Beyond Oversight: The CIA and The Technology Of Covert Operations
No se pudo agregar al carrito
Solo puedes tener X títulos en el carrito para realizar el pago.
Add to Cart failed.
Por favor prueba de nuevo más tarde
Error al Agregar a Lista de Deseos.
Por favor prueba de nuevo más tarde
Error al eliminar de la lista de deseos.
Por favor prueba de nuevo más tarde
Error al añadir a tu biblioteca
Por favor intenta de nuevo
Error al seguir el podcast
Intenta nuevamente
Error al dejar de seguir el podcast
Intenta nuevamente
Prueba gratis de 30 días de Audible Standard
Selecciona 1 audiolibro al mes de nuestra colección completa de más de 1 millón de títulos.
Es tuyo mientras seas miembro.
Obtén acceso ilimitado a los podcasts con mayor demanda.
Plan Standard se renueva automáticamente por $8.99 al mes después de 30 días. Cancela en cualquier momento.
Compra ahora por $7.99
-
Narrado por:
-
Virtual Voice
-
De:
-
Jonathan Sloane
Este título utiliza narración de voz virtual
Voz Virtual es una narración generada por computadora para audiolibros..
This is the story of spy satellites launched before NASA existed, poison laboratories hidden inside Army bases, and a cat surgically converted into a listening device. It traces the tunnel dug beneath Berlin to tap Soviet phone lines, the ship built to raise a sunken submarine from three miles down, and the malware that destroyed Iranian centrifuges without a single soldier crossing the border. The engineers and scientists who built these systems believed they were saving the world from Soviet domination.
The same secrecy that protected these programs also enabled abuses that would later produce scandal. Unwitting Americans were dosed with LSD. Assassination tools were developed and stockpiled in defiance of presidential orders. Surveillance capabilities expanded far beyond what legal frameworks had anticipated. When investigators finally gained access, they found an agency that had operated for decades with minimal accountability.
The full scope of what the CIA developed remains unknown. Documents were destroyed, programs were never acknowledged, and classification persists long after any operational justification has expired. What has emerged through declassification, leaks, and congressional investigation represents only a portion of the secret technological history that shaped the Cold War and continues to influence events today.
Todavía no hay opiniones