ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Book Review: 'Burn After Reading'

Updated on January 27, 2018
tamarawilhite profile image

Tamara Wilhite is a technical writer, an industrial engineer, a mother of two, and a published sci-fi and horror author.

An Introduction to "Burn After Reading"

The 1961 book “Burn After Reading”, subtitled “The Espionage History of World War 2”, was written by Ladislas Farago.

The book "Burn After Reading" gives the history and politics of intelligence gathering and propaganda during World War 2. It is detailed by a unique author, a Hungarian in the United States at the outbreak of World War 2 brought into the ONI as an intelligence analyst and propagandist.

Points in Favor of the Book Burn After Reading

Unlike many modern World War 2 commentaries, the book “Burn After Reading” book by Farago was written within 20 years of WW2, with stories still within the vivid memory of many who committed acts of espionage and lived to tell the stories or drawn from readily available records from the war. The book is full of first and second hand stories that make the experiences and lessons learned much more vivid than distantly removed analyses.

“Burn After Reading” by Farago brings up historical points that too many people forget about war. For example, Norway’s direct war was only a few days, but an underground war was waged for five years. In Greece during World War 2, roughly two thirds of those killed were during espionage actions and unconventional warfare, not traditional rows of soldiers charging one another. Espionage was crucial to supporting wars along the front lines, essential to preparing for an evasion and frequently ongoing after an invasion to hurt an enemy that you had little chance of driving out in an open battle.

The stories demonstrate that while soldiering was the men’s province, women and children of all ages could and were involved in espionage. In fact, the author details Stalin's memo ordering all citizens of all ages to be involved in actions from cutting cables to killing soldiers and officials to interfering with the enemy operations by setting things on fire.

The book reveals long neglected lessons, such as the need to identify those with very valuable knowledge and disaffection with the current political state, since these people are most easily led into spying for an enemy or convinced to share sensitive information. That was likely why the Chinese wanted the entire OPM database they copied in 2014, though the revelation came out in 2015.

The English did a poor job fighting spies and espionage during the war because they cut their spy agency and intelligence during peace time, letting their best people go to save money, and then having to fight the war with people who had to be lured back during war time while money was burned fighting spies and espionage within the country. If you are going to have an intelligence agency, it needs to be big enough to act as a war is ramping up, not built up after the enemy has struck.

There are stories of near-misses and missed opportunities from World War 2, such as Churchill receiving a German statesman Ferdinand von Schlabrendorff with information on the Nazi plans. Schlabrendorff simply couldn’t get an audience with people in Whitehall with his information, but ended up meeting with a not-yet powerful Winston Churchill instead. Only after the war started did the British government work to build a direct channel of communication with such a valuable resource – missing out on critical intelligence in the mean time and delays in all other information they did receive.

Dummy spy rings were set up in England to take up the time and energy of the counterespionage service. The Germans trained girls to work as servants and spies (such as learning how to set up a wireless transmitter) before going to work in the houses of important English families. They could provide small pieces of valuable information but primarily served to act as a distraction to counterespionage efforts, so that other more active spy networks would be undetected.

The book reveals the truth behind the “James Bond” mythos of the indestructible British spy. Most SOE operatives died in a matter of months, and only a small fraction survived the end of the war. The same was true of wireless operators like Noor Inayat Khan, a half Indian woman almost prevented from being a wireless operator due to racism and sexism.

This book has interesting stories that reveal the multi-faceted nature of intelligence services. Refugees from the Nazis in neutral countries were recruited by various groups in an effort to strike back against the Nazis. The Japanese mostly recruited from their own ethnicity within the US for spies, which was justification for the Japanese mass internments during World War 2, but one of their major Pearl Harbor spies was Bernard Kuehn, a German.

Another anecdote on this book is how official policies can hurt intelligence assets. A number of refugees from the Nazis living in neutral Switzerland worked for Dulles as spies but had no reportable income, so the Swiss police wanted to deport them. A solution was found by paying a psychiatric retreat to register them as patients, where they were committed. The spies then dropped off the list of concerns by Swiss police as contained, though the institution let them come and go as they pleased so they could continue spying. These sorts of stories bring the unorthodox solutions used to protect people as much as possible, though the author recounts many who died as well.

This is the only World War 2 book where I've read about the wholesale use of household servants as spies, cover for true spies and occasional murder of elite.
This is the only World War 2 book where I've read about the wholesale use of household servants as spies, cover for true spies and occasional murder of elite. | Source

Strikes Against Burn After Reading

The book “Burn After Reading” is written by someone obviously fluent in English but awkwardly inserts advanced vocabulary terms at times.

The author dedicates a whole chapter to the efforts to convince Japan to surrender prior to the dropping of the atomic bombs on Hiroshima and Nagasaki. He blames the lack of diplomatic channels for a formal acceptance of surrender between the US and Japan for the bombings. He had an overly optimistic assumption that they would surrender if given the chance, since so many military officers committed suicide instead of surrendering, their government told the average person to sharpen bamboo sticks to attack soldiers with and fight to the death, and the fact that it took two bombs plus false intelligence that we had many more on the runway ready to be dropped that the Japanese finally surrendered.

It is better to hide by blending in with the crowd than stand out James Bond style.
It is better to hide by blending in with the crowd than stand out James Bond style. | Source

Observations About Burn After Reading

Wars like Vietnam, and arguably Iraq and Afghanistan, demonstrated that endless attrition tends to wear down the Western will. This makes “Burn After Reading” an interesting look into tactics that are more likely to have bearing in future wars than either Civil War histories of large armies clashing or science fiction battles with infantries and laser pistols.

The book “Burn After Reading” by Farago focuses on the Western method of classic intelligence, with a few spies and networks finding information and committing espionage. The Chinese method since World War 2 isn’t discussed, where they ask legions of students abroad and workers in many institutions to collect small pieces of information correlated into a big picture back home. The large network with small pieces of information put together at home has several advantages over a smaller network with a tighter focus. First, it makes it harder for the enemy to determine the intended targets for intelligence gathering. Second, the sheer size and scope of such networks make it hard to track or interfere with. Third, asking multiple people to collect the same bits of information provides a measure of verification via redundancy, unless your misinformation is uniformly repeated by all sources. Fourth, it minimizes the impact if one person doing casual perusal along with their full time job is caught. Logistically, this is much more challenging but a better model if you have people and lines of communication to do it.

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)