Spycraft Rebooted: How Technology is Changing Espionage
Edward Lucas - 2018
Once, intelligence operations could employ James Bond-style forgeries and disguises to infiltrate a target, but modern-day spies must succeed at the seemingly impossible: to hide in plain sight in a world where everything is visible.Our technology-reliant lives are a trail of electronic interactions; from card payments to CCTV, we leave involuntary and often unwitting digital footprints. Faking this online trail is hard, while the lack of one is dangerously conspicuous. When even an expertly forged ID has little chance against biometric databases and facial recognition technology, how can open societies’ intelligence agencies continue to operate undercover?In this gripping, meticulously researched study, drawing on numerous real-life cases, Edward Lucas, an acclaimed espionage expert, tracks the changing landscape of international spycraft—and highlights the West’s growing disadvantage against its autocratic adversaries.
The Masada Complex
Avraham Azrieli - 2010
– President Barack Obama calls America’s alliance with Israel “unshakeable.” The Masada Complex questions this assertion with a realistic political thriller taking place in Arizona, Washington and Jerusalem.The Masada Complex unveils a chilling scenario. Its hero is Masada El-Tal, a beautiful Israeli expatriate, currently an investigative reporter in Arizona. Her exposure of a bribe payment causes a disgraced U.S. senator to commit suicide. Angered by Israel’s supposed culpability, an angry Congress moves to terminate all military aid to the Jewish state. At the same time, someone repeatedly attempts to assassinate Masada, whose relentless investigation becomes a race against time, leading to a shocking discovery and a spectacular climax.
The Moscow Whisper (Sean Richardson, #3)
Michael Jenkins - 2020
Hours later, with bodies strewn across a terrace, a piece of secret intelligence reveals an international plot of colossal magnitude.For disgraced agent Sean Richardson, this is the beginning of a deniable mission to infiltrate and disrupt a group of Russian mercenaries who are working clandestinely to take over a nation state.Acting covertly as an illicit arms trafficker, Sean is dropped into a deadly cauldron of terrorists and high-tech weaponry that will take a nation down. As the bullets fly and the chaos rains in, can Sean take down the merchants of death…..or has he finally met his match?
Just Love Me
Shenaé Hailey - 2019
From her college choice down to the flowers she'd have on her wedding day and what she'd name her children. With just a few days left before her thirtieth birthday, Hailey is in a sour mood. Her perfectly planned path has been horribly shattered by fate. Not only is she divorced, but she doesn't have any children, and she hasn't put her degree to use since she received it. Kane Travis has never been one to force anything. He's preferred going with the flow to avoid disappointment. Right after his thirtieth birthday, Kane finds himself taking inventory of all that he's accomplished in life. He doesn't regret much that he's missed out on because of his laid-back attitude, but there is one thing he's consistently regretted - not pursuing Hailey as actively as he desired to. Ten years ago, Kane and Hailey met and instantly clicked. Because of Hailey's strict plans for her life, she refused to entertain the thought of settling down with any man before finishing college. With Kane believing in things happening in their own timing, he offered what they considered to be the perfect solution - meeting up for Hailey's thirtieth birthday if they're both still single. There's just one problem - life has changed them both… and neither can say if it's for the better. Two old friends, one cabin, and zero chances of their lives not being changed. Will their old flame reignite and burn more passionately than it ever has, or will reconnecting be as impossible as capturing scattered ashes?
Love Me Right Now
B. Love - 2016
Ever. My life wasn’t set up for me to do something this taboo. This risky. This… sexy. This… reckless. As a preacher’s daughter there were just some things in this world I was not allowed or expected to do – meeting a total and complete stranger for sex was probably on the top of the list. This wasn’t planned. Okay, well maybe it was. Let me start from the beginning. Him I ain’t no fool. I know sex could never lead to love. I’ve never believed in love at first sight. So what was this that I was feeling for Akela? Akela. Even her name speaks to what she is. What she was. Alone. She didn’t know that I knew that that was what her name meant. We really didn’t know too much about each other. Just the basics. All I know is when I laid eyes on her I wanted her. And when I was inside of her I needed her. I never wanted to let her go. But she made it clear last night before we went to sleep that this was going to be a onetime thing. She wanted to forget she ever knew him. He wanted to be as close to her as her skin, yet as distant as enemies. After their night together, they are forced to be together for two months because of her accident and his career. Could a one-night stand turn into something more?
The Assassin's Prayer
Mark Allen - 2013
But some sins refuse to stay buried and Kain finds himself fighting not only a ruthless nemesis from his shadowy past, but also the scars on his soul, which are torn open by the arrival of a woman from his past. With its full-auto pace, high-powered action, and raw emotion, The Assassin's Prayer is a relentless tale of redemption for those who know that bullets sometimes speak louder than words.
Spy Game
John Fullerton - 2021
The Cold War is in full swing. Richard Brodick decides to follow in his father’s footsteps and seeks an exciting role in what used to be called the Great Game, only to find that it turns out to be less of an adventure and more brutal betrayal.What he had thought would be an adventure spying on the Soviets and their Afghan communist allies turns sour when he’s ordered to kill his best friend. Will he betray his country or his friend? Which side will he choose?
The Shadowmen
David Hagberg - 2016
Early in his career, he came up against the Soviet Union's deadliest agent three times, finally killing the man in a flooded tunnel beneath the ruins of a castle in Portugal.Years have passed. The Russian's brother, Kurshin, a Spetsnaz operator twenty-five years younger than McGarvey, vows revenge. He and McGarvey are both shadowmen--living between the real world, and the world of the deep cover spy and assassin. To get McGarvey's attention, Kurshin desecrates the grave of the American's wife. McGarvey pits himself against the Russian--the man of vast experience versus the bold young man who believes he is invincible. The mano a mano begins at Arlington Cemetery and moves across Europe, from the baccarat tables of Monte Carlo to the same the Portuguese castle where the Russian's brother was killed so many years ago. Only one shadowman will be left standing.At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.
Drums of War
Timothy W. Long - 2017
A government obsessed with power. A series of coordinated attacks on the largest cities in America. Bradley Adams, a former Army veteran, and prepper, is swept up in a web of lies following a politically motivated work place shooting. When martial law is declared, his life descends into a series of nightmares from which there may be no escape. This is the story of a man dedicated to defending his family, his home, and his country. "Timothy W. Long injects a stark degree of realism into everything he writes. His horror is more horrific, his heroics more heroic, I love reading his stuff." --Peter Clines, bestselling author of the Ex-Heroes series, 14, and The Fold "Reading Timothy W. Long is like being in a knife fight that doesn't end until the last page." --Nicholas Sansbury Smith, bestselling author of The Extinction Cycle
Spider Shepherd: SAS: Volume 2
Stephen Leather - 2014
The short stories are Personal Protection, The Rope, Planning Pack, Friendly Fire, Dead Drop and Kill Zone and feature Dan "Spider" Shepherd whose adventures have been Sunday Times bestsellers. Stephen Leather is one of the UK's most successful thriller writers. He was a journalist for more than ten years on newspapers such as The Times, the Daily Mail and the South China Morning Post in Hong Kong. He has sold more than a million eBooks and was named by Bookseller magazine as one of the most influential figures in British publishing. His bestsellers have been translated into more than ten languages. He has also written for television shows such as London's Burning, The Knock and the BBC's Murder in Mind series. Two of his books, The Stretch and The Bombmaker, were made into movies.
The Key to Rebecca / The Man from St Petersburg
Ken Follett - 1994
The Man Called Kyril
John Trenhaile - 1981
He must be stopped before the leak becomes a full, raging meltdown.The KGB director turns to Ivan Bucharensky – codename Kyril – to smoke him out.Kyril becomes live bait for both sides. The British think he’s a double agent. The Russians in London know Kyril must die. The mole thinks Kyril suspects his identity.Hunted by East and West, only when the last traitor dies will Kyril know who’s won the deadliest game ever played…A classic Cold War espionage mole hunt from ‘the heir-apparent to le Carré’ (Today) lovingly reissued for a new audience with a brand new afterword from the author. Perfect for fans of Alan Furst, John le Carré and Martin Cruz Smith.
Google Hacking for Penetration Testers, Volume 1
Johnny Long - 2004
What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
The Strategist
John Hardy Bell - 2013
Her job was to solve the country's most complex and violent crimes, often with little more than a textbook profile of the perpetrator to go on. No one did it better. But after her partner's death at the hands of serial killer Daniel Sykes, she has lost faith in everything she once was.Forced to leave the Bureau under the weight of guilt, Camille returns to her childhood home, hopeful that the presence of family and friends can heal the wounds that time could not. Unfortunately, a change in scenery does not bring about a change in fortune. Less than twenty-four hours after her arrival, Camille is left to deal with yet another tragic loss - the brutal murder of her best friend in an apparent home invasion.For local police, the case is open and shut; for Camille, it is anything but.Desperate for answers, she becomes an unwitting participant in an investigation that winds through the darkest corridors of wealth, power, and political corruption. All the while, a killer waits patiently in the shadows, watching Camille's every move.With the help of a young homicide detective whose doubts about her department's case increase by the second, Camille races to uncover the true motives behind her friend's murder, even though doing so will put her on an inevitable collision course with a past that she desperately wants to leave behind.