

Author: Immerman Richard
Publisher: Routledge Ltd
ISSN: 0268-4527
Source: Intelligence and National Security, Vol.26, Iss.2-3, 2011-04, pp. : 159-181
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




By Odom William
Intelligence and National Security, Vol. 23, Iss. 3, 2008-06 ,pp. :






Secret Intelligence, Covert Action and Clandestine Diplomacy
By Scott Len
Intelligence and National Security, Vol. 19, Iss. 2, 2004-06 ,pp. :