Running the World: The Inside Story of the National Security Council and the Architects of American Power


David Rothkopf - 2005
    The people at the top of the American national security establishment, the President and his principal advisors, the core team at the helm of the National Security Council, are without question the most powerful committee in the history of the world.Yet, in many respects, they are among the least understood. A former senior official in the Clinton Administration himself, David Rothkopf served with and knows personally many of the NSC's key players of the past twenty-five years. In Running the World he pulls back the curtain on this shadowy world to explore its inner workings, its people, their relationships, their contributions and the occasions when they have gone wrong. He traces the group's evolution from the final days of the Second World War to the post-Cold War realities of global terror—exploring its triumphs, its human dramas and most recently, what many consider to be its breakdown at a time when we needed it most.Drawing on an extraordinary series of insider interviews with policy makers including Condoleezza Rice, Colin Powell, Henry Kissinger, senior officials of the Bush Administration, and over 130 others, the book offers unprecedented insights into what must change if America is to maintain its unprecedented worldwide leadership in the decades ahead.

Eleventh Hour CISSP®: Study Guide


Eric Conrad - 2016
    This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam. Completely updated for the most current version of the exam’s Common Body of Knowledge Provides the only guide you need for last-minute studying Answers the toughest questions and highlights core topics Streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage


Clifford Stoll - 1989
    citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News


Eliot Higgins - 2021
    Soon, the identity of one of the suspects was revealed: he was a Russian spy. This huge investigative coup wasn't pulled off by an intelligence agency or a traditional news outlet. Instead, the scoop came from Bellingcat, the open-source investigative team that is redefining the way we think about news, politics, and the digital future.We Are Bellingcat tells the inspiring story of how a college dropout pioneered a new category of reporting and galvanized citizen journalists-working together from their computer screens around the globe-to crack major cases, at a time when fact-based journalism is under assault from authoritarian forces. Founder Eliot Higgins introduces readers to the tools Bellingcat investigators use, tools available to anyone, from software that helps you pinpoint the location of an image, to an app that can nail down the time that photo was taken. This book digs deep into some of Bellingcat's most important investigations-the downing of flight MH17 over Ukraine, Assad's use of chemical weapons in Syria, the identities of alt-right protestors in Charlottesville-with the drama and gripping detail of a spy novel.

Dark Mirror: Edward Snowden and the American Surveillance State


Barton Gellman - 2020
    Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio

Blue Team Field Manual (BTFM)


Alan J. White - 2017
    Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.

Information Wars: How We Lost the Global Battle Against Disinformation and What We Can Do about It


Richard Stengel - 2019
    When Satan told Eve nothing would happen if she bit the apple, that was disinformation. But the rise of social media has made disinformation even more pervasive and pernicious in our current era. In a disturbing turn of events, governments are increasingly using disinformation to create their own false narratives, and democracies are proving not to be very good at fighting it.During the final three years of the Obama administration, Richard Stengel, the former editor of Time and an Under Secretary of State, was on the front lines of this new global information war. At the time, he was the single person in government tasked with unpacking, disproving, and combating both ISIS's messaging and Russian disinformation. Then, in 2016, as the presidential election unfolded, Stengel watched as Donald Trump used disinformation himself, weaponizing the grievances of Americans who felt left out by modernism. In fact, Stengel quickly came to see how all three players had used the same playbook: ISIS sought to make Islam great again; Putin tried to make Russia great again; and we all know about Trump.In a narrative that is by turns dramatic and eye-opening, Information Wars walks readers through of this often frustrating battle. Stengel moves through Russia and Ukraine, Saudi Arabia and Iraq, and introduces characters from Putin to Hillary Clinton, John Kerry and Mohamed bin Salman to show how disinformation is impacting our global society. He illustrates how ISIS terrorized the world using social media, and how the Russians launched a tsunami of disinformation around the annexation of Crimea - a scheme that became the model for their interference with the 2016 presidential election. An urgent book for our times, Information Wars stresses that we must find a way to combat this ever growing threat to democracy.

The Lessons of Tragedy: Statecraft and World Order


Hal Brands - 2019
    By looking disaster squarely in the face, by understanding just how badly things could spiral out of control, they sought to create a communal sense of responsibility and courage—to spur citizens and their leaders to take the difficult actions necessary to avert such a fate. Today, after more than seventy years of great‑power peace and a quarter‑century of unrivaled global leadership, Americans have lost their sense of tragedy. They have forgotten that the descent into violence and war has been all too common throughout human history. This amnesia has become most pronounced just as Americans and the global order they created are coming under graver threat than at any time in decades. In a forceful argument that brims with historical sensibility and policy insights, two distinguished historians argue that a tragic sensibility is necessary if America and its allies are to address the dangers that menace the international order today. Tragedy may be commonplace, Brands and Edel argue, but it is not inevitable—so long as we regain an appreciation of the world’s tragic nature before it is too late.

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency


Parmy Olson - 2012
    WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.

iWar: War and Peace in the Information Age


Bill Gertz - 2017
    Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.

Connectography: Mapping the Future of Global Civilization


Parag Khanna - 2016
    Mankind is reengineering the planet, investing up to ten trillion dollars per year in transportation, energy, and communications infrastructure linking the world’s burgeoning megacities together. This has profound consequences for geopolitics, economics, demographics, the environment, and social identity. Connectivity, not geography, is our destiny. In Connectography, visionary strategist Parag Khanna travels from Ukraine to Iran, Mongolia to North Korea, Pakistan to Nigeria, and across the Arctic Circle and the South China Sea to explain the rapid and unprecedented changes affecting every part of the planet. He shows how militaries are deployed to protect supply chains as much as borders, and how nations are less at war over territory than engaged in tugs-of-war over pipelines, railways, shipping lanes, and Internet cables. The new arms race is to connect to the most markets—a race China is now winning, having launched a wave of infrastructure investments to unite Eurasia around its new Silk Roads. The United States can only regain ground by fusing with its neighbors into a super-continental North American Union of shared resources and prosperity.Connectography offers a unique and hopeful vision for the future. Khanna argues that new energy discoveries and technologies have eliminated the need for resource wars; ambitious transport corridors and power grids are unscrambling Africa’s fraught colonial borders; even the Arab world is evolving a more peaceful map as it builds resource and trade routes across its war-torn landscape. At the same time, thriving hubs such as Singapore and Dubai are injecting dynamism into young and heavily populated regions, cyber-communities empower commerce across vast distances, and the world’s ballooning financial assets are being wisely invested into building an inclusive global society. Beneath the chaos of a world that appears to be falling apart is a new foundation of connectivity pulling it together.Advance praise for Connectography“Connectography is ahead of the curve in seeing the battlefield of the future and the new kind of tug-of-war being waged on it. Khanna’s scholarship and foresight are world-class. . . . A must-read for the next president.”—Chuck Hagel, former U.S. secretary of defense “This bold reframing is an exciting addition to our ongoing debate about geopolitics and the future of globalization.”—Dominic Barton, global managing partner, McKinsey & Company “This is probably the most global book ever written. It is intensely specific while remaining broad and wide. Its takeaway is that infrastructure is destiny: Follow the supply lines outlined in this book to see where the future flows.”—Kevin Kelly, co-founder, Wired “There’s no better guide than Khanna to show us all the possibilities of this new hyperconnected world.”—Mathew Burrows, director, Strategic Foresight Initiative at the Atlantic Council, and former counselor, U.S. National Intelligence Council “This book is an invaluable resource for anyone involved in business, science, arts, or any other field.”—Mark Mobius, executive chairman, Templeton Emerging Markets Group “A must-read for anyone who wants to understand the future of humanity.”—Sandy Pentland, professor, MIT Media Lab

The Dead Hand: The Untold Story of the Cold War Arms Race and its Dangerous Legacy


David E. Hoffman - 2009
    In the last half of the twentieth century the two superpowers had perfected the science of mass destruction and possessed nuclear weapons with the combined power of a million Hiroshimas. What’s more, a Soviet biological warfare machine was ready to produce bacteria and viruses to sicken and kill millions. In The Dead Hand, a thrilling narrative history drawing on new archives and original research and interviews, David E. Hoffman reveals how presidents, scientists, diplomats, soldiers, and spies confronted the danger and changed the course of history. The Dead Hand captures the inside story in both the United States and the Soviet Union, giving us an urgent and intimate account of the last decade of the arms race. With access to secret Kremlin documents, Hoffman chronicles Soviet internal deliberations that have long been hidden. He reveals that weapons designers in 1985 laid a massive “Star Wars” program on the desk of Soviet leader Mikhail Gorbachev to compete with President Reagan, but Gorbachev refused to build it. He unmasks the cover-up of the Soviet biological weapons program. He tells the exclusive story of one Soviet microbiologist’s quest to build a genetically engineered super-germ—it would cause a mild illness, a deceptive recovery, then a second, fatal attack. And he details the frightening history of the Doomsday Machine, known as the Dead Hand, which would launch a retaliatory nuclear strike if the Soviet leaders were wiped out. When the Soviet Union collapsed, the dangers remained. Soon rickety trains were hauling unsecured nuclear warheads across the Russian steppe; tons of highly-enriched uranium and plutonium lay unguarded in warehouses; and microbiologists and bomb designers were scavenging for food to feed their families. The Dead Hand offers fresh and startling insights into Reagan and Gorbachev, the two key figures of the end of the Cold War, and draws colorful, unforgettable portraits of many others who struggled, often valiantly, to save the world from the most terrifying weapons known to man.

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News


Clint Watts - 2018
    In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.

Understanding International Conflicts: An Introduction to Theory and History


Joseph S. Nye Jr. - 1993
    Nye, this lively book gives readers the background in history and political concepts they need to understand the issues facing our world today: the war in Iraq, the Israeli-Palestinian conflict, nuclear proliferation in North Korea and Iran, and much more. Origins of the Great Twentieth-Century Conflicts; Balance of Power and World War I; The Failure of Collective Security and World War II; The Cold War; Intervention, Institutions, and Regional Conflicts; Interdependence and Globalization; The Information Age; A New World Order? Anyone interested in understanding international relations today.

The Art of Deception: Controlling the Human Element of Security


Kevin D. Mitnick - 2001
    Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.