The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America


James Bamford - 2008
    Now Bamford describes the transformation of the NSA since 9/11, as the agency increasingly turns its high-tech ears on the American public.The Shadow Factory reconstructs how the NSA missed a chance to thwart the 9/11 hijackers and details how this mistake has led to a heightening of domestic surveillance. In disturbing detail, Bamford describes exactly how every American’s data is being mined and what is being done with it. Any reader who thinks America’s liberties are being protected by Congress will be shocked and appalled at what is revealed here.From the Trade Paperback edition.

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State


Glenn Greenwald - 2014
    That source turned out to be the twenty-nine-year-old NSA contractor Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy.Now Greenwald fits all the pieces together, recounting his high-intensity eleven-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with documents from the Snowden archive. Fearless and incisive, No Place to Hide has already sparked outrage around the globe and been hailed by voices across the political spectrum as an essential contribution to our understanding of the U.S. surveillance state.

Dark Mirror: Edward Snowden and the American Surveillance State


Barton Gellman - 2020
    Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio

Between Silk and Cyanide: A Codemaker's War, 1941-1945


Leo Marks - 1998
    He was twenty-two. Soon recognized as a cryptographer of genius, he became head of communications at the Special Operations Executive (SOE), where he revolutionized the codemaking techniques of the Allies and trained some of the most famous agents dropped into occupied Europe, including "the White Rabbit" and Violette Szabo. As a top codemaker, Marks had a unique perspective on one of the most fascinating and, until now, little-known aspects of the Second World War. Writing with the narrative flair and vivid characterization of his famous screenplays, Marks gives free rein to his keen sense of the absurd and his wry wit, resulting in a thrilling and poignant memoir that celebrates individual courage and endeavor, without losing sight of the human cost and horror of war.

Code Breaking: A History and Exploration


Rudolf Kippenhahn - 1999
    In Code Breaking , Rudolf Kippenhahn offers readers both an exciting chronicle of cryptography and a lively exploration of the cryptographer’s craft. Rich with vivid anecdotes from a history of coding and decoding and featuring three new chapters, this revised and expanded edition makes the often abstruse art of deciphering coded messages accessible to the general reader and reveals the relevance of codes to our everyday high-tech society. A stylishly written, meticulously researched adventure, Code Breaking explores the ways in which communication can be obscured and, like magic, made clear again.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

The Ultra Secret


F.W. Winterbotham - 1974
    F.W. Winterbotham, was the man responsible for the organization, distribution & security of Ultra. This is his personal account of the operation.

The Secret War: Spies, Codes and Guerrillas 1939-1945


Max Hastings - 2015
    Moving chronologically through the conflict, Max Hastings charts the successes and failures of allied and axis forces, espionage and counterespionage.Observing how the evolution of electronic communications dramatically increased the possibilities and significance of these secret battles, this is the story of intelligence beyond Bletchley to the FBI, Russia and the spies of axis dictatorships. For the first time since his best-selling ‘All Hell Let Loose’, Max Hastings returns to the Second World War, this time to chronicle its second, untold story.

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage


Clifford Stoll - 1989
    citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News


Eliot Higgins - 2021
    Soon, the identity of one of the suspects was revealed: he was a Russian spy. This huge investigative coup wasn't pulled off by an intelligence agency or a traditional news outlet. Instead, the scoop came from Bellingcat, the open-source investigative team that is redefining the way we think about news, politics, and the digital future.We Are Bellingcat tells the inspiring story of how a college dropout pioneered a new category of reporting and galvanized citizen journalists-working together from their computer screens around the globe-to crack major cases, at a time when fact-based journalism is under assault from authoritarian forces. Founder Eliot Higgins introduces readers to the tools Bellingcat investigators use, tools available to anyone, from software that helps you pinpoint the location of an image, to an app that can nail down the time that photo was taken. This book digs deep into some of Bellingcat's most important investigations-the downing of flight MH17 over Ukraine, Assad's use of chemical weapons in Syria, the identities of alt-right protestors in Charlottesville-with the drama and gripping detail of a spy novel.

Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda


Robert Wallace - 2008
    It is a world where the intrigue of reality exceeds that of fiction. What is an invisible photo used for? What does it take to build a quiet helicopter? How does one embed a listening device in a cat? If these sound like challenges for Q, James Bondas fictional gadget-master, think again. Theyare all real-life devices created by the CIAas Office of Technical Serviceaan ultrasecretive department that combines the marvels of state-of-the-art technology with the time-proven traditions of classic espionage. And now, in the first book ever written about this office, the former director of OTS teams up with an internationally renowned intelligence historian to take readers into the laboratory of espionage. Spycraft tells amazing life and death stories about this littleknown group, much of it never before revealed. Against the backdrop of some of Americaas most critical periods in recent historyaincluding the Cold War, the Cuban Missile Crisis, and the war on terrorathe authors show the real technical and human story of how the CIA carries out its missions.

Battle of Wits: The Complete Story of Codebreaking in World War II


Stephen Budiansky - 2000
    Army and Navy and the British government over the last five years. Now, Battle of Wits presents the history of the war that these documents reveal. From the battle of Midway until the last German code was broken in January 1945, this is an astonishing epic of a war that was won not simply by brute strength but also by reading the enemy's intentions. The revelations of Stephen Budiansky's dramatic history include how Britain tried to manipulate the American codebreakers and monopolize German Enigma code communications; the first detailed published explanations of how the Japanese codes were broken; and how the American codebreaking machines worked to crack the Japanese, the German, and even the Russian diplomatic codes. The compelling narrative shows the crucial effect codebreaking had on the battlefields by explaining the urgency of stopping the wolf pack U-boat attacks in the North Atlantic, the importance of halting Rommel's tanks in North Africa, and the necessity of ensuring that the Germans believed the Allies' audacious deception and cover plans for D-Day. Unveiled for the first time, the complete story of codebreaking in World War II has now been told.

The Secret Life of Bletchley Park: The WWII Codebreaking Centre and the Men and Women Who Worked There


Sinclair McKay - 2010
    This country house was home to Britain's most brilliant mathematical brains, like Alan Turing, and the scene of immense advances in technology—indeed, the birth of modern computing. The military codes deciphered there were instrumental in turning both the Battle of the Atlantic and the war in North Africa. But, though plenty has been written about the scientists and the codebreaking, fictional and non-fiction—from Robert Harris and Ian McEwan to Andrew Hodges' biography of Turing—what of the thousands of men and women who lived and worked there during the war? The first history for the general reader of life at Bletchley Park, this is also an amazing compendium of memories from people now in their eighties of skating on the frozen lake in the grounds (a depressed Angus Wilson, the novelist, once threw himself in), of a youthful Roy Jenkins—useless at codebreaking, of the high jinks at nearby accommodation hostels, and of the implacable secrecy that meant girlfriend and boyfriend working in adjacent huts knew nothing about each other's work.

Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age


Steven Levy - 2001
    From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.

Rise and Kill First: The Secret History of Israel's Targeted Assassinations


Ronen Bergman - 2018
    From the very beginning of its statehood in 1948, protecting the nation from harm has been the responsibility of its intelligence community and armed services, and there is one weapon in their vast arsenal that they have relied upon to thwart the most serious threats: Targeted assassinations have been used countless times, on enemies large and small, sometimes in response to attacks against the Israeli people and sometimes preemptively. In this page-turning, eye-opening book, journalist and military analyst Ronen Bergman offers a riveting inside account of the targeted killing programs—their successes, their failures, and the moral and political price exacted on the men and women who approved and carried out the missions.Bergman has gained the exceedingly rare cooperation of many current and former members of the Israeli government, including Prime Ministers Shimon Peres, Ehud Barak, Ariel Sharon, and Benjamin Netanyahu, as well as high-level figures in the country’s military and intelligence services: the IDF (Israel Defense Forces), the Mossad (the world’s most feared intelligence agency), Caesarea (a “Mossad within the Mossad” that carries out attacks on the highest-value targets), and the Shin Bet (an internal security service that implemented the largest targeted assassination campaign ever, in order to stop what had once appeared to be unstoppable: suicide terrorism).Including never-before-reported, behind-the-curtain accounts of key operations, and based on hundreds of on-the-record interviews and thousands of files to which Bergman has gotten exclusive access over his decades of reporting, Rise and Kill First brings us deep into the heart of Israel’s most secret activities. Bergman traces, from statehood to the present, the gripping events and thorny ethical questions underlying Israel’s targeted killing campaign, which has shaped the Israeli nation, the Middle East, and the entire world.