Book picks similar to
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer by William R. Johnson
intelligence
non-fiction
cia
security
The CIA at War: Inside the Secret Campaign Against Terror
Ronald Kessler - 2000
Yet the CIA is a closed and secretive world-impenetrable to generations of journalists-and few Americans know what really goes on among the spy masters who plot America's worldwide campaign against terrorists.Only Ronald Kessler, an award-winning former Washington Post and Wall Street Journal investigative reporter, could have gained the unprecedented access to tell the story. Kessler interviewed fifty current CIA officers, including all the agency's top officials, and toured areas of the CIA the media has never seen. The agency actively encouraged retired CIA officers and officials to talk with him as well. In six years as director, George J. Tenet has never appeared on TV shows and has given only a handful of print interviews, all before 9/11, but Tenet agreed to be interviewed by Kessler for this book. He spoke candidly and passionately about the events of 9/11, the war on terror, the agency's intelligence on Iraq, and the controversies surrounding the agency.The CIA at War tells the inside story of how Tenet, a son of Greek immigrants, turned around the CIA from a pathetic, risk averse outfit to one that has rolled up 3,000 terrorists since 9/11, was critically important to winning in Afghanistan and Iraq, and now kills terrorists with its Predator drone aircraft.The book portrays Tenet as a true American hero, one who overcame every kind of Washington obstacle and the destructive actions of previous director John Deutch to make the agency a success. As Tenet said in a recent speech, "Nowhere in the world could the son of an immigrant stand before you as the director of Central Intelligence. This is simply the greatest country on the face of the earth."The CIA at War discloses highly sensitive information about the CIA's unorthodox methods and its stunning successes and shocking failures. The book explores whether the CIA can be trusted, whether its intelligence is politicized, and whether it is capable of winning the war on terror. In doing so, the book weaves in the history of the CIA and how it really works. It is the definitive account of the agency.From the CIA's intelligence failure of 9/11 to its critical role in preventing further attacks, The CIA at War tells a riveting, unique story about a secretive, powerful agency and its confrontation with global terrorism.
Tiger Trap: America's Secret Spy War with China
David Wise - 2011
Now, for the first time, based on numerous interviews with key insiders at the FBI and CIA as well as with Chinese agents and people close to them, David Wise tells the full story of China’s many victories and defeats in its American spy wars.Two key cases interweave throughout: Katrina Leung, code-named Parlor Maid, worked for the FBI for years, even after she became a secret double agent for China, aided by love affairs with both of her FBI handlers. Here, too, is the inside story of the case, code-named Tiger Trap, of a key Chinese-American scientist suspected of stealing nuclear weapons secrets. These two cases led to many others, involving famous names from Wen Ho Lee to Richard Nixon, stunning national security leaks, and sophisticated cyberspying. The story takes us up to the present, with a West Coast spy ring whose members were sentenced in 2010—but it surely will continue for years to come, as China faces off against America. David Wise’s history of China’s spy wars in America is packed with eye-popping revelations.
Cyberwar: The Next Threat to National Security & What to Do About It
Richard A. Clarke - 2010
Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.
Analyzing Intelligence: Origins, Obstacles, and Innovations
Roger Z. George - 2008
Its in-depth and balanced evaluation of more than fifty years of U.S. analysis includes a critique of why it has under-performed at times. It provides insights regarding the enduring obstacles as well as new challenges of analysis in the post-9/11 world, and suggests innovative ideas for improved analytical methods, training, and structured approaches. The book's six sections present a coherent plan for improving analysis. Early chapters examine how intelligence analysis has evolved since its origins in the mid-20th century, focusing on traditions, culture, successes, and failures.The middle sections examine how analysis supports the most senior national security and military policymakers and strategists, and how analysts must deal with the perennial challenges of collection, politicization, analytical bias, knowledge building and denial and deception. The final sections of the book propose new ways to address enduring issues in warning analysis, methodology (or 'analytical tradecraft') and emerging analytic issues like homeland defense. The book suggests new forms of analytic collaboration in a global intelligence environment, and imperatives for the development of a new profession of intelligence analysis. "Analyzing Intelligence" is written for the national security expert who needs to understand the role of intelligence and its strengths and weaknesses.Practicing and future analysts will also find that its attention to the enduring challenges provides useful lessons-learned to guide their own efforts. The innovations section will provoke senior intelligence managers to consider major changes in the way analysis is currently organized and conducted, and the way that analysts are trained and perform.
The Art of Intelligence
Henry A. Crumpton - 2012
In the days after 9/11, the CIA tasked Crumpton to organize and lead the Afghanistan campaign. With Crumpton's strategic initiative and bold leadership, from the battlefield to the Oval Office, U.S. and Afghan allies routed al Qaeda and the Taliban in less than ninety days after the Twin Towers fell. At the height of combat against the Taliban in late 2001, there were fewer than five hundred Americans on the ground in Afghanistan, a dynamic blend of CIA and Special Forces. The campaign changed the way America wages war. This book will change the way America views the CIA.The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAV Predator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.No book like The Art of Intelligence has ever been written-not with Crumpton's unique perspective, in a time when America faced such grave and uncertain risk. It is an epic, sure to be a classic in the annals of espionage and war.
Dark Territory: The Secret History of Cyber War
Fred Kaplan - 2016
The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.
Facts and Fears: Hard Truths from a Life in Intelligence
James R. Clapper - 2018
In Facts and Fears Clapper traces his career through his rise in ranks of the military, the history of several decades of national intelligence operations, the growing threat of cyberattacks, his relationships with presidents and Congress, and the truth about Russia's role in the presidential election. He describes, in the wake of Snowden and WikiLeaks, his efforts to make intelligence more transparent and to push back against the suspicion that Americans' private lives are subject to surveillance. Clapper considers such difficult questions as, is intelligence ethical? Is it moral to use human sources to learn secrets, to intercept communications, to take pictures of closed societies from orbit? What are the limits of what we should be allowed to do? What protections should we give to the private citizens of the world, not to mention our fellow Americans? Is there a time that intelligence officers can lose credibility as unbiased reporters of hard truths by asserting themselves into policy decisions?
Psychology of Intelligence Analysis
Richards J. Heuer Jr. - 1999
Intelligence rains in, but without an understanding of the nature of the intelligence, it accumulates in puddles of obscurity. The problems therefore seem to be how to obtain it, how to understand it, and how to sell it to one's bosses. This book deals with how to understand it. Three fundamental points are at the heart of this presentation about the cognitive challenges intelligence analysts face: The mind is poorly wired to deal effectively with both inherent uncertainty (the natural fog surrounding complex, indeterminate intelligence issues) and induced uncertainty (the man-made fog fabricated by denial and deception operations). Even increased awareness of cognitive and other unmotivated biases, such as the tendency to see information confirming an already-held judgement more vividly than one sees disconfirming information, does little by itself to help analysts deal effectively with uncertainty. critical thinking can substantially improve analysis on complex issues on which information is incomplete, ambiguous, and often deliberately distorted. Key examples of such intellectual devices include techniques for structuring information, challenging assumptions, and exploring alternative interpretations. This book was first issued by the CIA.
@War: The Rise of the Military-Internet Complex
Shane Harris - 2014
In fact, as @WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America’s new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains what the new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet — and are vulnerable to its dangers.
The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
James Bamford - 2008
Now Bamford describes the transformation of the NSA since 9/11, as the agency increasingly turns its high-tech ears on the American public.The Shadow Factory reconstructs how the NSA missed a chance to thwart the 9/11 hijackers and details how this mistake has led to a heightening of domestic surveillance. In disturbing detail, Bamford describes exactly how every American’s data is being mined and what is being done with it. Any reader who thinks America’s liberties are being protected by Congress will be shocked and appalled at what is revealed here.From the Trade Paperback edition.
Intelligence: From Secrets to Policy
Mark M. Lowenthal - 1999
and a former U.S. intelligence official) presents an academic introduction to the history and current role of intelligence agencies in the foreign policy of the United States. He surveys the growth of the intelligence agencies, examines their place in the general structure of government, reviews policy debates about the scope and nature of intelligence activities, and discusses intelligence reforms. Annotation c. Book News, Inc., Portland, OR
The Craft of Intelligence: America's Legendary Spy Master on the Fundamentals of Intelligence Gathering for a Free World
Allen W. Dulles - 1962
Dulles's The Craft of Intelligence. This classic of spycraft is based on Dulles's incomparable experience as a diplomat, international lawyer, and America's premier intelligence officer. Dulles was a high-ranking officer of the CIA's predecessor - the Office of Strategic Services - and served eight years as director of the newly created CIA.In The Craft of Intelligence, Dulles reveals how intelligence is collected and processed, and how the results contribute to the formation of national policy. He discusses methods of surveillance and the usefulness of defectors from hostile nations. His knowledge of Cold War Soviet espionage techniques is unrivaled, and he explains how the Soviet State Security Service recruited operatives and planted "illegals" in foreign countries. In an account enlivened with a wealth of personal anecdotes, Dulles also addresses the Bay of Pigs incident, denying that the 1961 invasion was based on a CIA estimate that a popular Cuban uprising would ensue. He spells out not only the techniques of modern espionage but also the philosophy and role of intelligence in a free society threatened by global conspiracies.This is a book for readers who seek wider understanding of the contribution of intelligence to our national security.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Intelligence Analysis: A Target-Centric Approach
Robert M. Clark - 2003
In countering asymmetric threats and non-state adversaries, the model is simply outmoded. A flatter, horizontal, networked solution has proven much more effective in today's world. In his second edition, Robert Clark--former CIA analyst and executive in the Intelligence Directorate--explains how a collaborative, target-centric process both attends to the needs of the customer and promotes more effective collection. Based on feedback from users, early chapters introduce the concept of model synthesis more gradually. Recent intelligence events--with the Iraqi WMD Commission Report at center stage--illustrate the importance of target-centric analysis. This revision also includes broader treatment of collection strategies, systems analysis, and analyst-customer interaction as well as more attention to denial and deception, and to both counterterrorism and counterintelligence analysis. This new edition contains updates of the practical information and day-to-day details from the previous book told as only an experienced intelligence hand could. Extensive descriptions of the art of target modeling and organizational analysis, as well as thoroughly detailed overviews of the quantitative and predictive techniques used in intelligence analysis make this book an essential tool for illuminating an often shadowy world.
Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda
Robert Wallace - 2008
It is a world where the intrigue of reality exceeds that of fiction. What is an invisible photo used for? What does it take to build a quiet helicopter? How does one embed a listening device in a cat? If these sound like challenges for Q, James Bondas fictional gadget-master, think again. Theyare all real-life devices created by the CIAas Office of Technical Serviceaan ultrasecretive department that combines the marvels of state-of-the-art technology with the time-proven traditions of classic espionage. And now, in the first book ever written about this office, the former director of OTS teams up with an internationally renowned intelligence historian to take readers into the laboratory of espionage. Spycraft tells amazing life and death stories about this littleknown group, much of it never before revealed. Against the backdrop of some of Americaas most critical periods in recent historyaincluding the Cold War, the Cuban Missile Crisis, and the war on terrorathe authors show the real technical and human story of how the CIA carries out its missions.