Book picks similar to
Attribution of Advanced Persistent Threats: How to Identify the Actors Behind Cyber-Espionage by Timo Steffens
espionage
read-asap
tradecraft
waiting-reading
A Secret Life: The Polish Officer, His Covert Mission, And The Price He Paid To Save His Country
Benjamin Weiser - 2004
Despite the extreme risk to himself and his family, he contacted the American Embassy in Bonn, and arranged a secret meeting. From the very start, he made clear that he deplored the Soviet domination of Poland, and believed his country was on the wrong side of the Cold War. Over the next nine years, Kuklinski -- code name "Jack Strong" -- rose quickly in the Polish defense ministry, acting as a liaison to Moscow, and helping to prepare for a "hot war" with the West. But he also lived a life of subterfuge -- of dead drops, messages written in invisible ink, miniature cameras, and secret transmitters. In 1981, he gave the CIA the secret plans to crush Solidarity. Then, about to be discovered, he made a dangerous escape with his family to the West. He still lives in hiding in America. Kuklinski's story is a harrowing personal drama about one man's decision to betray the Communist leadership in order to save the country he loves, and the intense debate it spurred over whether he was a traitor or a patriot. Through extensive interviews and access to the CIA's secret archive on the case, Benjamin Weiser offers an unprecedented and richly detailed look at this secret history of the Cold War.
Red Sparrow Trilogy eBook Boxed Set (The Red Sparrow Trilogy)
Jason Matthews - 2018
Forced to become a “Sparrow”—a spy trained in the art of seduction to elicit information from unsuspecting marks—she’s been assigned to Nathaniel Nash, a CIA officer who handles the organization’s most sensitive Russian intelligence. The action in The Red Sparrow Trilogy careens between Russia, France, Hong Kong, Turkey, Greece, Italy, and the United States as these two young intelligence officers, trained in their respective spy schools, collide in a charged atmosphere of deception and a forbidden spiral of carnal attraction that threatens both their careers and consumes intelligence agencies from Moscow to the highest offices in the US government. In each book they confront not only the shadows and intrigues of the Russian and American intelligence networks but highly trained, cold-blooded killers assigned to destroy them. With a plot ripped from tomorrow’s headlines, and written with sophisticated brio, The Red Sparrow Trilogy has been hailed as a monumental accomplishment “as suspenseful and cinematic as the best spy movies” (The Philadelphia Inquirer); “fans of the genre’s masters including John le Carré and Ian Fleming will happily embrace Matthews’s central spy” (USA TODAY). Collected together, the three novels form a stunning masterwork of suspense, intrigue, sex, and violence.
A Spy In Vienna: A Paul Muller Novel of Political Intrigue
William N. Walker - 2018
It is the second Paul Muller novel set in Europe before World War II. Muller is recruited to become a spy to resist Hitler's campaign to absorb Austria into the German Reich and, from his perch in Vienna, finds himself at the epicenter of the desperate struggle to preserve Austrian independence. Muller plays a dangerous game in helping Austria oppose Hitler's demands and he hatches a bold plan to divert Austria's gold reserves so they stay out of Hitler's grasp. The novel captures this gripping drama in rich and vivid detail as political pressures mount and the threat of war looms. A Spy in Vienna re-creates for readers the fraught atmosphere of 1930's, when the threat of Nazi violence hung over Europe. Aficionados of that epoch will relish the authenticity of the novel, which reawakens the tensions and turbulence of the era, with its undercurrent of violence and fear. The narrative recaptures the urgency of the crisis as repeated confrontations escalated to an explosive conclusion. Today, sitting at the safe remove of eighty years, we know the outcome. Hitler's bald aggression prevailed; his takeover of Austria became a crucial stepping stone leading to World War II. But the characters in the novel know none of this; for them, the events they are caught up in are frightening and bewildering, confronting them with dire choices and fearful consequences. The novel transports the reader into that contemporary maelstrom of intrigue and danger—combining real history with a compelling story. Admirers of Paul Muller in Danzig will revel in his new adventures in Vienna, as once again he confronts Nazi tyranny.
The Ultra Secret
F.W. Winterbotham - 1974
F.W. Winterbotham, was the man responsible for the organization, distribution & security of Ultra. This is his personal account of the operation.
Secret Affairs: Britain's Collusion with Radical Islam
Mark Curtis - 2010
Exploring how the bombings of 7/7 can be traced back to groups and individuals trained and supported by Britain, Curtis draws on formerly classified government files to unravel a long history of the British government's secret collusion with and direct involvement in Islamic terrorism, from 1945 to the present day.From the overthrow of Iran's popular government during the 1950s and the rise of the Muslim Brotherhood in Syria, to Libya, Kosovo, Afghanistan and Saudi Arabia's ruthless internal oppression, Secret Affairs shows Britain's hidden hand in the rise of global terrorism. At a time when British forces are being sent to wage war in Afghanistan in increasing numbers, Mark Curtis' book shows how the seeds of today's lose-lose situation were sown a long time ago in a hidden politics as ineffective as it was immoral.
Agent Hill Super Boxset
James Hunt - 2017
These stories have accumulated over 150+ five-star reviews and have been boxed together for the first time! That's TWO COMPLETE BOOK SERIES totaling 6 NOVELS! Agent Sarah Hill loves her job. As the number one agent at the GSF, the most covert spy agency in the world that operates beyond the reach of any government, Agent Hill has to balance locating the mastermind behind the attack on the global power grid and finding her brother and his family. But for her, they’re one in the same.
Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare
Paul Rosenzweig - 2013
Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government. Disclaimer: Please note that this recording may include references to supplemental texts or print references that are not essential to the program and not supplied with your purchase.©2013 The Teaching Company, LLC (P)2013 The Great Courses
Claimed By Her Best Friend's Dad
Flora Ferrari - 2021
His daughter is my best friend, the woman who took me in when my father died in a tragic ski accident.I’m being stalked by a man who wants to do me harm, and Yasmin suggests that I take her dad’s one on one self-defense class, something he does on the side to give back to the community.At first, I think I’m imagining the blistering heat between us, but then he crushes me with his possessor’s lips and tells me that I belong to him.It isn’t right. But if it is wrong, why does it feel so perfect?I might just be a curvy nineteen year old virgin, but know I want this six foot six iron haired forty-one year alpha male.We try to fight it for my best friend’s sake, for his daughter’s sake, but our desire has different ideas.Soon we can’t stop, even as things get more and more complicated. My stalker is on the prowl. Yasmin is going to find out sooner or later.Our whole world threatens to come toppling down.But we cling to one another as though our souls were made for each other thousands of years ago, as though we don’t have a choice in the matter.Or maybe that’s just an excuse I use to justify giving into my years’ long crush on my best friend’s dad.*Claimed by Her Best Friend’s Dad is an insta-everything standalone instalove romance with a HEA, no cheating, and no cliffhanger.
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Kevin D. Mitnick - 2005
In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
A Lie Too Big to Fail: The Real History of the Assassination of Robert F. Kennedy
Lisa Pease - 2018
Pease reveals how the trial was essentially a sham, and how the prosecution did not dare to follow where the evidence led.A Lie Too Big to Fail asserts the idea that a government can never investigate itself in a crime of this magnitude. Was the convicted Sirhan Sirhan a willing participant? Or was he a mind-controlled assassin? It has fallen to independent researchers like Pease to lay out the evidence in a clear and concise manner, allowing readers to form their theories about this event. Pease places the history of this event in the context of the era and provides shocking overlaps between other high-profile murders and attempted murders of the time. Lisa Pease goes further than anyone else in proving who likely planned the assassination, who the assassination team members were, and why Kennedy was deemed such a threat that he had to be taken out before he became President of the United States.
Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Don Murdoch - 2014
The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience," so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way.
Where Seagulls Dare
Mark Farrer - 2016
SABOTAGE. THEFT. PANTO. What's the connection between a scheming Russian oligarch and his bungling henchmen, an ardent eco-protester and a faded Hollywood bombshell? And why are they leaving crime scenes all over Scotland - from Largs to Orkney, Stornoway to the Borders? And what has any of this got to do with Cullen? He just wants to be bloody left alone. It’s a series of bizarre mishaps in a plot full of incident, humour and Scottish salmon. Oh no it isn’t! OH YES IT IS!