Cyber War Will Not Take Place


Thomas Rid - 2013
    In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the "fifth domain" of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain? Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure? How serious is the threat of "pure" cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?

WikiLeaks: Inside Julian Assange's War on Secrecy


David Leigh - 2011
    A team of journalists with unparalleled inside access provides the first full, in-depth account of WikiLeaks, its founder Julian Assange, and the ethical, legal, and political controversies it has both uncovered and provoked.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race


Nicole Perlroth - 2021
    One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

The Darkening Web: The War for Cyberspace


Alexander Klimburg - 2017
    Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn't so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests. Klimburg is a leading voice in the conversation on the implications of this dangerous shift, and in The Darkening Web, he explains why we underestimate the consequences of states' ambitions to project power in cyberspace at our peril: Not only have hacking and cyber operations fundamentally changed the nature of political conflict--ensnaring states in a struggle to maintain a precarious peace that could rapidly collapse into all-out war--but the rise of covert influencing and information warfare has enabled these same global powers to create and disseminate their own distorted versions of reality in which anything is possible. At stake are not only our personal data or the electrical grid, but the Internet as we know it today--and with it the very existence of open and democratic societies. Blending anecdote with argument, Klimburg brings us face-to-face with the range of threats the struggle for cyberspace presents, from an apocalyptic scenario of debilitated civilian infrastructure to a 1984-like erosion of privacy and freedom of expression. Focusing on different approaches to cyber-conflict in the US, Russia and China, he reveals the extent to which the battle for control of the Internet is as complex and perilous as the one surrounding nuclear weapons during the Cold War--and quite possibly as dangerous for humanity as a whole. Authoritative, thought-provoking, and compellingly argued, The Darkening Web makes clear that the debate about the different aspirations for cyberspace is nothing short of a war over our global values.

Dead Doubles: The Extraordinary Worldwide Hunt for One of the Cold War's Most Notorious Spy Rings


Trevor Barnes - 2020
    Alerted by the CIA, Britain's security service, MI5, had discovered two British spies stealing invaluable secrets from the highly sensitive submarine research center at Portland, UK.  Their controller, Gordon Lonsdale, was a Canadian who frequently visited a middle-aged couple, the Krogers, in their sleepy London suburb. But the seemingly unassuming Krogers were revealed to be deep cover American KGB spies—infamous undercover agents the FBI had been hunting for years—and they were just one part of an extensive network of Soviet operatives in the UK.In the wake of the spies' sensational trial, the FBI uncovered the true identity of the enigmatic Lonsdale—Konon Molody, a Russian who had lived in California before being recruited by the KGB. Molody opened secret talks with MI5 to betray Russia, but before he had the chance, the KGB blackmailed Britain into spy swaps for him and the Krogers.Based on revelatory, newly-released archival material and inside sources from around the world, Dead Doubles follows the hunt for the highly damaging Portland Spy Ring.  As gripping as a le Carré novel, this incredible narrative, layered with false identities, deceptions, and betrayal, crisscrosses from the UK to the USSR to the US, Canada, Europe and New Zealand, and brings to life one of the most extraordinary spy stories of the Cold War.

The Spy Who Was Left Behind: Russia, the United States, and the True Story of the Betrayal and Assassination of a CIA Agent


Michael Pullara - 2018
    Within hours, police had a suspect—a vodka-soaked village bumpkin named Anzor Sharmaidze. A tidy explanation quickly followed: It was a tragic accident. US diplomats hailed Georgia’s swift work, and both countries breathed a sigh of relief. Yet the bullet that killed Woodruff was never found and key witnesses have since retracted their testimony, saying they were beaten and forced to identify Sharmaidze. But if he didn’t do it, who did? Those who don’t buy the official explanation think the answer lies in the spy games that played out on Russia’s frontier following the 1991 collapse of the Soviet Union. Woodruff was an early actor in a dangerous drama. American spies were moving into newborn nations previously dominated by Soviet intelligence. Russia’s security apparatus, resentful and demoralized, was in turmoil, its nominal loyalty to a pro-Western course set by President Boris Yeltsin, shredded by hardline spooks and generals who viewed the Americans as a menace. At the time when Woodruff was stationed there, Georgia was a den of intrigue. It had a big Russian military base and was awash with former and not-so-former Soviet agents. Shortly before Woodruff was shot, veteran CIA officer Aldrich Ames—who would soon be unmasked as a KGB mole—visited him on agency business. In short order, Woodruff would be dead and Ames, in prison for life. Buckle up, because The Spy Who Was Left Behind reveals the full-throttle, little-known thrilling tale.

Near and Distant Neighbors: A New History of Soviet Intelligence


Jonathan Haslam - 2015
    Drawing on previously neglected Russian sources, Haslam reveals how both were in fact crucial to the survival of the Soviet state. This was especially true after Stalin's death in 1953, as the Cold War heated up and dedicated Communist agents the regime had relied upon--Klaus Fuchs, the Rosenbergs, Donald Maclean--were betrayed. In the wake of these failures, Nikita Khrushchev and his successors discarded ideological recruitment in favor of blackmail and bribery. The tactical turn was so successful that we can draw only one conclusion: the West ultimately triumphed despite, not because of, the espionage war.In bringing to light the obscure inhabitants of an undercover intelligence world, Haslam offers a surprising and unprecedented portrayal of Soviet success that is not only fascinating but also essential to understanding Vladimir Putin's power today.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Black Site: The CIA in the Post-9/11 World


Philip Mudd - 2019
    Almost overnight, an intelligence organization converted itself into a weaponized warfighting machine, one that raised questions about how far America would go to pursue al-Qa’ida. Now, more than fifteen years later, ex-CIA executive Philip Mudd comes forward with a never-before-told account of the 9/11 story, one that illuminates the profound impact that enhanced interrogation techniques and other initiatives known internally as “The Program” took on those who administered them. With unprecedented access to officials at the highest levels―including Director George Tenet―Mudd goes beyond the 2014 Senate report to show us what life was really like at the CIA prisons and why interrogators were forced to make decisions that they still ponder today. As hair-raising as it is revelatory, Black Site shows us the tragedy and triumph of the CIA during its most difficult hour.

The Long Range Desert Group 1940-1945: Providence Their Guide


David Lloyd Owen - 1980
    This classic insider's account has been updated and supplemented with rare photographs from the LRDG collection in the Imperial War Museum.

Operation Garbo: The Personal Story of the Most Successful Spy of World War II


Juan Pujol Garcia - 1985
    By feeding false information to the Germans on the eve of the D-Day landings he ensured Hitler held troops back that might otherwise have defeated the Normandy landings. This allowed the Allied push against the Nazis in Europe to begin. Amazingly, Garbo's cover was never broken and he remains the only person ever to have been awarded both the British MBE and the German Iron Cross. After the war Garbo faked his own death and fled to Venezuela with a mistress, where he later opened a book store. Ironically, his family in Spain only found out he was still alive when this book was published - Garbo having failed to realise it would also be translated into Spanish.

Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union


Stephen Budiansky - 2016
    The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how the NSA came to be, and of its central, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. He also guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. A riveting, essential history of the underbelly of the Cold War.

Above and Beyond: John F. Kennedy and America's Most Dangerous Cold War Spy Mission


Casey Sherman - 2018
    Kennedy and two U-2 pilots, Rudy Anderson and Chuck Maultsby, who risked their lives to save America during the Cuban Missile Crisis.During an infamous thirteen-day stretch of October 1962, America faced the prospect of imminent nuclear war with the Soviet Union. Two things saved humanity: the strategic wisdom of John F. Kennedy, and the U-2 aerial spy program.Above and Beyond tells the story of the Cuban Missile Crisis through the eyes of three characters: Kennedy, and two U-2 pilots, Rudy Anderson and Charles Maultsby, who found themselves in the crosshairs of history, on the worst and most intense day of the crisis.Anderson, a decorated combat pilot, embarked on a top-secret mission from McCoy Air Force Base, Florida, to fly his U-2 spy plane over Cuba to photograph evidence that five Soviet R-2 missile sites are up and running.At the same time, thousands of miles away in Alaska, Maultsby climbed into his own U-2 spy plane and took off on what was believed to be a routine mission to the North Pole to gather radioactive air samples from a recent Russian nuclear test. But just after 12 PM, Maultsby suddenly became disoriented and steered his plane into Soviet airspace. In the White House, Kennedy, strained from back pain, sleeplessness, and days impossible tension, was briefed about Maultsby and his missing U-2. If detected by the Soviets, its presence in Soviet air space could be considered an act of war. But as the president and his advisers wrestled with this information, more bad news came: another U-2 had gone missing--this time over Cuba.Above and Beyond is a deeply researched, gripping account of the lives of these three men, war heroes all, who were brought together during a day that could have changed history.

Halting State


Charles Stross - 2007
    A daring bank robbery has taken place at Hayek Associates -- a dot-com start-up company that's just floated onto the London stock exchange. But this crime may be a bit beyond Smith's expertise.The prime suspects are a band of marauding orcs with a dragon in tow for fire support. The bank is located within the virtual land of Avalon Four, and the robbery was supposed to be impossible. When word gets out, Hayek Associates and all its virtual "economies" are going to crash hard.For Smith, the investigation seems pointless. But the deeper she digs, the bigger the case gets. There are powerful players -- both real and pixilated -- who are watching her every move. Because there is far more at stake than just some game-head's fantasy financial security . . .