Let Bhutto Eat Grass


Shaunak Agarkhedkar - 2022
    India tested a nuke just months earlier, and Pakistan is desperate to acquire a few for themselves. Unfortunately for Bhutto, Pakistan’s Prime Minister, his scientists are nowhere close to building a nuclear weapon.Capt. Sablok, an intelligence analyst, is convinced that the Pakistani agent in Europe is passing sensitive weapons technology to back to Pakistan.But his evidence is weak. His inexperience and reputation for alcoholism conspire against him, and his Section Chief declines to authorise an operation.Sablok, however, has finally found a sense of purpose after two miserable years, and he will not give up without a fight. The only other person he trusts in R&AW is a washed-up Case Officer who was an outstanding field agent once.But can the two of them rein the ISI in before Pakistan steals all the technology it needs?

Spies Against Armageddon


Dan Raviv - 1992
    It is filled with colorful characters, who risk their lives and reputations in the secret service of their nation. R. James Woolsey, former Director of Central Intelligence, writes: “Raviv and Melman have redefined the gold standard for nonfiction about intelligence. This remarkable history of Israeli intelligence from the War of Independence to Stuxnet calls it straight. By describing the roots of both the triumphs and the screw-ups thoroughly and fairly the authors help us see not only how Israel's survival has been effectively protected but the huge debt the rest of us owe.” The award-winning historian Douglas Brinkley, author of CRONKITE, writes: “The revelatory research amassed in SPIES AGAINST ARMAGEDDON is nothing short of stunning. Raviv and Melman understand the inner workings of Israel’s Mossad better than most Mossad agents. Highly recommended!” James Roche, a former Secretary of the Air Force, writes: "Fascinating vignettes ... a detailed exposition of the activities of serious, professional, and generally successful Israeli operatives who are dedicated totally to the defense of Israel and the Jewish people."

Book of Spies PB


Alan FurstJohn le Carré - 2003
    The Book of Spies brings us the aristocratic intrigues of The Scarlet Pimpernel, in which French émigrés duel with Robespierre’s secret service; the savage political realities of the 1930s in Eric Ambler’s classic A Coffin for Dimitrios; the ordinary (well, almost) citizens of John le Carré’s The Russia House, who are drawn into Cold War spy games; and the 1950s Vietnam of Graham Greene’s The Quiet American, with its portrait of American idealism and duplicity. Drawing on acknowledged classics and rediscovered treasures, A Book of Spies delivers literate entertainment and excitement on every page.

International Spy Museum: The Handbook of Practical Spying


Jack Barth - 2004
    If you can adopt the principles described in this book, you will be better prepared to counter the razor-sharp hats of hassle that the Odd Jobs of the world are continually flinging at you. It's the first step in learning how to think like a spy.In today's world, information is everything and no one knows how to gather information more effectively than spies. So why not use the information and techniques developed by real spies in your everyday life? The Handbook of Practical Spying shows you how. Get into the mind-set of spies, and learn the cardinal rule: how to deal with the unexpected. Spies have honed the ability to assess a situation, depend on their intuition and knowledge, and react effectively. Learn how to apply spy knowledge to situations in your own life, from how to hide valuables in your home, to how to shake a tail if you are being followed on a dark street. Learn how to avoid carjacking, pickpockets, and how to protect yourself from identity theft. The same tactics used by CIA and KGB agents can also be used in less serious situations-and these techniques can work in surprising ways. Planning a surprise birthday party for someone special? Learn how to create a cover story. Real spies know the tricks and what can give your cover away. A spy must master many skills, and is only as good as what he or she sees and understands. Observe and Analyze, Avoid Capture, Use Disguises, and Analyze Threats. These are all things that can help you in daily applications.The book is presented by International Spy Museum director and ex-CIA operative Peter Earnest, and filled with useful information gathered by the Spy Museum's team of experts. There are sections on how to be safe in your home or when traveling. Tips on child safety, and how to tell if someone is lying. There is a rundown on how to react if terrorism strikes: what do you do if a dirty bomb goes off near you? Sprinkled with quotes from Sun Tzu's The Art of War that are as relevant today as they were when written 2500 years ago, this books teaches in wry and pithy text the cardinal tenet of his writing, "There is nowhere you cannot put spies to good use." The Handbook of Practical Spying features illustrated step-by-step instructions on real-life spy techniques and their practical, positive applications. The authors also share real-life stories about how these tactics have been employed by professional spies all over the world. Featuring 40 2-color line drawings, illustrating spy techniques, and a bulleted text for easy access to the information.

The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage


Clifford Stoll - 1989
    citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.

Escape to Nowhere


Amar Bhushan - 2012
    An inquiry is promptly launched and Ravi, the suspect is placed under an elaborate regime of surveillance. The investigation subsequently throws up a huge amount of evidence, showing the suspect stealing sensitive data. As panic sets in, investigators acrimoniously debate whether to allow the suspect to walk free or physically force him to own up his crime. For Jeevnathan, the problem also is how to keep the tiring watchers going and persuade an edgy Chief to stay on course. As the story enters 96th Day, paradoxical consequences follow.Loosely inspired by a true incident that took place in 2004 when a senior intelligence officer suspected of being a spy for decades vanished, the story also treats us to a rare insight into the state of security awareness of employees in the Agency, constrains in conducting aggressive operations, pitfalls in liaison relationship, competing interests of intelligence services, hazards in co-ordination of intelligence inputs and the Kashmir imbroglio.

The Secret Sentry: The Untold History of the National Security Agency


Matthew M. Aid - 2009
    In February 2006, while researching this book, Matthew Aid uncovered a massive and secret document reclassification program—a revelation that made the front page of the New York Times. This was only one of the discoveries Aid has made during two decades of research in formerly top-secret documents. In The Secret Sentry, Aid provides the first-ever full history of America's largest security apparatus, the National Security Agency. This comprehensive account traces the growth of the agency from 1945 to the present through critical moments in its history, from the cold war up to its ongoing involvement in Afghanistan and Iraq. Aid explores the agency's involvement in the Iraqi weapons intelligence disaster, where evidence that NSA officials called "ambiguous" was used as proof of Iraqi WMD capacity, and details the intense debate within the NSA over its unprecedented role, pressed by the Bush-Cheney administration, in spying on U.S. citizens. Today, the NSA has become the most important source of intelligence for the U.S. government, providing 60 percent of the president's daily intelligence briefing. While James Bamford's New York Times bestseller The Shadow Factory covered the NSA since 9/11, The Secret Sentry contains new information about every period since World War II . It provides a shadow history of global affairs, from the creation of I srael to the War on Terror.

Playing to the Edge: American Intelligence in the Age of Terror


Michael V. Hayden - 2016
    Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America. "Play to the edge" was Hayden's guiding principle when he ran the National Security Agency, and it remained so when he ran CIA.  In his view, many shortsighted and uninformed people are quick to criticize, and this book will give them much to chew on but little easy comfort; it is an unapologetic insider's look told from the perspective of the people who faced awesome responsibilities head on, in the moment.   How did American intelligence respond to terrorism, a major war and the most sweeping technological revolution in the last 500 years?  What was NSA before 9/11 and how did it change in its aftermath?  Why did NSA begin the controversial terrorist surveillance program that included the acquisition of domestic phone records? What else was set in motion during this period that formed the backdrop for the infamous Snowden revelations in 2013?     As Director of CIA in the last three years of the Bush administration,  Hayden had to deal with the rendition, detention and interrogation program as bequeathed to him by his predecessors. He also had to ramp up the agency to support its role in the targeted killing program that began to dramatically increase in July 2008. This was a time of great crisis at CIA, and some agency veterans have credited Hayden with actually saving the agency. He himself won't go that far, but he freely acknowledges that CIA helped turn the American security establishment into the most effective killing machine in the history of armed conflict.   For 10 years, then, General Michael Hayden was a participant in some of the most telling events in the annals of American national security. General Hayden's goals are in writing this book are simple and unwavering: No apologies. No excuses. Just what happened. And why. As he writes, "There is a story here that deserves to be told, without varnish and without spin. My view is my view, and others will certainly have different perspectives, but this view deserves to be told to create as complete a history as possible of these turbulent times. I bear no grudges, or at least not many, but I do want this to be a straightforward and readable history for that slice of the American population who depend on and appreciate intelligence, but who do not have the time to master its many obscure characteristics."

Code Name Komiko


Naomi Paul - 2014
    But Lian has a secret identity. She is part of 04/06a band of cyber-investigators who work to expose injustice and corruption. In this virtual world, Lian goes by the code name, Komiko.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage


Gordon Corera - 2015
    The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.

Dark Mirror: Edward Snowden and the American Surveillance State


Barton Gellman - 2020
    Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio

Seven Days in May


Fletcher Knebel - 1962
    Like a lot of people, he believed the President was ruining the country. Unlike anyone else, he had the power to do something about it, something unprecedented and terrifying. Colonel "Jiggs" Casey was the Marine who accidentally stumbled onto the plot. At first he refused to believe it; then he risked his life and career to inform the President. Jordan Lyman was President of the United States. By the time he was finally able to convince himself of the appalling truth, he had only seven days left to stop a brilliant, seemingly irresistible military plot to seize control of the government of the United States.Seven Days in May is a political thriller novel written by Fletcher Knebel and Charles W. Bailey II and published in 1962. It was made into a motion picture in 1964, with a screenplay by Rod Serling, directed by John Frankenheimer, and starring Burt Lancaster and Kirk Douglas.The story is said to have been influenced by the right-wing anti-Communist political activities of General Edwin A. Walker after he resigned from the military. The author, Knebel, got the idea for the book after interviewing then-Air Force Chief of Staff Curtis LeMay.

We Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News


Eliot Higgins - 2021
    Soon, the identity of one of the suspects was revealed: he was a Russian spy. This huge investigative coup wasn't pulled off by an intelligence agency or a traditional news outlet. Instead, the scoop came from Bellingcat, the open-source investigative team that is redefining the way we think about news, politics, and the digital future.We Are Bellingcat tells the inspiring story of how a college dropout pioneered a new category of reporting and galvanized citizen journalists-working together from their computer screens around the globe-to crack major cases, at a time when fact-based journalism is under assault from authoritarian forces. Founder Eliot Higgins introduces readers to the tools Bellingcat investigators use, tools available to anyone, from software that helps you pinpoint the location of an image, to an app that can nail down the time that photo was taken. This book digs deep into some of Bellingcat's most important investigations-the downing of flight MH17 over Ukraine, Assad's use of chemical weapons in Syria, the identities of alt-right protestors in Charlottesville-with the drama and gripping detail of a spy novel.

Operation Whisper: The Capture of Soviet Spies Morris and Lona Cohen


Barnes Carr - 2016
    On a hot afternoon in the autumn of 1950, a trusted colleague knocked at their door, held up a finger for silence, then began scribbling a note: Go now. Leave the lights on, walk out, don't look back. Born and raised in the Bronx and recruited to play football at Mississippi State, Morris Cohen fought for the Loyalists in the Spanish Civil War and with the U.S. Army in World War II. He and his wife, Lona, were as American as football and fried chicken, but for one detail: they'd spent their entire adult lives stealing American military secrets for the Soviet Union. And not just any military secrets, but a complete working plan of the first atomic bomb, smuggled direct from Los Alamos to their Soviet handler in New York. Their associates Julius and Ethel Rosenberg, who accomplished far less, had just been arrested, and the prosecutor wanted the death penalty. Did the Cohens wish to face the same fate? Federal agents were in the neighborhood, knocking on doors, getting close. So get out. Take nothing. Tell no one. In Operation Whisper, Barnes Carr tells the full, true story of the most effective Soviet spy couple in America, a pair who vanished under the FBI's nose only to turn up posing as rare book dealers in London, where they continued their atomic spying. The Cohens were talented, dedicated, worldly spies-an urbane, jet-set couple loyal to their service and their friends, and very good at their work. Most people they met seemed to think they represented the best of America. The Soviets certainly thought so.