A Vengeance of Spies: A WW2 Novella


Manda Scott - 2019
    It is an accusation. So, in case you get no further, here is the bald fact. I killed your grandfather. War hides many secrets and some of them are better kept. But the secret of Hut Ten was never that kind: it could have been leaked and a life would have been saved. One man could have made that difference. He didn’t - and vengeance has taken forty years to catch up with him. This thrilling novella is set in the same world as Sunday Times Thriller of the Month, A Treachery of Spies. What the Critics say about Manda Scott: “This is a rich vein for fiction, and Scott does it more than justice, with this beautifully imagined, beautifully written, smart, sophisticated – but fiercely suspenseful – thriller.” – Lee Child THRILLER OF THE MONTH ‘Superb . . . a blend of historical imagination and storytelling verve reminiscent of Robert Harris.’ The Sunday Times “… the most exciting, involving thriller I’ve read in an age, and I can’t recommend it highly enough.” – Sunday Times Bestselling author Mick Herron “Scott gives us expertly wrought espionage fiction that blooms into a meditation on war, intimacy and memory” – Adam Brookes "…an extraordinary blend of the past and present.” – Terry Wogan "…seriously clever writing" – Crime Review "…staggeringly Imaginative." – Val McDermid "“A stunning feat of the imagination and an absolute must-read for lovers of historical fiction. Utterly convincing and compelling.” – Stephen Pressfield "A masterpiece in historical fiction." – New York Times ‘A Treachery of Spies is the equal of Charlotte Gray in its insights into the period and, I would say, beats it for sheer excitement… one of the most gripping spy stories I have ever read.’ Jake Kerridge, S Magazine 'Ingeniously plotted and wonderfully written.' Antonia Senior, The Times 'A fast-moving tightly-wrought thriller. The destination is in fact as unexpected as it’s satisfying - and very thought-provoking.' Robert Goddard 'A Treachery of Spies is a masterclass in thriller-writing. It is a heart-racing, heart-wrenching read, conceived with passion and executed with frightening skill. An awe-inspiring achievement.' Giles Kristian What Readers Say: ✭✭✭✭✭ "What a marvellous blend of history, espionage, mystery and politics. Beautifully written, too!" ✭✭✭✭✭ "The author's writing is absolutely masterful, reminding me of Hilary Mantel's." ✭✭✭✭✭ "Unputdownable, gripping, credible account of WW2 heroism and double-dealing." ✭✭✭✭✭ "A Top-Secret First-Rate Spy Thriller!" ✭✭✭✭✭ "Fascinating historical and political detail, brilliant characters...A powerful read.

The Prototype


Matt McCormick - 2018
    His employer, Advanced Research Technologies, is racing to beat foreign competitors to market with their solar power storage prototype. They have potentially hundreds of millions of dollars in revenue to gain—and, as it turns out, everything to lose. As the day for testing the prototype rapidly approaches, the danger to those involved in the project increases. Robert is forced to leave his lighthearted life behind and focus on protecting the prototype—and keeping himself alive.

The Shadow War: Inside Russia's and China's Secret Operations to Defeat America


Jim Sciutto - 2019
    Election interference. Armed invasions. International treaties thrown into chaos. Secret military buildups. Hackers and viruses. Weapons deployed in space. China and Russia (and Iran and North Korea) spark news stories here by carrying out bold acts of aggression and violating international laws and norms. Isn’t this just bad actors acting badly?That kind of thinking is outdated and dangerous. Emboldened by their successes, these countries are, in fact, waging a brazen, global war on the US and the West. This is a new Cold War, which will not be won by those who fail to realize they are fighting it. The enemies of the West understand that while they are unlikely to win a shooting war, they have another path to victory. And what we see as our greatest strengths—open societies, military innovation, dominance of technology on Earth and in space, longstanding leadership in global institutions—these countries are undermining or turning into weaknesses.In The Shadow War, CNN anchor and chief national security correspondent Jim Sciutto provides us with a revealing and at times disturbing guide to this new international conflict. This Shadow War is already the greatest threat to America’s national security, even though most Americans know little or nothing about it. With on-the-ground reporting from Ukraine to the South China Sea, from a sub under the Arctic to unprecedented access to America’s Space Command, Sciutto draws on his deep knowledge, high-level contacts, and personal experience as a journalist and diplomat to paint the most comprehensive and vivid picture of a nation targeted by a new and disturbing brand of warfare.Thankfully, America is adapting and fighting back. In The Shadow War, Sciutto introduces readers to the dizzying array of soldiers, sailors, submariners and their commanders, space engineers, computer scientists, civilians, and senior intelligence officials who are on the front lines of this new kind of forever war. Intensive and disturbing, this invaluable and important work opens our eyes and makes clear that the war of the future is already here.

The Imagineers of War: The Untold Story of DARPA, the Pentagon Agency That Changed the World


Sharon Weinberger - 2017
    Founded in 1958 in response to the launch of Sputnik, DARPA has been responsible for countless inventions and technologies that have evolved from the agency's mission: forward-thinking solutions to the Pentagon's challenges. Sharon Weinberger gives us a riveting account of DARPA's successes and failures, useful innovations and wild-eyed schemes: we see how the nuclear threat sparked investment in computer networking, which led to the Internet, as well as plans to power a missile-seeking particle beam by draining the Great Lakes...how, in Vietnam, DARPA developed technology for the world's first armed drones and was also responsible for Agent Orange... how DARPA's recent success with self-driving cars is counterbalanced with its disappointing contributions to the Afghanistan and Iraq wars. Weinberger has spoken to dozens of former DARPA and Pentagon officials--many of whom had never been interviewed before about their work with the agency--and synthesized countless documents obtained under the Freedom of Information Act. The result is a riveting history of a meeting point of science, technology, and politics.

Legends of Dimmingwood Series: Books 1-4


C. Greenwood - 2014
    Concealment. In the shadow of Dimmingwood, she finds temporary protection with a band of forest brigands led by the infamous outlaw Rideon the Red Hand. * * * * * Book 2: Betrayal of Thieves -- Ilan has narrowly escaped her last encounter with the soldiers of the evil Praetor but many of her outlaw friends have not been so fortunate. When her closest companion is dragged off to Selbius for execution, Ilan has no choice but to defy the captain of the forest brigands and journey to the stronghold of her enemies. * * * * * Book 3: Circle of Thieves -- In the wake of a painful betrayal, Ilan abandons her friends among the river people to return to the peace of shadowy Dimmingwood. But things in the forest are not as she left them. A deadly new enemy is attacking the local villagers, threatening the very existence of the forest outlaws. * * * * * Book 4: Redemption of Thieves -- Compelled to join forces with her life-long enemy, the Praetor, Ilan sets out to defend her friends in Dimmingwood from the murderous raiders across the border. But when Ilan, Terrac, and the Fists in their command enter Skeltai territory through a magic portal, they find themselves in more danger than they bargained for.

Adrishya - True Stories of Indian Spies


EPIC Television's popular - 2017
    Some remain invisible, away from direct combat and yet risk their lives to protect the honour of their king and country. These are the faceless heroes of war—the spies—who collect classified information about the enemy, skilfully helping the ruler and the government of the land to safeguard their own territory.Packed with action, Adrishya is a collection of India's greatest spy stories. It captures the lives of spies—extraordinary men and women—through the danger, the fear and the triumphs. It narrates their heroic acts and follows them as they travel through dangerous landscapes, slip into disguises and hoodwink enemy soldiers. Starting off with India's first spy from the Mahabharata to the RAW officials of the 1971 war, this book is a collection of real spy stories which will entertain and inspire at the same time.

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System


Bill Blunden - 2009
    Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.The spectrum of topics covered includes how to:* Hook kernel structures on multi-processor systems* Use a kernel debugger to reverse system internals* Inject call gates to create a back door into Ring-0* Use detour patches to sidestep group policy* Modify privilege levels on Vista by altering kernel objects* Utilize bootkit technology* Defeat live incident response and post-mortem forensics* Implement code armoring to protect your deliverables* Establish covert channels using the WSK and NDIS 6.0

The Practice of Network Security Monitoring: Understanding Incident Detection and Response


Richard Bejtlich - 2013
    The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

The Secret State: Whitehall and the Cold War


Peter Hennessy - 2002
    Peter Hennessy's sensational book draws on recently declassified intelligence and war-planning documents, and interviews with key officials, to reveal a chilling behind-the-scenes picture of the corridors of power when the world teetered on the brink of disaster. Who would have gone underground with the Prime Minister in the event of an attack? Where is their secret bunker? Under what circumstances would we retaliate? Where were the Soviets' UK targets thought to be? Whose finger was -- and is -- on the button? And what kind of world would have been left when the dust had settled and 'breakdown' had occurred ...?

Hiding from the Internet: Eliminating Personal Online Information


Michael Bazzell - 2012
    Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removalConfigure a home firewall with VPN Kill-SwitchPurchase a completely invisible home or vehicle

The Command: Deep Inside The President's Secret Army


Marc Ambinder - 2012
    Joint Special Operations Command (JSOC) has proven to be the most lethal weapon in the president's arsenal. Shrouded in secrecy, the Command has done more to degrade the capacity of terrorists to attack the United States than any other single entity. And counter-terrorism is only one of its many missions. Because of such high profile missions as Operation Neptune's Spear, which resulted in the death of Osama bin Laden, JSOC has attracted the public's attention. But Americans only know a fraction of the real story.In The Command, Ambinder and Grady provide readers with a concise and comprehensive recent history of the special missions units that comprise the most effective weapon against terrorism ever conceived. For the first time, they reveal JSOC's organizational chart and describe some of the secret technologies and methods that catalyze their intelligence and kinetic activities. They describe how JSOC migrated to the center of U.S. military operations, and how they fused intelligence and operations in such a way that proved crucial to beating back the Iraq insurgency. They also disclose previously unreported instances where JSOC's activities may have skirted the law, and question the ability of Congress to oversee units that, by design, must operate with minimum interference.With unprecedented access to senior commanders and team leaders, the authors also: Put the bin Laden raid in the larger context of a transformed secret organization at its operational best. Explore other secret missions ordered by the president (and the surprising countries in which JSOC operates). Trace the growth of JSOC's operational and support branches and chronicle the command's mastery of the Washington inter-agency bureaucracy. By Marc Ambinder, a contributing editor at the Atlantic, who has covered politics for CBS News and ABC News, and D.B. Grady, a correspondent for the Atlantic, and former U.S. Army paratrooper and a veteran of Afghanistan.

Atomic Spy: The Dark Lives of Klaus Fuchs


Nancy Thorndike Greenspan - 2020
    He was convicted of treason by Britain in 1950 for handing over the designs of the plutonium bomb to the Russians, and has gone down in history as one of the most dangerous espionage agents in American and British history. He put an end to America's nuclear hegemony and single-handedly heated up the Cold War. But, was Klaus Fuchs really evil?Using archives long hidden in Germany as well as intimate correspondence, Nancy Thorndike Greenspan brings into sharp focus the moral and political ambiguity of the times in which Fuchs lived and the ideals with which he struggled. As a university student in Germany, he stood up to Nazi terror without flinching, and joined the Communists largely because they were the only ones resisting the Nazis. After escaping to Britain, he was arrested as a German �migr�--an "enemy alien"--and sent to an internment camp in Canada. His mentor at university, Max Born, worked to facilitate his release. After years of struggle and ideological conflict, when he joined the atomic bomb project, first in Manhattan and later at Los Alamos, his loyalties were firmly split. In 1944, in New York with the British Scientific Mission, he started handing over research, partly because of his Communist convictions but seemingly also to level the playing field of the world powers.With thrilling detail from never-before-seen archives, Atomic Spy places readers in the Germany of an ascendant Nazi party; the British university classroom of Max Born; a British internment camp in Canada; the secret laboratories of Los Alamos; and Eastern Germany at the height of the Cold War. Atomic Spy shows the real Klaus Fuchs--who he was, what he did, why he did it, and how he was caught. His extraordinary life is a cautionary tale about morality and the prisms through which we perceive it--and a classic anti-hero story.

Gunwitch: Rebirth


Niall Teasdale - 2016
    She wanted to keep her city safe form those who wanted to bring it down. She wanted to follow in her brother’s footsteps, fight the good fight, even if her father would have preferred that she stay home. And in many ways, Annette got wanted she wanted. But she had to be reborn as Louise, the Gunwitch, before it could happen.

Dark Alliance: The CIA, the Contras, and the Crack Cocaine Explosion


Gary Webb - 1998
    A simple phone call concerning an unexceptional pending drug trial turned into a massive conspiracy involving the Nicaraguan Contra rebels, L.A. and Bay Area crack cocaine dealers, and the Central Intelligence Agency. For several years during the 1980s, Webb discovered, Contra elements shuttled thousands of tons of cocaine into the United States, with the profits going toward the funding of Contra rebels attempting a counterrevolution in their Nicaraguan homeland. Even more chilling, Webb quickly realized, was that the massive drug-dealing operation had the implicit approval--and occasional outright support--of the CIA, the very organization entrusted to prevent illegal drugs from being brought into the United States.Within the pages of Dark Alliance, Webb produces a massive amount of evidence that suggests that such a scenario did take place, and more disturbing evidence that the powers that be that allowed such an alliance are still determined to ruthlessly guard their secrets. Webb's research is impeccable--names, dates, places, and dollar amounts gather and mount with every page, eventually building a towering wall of evidence in support of his theories. After the original series of articles ran in the Mercury-News in late 1996, both Webb and his paper were so severely criticized by political commentators, government officials, and other members of the press that his own newspaper decided it best not to stand behind the series, in effect apologizing for the assertions and disavowing his work. Webb quit the paper in disgust in November 1997. His book serves as both a complex memoir of the time of the Contras and an indictment of the current state of America's press; Dark Alliance is as necessary and valuable as it is horrifying and grim. --Tjames Madison --This text refers to an out of print or unavailable edition of this title.

Sanction


William Hunter - 2017
    With his cover blown, Garrett is on the run from an assassin desperate to erase his tracks, and authorities who believe he is responsible for the murder. Banastre Montjoy, a burned-out head of section at the Secret Intelligence Service, is in a race himself to discover if the scholar's death is linked to a bombing of the London Underground a year earlier. Montjoy's nemesis, the power-hungry and scheming Berwyn Rees, seeks to drum his rival out of MI6, while maneuvering to become deputy chief.With time running out, SOG operators are sent in by the CIA to locate and extract Garrett. As Laurent, MI5, and Scotland Yard close in on their target, Montjoy uncovers a devastating secret, one that someone inside the British government has sought to keep buried since World War II.