From CIA to APT


Book Description

Most introductory books on cyber security are either too technical for popular readers, or too casual for professional ones. This book, in contrast, is intended to reside somewhere in the middle. That is, while concepts are explained in a friendly manner for any educated adult, the book also necessarily includes network diagrams with the obligatory references to clouds, servers, and packets. But don't let this scare you. Anyone with an ounce of determination can get through every page of this book, and will come out better informed, not only on cyber security, but also on computing, networking, and software.




Secret Agenda


Book Description

The exposé that reveals “a prostitution ring, heavy CIA involvement, spying on the White House as well as on the Democrats, and plots within plots” (The Washington Post) Ten years after the infamous Watergate scandal that brought down the Nixon presidency, Jim Hougan—then the Washington editor of Harper’s Magazine—set out to write a profile of Lou Russell, a boozy private-eye who plied his trade in the vice-driven underbelly of the nation’s capital. Hougan soon discovered that Russell was “the sixth man, the one who got away” when his boss, veteran CIA officer Jim McCord, led a break-in team into a trap at the Watergate. Using the Freedom of Information Act to win the release of the FBI’s Watergate investigation—some thirty-thousand pages of documents that neither the Washington Post nor the Senate had seen—Hougan refuted the orthodox narrative of the affair. Armed with evidence hidden from the public for more than a decade, Hougan proves that McCord deliberately sabotaged the June 17, 1972, burglary. None of the Democrats’ phones had been bugged, and the spy-team’s ostensible leader, Gordon Liddy, was himself a pawn—at once, guilty and oblivious. The power struggle that unfolded saw E. Howard Hunt and Jim McCord using the White House as a cover for an illicit domestic intelligence operation involving call-girls at the nearby Columbia Plaza Apartments. A New York Times Notable Book, Secret Agenda “present[s] some valuable new evidence and explored many murky corners of our recent past . . . The questions [Hougan] has posed here—and some he hasn’t—certainly deserve an answer” (The New York Times Book Review). Kirkus Reviews declared the book “a fascinating series of puzzles—with all the detective work laid out.”




Secret History, Second Edition


Book Description

The first edition of this book, published in 1999, was well-received, but interest in it has surged in recent years. It chronicles an early example of “regime change” that was based on a flawed interpretation of intelligence and proclaimed a success even as its mistakes were becoming clear. Since 1999, a number of documents relating to the CIA’s activities in Guatemala have been declassified, and a truth and reconciliation process has unearthed other reports, speeches, and writings that shed more light on the role of the United States. For this edition, the author has selected and annotated twenty-one documents for a new documentary Appendix, including President Clinton’s apology to the people of Guatemala.




Cyber Mercenaries


Book Description

Cyber Mercenaries explores the secretive relationships between states and hackers. As cyberspace has emerged as the new frontier for geopolitics, states have become entrepreneurial in their sponsorship, deployment, and exploitation of hackers as proxies to project power. Such modern-day mercenaries and privateers can impose significant harm undermining global security, stability, and human rights. These state-hacker relationships therefore raise important questions about the control, authority, and use of offensive cyber capabilities. While different countries pursue different models for their proxy relationships, they face the common challenge of balancing the benefits of these relationships with their costs and the potential risks of escalation. This book examines case studies in the United States, Iran, Syria, Russia, and China for the purpose of establishing a framework to better understand and manage the impact and risks of cyber proxies on global politics.




The Targeter


Book Description

A CIA analyst's "revealing and utterly engrossing account" of the world of high-stakes foreign intelligence and her role within the campaign to stop top-tier targets inside Al-Qaida (Joby Warrick). In 1999, 30-year-old Nada Bakos moved from her lifelong home in Montana to Washington, D.C., to join the CIA. Quickly realizing her affinity for intelligence work, Nada was determined to rise through the ranks of the agency first as an analyst and then as a Targeting Officer, eventually finding herself on the frontline of America's war against Islamic extremists. In this role, Nada was charged with determining if Iraq had a relationship with 9/11 and Al-Qaida, and finding the mastermind behind this terrorist activity: Abu Musab al-Zarqawi. Her team's analysis stood the test of time, but it was not satisfactory for some members of the Administration. In a tight, tension-packed narrative that takes the reader from Langley deep into Iraq, Bakos reveals the inner workings of the Agency and the largely hidden world of intelligence gathering post 9/11. Entrenched in the world of the CIA, Bakos, along with her colleagues, focused on leading U.S. Special Operations Forces to the doorstep of one of the world's most wanted terrorists. Filled with on-the-ground insights and poignant personal anecdotes, The Targeter shows us the great personal sacrifice that comes with intelligence work. This is Nada's story, but it is also an intimate chronicle of how a group of determined, ambitious men and women worked tirelessly in the heart of the CIA to ensure our nation's safety at home and abroad.




The 2030 Spike


Book Description

The clock is relentlessly ticking! Our world teeters on a knife-edge between a peaceful and prosperous future for all, and a dark winter of death and destruction that threatens to smother the light of civilization. Within 30 years, in the 2030 decade, six powerful 'drivers' will converge with unprecedented force in a statistical spike that could tear humanity apart and plunge the world into a new Dark Age. Depleted fuel supplies, massive population growth, poverty, global climate change, famine, growing water shortages and international lawlessness are on a crash course with potentially catastrophic consequences. In the face of both doomsaying and denial over the state of our world, Colin Mason cuts through the rhetoric and reams of conflicting data to muster the evidence to illustrate a broad picture of the world as it is, and our possible futures. Ultimately his message is clear; we must act decisively, collectively and immediately to alter the trajectory of humanity away from catastrophe. Offering over 100 priorities for immediate action, The 2030 Spike serves as a guidebook for humanity through the treacherous minefields and wastelands ahead to a bright, peaceful and prosperous future in which all humans have the opportunity to thrive and build a better civilization. This book is powerful and essential reading for all people concerned with the future of humanity and planet earth.




The Manchurian Candidate


Book Description

The classic thriller about a hostile foreign power infiltrating American politics: “Brilliant . . . wild and exhilarating.” —The New Yorker A war hero and the recipient of the Congressional Medal of Honor, Sgt. Raymond Shaw is keeping a deadly secret—even from himself. During his time as a prisoner of war in North Korea, he was brainwashed by his Communist captors and transformed into a deadly weapon—a sleeper assassin, programmed to kill without question or mercy at his captors’ signal. Now he’s been returned to the United States with a covert mission: to kill a candidate running for US president . . . This “shocking, tense” and sharply satirical novel has become a modern classic, and was the basis for two film adaptations (San Francisco Chronicle). “Crammed with suspense.” —Chicago Tribune “Condon is wickedly skillful.” —Time




The Digital Battle


Book Description

Playing A Game…. And Don’t Know the Cyber Security Rules. Networking in the form of internet, extranet, intranet, and virtual private network (vpn) has opened many doors for businesses. No longer is commerce inhibited by time zones or geographic locations to conduct financial transactions. Cyberspace affords businesses enormous revenue opportunities with reduced associated costs. All that is necessary for customers to make online purchases is internet availability and connectivity, an internet of things (IoT) digital media (i.e. laptop, desktop, tablet, smartphone, etc), and a method of payment (i.e. bank account, credit card debit card, etc). The problem resonates from the protection of your personal identifiable information (PII) during authentication and validation processes. The Digital Battle: Cyber Security is an attempt to assist consumers by protecting their PII, trade secrets, and critical infrastructure from compromise. To prevent exploitation, consumers need vigilance paired with knowledge. Using strategies of cyber security outlined in the three domains within this book, readers can gain the tools they need to succeed. Be Ready, cover your Defenses, and take the Offensive with Cyber Warfare Tactics.




Killing Hope


Book Description

In Killing Hope, William Blum, author of the bestselling Rogue State: A Guide to the World's Only Superpower, provides a devastating and comprehensive account of America's covert and overt military actions in the world, all the way from China in the 1940s to the invasion of Iraq in 2003 and - in this updated edition - beyond. Is the United States, as it likes to claim, a global force for democracy? Killing Hope shows the answer to this question to be a resounding 'no'.




The Grand Chessboard


Book Description

Bestselling author and eminent foreign policy scholar Zbigniew Brzezinski's classic book on American's strategic mission in the modern world. In The Grand Chessboard, renowned geostrategist Zbigniew Brzezinski delivers a brutally honest and provocative vision for American preeminence in the twenty-first century. The task facing the United States, he argues, is to become the sole political arbiter in Eurasian lands and to prevent the emergence of any rival power threatening our material and diplomatic interests. The Eurasian landmass, home to the greatest part of the globe's population, natural resources, and economic activity, is the "grand chessboard" on which America's supremacy will be ratified and challenged in the years to come. In this landmark work of public policy and political science, Brzezinski outlines a groundbreaking and powerful blueprint for America's vital interests in the modern world. In this revised edition, Brzezinski addresses recent global developments including the war in Ukraine, the re-emergence of Russia, and the rise of China.