions of dollars into universities to[...]
Morten Storm was an unlikely Jihadi. A six-foot-one red-haired Dane, Storm spent his teens in and out of trouble. A book about the Prophet Mohammed prompted his conversion to Islam, and Storm sought purpose in a community of believers. He attended a militant madrasah in Yemen, named his son Osama, a[...]
Morten Storm was an unlikely jihadi. A six-foot-one red-haired Dane, Storm spent his teens in and out of trouble. A book about the Prophet Mohammed prompted his conversion to Islam, and Storm sought purpose in a community of believers. He attended a militant madrasah in Yemen, named his son Osama, a[...]
Describes the CIA's development and use of psychological torture, from the Cold War to the post-September 11th era, detailing the use of isolation, hooding, extremes of temperature, the manipulation of time, and other techniques and assessing the implications of such inhumane practices. Reprint.[...]
Approved by BCS and ECDL Foundation. This training guide has been written specifically for the new ECDL unit Word Processing Software (BCS ITQ level 2, syllabus 5.0).[...]
Approved by BCS and ECDL Foundation. This training guide has been written specifically for the new ECDL unit Database Software (BCS ITQ level 2, syllabus 5.0).[...]
Approved by BCS and ECDL Foundation. This training guide has been written specifically for the ECDL unit Advanced Word Processing Software (BCS ITQ level 3, syllabus 2.0).[...]
Approved by BCS and ICS Skills. This training guide has been written specifically for the new ECDL unit Word Processing Software (BCS ITQ level 1, syllabus 2.0)[...]
Approved by BCS and ICS Skills. This training guide has been written specifically for the new ECDL unit Spreadsheet Software (BCS ITQ level 1, syllabus 1.0).[...]
Approved by BCS and ICS Skills. This training guide has been written specifically for the new ECDL unit Database Software (BCS ITQ level 1, syllabus 1.0).[...]