Leaderless Jihad: Terror Networks in the Twenty-First Century


Marc Sageman - 2007
    It is now more a source of inspiration for terrorist acts carried out by independent local groups that have branded themselves with the Al Qaeda name. Building on his previous groundbreaking work on the Al Qaeda network, forensic psychiatrist Marc Sageman has greatly expanded his research to explain how Islamic terrorism emerges and operates in the twenty-first century.In Leaderless Jihad, Sageman rejects the views that place responsibility for terrorism on society or a flawed, predisposed individual. Instead, he argues, the individual, outside influence, and group dynamics come together in a four-step process through which Muslim youth become radicalized. First, traumatic events either experienced personally or learned about indirectly spark moral outrage. Individuals interpret this outrage through a specific ideology, more felt and understood than based on doctrine. Usually in a chat room or other Internet-based venues, adherents share this moral outrage, which resonates with the personal experiences of others. The outrage is acted on by a group, either online or offline.Leaderless Jihad offers a ray of hope. Drawing on historical analogies, Sageman argues that the zeal of jihadism is self-terminating; eventually its followers will turn away from violence as a means of expressing their discontent. The book concludes with Sageman's recommendations for the application of his research to counterterrorism law enforcement efforts.

The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth


Mark Mazzetti - 2013
    The Way of the Knife is the untold story of that shadow war: a campaign that has blurred the lines between soldiers and spies and lowered the bar for waging war across the globe. America has pursued its enemies with killer drones and special operations troops; trained privateers for assassination missions and used them to set up clandestine spying networks; and relied on mercurial dictators, untrustworthy foreign intelligence services, and proxy armies.This new approach to war has been embraced by Washington as a lower risk, lower cost alternative to the messy wars of occupation and has been championed as a clean and surgical way of conflict. But the knife has created enemies just as it has killed them. It has fomented resentments among allies, fueled instability, and created new weapons unbound by the normal rules of accountability during wartime.

Gideon's Spies: The Secret History of the Mossad (Updated)


Gordon Thomas - 1999
    Gordon Thomas's 1999 publication of Gideon's Spies, resulting from closed-door interviews with Mossad agents, informants, and spymasters as well as from classified documents and top-secret sources, revealed previously untold truths about the Israeli intelligence agency. And now, in this edition, Thomas updates his classic text and shows the Mossad as it truly is: brilliant, ruthless, and flawed, but ultimately awesome.Three all-new chapters cover topics including:- How the Mossad planned to assassinate Saddam Hussein- Saddam's food-testing ritual, and the surprising "source" within his government- China's U.S.-based front-companies, and its relationship with bin Laden- Mossad's untold role in the events before and after 9/11- Mossad and revelations about Princess Diana's death- The disappearance of the millions transferred from the Vatican Bank to the Polish Solidarity movement- How extremists recruit suicide bombers, including women- Mossad's untold role in the Iraq war and the hunts for Saddam and bin Laden- Saddam's plans for trial

Destined for War: Can America and China Escape Thucydides’s Trap?


Graham Allison - 2017
    The reason is Thucydides’s Trap, a deadly pattern of structural stress that results when a rising power challenges a ruling one. This phenomenon is as old as history itself. About the Peloponnesian War that devastated ancient Greece, the historian Thucydides explained: “It was the rise of Athens and the fear that this instilled in Sparta that made war inevitable.” Over the past 500 years, these conditions have occurred sixteen times. War broke out in twelve of them. Today, as an unstoppable China approaches an immovable America and both Xi Jinping and Donald Trump promise to make their countries “great again,” the seventeenth case looks grim. Unless China is willing to scale back its ambitions or Washington can accept becoming number two in the Pacific, a trade conflict, cyberattack, or accident at sea could soon escalate into all-out war. In Destined for War, the eminent Harvard scholar Graham Allison explains why Thucydides’s Trap is the best lens for understanding U.S.-China relations in the twenty-first century. Through uncanny historical parallels and war scenarios, he shows how close we are to the unthinkable. Yet, stressing that war is not inevitable, Allison also reveals how clashing powers have kept the peace in the past — and what painful steps the United States and China must take to avoid disaster today.

The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower


Michael Pillsbury - 2014
    government's leading China experts reveals the hidden strategy fueling that country's rise – and how Americans have been seduced into helping China overtake us as the world's leading superpower.For more than forty years, the United States has played an indispensable role helping the Chinese government build a booming economy, develop its scientific and military capabilities, and take its place on the world stage, in the belief that China's rise will bring us cooperation, diplomacy, and free trade. But what if the "China Dream" is to replace us, just as America replaced the British Empire, without firing a shot?Based on interviews with Chinese defectors and newly declassified, previously undisclosed national security documents, The Hundred-Year Marathon reveals China's secret strategy to supplant the United States as the world's dominant power, and to do so by 2049, the one-hundredth anniversary of the founding of the People's Republic. Michael Pillsbury, a fluent Mandarin speaker who has served in senior national security positions in the U.S. government since the days of Richard Nixon and Henry Kissinger, draws on his decades of contact with the "hawks" in China's military and intelligence agencies and translates their documents, speeches, and books to show how the teachings of traditional Chinese statecraft underpin their actions. He offers an inside look at how the Chinese really view America and its leaders – as barbarians who will be the architects of their own demise.Pillsbury also explains how the U.S. government has helped – sometimes unwittingly and sometimes deliberately – to make this "China Dream" come true, and he calls for the United States to implement a new, more competitive strategy toward China as it really is, and not as we might wish it to be. The Hundred-Year Marathon is a wake-up call as we face the greatest national security challenge of the twenty-first century.

Deceiving the Sky: Inside Communist China's Drive for Global Supremacy


Bill Gertz - 2019
    

Directorate S: The C.I.A. and America's Secret Wars in Afghanistan and Pakistan


Steve Coll - 2018
    While the US was trying to quell extremists, a highly secretive and compartmentalized wing of I.S.I., known as "Directorate S," was covertly training, arming, and seeking to legitimize the Taliban, in order to enlarge Pakistan's sphere of influence. After 9/11, when fifty-nine countries, led by the U. S., deployed troops or provided aid to Afghanistan in an effort to flush out the Taliban and Al Qaeda, the U.S. was set on an invisible slow-motion collision course with Pakistan.Today we know that the war in Afghanistan would falter badly because of military hubris at the highest levels of the Pentagon, the drain on resources and provocation in the Muslim world caused by the U.S.-led invasion of Iraq, and corruption. But more than anything, as Coll makes painfully clear, the war in Afghanistan was doomed because of the failure of the United States to apprehend the motivations and intentions of I.S.I.'s "Directorate S". This was a swirling and shadowy struggle of historic proportions, which endured over a decade and across both the Bush and Obama administrations, involving multiple secret intelligence agencies, a litany of incongruous strategies and tactics, and dozens of players, including some of the most prominent military and political figures. A sprawling American tragedy, the war was an open clash of arms but also a covert melee of ideas, secrets, and subterranean violence. Coll excavates this grand battle, which took place away from the gaze of the American public. With unsurpassed expertise, original research, and attention to detail, he brings to life a narrative at once vast and intricate, local and global, propulsive and painstaking. This is the definitive explanation of how America came to be so badly ensnared in an elaborate, factional, and seemingly interminable conflict in South Asia. Nothing less than a forensic examination of the personal and political forces that shape world history, Directorate S is a complete masterpiece of both investigative and narrative journalism.

Surveillance Valley: The Rise of the Military-Digital Complex


Yasha Levine - 2018
    This idea--using computers to spy on people and groups perceived as a threat, both at home and abroad--drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology.But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news--and the device on which you read it.

All the Shah's Men: An American Coup and the Roots of Middle East Terror


Stephen Kinzer - 2003
    The victim was Mohammad Mossadegh, the democratically elected prime minister of Iran. Although the coup seemed a success at first, today it serves as a chilling lesson about the dangers of foreign intervention.In this book, veteran New York Times correspondent Stephen Kinzer gives the first full account of this fateful operation. His account is centered around an hour-by-hour reconstruction of the events of August 1953, and concludes with an assessment of the coup's "haunting and terrible legacy."Operation Ajax, as the plot was code-named, reshaped the history of Iran, the Middle East, and the world. It restored Mohammad Reza Shah to the Peacock Throne, allowing him to impose a tyranny that ultimately sparked the Islamic Revolution of 1979. The Islamic Revolution, in turn, inspired fundamentalists throughout the Muslim world, including the Taliban and terrorists who thrived under its protection."It is not far-fetched," Kinzer asserts in this book, "to draw a line from Operation Ajax through the Shah's repressive regime and the Islamic Revolution to the fireballs that engulfed the World Trade Center in New York."Drawing on research in the United States and Iran, and using material from a long-secret CIA report, Kinzer explains the background of the coup and tells how it was carried out. It is a cloak-and-dagger story of spies, saboteurs, and secret agents. There are accounts of bribes, staged riots, suitcases full of cash, and midnight meetings between the Shah and CIA agent Kermit Roosevelt, who was smuggled in and out of the royal palace under a blanket in the back seat of a car. Roosevelt,the grandson of President Theodore Roosevelt, was a real-life James Bond in an era when CIA agents operated mainly by their wits. After his first coup attempt failed, he organized a second attempt that succeeded three days later.The colorful cast of characters includes the terrified young Shah, who fled his country at the first sign of trouble; General H. Norman Schwarzkopf, father of the Gulf War commander and the radio voice of "Gang Busters," who flew to Tehran on a secret mission that helped set the coup in motion; and the fiery Prime Minister Mossadegh, who outraged the West by nationalizing the immensely profitable Anglo-Iranian Oil Company. The British, outraged by the seizure of their oil company, persuaded President Dwight Eisenhower that Mossadegh was leading Iran toward Communism. Eisenhower and Prime Minister Winston Churchill of Great Britain became the coup's main sponsors.Brimming with insights into Middle Eastern history and American foreign policy, this book is an eye-opening look at an event whose unintended consequences - Islamic revolution and violent anti-Americanism--have shaped the modern world. As the United States assumes an ever-widening role in the Middle East, it is essential reading.

Kill or Capture: How a Special Operations Task Force Took Down a Notorious Al Qaeda Terrorist


Matthew Alexander - 2011
    "Kill or Capture "immerses readers in the dangerous world of battlefield interrogations as the author and his team climb the ladder of al Qaeda leadership in a series of raids, braving roadside bombs, near death by electrocution and circles within circles of lies.

Battle of Wits: The Complete Story of Codebreaking in World War II


Stephen Budiansky - 2000
    Army and Navy and the British government over the last five years. Now, Battle of Wits presents the history of the war that these documents reveal. From the battle of Midway until the last German code was broken in January 1945, this is an astonishing epic of a war that was won not simply by brute strength but also by reading the enemy's intentions. The revelations of Stephen Budiansky's dramatic history include how Britain tried to manipulate the American codebreakers and monopolize German Enigma code communications; the first detailed published explanations of how the Japanese codes were broken; and how the American codebreaking machines worked to crack the Japanese, the German, and even the Russian diplomatic codes. The compelling narrative shows the crucial effect codebreaking had on the battlefields by explaining the urgency of stopping the wolf pack U-boat attacks in the North Atlantic, the importance of halting Rommel's tanks in North Africa, and the necessity of ensuring that the Germans believed the Allies' audacious deception and cover plans for D-Day. Unveiled for the first time, the complete story of codebreaking in World War II has now been told.

The Billion Dollar Spy: A True Story of Cold War Espionage and Betrayal


David E. Hoffman - 2015
    A man on the curb handed him an envelope whose contents stunned U.S. intelligence: details of top-secret Soviet research and developments in military technology that were totally unknown to the United States. In the years that followed, the man, Adolf Tolkachev, an engineer in a Soviet military design bureau, used his high-level access to hand over tens of thousands of pages of technical secrets. His revelations allowed America to reshape its weapons systems to defeat Soviet radar on the ground and in the air, giving the United States near total superiority in the skies over Europe.One of the most valuable spies to work for the United States in the four decades of global confrontation with the Soviet Union, Tolkachev took enormous personal risks—but so did the Americans. The CIA had long struggled to recruit and run agents in Moscow, and Tolkachev was a singular breakthrough. Using spy cameras and secret codes as well as face-to-face meetings in parks and on street corners, Tolkachev and his handlers succeeded for years in eluding the feared KGB in its own backyard, until the day came when a shocking betrayal put them all at risk.Drawing on previously secret documents obtained from the CIA and on interviews with participants, David Hoffman has created an unprecedented and poignant portrait of Tolkachev, a man motivated by the depredations of the Soviet state to master the craft of spying against his own country. Stirring, unpredictable, and at times unbearably tense, The Billion Dollar Spy is a brilliant feat of reporting that unfolds like an espionage thriller.

The Killing of Osama bin Laden


Seymour M. Hersh - 2016
    The news did much to boost President Obama’s first term and played a major part in his reelection victory of the following year. But much of the story of that night, as presented to the world, was incomplete, or a lie. The evidence of what actually went on remains hidden.At the same time, the full story of the United States’ involvement in the Syrian civil war has been kept behind a diplomatic curtain, concealed by doublespeak. It is a policy of obfuscation that has compelled the White House to turn a blind eye to Turkey’s involvement in supporting ISIS and its predecessors in Syria.This investigation, which began as a series of essays in the London Review of Books, has ignited a firestorm of controversy in the world media. In his introduction, Hersh asks what will be the legacy of Obama’s time in office. Was it an era of “change we can believe in” or a season of lies and compromises that continued George W. Bush’s misconceived War on Terror? How did he lose the confidence of the general in charge of America’s forces who acted in direct contradiction to the White House? What else do we not know?

Black Code: The Battle for the Future of Cyberspace


Ronald J. Deibert - 2011
    It is difficult to imagine a world without instant access and 24/7 connectivity. We have reengineered our business, governance, and social relations around a planetary network unlike any that has come before. And, as with any social transformation, there have been unintended consequences.     In Black Code, Ron Deibert examines the profound effect that cyberspace is having on the relationship between citizens and states, on the private and public spheres, and on domestic and international affairs. Cyberspace has brought us a world of do-it-yourself signals intelligence, he argues, and WikiLeaks is only a symptom of a much larger phenomenon to which governments, businesses, and individuals will have to get accustomed. Our lives have been turned inside out by a digital world of our own spinning.     Fast-paced, revealing, and sometimes terrifying, Black Code takes readers into the shadowy realm of cybersecurity, offering insight into the very future of cyberspace and revealing what new rules and norms we will need to adopt in order to survive in this new environment.

Beirut Rules: The Murder of a CIA Station Chief and Hezbollah's War Against America


Fred Burton - 2018
    Assigned as the new Beirut station chief, Buckley arrived to a war-torn city and a CIA station in tatters. A field operative at heart, he delved into Beirut's darkest corners, developing new sources and handling assets. Then, on October 23rd, a US Marine Corps barracks was destroyed in a plot masterminded by a young terrorist named Imad Mughniyeh. But even as President Reagan vowed revenge, Mughniyeh eyed a new target: Buckley. Beirut Rules is the pulse-by-pulse account of Buckley’s abduction, torture, and murder at the hands of Hezbollah terrorists. Drawing on never seen before U.S. government documents, as well as interviews with Buckley’s former coworkers, friends and family, Burton and Katz reveal how the pursuit to find Buckley in the wake of his kidnapping ignited a war against terror that continues to shape the Middle East to this day.