Provides a systematic analysis of all known CIA PMOs and explains the why, who, and how of proxy warfare Includes both a survey of secondary literature and an array of primary sources
Adds a theoretical perspective with the application of principal agent theory to the field of covert action and proxy warfare