The Special Operations Executive was formed by Winston Churchill in 1940 to "set Europe ablaze." In the SOE women were trained to handle guns and explosives, work undercover, endure interrogation by the Gestapo, and use complex codes. In The Women Who Lived for Danger, acclaimed historian Marcus Binney recounts the story of ten remarkable women who were dropped in occupied territories to work as secret agents.
Stealing Secrets: How a Few Daring Women Deceived Generals, Impacted Battles, and altered the Course of the Civil War In this breezy overview of 36 women who spied for the Confederacy and the Union, Winkler (Lincoln's Ladies) tells "stories of women spies...filled with suspense and seduction, treachery and trickery, romance and bravery."
The compelling untold story of a group of stranded U.S. Army nurses and medics fighting to escape Nazi-occupied Europe. When 26 Army nurses and medics-part of the 807th Medical Air Evacuation Transport Squadron-boarded a cargo plane for transport in November 1943, they never anticipated the crash landing in Nazi-occupied Albania that would lead to their months-long struggle for survival. A mesmerizing tale of the courage and heroism of ordinary people, THE SECRET RESCUE tells not only a new story of
A remarkable tale of espionage and intrigue?the story of Wilhelm Canaris, Hitler?s intelligence chief, and his role in the conspiracy to assassinate the Führer. Admiral Wilhelm Canaris was appointed by Hitler to head the Abwehr (the German secret service) eighteen months after the Nazis came to power. But Canaris would turn against the Führer and the Nazi regime, believing that Hitler had started a war Germany could not win. In 1938 he was involved in an attempted coup, undermined by British
In the annals of espionage, one name towers above all others: that of H.A.R. ?Kim? Philby, the ringleader of the legendary Cambridge spies. A member of the British establishment, Philby joined the Secret Intelligence Service in 1940, rose to the head of Soviet counterintelligence , and, as MI6?s liaison with the CIA and the FBI, betrayed every secret of Allied operations to the Russians, fatally compromising covert actions to roll back the Iron Curtain in the early years of the Cold War. Written from Moscow
Item is on Backorder Magnus Pym, ranking diplomat, has vanished, believed defected. The chase is on: for a missing husband, a devoted father, and a secret agent. Pym's life, it is revealed, is entirely made up of secrets. Dominated by a father who is also a confidence trickster on an epic scale, Pym has from the age of seventeen been controlled by two mentors. It is these two, racing each other and time itself, who are orchestrating the search to find the perfect spy ...
Could Martin Talbots elderly, Alzheimer-stricken mother, Judy, really have been the Black Stiletto? When Martin discovers several volumes of her diaries hidden by his mother, he is stunned beyond all imagination. His mother, the underground heroine of yesteryear? The famed ,still unidentified woman who battled Communist spies, took on the Mafia, and preyed on common crooks? The woman who exacted punishment on evildoers without mercy? But it is all described, in great detail, in the diaries. What caused her
In the early 1960's, a handful of CIA paramilitary officers led a secret war in the mountains of Laos against North Vietnamese and Lao Communist forces. One of those secret warriors, Terrence Burke, gives a vivid account of primitive guerrilla warfare that eventually led to an attempt by the North Vietnamese to capture him. Burke's stories of that war are of gritty and often deadly hit and run tactics against the North Vietnamese, attempted rescues of downed pilots, and daily survival far from American
Moran, a few years out of Harvard and fresh from a Fulbright scholarship in Bulgaria, decides to follow her childhood dream of becoming and spy and, after a grueling interview process that involves several polygraphs and an abandoned foreign boyfriend, goes to work for the CIA. What follows is a surprisingly honest behind-the-scenes look at what it takes to become a real-life CIA agent, signal-sites and all.
Code-crackers with a sense of history will appreciate this medallion. Named after Julius Caesar, who used it to communicate with his generals, the Caesar cipher is one of the most well-known encryption techniques. Send secured messages to covert operators by using the inner disk as the real message and the outer disk as the encrypted message. For example, if you set #1 in the window, that means there?s an alphabet code shift of 1. So A=B, B=C, etc. The message?s recipient must also know the shift number to