In this Book

summary
In 1938, Hazel Frome, the wife of a powerful executive at Atlas Powder Company, a San Francisco explosives manufacturer, set out on a cross-country motor trip with her twenty-three-year-old daughter, Nancy. When their car broke down in El Paso, Texas, they made the most of being stranded by staying at a posh hotel and crossing the border to Juarez for shopping, dining, and drinking. A week later, their near-nude bodies were found in the Chihuahuan Desert. Though they had been seen on occasion with two mystery men, there were no clues as to why they had apparently been abducted, tortured for days, and shot execution style. El Paso sheriff Chris Fox, a lawman right out of central casting, engaged in a turf war with the Texas Rangers and local officials that hampered the investigation. But the victims’ detours had placed them in the path of a Nazi spy ring operating from the West Coast to Latin America through a deep-cover portal at El Paso. The sleeper cell was run by spymasters at the German consulate in San Francisco. In 1938, only the inner circle of the Roosevelt White House and a few FBI agents were aware of the extent to which German agents had infiltrated American industry. Fetch the Devil is the first narrative account of this still officially unsolved case. Based on long forgotten archives and recently declassified FBI files, Richmond paints a convincing portrait of a sheriff’s dogged investigation into a baffling murder, the international spy ring that orchestrated it, and America on the brink of another world war.

Table of Contents

restricted access Download Full Book
  1. Cover
  2. restricted access
    • Download PDF Download
  1. Title Page, Copyright, Dedication, Quote
  2. restricted access
    • Download PDF Download
  1. Contents
  2. pp. ix-x
  3. restricted access
    • Download PDF Download
  1. Preface
  2. pp. xi-xiv
  3. restricted access
    • Download PDF Download
  1. An Unforgiving Place
  2. pp. 1-2
  3. restricted access
    • Download PDF Download
  1. Part I: Murder in the Desert
  1. [1]
  2. pp. 5-10
  3. restricted access
    • Download PDF Download
  1. [2]
  2. pp. 11-15
  3. restricted access
    • Download PDF Download
  1. [3]
  2. pp. 16-21
  3. restricted access
    • Download PDF Download
  1. [4]
  2. pp. 22-25
  3. restricted access
    • Download PDF Download
  1. [5]
  2. pp. 26-29
  3. restricted access
    • Download PDF Download
  1. [6]
  2. pp. 30-35
  3. restricted access
    • Download PDF Download
  1. [7]
  2. pp. 36-41
  3. restricted access
    • Download PDF Download
  1. [8]
  2. pp. 42-45
  3. restricted access
    • Download PDF Download
  1. [9]
  2. pp. 46-51
  3. restricted access
    • Download PDF Download
  1. [10]
  2. pp. 52-58
  3. restricted access
    • Download PDF Download
  1. [11]
  2. pp. 59-65
  3. restricted access
    • Download PDF Download
  1. [12]
  2. pp. 66-70
  3. restricted access
    • Download PDF Download
  1. [13]
  2. pp. 71-75
  3. restricted access
    • Download PDF Download
  1. [14]
  2. pp. 76-80
  3. restricted access
    • Download PDF Download
  1. [15]
  2. pp. 81-83
  3. restricted access
    • Download PDF Download
  1. [16]
  2. pp. 84-89
  3. restricted access
    • Download PDF Download
  1. [17]
  2. pp. 90-93
  3. restricted access
    • Download PDF Download
  1. [18]
  2. pp. 94-101
  3. restricted access
    • Download PDF Download
  1. [19]
  2. pp. 102-109
  3. restricted access
    • Download PDF Download
  1. [20]
  2. pp. 110-116
  3. restricted access
    • Download PDF Download
  1. [21]
  2. pp. 117-123
  3. restricted access
    • Download PDF Download
  1. [22]
  2. pp. 124-128
  3. restricted access
    • Download PDF Download
  1. [23]
  2. pp. 129-135
  3. restricted access
    • Download PDF Download
  1. [24]
  2. pp. 136-140
  3. restricted access
    • Download PDF Download
  1. Part II: Spies on the Border
  1. [25]
  2. pp. 143-146
  3. restricted access
    • Download PDF Download
  1. [26]
  2. pp. 147-155
  3. restricted access
    • Download PDF Download
  1. [27]
  2. pp. 156-160
  3. restricted access
    • Download PDF Download
  1. [28]
  2. pp. 161-165
  3. restricted access
    • Download PDF Download
  1. [29]
  2. pp. 166-173
  3. restricted access
    • Download PDF Download
  1. [30]
  2. pp. 174-180
  3. restricted access
    • Download PDF Download
  1. [31]
  2. pp. 181-184
  3. restricted access
    • Download PDF Download
  1. [32]
  2. pp. 185-190
  3. restricted access
    • Download PDF Download
  1. [33]
  2. pp. 191-195
  3. restricted access
    • Download PDF Download
  1. [34]
  2. pp. 196-199
  3. restricted access
    • Download PDF Download
  1. [35]
  2. pp. 200-206
  3. restricted access
    • Download PDF Download
  1. [36]
  2. pp. 207-212
  3. restricted access
    • Download PDF Download
  1. Part III: An Enemy Within
  1. [37]
  2. pp. 215-218
  3. restricted access
    • Download PDF Download
  1. [38]
  2. pp. 219-222
  3. restricted access
    • Download PDF Download
  1. [39]
  2. pp. 223-229
  3. restricted access
    • Download PDF Download
  1. [40]
  2. pp. 230-235
  3. restricted access
    • Download PDF Download
  1. [41]
  2. pp. 236-242
  3. restricted access
    • Download PDF Download
  1. [42]
  2. pp. 243-250
  3. restricted access
    • Download PDF Download
  1. [43]
  2. pp. 251-254
  3. restricted access
    • Download PDF Download
  1. [44]
  2. pp. 255-258
  3. restricted access
    • Download PDF Download
  1. [45]
  2. pp. 259-263
  3. restricted access
    • Download PDF Download
  1. [46]
  2. pp. 264-267
  3. restricted access
    • Download PDF Download
  1. [47]
  2. pp. 268-272
  3. restricted access
    • Download PDF Download
  1. [48]
  2. pp. 273-275
  3. restricted access
    • Download PDF Download
  1. [49]
  2. pp. 276-282
  3. restricted access
    • Download PDF Download
  1. [50]
  2. pp. 283-287
  3. restricted access
    • Download PDF Download
  1. [51]
  2. pp. 288-291
  3. restricted access
    • Download PDF Download
  1. [52]
  2. pp. 292-295
  3. restricted access
    • Download PDF Download
  1. [53]
  2. pp. 296-298
  3. restricted access
    • Download PDF Download
  1. [54]
  2. pp. 299-306
  3. restricted access
    • Download PDF Download
  1. A Haunting Legacy
  2. pp. 307-308
  3. restricted access
    • Download PDF Download
  1. Epilogue
  2. pp. 309-316
  3. restricted access
    • Download PDF Download
  1. Coda
  2. pp. 317-322
  3. restricted access
    • Download PDF Download
  1. Acknowledgments
  2. pp. 323-326
  3. restricted access
    • Download PDF Download
  1. Notes
  2. pp. 327-344
  3. restricted access
    • Download PDF Download
  1. Index
  2. pp. 345-356
  3. restricted access
    • Download PDF Download
  1. Images
  2. restricted access
    • Download PDF Download
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.