A Spy Called Cynthia : And a Life in Intelligence

Elizabeth Thorpe, codenamed Cynthia, was a glamorous American socialite recruited by MI6 to obtain intelligence from the Polish Foreign Ministry and from the Italian and Vichy French embassies in Washington. Her method was to seduce whatever targets could provide her with vital intelligence, a practice in which she hardly ever failed, enabling her to secure first the French and then the Italian naval codes. In the landings in North Africa, she was credited with having saved the lives of hundreds of Allied soldiers.

This unique account by a British spymaster of his relationship with Cynthia, detailing his subsequent involvement with Kim Philby and the Cambridge spies and his dealings with his counterparts in the CIA and French intelligence, was entrusted by him to a junior colleague on the basis that it was not to be published until everyone in it was dead. Necessarily anonymous and impossible to fully verify, though most of it undoubtedly did happen and is part of the historical record, A Spy Called Cynthia provides a special insight into the world of intelligence and one of its most effective practitioners.

Kokeile 30 tuntia ilmaiseksi

  • Lue ja kuuntele tänään
  • Ei sitoumusta, voit perua milloin vain
Kokeile nyt ilmaiseksi

Tee jokaisesta hetkestä seikkailu

  • Kuljeta satojatuhansia tarinoita taskussasi
  • Ei sitoumusta, voit perua milloin vain
Kokeile nyt ilmaiseksi
Hymyilevä nainen katsoo ulos junan ikkunasta, kuulokkeet päässään ja puhelin kädessään

Aloita tämä kirja jo tänään, hintaan 0€

  • Kokeilujakson aikana käytössäsi on kaikki sovelluksen kirjat
  • Ei sitoumusta, voit perua milloin vain
Kokeile nyt ilmaiseksi
Yli 52 000 ihmistä on antanut Nextorylle viisi tähteä App Storessa ja Google Playssä.

Muut ovat myös lukeneet

Ohita lista
  1. Artificial Intelligence for Cybersecurity : Develop AI approaches to solve cybersecurity problems in your organization

    Bojan Kolosnjaji, Huang Xiao, Peng Xu, Apostolis Zarras

    book
  2. Cybersecurity Strategies and Best Practices : A comprehensive guide to mastering enterprise cyber defense tactics and techniques

    Milad Aslaner

    book
  3. Combating Cyberattacks Targeting the AI Ecosystem : Strategies to secure AI systems from emerging cyber threats, risks, and vulnerabilities

    Aditya K. Sood

    book
  4. Artificial Intelligence Uncovered : Applications and Future Trends

    Oliver Brooks

    book
  5. Cyber Forensics and Investigation on Smart Devices: Volume 1

    book
  6. CC Certified in Cybersecurity Study Guide

    Mike Chapple

    audiobook
  7. In Depth Security Vol. II

    book
  8. Incident Response with Threat Intelligence : Practical insights into developing an incident response capability through intelligence-based threat hunting

    Roberto Martinez

    book
  9. IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications

    book
  10. Security Mom : An Unclassified Guide to Protecting Our Homeland and Your Home

    Juliette Kayyem

    book
  11. Mastering Cyber Intelligence : Gain comprehensive knowledge and skills to conduct threat intelligence for effective system defense

    Jean Nestor M. Dahj

    book
  12. Living to Tell the Horrid Tales: True Life Stories of Fomer Slaves, Historical Documents & Novels

    Frederick Douglass, Harriet Jacobs, Harriet Beecher Stowe, Mark Twain, Lydia Maria Child, Harriet E. Wilson, William Wells Brown, Charles W. Chesnutt, James Weldon Johnson, Albion Winegar Tourgée, Sutton E. Griggs, Solomon Northup, Willie Lynch, Nat Turner, Sojourner Truth, Mary Prince, William Craft, Ellen Craft, Louis Hughes, Jacob D. Green, Booker T. Washington, Olaudah Equiano, Elizabeth Keckley, William Still, Sarah H. Bradford, Josiah Henson, Charles Ball, Austin Steward, Henry Bibb, L. S. Thompson, Kate Drumgoold, Lucy A. Delaney, Moses Grandy, John Gabriel Stedman, Henry Box Brown, Margaretta Matilda Odell, Thomas S. Gaines, Brantz Mayer, Aphra Behn, Theodore Canot, Daniel Drayton, Thomas Clarkson, F. G. De Fontaine, John Dixon Long, Stephen Smith, Joseph Mountain, Ida B. Wells-Barnett

    book