Book picks similar to
The Secret Sentry: The Untold History of the National Security Agency by Matthew M. Aid
history
non-fiction
intelligence
espionage
Cyberwar: The Next Threat to National Security & What to Do About It
Richard A. Clarke - 2010
Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.
The Perfect Weapon: How the Cyber Arms Race Set the World Afire
David E. Sanger - 2018
The Perfect Weapon is the riveting story of how, in less than a decade, cyberwarfare displaced terrorism and nuclear attacks as the greatest threat to American national security. Cheap to acquire, difficult to defend against, and designed to shield their user's identities so as to complicate retaliation, these weapons are capable of an unprecedented range of offensive tactics; they can take us just short of war, allowing for everything from disruption to theft to the cause of widespread damage of essential infrastructure systems. And the vulnerability of those systems has created a related but equally urgent conflict: American companies like Apple and Cisco must claim allegiance to no government in the name of selling secure products around the globe yet the US intelligence agencies want the help of such companies in defending against future cyberattacks. Reported and written with unprecedented access by New York Times chief Washington correspondent and bestselling author David Sanger, The Perfect Weapon takes readers inside war rooms and boardrooms, into the secret cyberdens of American and Chinese military, to give the deep-background story of the increasingly pitched battle between nations, their governments, their cyberwarriors, and their corporations.
The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency
Annie Jacobsen - 2015
In the first-ever history about the organization, New York Times bestselling author Annie Jacobsen draws on inside sources, exclusive interviews, private documents, and declassified memos to paint a picture of DARPA, or "the Pentagon's brain," from its Cold War inception in 1958 to the present.This is the book on DARPA--a compelling narrative about this clandestine intersection of science and the American military and the often frightening results.
The Very Best Men: The Daring Early Years of the CIA
Evan Thomas - 1995
Evan Thomas re-creates the personal dramas and sometimes tragic lives of Frank Wisner, Richard Bissell, Tracy Barnes, and Desmond FitzGerald, who risked everything to contain the Soviet threat.Within the inner circles of Washington, they were regarded as the best and the brightest. They planned and acted to keep the country out of war—by stealth and “political action” and to do by cunning and sleight of hand what great armies could not, must not be allowed to do. In the end, they were too idealistic and too honorable, and were unsuited for the dark, duplicitous life of spying. Their hubris and naïveté led them astray, producing both sensational coups and spectacular blunders like the Bay of Pigs and the failed assassination attempts on foreign leaders in the early 1960s. Thomas draws on the CIA's own secret histories, to which he has had exclusive access, as well as extensive interviews, to bring to life a crucial piece of American history.
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat
John P. Carlin - 2018
We've seen North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage against American companies, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us.As the former Assistant Attorney General and Chief of Staff to FBI Director Robert Mueller, John Carlin has spent 15 years on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his years-long secret battle to keep America safe, and warns us of the perils that await us as we embrace the latest digital novelties -- smart appliances, artificial intelligence, self-driving cars -- with little regard for how our enemies might compromise them. The potential targets for our enemies are multiplying: our electrical grid, our companies, our information sources, our satellites. As each sector of the economy goes digital, a new vulnerability is exposed.The Internet of Broken Things makes the urgent case that we need to start innovating more responsibly. As a fleet of web-connected cars and pacemakers rolls off the assembly lines, the potential for danger is overwhelming. We must see and correct these flaws before our enemies exploit them.
Playing to the Edge: American Intelligence in the Age of Terror
Michael V. Hayden - 2016
Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America. "Play to the edge" was Hayden's guiding principle when he ran the National Security Agency, and it remained so when he ran CIA. In his view, many shortsighted and uninformed people are quick to criticize, and this book will give them much to chew on but little easy comfort; it is an unapologetic insider's look told from the perspective of the people who faced awesome responsibilities head on, in the moment. How did American intelligence respond to terrorism, a major war and the most sweeping technological revolution in the last 500 years? What was NSA before 9/11 and how did it change in its aftermath? Why did NSA begin the controversial terrorist surveillance program that included the acquisition of domestic phone records? What else was set in motion during this period that formed the backdrop for the infamous Snowden revelations in 2013? As Director of CIA in the last three years of the Bush administration, Hayden had to deal with the rendition, detention and interrogation program as bequeathed to him by his predecessors. He also had to ramp up the agency to support its role in the targeted killing program that began to dramatically increase in July 2008. This was a time of great crisis at CIA, and some agency veterans have credited Hayden with actually saving the agency. He himself won't go that far, but he freely acknowledges that CIA helped turn the American security establishment into the most effective killing machine in the history of armed conflict. For 10 years, then, General Michael Hayden was a participant in some of the most telling events in the annals of American national security. General Hayden's goals are in writing this book are simple and unwavering: No apologies. No excuses. Just what happened. And why. As he writes, "There is a story here that deserves to be told, without varnish and without spin. My view is my view, and others will certainly have different perspectives, but this view deserves to be told to create as complete a history as possible of these turbulent times. I bear no grudges, or at least not many, but I do want this to be a straightforward and readable history for that slice of the American population who depend on and appreciate intelligence, but who do not have the time to master its many obscure characteristics."
Dred Scott's Revenge: A Legal History of Race and Freedom in America
Andrew P. Napolitano - 2009
But American governments legally suspended the free will of blacks for 150 years, and then denied blacks equal protection of the law for another 150 years. How did this happen in America, how were the Constitution and laws of the land twisted so as to institutionalize racism, and how did it or will it end? In a refreshingly candid book, Dred Scott's Revenge: A Legal History of Race and Freedom In America, Judge Andrew P. Napolitano takes a no-holds-barred look at the role of the government in the denial of freedoms based on race.
Dark Territory: The Secret History of Cyber War
Fred Kaplan - 2016
The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.
Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union
Stephen Budiansky - 2016
The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how the NSA came to be, and of its central, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. He also guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. A riveting, essential history of the underbelly of the Cold War.
The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
James Bamford - 2008
Now Bamford describes the transformation of the NSA since 9/11, as the agency increasingly turns its high-tech ears on the American public.The Shadow Factory reconstructs how the NSA missed a chance to thwart the 9/11 hijackers and details how this mistake has led to a heightening of domestic surveillance. In disturbing detail, Bamford describes exactly how every American’s data is being mined and what is being done with it. Any reader who thinks America’s liberties are being protected by Congress will be shocked and appalled at what is revealed here.From the Trade Paperback edition.
The Good Spy: The Life and Death of Robert Ames
Kai Bird - 2014
It marked the beginning of Hezbollah as a political force, but even more important, it eliminated America’s most influential and effective intelligence officer in the Middle East – CIA operative Robert Ames. What set Ames apart from his peers was his extraordinary ability to form deep, meaningful connections with key Arab intelligence figures. Some operatives relied on threats and subterfuge, but Ames worked by building friendships and emphasizing shared values – never more notably than with Yasir Arafat’s charismatic intelligence chief and heir apparent Ali Hassan Salameh (aka “The Red Prince”). Ames’ deepening relationship with Salameh held the potential for a lasting peace. Within a few years, though, both men were killed by assassins, and America’s relations with the Arab world began heading down a path that culminated in 9/11, the War on Terror, and the current fog of mistrust. Bird, who as a child lived in the Beirut Embassy and knew Ames as a neighbor when he was twelve years old, spent years researching The Good Spy. Not only does the book draw on hours of interviews with Ames’ widow, and quotes from hundreds of Ames’ private letters, it’s woven from interviews with scores of current and former American, Israeli, and Palestinian intelligence officers as well as other players in the Middle East “Great Game.” What emerges is a masterpiece-level narrative of the making of a CIA officer, a uniquely insightful history of twentieth-century conflict in the Middle East, and an absorbing hour-by-hour account of the Beirut Embassy bombing. Even more impressive, Bird draws on his reporter’s skills to deliver a full dossier on the bombers and expose the shocking truth of where the attack’s mastermind resides today.
George Washington's Secret Six: The Spy Ring That Saved the American Revolution
Brian Kilmeade - 2013
The Culper spies represent all the patriotic Americans who give so much for their country but, because of the nature of their work, will not or cannot take a bow or even talk about their missions. Brian Kilmeade When General George Washington beat a hasty retreat from New York City in August 1776, many thought the American Revolution might soon be over. Instead, Washington rallied thanks in large part to a little-known, top-secret group called the Culper Spy Ring.Washington realized that he could not beat the British with military might, so he recruited a sophisticated and deeply secretive intelligence network to infiltrate New York. So carefully guarded were the members identities that one spy s name was not uncovered until the twentieth century, and one remains unknown today. But by now, historians have discovered enough information about the ring s activities to piece together evidence that these six individuals turned the tide of the war.Drawing on extensive research, Brian Kilmeade and Don Yaeger have painted compelling portraits of George Washington s secret six:Robert Townsend, the reserved Quaker merchant and reporter who headed the Culper Ring, keeping his identity secret even from Washington; Austin Roe, the tavern keeper who risked his employment and his life in order to protect the mission; Caleb Brewster, the brash young longshoreman who loved baiting the British and agreed to ferry messages between Connecticut and New York; Abraham Woodhull, the curmudgeonly (and surprisingly nervous) Long Island bachelor with business and family excuses for traveling to Manhattan; James Rivington, the owner of a posh coffeehouse and print shop where high-ranking British officers gossiped about secret operations; Agent 355, a woman whose identity remains unknown but who seems to have used her wit and charm to coax officers to share vital secrets.In" George Washington s Secret Six," Townsend and his fellow spies finally receive their due, taking their place among the pantheon of heroes of the American Revolution."
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Landslide: The Unmaking of the President, 1984-1988
Jane Mayer - 1988
Then came the Iran-Contra scandal, and his once-charmed presidency began coming apart. This explosive book provides the first authoritative account of Reagan's second term White House--a book that is both a gripping narrative and a carefully documented investigation. 8-page photo insert.
The Phoenix Program: America's Use of Terror in Vietnam
Douglas Valentine - 1990
Between 1965 and 1972, more than eighty thousand noncombatants were “neutralized,” as men and women alike were subjected to extended imprisonment without trial, horrific torture, brutal rape, and in many cases execution, all under the watchful eyes of US government agencies.Based on extensive research and in-depth interviews with former participants and observers, Douglas Valentine’s startling exposé blows the lid off of what was possibly the bloodiest and most inhumane covert operation in the CIA’s history.The ebook edition includes “The Phoenix Has Landed,” a new introduction that addresses the “Phoenix-style network” that constitutes America’s internal security apparatus today. Residents on American soil are routinely targeted under the guise of protecting us from terrorism—which is why, more than ever, people need to understand what Phoenix is all about.