Book picks similar to
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage by Timo Steffens
waiting-reading
cyber
dfir
espionage
True Believer: Inside the Investigation and Capture of Ana Montes, Cuba's Master Spy
Scott W. Carmichael - 2007
Known to her coworkers as the Queen of Cuba, she was an overachiever who advanced quickly through the ranks of Latin American specialists to become the intelligence community's top analyst on Cuban affairs. But throughout her sixteen-year career at DIA, Montes was sending Castro some of America's most closely guarded secrets and at the same time helping influence what the United States thought it knew about Cuba. When she was finally arrested in September 2001, she became the most senior American intelligence official ever accused of operating as a Cuban spy from within the federal U.S. government. Unrepentant as she serves out her time in a federal prison in Texas, Montes remains the only member of the intelligence community ever convicted of espionage on behalf of the Cuban government.This inside account of the investigation that led to her arrest has been written by Scott W. Carmichael, the DIA's senior counterintelligence investigator who persuaded the FBI to launch an investigation. Although Montes did not fit the FBI's profile of a spy and easily managed to defeat the agency's polygraph exams, Carmichael became suspicious of her activities and with the FBI over a period of several years developed a solid case against her. Here he tells the story of that long and ultimately successful spy hunt. Carmichael reveals the details of their efforts to bring her to justice, offering readers a front-row seat for the first major U.S. espionage case of the twentieth century. She was arrested less than twenty-four hours before learning details of the U.S. plan to invade Afghanistan post-September 11. Motivated by ideology not money, Montes was one of the last true believers of the communist era. Because her arrest came just ten days after 9/11, it went largely unnoticed by the American public. This book calls attention to the grave damage Montes inflicted on U.S. security--Carmichael even implicates her in the death of a Green Beret fighting Cuban-backed insurgents in El Salvador--and the damage she would have continued to inflict had she not been caught.
Special Forces Berlin: Clandestine Cold War Operations of the U.S. Army's Elite, 1956-1990
James Stejskal - 2017
It came into existence in response to the threat posed by the massive armies of the Soviet Union and its Warsaw Pact allies to the nations of Western Europe.US military planners decided they needed a plan to slow the massive Soviet advance they expected when and if a war began. The plan was Special Forces Berlin. The first 40 men who came to Berlin in mid-1956 were soon reinforced by 60 more and these 100 soldiers (and their successors) would stand ready to go to war in a hostile area occupied by nearly one million Warsaw Pact forces until 1990.If war came, some of these men would stay in Berlin to fight the enemy, while others would cross the most heavily defended border in the world and disappear into the countryside to accomplish their tasks behind Soviet lines. The Detachment were also involved in operations elsewhere, including involvement in the attempted rescue of American hostages from Tehran in 1979. When SF Berlin was disbanded, its files and records were for the most part destroyed or lost.Written by a veteran of the unit, this narrative of the unit's activities is based on the recollections of the men who served in it, coupled with what little declassified, official documentation is available.
Special Boat Squadron
Barrie Pitt - 1983
Only since the Falklands campaign have the initials SBS become known to the public. Yet this clandestine formation of Britain’s armed forces has been in existence since the Second World War. Barrie Pitt, who himself served with the SBS, describes how the it came into being in 1941. How they fought with distinction in the Aegean, where one of their exploits inspired The Guns of Navarone. How they earned rapport in the Adriatic, in Greece and in Italy. How the SBS was reorganised in 1946 as part of the Royal Marines and has since played a role in Korea, Borneo and the Falklands. Equally interesting is the author’s report of the training and specialized skills required by the boat units, and the essential tasks facing them — infiltration from the sea, reconnaissance, sabotage, survival, resistance to interrogation, escape from captivity — and the expertise and determination to complete them. As Barrie Pitt's superb account of the formative years of this elite force shows, these qualities have been present from the very beginning. Barrie Pitt (1918-2006) was well known as a military historian and editor of Purnell’s History of the Second World War and History of the First World War. His publications include 'Coronel and Falkland', 'Churchill and the Generals' and 'The Crucible of War', a trilogy covering the North African campaign of the Second World War. He was born in Galway and later lived near Ilminster in Somerset.
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Deviant Ollam - 2010
Unlike other texts on the subject (which tend to be either massive volumes detailing every conceivable style of lock or brief "spy manuals" that only skim the surface) this book is for INFOSEC professionals that need essential, core knowledge of lockpicking and seek the ability to open most locks with relative ease. Deviant's material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly. Everything from straightforward lockpicking to quick-entry techniques like shimming, bumping, and bypassing is explained and shown.Whether you're being hired to penetrate security or simply trying to harden your own defenses, this book is essential.
Detailed photos make learning as easy as picking a lock
DVD is filled with indispensible lock picking videos and color photos
Extensive appendix details tools and toolkits currently available for all your lock picking needs
Agent 110: An American Spymaster and the German Resistance in WWII
Scott Miller - 2017
From his townhouse in Bern, and in clandestine meetings in restaurants, back roads, and lovers’ bedrooms, Dulles met with and facilitated the plots of Germans who were trying to destroy the country’s leadership. Their underground network exposed Dulles to the political maneuverings of the Soviets, who were already competing for domination of Germany, and all of Europe, in the post-war period. Scott Miller’s fascinating Agent 110 explains how leaders of the German Underground wanted assurances from Germany’s enemies that they would treat the country humanely after the war. If President Roosevelt backed the resistance, they would overthrow Hitler and shorten the war. But Miller shows how Dulles’s negotiations fell short. Eventually he was placed in charge of the CIA in the 1950s, where he helped set the stage for US foreign policy. With his belief that the ends justified the means, Dulles had no qualms about consorting with Nazi leadership or working with resistance groups within other countries to topple governments. Now Miller brings to life this exhilarating, and pivotal, period of world history—of desperate renegades in a dark and dangerous world where spies, idealists, and traitors match wits and blows to ensure their vision of a perfect future.
The Brilliant Disaster: JFK, Castro, and America's Doomed Invasion of Cuba's Bay of Pigs
Jim Rasenberger - 2011
Despite the Kennedy administration’s initial public insistence that the United States had nothing to do with the invasion, it soon became clear that the complex operation had been planned and approved by the best and brightest minds at the highest reaches of Washington, including the Joint Chiefs of Staff and President John F. Kennedy himself. The Cuban-born invaders were trained by CIA officers, supplied with American matériel, and shadowed by the U.S. Navy. Landing by sea with fighter-plane support, they hoped to establish a military beachhead and spark a counterrevolution against Fidel Castro’s regime. The gambit was a stupendous failure, resulting in the death or imprisonment of more than a thousand men. In its wake, the United States appeared inept, reckless, and corrupt. Now, journalist Jim Rasenberger takes a closer look at this darkly fascinating incident in American history. At the heart of the crisis stood President Kennedy, and Rasenberger traces what Kennedy knew, thought, and said as events unfolded. He examines whether Kennedy was manipulated by the CIA into approving a plan that would ultimately involve the American military. He also draws compelling portraits of the other figures who played key roles in the drama: Castro, who shortly after achieving power visited New York City and was cheered by thousands (just months before the United States began plotting his demise); Dwight Eisenhower, who originally ordered the secret program, then later disavowed it; Allen Dulles, the CIA director who may have told Kennedy about the plan before he was elected president (or so Richard Nixon suspected); and Richard Bissell, the famously brilliant “deus ex machina” who ran the operation for the CIA—and took the blame when it failed. Beyond the short-term fallout, Rasenberger demonstrates, the Bay of Pigs gave rise to further and greater woes, including the Cuban Missile Crisis, the Vietnam War, and even, possibly, the assassination of John Kennedy. Written with elegant clarity and narrative verve, The Brilliant Disaster is the most complete account of this event to date, providing not only a fast-paced chronicle of the disaster but an analysis of how it occurred—a question as relevant today as then—and how it profoundly altered the course of modern American history.
Shadow Warrior: William Egan Colby And The CIA
Randall B. Woods - 2013
A quintessential member of the greatest generation, Colby embodied the moral and strategic ambiguities of the postwar world, and first confronted many of the dilemmas about power and secrecy that America still grapples with today.In Shadow Warrior, eminent historian Randall B. Woods presents a riveting biography of Colby, revealing that this crusader for global democracy was also drawn to the darker side of American power. Aiming to help reverse the spread of totalitarianism in Europe and Asia, Colby joined the U.S. Army in 1941, just as America entered World War II. He served with distinction in France and Norway, and at the end of the war transitioned into America's first peacetime intelligence agency: the CIA. Fresh from the fight against fascism, Colby zealously redirected his efforts against international communism. He insisted on the importance of fighting communism on the ground, doggedly applying guerilla tactics for counterinsurgency, sabotage, surveillance, and information-gathering on the new battlefields of the Cold War. Over time, these strategies became increasingly ruthless; as head of the CIA's Far East Division, Colby oversaw an endless succession of assassination attempts, coups, secret wars in Laos and Cambodia, and the Phoenix Program, in which 20,000 civilian supporters of the Vietcong were killed. Colby ultimately came clean about many of the CIA's illegal activities, making public a set of internal reports—known as the “family jewels”—that haunt the agency to this day. Ostracized from the intelligence community, he died under suspicious circumstances—a murky ending to a life lived in the shadows.Drawing on multiple new sources, including interviews with members of Colby's family, Woods has crafted a gripping biography of one of the most fascinating and controversial figures of the twentieth century.
The Story of My Disappearance: A Novel
Paul Watkins - 1997
As a patriotic young man, he enlisted in the East German Stasi and was sent to Afghanistan, where he and a friend were taken prisoner by the Mujahadin. Years later Paul is sent to America as a contact for the KGB, where his life is changed forever by one woman. Together, these two exiles must find the strength to resist demands of the men who claim to own them.
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
Steven Levy - 2001
From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
Spies for Hire: The Secret World of Intelligence Outsourcing
Tim Shorrock - 2008
Tracking down terrorists in the Middle East. Interrogating enemy prisoners. Analyzing data from spy satellites and intercepted phone calls. All of these are vital intelligence tasks that traditionally have been performed by government officials accountable to Congress and the American people. But that is no longer the case.Starting during the Clinton administration, when intelligence budgets were cut drastically and privatization of government services became national policy, and expanding dramatically in the wake of 9/11, when the CIA and other agencies were frantically looking to hire analysts and linguists, the Intelligence Community has been relying more and more on corporations to perform sensitive tasks heretofore considered to be exclusively the work of federal employees. This outsourcing of intelligence activities is now a $50 billion-a-year business that consumes up to 70 percent of the U.S. intelligence budget. And it's a business that the government has tried hard to keep under wraps.Drawing on interviews with key players in the Intelligence-Industrial Complex, contractors' annual reports and public filings with the government, and on-the-spot reporting from intelligence industry conferences and investor briefings, "Spies for Hire" provides the first behind-the-scenes look at this new way of spying. Shorrock shows how corporations such as Booz Allen Hamilton, Lockheed Martin, SAIC, CACI International, and IBM have become full partners with the CIA, the National Security Agency, and the Pentagon in their most sensitive foreign and domestic operations. He explores how this partnership has led to wasteful spending and threatens to erode the privacy protections and congressional oversight so important to American democracy.Shorrock exposes the kinds of spy work the private sector is doing, such as interrogating prisoners in Iraq, managing covert operations, and collaborating with the National Security Agency to eavesdrop on Americans' overseas phone calls and e-mails. And he casts light on a "shadow Intelligence Community" made up of former top intelligence officials who are now employed by companies that do this spy work, such as former CIA directors George Tenet and James Woolsey. Shorrock also traces the rise of Michael McConnell from his days as head of the NSA to being a top executive at Booz Allen Hamilton to returning to government as the nation's chief spymaster.From CIA covert actions to NSA eavesdropping, from Abu Ghraib to Guantanamo, from the Pentagon's techno-driven war in Iraq to the coming global battles over information dominance and control of cyberspace, contractors are doing it all. "Spies for Hire" goes behind today's headlines to highlight how private corporations are aiding the growth of a new and frightening national surveillance state.
The Watchers: The Rise of America's Surveillance State
Shane Harris - 2010
and the document leaks by NSA whistleblower Edward Snowden, The Watchers is more timely than ever, drawing on access to political and operational insiders to create a brilliant exposé of why and how the American government spies on its own citizens. Born in the wake of the 1983 massacre of 241 Marines in Beirut, the domestic surveillance program introduced by Ronald Reagan's national security advisor, John Poindexter, to coordinate intelligence on terrorists has claimed billions of government dollars. Despite the cost, it has failed in its mission to identify new threats. But as Harris shows, it has provided the government with a tool for the electronic surveillance of Americans that has ushered in an age of constitutionally questionable intrusion into the lives of every citizen.
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
David E. Sanger - 2018
The Perfect Weapon is the riveting story of how, in less than a decade, cyberwarfare displaced terrorism and nuclear attacks as the greatest threat to American national security. Cheap to acquire, difficult to defend against, and designed to shield their user's identities so as to complicate retaliation, these weapons are capable of an unprecedented range of offensive tactics; they can take us just short of war, allowing for everything from disruption to theft to the cause of widespread damage of essential infrastructure systems. And the vulnerability of those systems has created a related but equally urgent conflict: American companies like Apple and Cisco must claim allegiance to no government in the name of selling secure products around the globe yet the US intelligence agencies want the help of such companies in defending against future cyberattacks. Reported and written with unprecedented access by New York Times chief Washington correspondent and bestselling author David Sanger, The Perfect Weapon takes readers inside war rooms and boardrooms, into the secret cyberdens of American and Chinese military, to give the deep-background story of the increasingly pitched battle between nations, their governments, their cyberwarriors, and their corporations.
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Hard Measures: How Aggressive CIA Actions After 9/11 Saved American Lives
José A. Rodríguez Jr. - 2012
counterterrorism operations and oversaw the use of those procedures—procedures that obtained vital and timely intelligence and helped safeguard the nation from future attacks. Puerto Rican–born Jose A. Rodriguez, Jr., served the United States for twenty-five years as an undercover officer before bringing his wealth of field knowledge to the CIA’s Counterterrorism Center; now, in this riveting account and fascinating life story, one of America’s top undercover operatives reveals how hard measures have derailed terrorist activity targeting the U.S., and saved countless American lives. Fully disclosed here for the first time are the undercover operations and tactics implemented during the George W. Bush presidency—which were approved by the highest levels of the U.S. government, certified as legal by the Department of Justice, and supported by bipartisan leadership of congressional intelligence oversight committees. But as the shock of 9/11 faded, the support that the intelligence community enjoyed and deserved gave way to shortsighted and potentially dangerous political correctness. One by one, the tools needed to successfully fight terrorism were banished, and the men and women who volunteered to carry out our nation’s orders in combating al-Qa'ida found themselves second-guessed, hamstrung, and investigated— including Rodriguez himself. In effect, the United States has chosen to willfully and unilaterally disarm itself in the war on terror. In Hard Measures, Rodriguez convincingly argues for the techniques used, and uncompromisingly details when these techniques were necessary, why they worked, and how, ultimately, they contributed to the capture of the world’s most-wanted terror operatives, including Usama bin Ladin. From law school student to CIA recruit to his role as America’s top spy, Rodriguez’s full story is one of utmost importance—a rare, insider’s look at an issue that demands attention. Above all, it’s a reasoned, imperative, and fully informed case for hard measures, and an explosive and gripping account of the real war on terror— where it’s been and where it’s headed. Terrorism has always been one of the toughest targets on which to collect intelligence. The secrets you want to steal frequently don’t reside in computer systems, which can be hacked, or safes, which can be broken into, but in the inner recesses of a handful of individuals’ minds. The cliché about intelligence work is that it is like working on a thousand-piece jigsaw puzzle but not having the box top to show you what the finished picture should look like. If only it were that easy. In fact, it is more like working on a million-piece puzzle with no box top, and having millions more random pieces that look like they might fit, but actually are from different puzzles altogether. It fell to us to make sense of the countless fragments of information and to take action on the chunks of the puzzle, which represented a real and growing threat to the United States and our allies.
Kill the Messenger: How the CIA's Crack-Cocaine Controversy Destroyed Journalist Gary Webb
Nick Schou - 2006
Webb is the former San Jose Mercury News reporter whose 1996 "Dark Alliance" series on the so-called CIA-crack cocaine connection created a firestorm of controversy and led to his resignation from the paper amid escalating attacks on his work by the mainstream media. Author and investigative journalist Nick Schou published numerous articles on the controversy and was the only reporter to significantly advance Webb's stories. Drawing on exhaustive research and highly personal interviews with Webb's family, colleagues, supporters and critics, this book argues convincingly that Webb's editors betrayed him, despite mounting evidence that his stories were correct. Kill the Messenger examines the "Dark Alliance" controversy, what it says about the current state of journalism in America, and how it led Webb to ultimately take his own life. Webb's widow, Sue Bell Stokes, remains an ardent defender of her ex-husband. By combining her story with a probing examination of the one of the most important media scandals in recent memory, this book provides a gripping view of one of the greatest tragedies in the annals of investigative journalism.