Legacy of Ashes: The History of the CIA


Tim Weiner - 2007
    Its mission was to know the world. When it did not succeed, it set out to change the world. Its failures have handed us, in the words of President Eisenhower, “a legacy of ashes.”Now Pulitzer Prize–winning author Tim Weiner offers the first definitive history of the CIA—and everything is on the record. LEGACY OF ASHES is based on more than 50,000 documents, primarily from the archives of the CIA itself, and hundreds of interviews with CIA veterans, including ten Directors of Central Intelligence. It takes the CIA from its creation after World War II, through its battles in the cold war and the war on terror, to its near-collapse after September 11th, 2001.Tim Weiner’s past work on the CIA and American intelligence was hailed as “impressively reported” and “immensely entertaining” in The New York Times.The Wall Street Journal called it “truly extraordinary . . . the best book ever written on a case of espionage.” Here is the hidden history of the CIA: why eleven presidents and three generations of CIA officers have been unable to understand the world; why nearly every CIA director has left the agency in worse shape than he found it; and how these failures have profoundly jeopardized our national security.

Manhunt: The Ten-Year Search for Bin Laden--from 9/11 to Abbottabad


Peter L. Bergen - 2012
    Other key elements of the book will include:A careful account of Obama’s decision-making process as the raid was plannedThe fascinating story of a group of CIA analysts—largely women—who never gave up assembling the tiniest clues about OBL’s whereaboutsThe untold and action-packed history of the Joint Special Operations Command (JSOC) and the SEALsAn analysis of what the death of OBL means for al Qaeda, and for Obama’s legacy. Just as Too Big to Fail captured, in riveting detail, the anatomy of this decade’s financial disaster, so too is Manhunt one of the key stories of this decade: the authoritative, immersive account of the operation that killed the man who organized the largest mass murder in American history.

Reign of Terror: How the 9/11 Era Destabilized America and Produced Trump


Spencer Ackerman - 2021
    In addition to multiple ground wars, it has pioneered drone strikes and industrial-scale digital surveillance, as well as detaining people indefinitely and torturing them. These conflicts have yielded neither peace nor victory, but they have transformed America. What began as the persecution of Muslims and immigrants has become a normalized, paranoid feature of American politics and security, expanding the possibilities for applying similar or worse measures against other targets at home. A politically divided country turned the War on Terror into a cultural and then tribal struggle, first on the ideological fringes and ultimately expanding to conquer the Republican Party, often with the timid acquiescence of the Democratic Party. Today's nativist resurgence walked through a door opened by the 9/11 era.Reign of Terror will show how these policies created a foundation for American authoritarianism and, though it is not a book about Donald Trump, it will provide a critical explanation of his rise to power and the sources of his political strength. It will show that Barack Obama squandered an opportunity to dismantle the War on Terror after killing Osama bin Laden. That mistake turns out to have been portentous. By the end of his tenure, the war metastasized into a broader and bitter culture struggle in search of a demagogue like Trump to lead it.A union of journalism and intellectual history, Reign of Terror will be a pathbreaking and definitive book with the power to transform how America understands its national security policies and their catastrophic impact on its civic life.

Dark Mirror: Edward Snowden and the American Surveillance State


Barton Gellman - 2020
    Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio

The Snowden Files: The Inside Story of the World's Most Wanted Man


Luke Harding - 2014
    The consequences have shaken the leaders of nations worldwide. This is the inside story of Snowden's deeds and the journalists who faced down pressure from the US and UK governments to break a remarkable scoop.From the day he left his glamorous girlfriend in Hawaii, carrying a hard drive full of secrets, to the weeks of secret-spilling in Hong Kong and his battle for asylum, Snowden's story reads like a globe-trotting thriller.

The Art of Intelligence


Henry A. Crumpton - 2012
    In the days after 9/11, the CIA tasked Crumpton to organize and lead the Afghanistan campaign. With Crumpton's strategic initiative and bold leadership, from the battlefield to the Oval Office, U.S. and Afghan allies routed al Qaeda and the Taliban in less than ninety days after the Twin Towers fell. At the height of combat against the Taliban in late 2001, there were fewer than five hundred Americans on the ground in Afghanistan, a dynamic blend of CIA and Special Forces. The campaign changed the way America wages war. This book will change the way America views the CIA.The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAV Predator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.No book like The Art of Intelligence has ever been written-not with Crumpton's unique perspective, in a time when America faced such grave and uncertain risk. It is an epic, sure to be a classic in the annals of espionage and war.

The Untold History of The United States


Oliver Stone - 2012
    Most are loathe to admit that the United States has any imperial pretensions. But history tells a different story as filmmaker Oliver Stone and historian Peter Kuznick reveal in this riveting account of the rise and decline of the American empire.Aided by the latest archival findings and recently declassified documents and building on the research of the world’s best scholars, Stone and Kuznick construct an often shocking but meticulously documented “People’s History of the American Empire” that offers startling context to the Bush-Cheney policies that put us at war in two Muslim countries and show us why the Obama administration has had such a difficult time cleaving a new path.Stone and Kuznick will introduce readers to a pantheon of heroes and villains as they show not only how far the United States has drifted from its democratic traditions, but the powerful forces that have struggled to get us back on track.The authors reveal that:· The atomic bombings of Hiroshima and Nagasaki were militarily unnecessary and morally indefensible.· The United States, not the Soviet Union, bore the lion’s share of responsibility for perpetuating the Cold War.· The U.S. love affair with right-wing dictators has gone as far as overthrowing elected leaders, arming and training murderous military officers, and forcing millions of people into poverty.· U.S.-funded Islamist fundamentalists, who fought against the Soviets in Afghanistan, have blown back to threaten the interests of the U.S. and its allies.· U.S. presidents, especially in wartime, have frequently trampled on the constitution and international law.· The United States has brandished nuclear threats repeatedly and come terrifyingly close to nuclear war.American leaders often believe they are unbound by history, yet Stone and Kuznick argue that we must face our troubling history honestly and forthrightly in order to set a new course for the twenty-first century. Their conclusions will challenge even experts, but there is one question only readers can answer: Is it too late for America to change?

Surveillance Valley: The Rise of the Military-Digital Complex


Yasha Levine - 2018
    This idea--using computers to spy on people and groups perceived as a threat, both at home and abroad--drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology.But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news--and the device on which you read it.

The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election


Malcolm W. Nance - 2016
    Clinton 2016 presidential election, this book exposed the Russian hacking while the CIA was drafting their own report. In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization’s computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation’s top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.Soon after, the remainder of the Democratic Party machine, the congressional campaign, the Clinton campaign, and their friends and allies in the media were also hacked. Credit cards numbers, phone numbers, and contacts were stolen. In short order, the FBI found that more than twenty-five state election offices had their voter registration systems probed or attacked by the same hackers.Western intelligence agencies tracked the hack to Russian spy agencies and dubbed them the “Cyber Bears.” The media was soon flooded with the stolen information channeled through Julian Assange, the founder of WikiLeaks. It was a massive attack on America but the Russian hacks appeared to have a singular goal—elect Donald J. Trump as president of the United States.Malcolm Nance’s fast paced real-life spy thriller takes you from Vladimir Putin’s rise through the KGB from junior officer to spymaster-in-chief and spells out the story of how he performed the ultimate political manipulation—convincing Donald Trump to abandon seventy years of American foreign policy including the destruction of NATO, cheering the end of the European Union, allowing Russian domination of Eastern Europe, and destroying the existing global order with America at its lead.The Plot to Hack America is the thrilling true story of how Putin’s spy agency, run by the Russian billionaire class, used the promise of power and influence to cultivate Trump as well as his closest aides, the Kremlin Crew, to become unwitting assets of the Russian government. The goal? To put an end to 240 years of free and fair American democratic elections.

The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency


Annie Jacobsen - 2015
    In the first-ever history about the organization, New York Times bestselling author Annie Jacobsen draws on inside sources, exclusive interviews, private documents, and declassified memos to paint a picture of DARPA, or "the Pentagon's brain," from its Cold War inception in 1958 to the present.This is the book on DARPA--a compelling narrative about this clandestine intersection of science and the American military and the often frightening results.

Overthrow: America's Century of Regime Change from Hawaii to Iraq


Stephen Kinzer - 2006
    Bush, but has been an integral part of U.S. foreign policy for more than one hundred years. Starting with the overthrow of the Hawaiian monarchy in 1893 and continuing through the Spanish-American War and the Cold War and into our own time, the United States has not hesitated to overthrow governments that stood in the way of its political and economic goals. The invasion of Iraq in 2003 is the latest, though perhaps not the last, example of the dangers inherent in these operations.In Overthrow, Stephen Kinzer tells the stories of the audacious politicians, spies, military commanders, and business executives who took it upon themselves to depose monarchs, presidents, and prime ministers. He also shows that the U.S. government has often pursued these operations without understanding the countries involved; as a result, many of them have had disastrous long-term consequences.In a compelling and provocative history that takes readers to fourteen countries, including Cuba, Iran, South Vietnam, Chile, and Iraq, Kinzer surveys modern American history from a new and often surprising perspective."Detailed, passionate and convincing . . . [with] the pace and grip of a good thriller." -- Anatol Lieven, The New York Times Book Review

Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union


Stephen Budiansky - 2016
    The National Security Agency grew out of the legendary codebreaking programs of World War II that turned the tide of Allied victory by cracking the famed Enigma machine and other seemingly impenetrable German and Japanese codes. But things became murky in the postwar years, when our intelligence community found itself targeting not battlefield enemies, but suspected spies, foreign leaders, and even American citizens. Now Stephen Budiansky--a longtime expert in cryptology--tells the fascinating story of how the NSA came to be, and of its central, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond. He also guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. A riveting, essential history of the underbelly of the Cold War.

The Pentagon Papers


Neil Sheehan - 1971
    'The Washington Post' called them "the most significant material in American history" and they remain relevant today as a reminder of the importance of a free press and First Amendment rights. 'THE PENTAGON PAPERS' demonstrated that the government had systemically lied to both the public and to Congress.THIS INCOMPARABLE VOLUME INCLUDES:• The Truman and Eisenhower Years: 1945-1960 by Fox Butterfield• Origins of the insurgency in South Vietnam by Fox Butterfield• The Kennedy Years: 1961-1963 by Hedrick Smith• The Overthrow of Ngo Dinh Diem: May-November, 1963 by Hedrick Smith• The Covert War and Tonkin Gulf: February-August, 1964 by Neil Sheehan• The Consensus to Bomb North Vietnam: August, 1964-February, 1965 by Neil Sheehan• The Launching of the Ground War: March-July, 1965 by Neil Sheehan• The Buildup: July, 1965-September, 1966 by Fox Butterfield• Disenchantment: October, 1966-May, 1967 by Hedrick Smith• The Tet Offensive and the Turnaround by E.W. Kenworthy• Analysis and Comment• Court Records• Biographies of Key FiguresWith a brand-new foreword by James L. Greenfield, this edition of the Pulitzer Prize-winning story is sure to provoke discussion about free press and government deception, and shed some light on issues in the past and the present so that we can better understand and improve the futureRUNNING TIME ⇒ 37hrs.©2018 Neil Sheehan, E.W. Kenworthy, Fox Butterfield, Hendrick Smith (P)2018 Brilliance Audio, Inc., all rights reserved.

The Assassination Complex: Inside the Government's Secret Drone Warfare Program


Jeremy Scahill - 2016
    A must-read for concerned citizens” (Library Journal, starred review) from bestselling author Jeremy Scahill and his colleagues at the investigative website The Intercept.Drones are a tool, not a policy. The policy is assassination. But drone strikes often kill people other than the intended target. These deaths, which have included women and children, dwarf the number of actual combatants who have been assassinated by drones. They have generated anger toward the United States among foreign populations and have even become a recruiting tool for jihadists.The first drone strike outside a declared war zone was conducted more than twelve years ago, but it was not until May 2013 that the White House released a set of standards and procedures for conducting such strikes. However, there was no explanation of the internal process used to determine whether a suspect should be killed without being indicted or tried, even if that suspect is an American citizen. The implicit message of the Obama administration has been: Trust, but don’t verify. The Assassination Complex reveals stunning details of the government’s secretive drone warfare program based on documents supplied by a confidential source in the intelligence community. These documents make it possible to begin the long-overdue debate about the policy of drone warfare and how it is conducted. The Assassination Complex allows us to understand at last the circumstances under which the US government grants itself the right to sentence individuals to death without the established checks and balances of arrest, trial, and appeal—“readers will be left in no doubt that drone warfare affronts morality and the Constitution” (Kirkus Reviews).

National Security and Double Government


Michael J. Glennon - 2014
    security policy scarcely changed from the Bush to the Obama administration? National Security and Double Government offers a disquieting answer. Michael J. Glennon challenges the myth that U.S. security policy is still forged by America's visible, Madisonian institutions - thePresident, Congress, and the courts. Their roles, he argues, have become largely illusory. Presidential control is now nominal, congressional oversight is dysfunctional, and judicial review is negligible. The book details the dramatic shift in power that has occurred from the Madisonian institutionsto a concealed Trumanite network - the several hundred managers of the military, intelligence, diplomatic, and law enforcement agencies who are responsible for protecting the nation and who have come to operate largely immune from constitutional and electoral restraints. Reform efforts facedaunting obstacles. Remedies within this new system of double government require the hollowed-out Madisonian institutions to exercise the very power that they lack. Meanwhile, reform initiatives from without confront the same pervasive political ignorance within the polity that has given rise tothis duality. The book sounds a powerful warning about the need to resolve this dilemma-and the mortal threat posed to accountability, democracy, and personal freedom if double government persists. This paperback version features an Afterword that addresses the emerging danger posed by populistauthoritarianism rejecting the notion that the security bureaucracy can or should be relied upon to block it.