iWar: War and Peace in the Information Age


Bill Gertz - 2017
    Covert information warfare is being waged by world powers, rogue states—such as Russia, China, Iran, and North Korea—and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States. This new type of warfare is part of the Information Age that has come to dominate our lives. In iWar, Bill Gertz describes how technology has completely revolutionized modern warfare, how the Obama administration failed to meet this challenge, and what we can and must do to catch up and triumph over this timely and important struggle.

Threat Modeling: Designing for Security


Adam Shostack - 2014
    Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

Fear: Trump in the White House


Bob Woodward - 2018
    Woodward draws from hundreds of hours of interviews with firsthand sources, meeting notes, personal diaries, files and documents. The focus is on the explosive debates and the decision-making in the Oval Office, the Situation Room, Air Force One and the White House residence.Fear is the most intimate portrait of a sitting president ever published during the president’s first years in office.

The Future of Violence: Robots and Germs, Hackers and Drones: Confronting A New Age of Threat


Benjamin Wittes - 2014
    government has harnessed the power of cutting-edge technology to awesome effect. But what happens when ordinary people have the same tools at their fingertips? Advances in cybertechnology, biotechnology, and robotics mean that more people than ever before have access to potentially dangerous technologies—from drones to computer networks and biological agents—which could be used to attack states and private citizens alike.In The Future of Violence, law and security experts Benjamin Wittes and Gabriella Blum detail the myriad possibilities, challenges, and enormous risks present in the modern world, and argue that if our national governments can no longer adequately protect us from harm, they will lose their legitimacy. Consequently, governments, companies, and citizens must rethink their security efforts to protect lives and liberty. In this brave new world where many little brothers are as menacing as any Big Brother, safeguarding our liberty and privacy may require strong domestic and international surveillance and regulatory controls. Maintaining security in this world where anyone can attack anyone requires a global perspective, with more multinational forces and greater action to protect (and protect against) weaker states who do not yet have the capability to police their own people. Drawing on political thinkers from Thomas Hobbes to the Founders and beyond, Wittes and Blum show that, despite recent protestations to the contrary, security and liberty are mutually supportive, and that we must embrace one to ensure the other. The Future of Violence is at once an introduction to our emerging world—one in which students can print guns with 3-D printers and scientists’ manipulations of viruses can be recreated and unleashed by ordinary people—and an authoritative blueprint for how government must adapt in order to survive and protect us.

Arguably: Selected Essays


Christopher Hitchens - 2011
    Topics range from ruminations on why Charles Dickens was among the best of writers and the worst of men to the haunting science fiction of J.G. Ballard; from the enduring legacies of Thomas Jefferson and George Orwell to the persistent agonies of anti-Semitism and jihad. Hitchens even looks at the recent financial crisis and argues for the enduring relevance of Karl Marx. The book forms a bridge between the two parallel enterprises of culture and politics. It reveals how politics justifies itself by culture, and how the latter prompts the former. In this fashion, Arguably burnishes Christopher Hitchens' credentials as (to quote Christopher Buckley) our "greatest living essayist in the English language."

How Music Got Free: The End of an Industry, the Turn of the Century, and the Patient Zero of Piracy


Stephen Richard Witt - 2015
    It’s about the greatest pirate in history, the most powerful executive in the music business, a revolutionary invention and an illegal website four times the size of the iTunes Music Store. Journalist Stephen Witt traces the secret history of digital music piracy, from the German audio engineers who invented the mp3, to a North Carolina compact-disc manufacturing plant where factory worker Dell Glover leaked nearly two thousand albums over the course of a decade, to the high-rises of midtown Manhattan where music executive Doug Morris cornered the global market on rap, and, finally, into the darkest recesses of the Internet.Through these interwoven narratives, Witt has written a thrilling book that depicts the moment in history when ordinary life became forever entwined with the world online — when, suddenly, all the music ever recorded was available for free. In the page-turning tradition of writers like Michael Lewis and Lawrence Wright, Witt’s deeply-reported first book introduces the unforgettable characters—inventors, executives, factory workers, and smugglers—who revolutionized an entire artform, and reveals for the first time the secret underworld of media pirates that transformed our digital lives.An irresistible never-before-told story of greed, cunning, genius, and deceit, How Music Got Free isn’t just a story of the music industry—it’s a must-read history of the Internet itself.

The Revolution Will be Digitised: Dispatches from the Information War


Heather Brooke - 2011
    Circling them is a new generation of hackers, pro-democracy campaigners and internet activists who no longer accept that the Establishment should run the show. Award-winning journalist and campaigner Heather Brooke takes us inside the Information War and explores the most urgent questions of the digital age: where is the balance between freedom and security? In an online world, does privacy still exist? And will the internet empower individuals, or usher in a new age of censorship, surveillance and oppression?

Spy Catcher: The Candid Autobiography of a Senior Intelligence Officer


Peter Wright - 1987
    Wright drew on his own experiences and research into the history of the British intelligence community. Published first in Australia, the book was banned in England (but not Scotland) due to its allegations about government policy and incidents. These efforts ensured the book's notoriety, and it earned considerable profit for Wright.

A Generation of Sociopaths: How the Baby Boomers Betrayed America


Bruce Cannon Gibney - 2017
    In A Generation of Sociopaths, Gibney examines the disastrous policies of the most powerful generation in modern history, showing how the Boomers ruthlessly enriched themselves at the expense of future generations.Acting without empathy, prudence, or respect for facts--acting, in other words, as sociopaths--the Boomers turned American dynamism into stagnation, inequality, and bipartisan fiasco. The Boomers have set a time bomb for the 2030s, when damage to Social Security, public finances, and the environment will become catastrophic and possibly irreversible--and when, not coincidentally, Boomers will be dying off. Gibney argues that younger generations have a fleeting window to hold the Boomers accountable and begin restoring America.

The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries


Andrei Soldatov - 2015
    Perhaps both. On the eighth floor of an ordinary-looking building in an otherwise residential district of southwest Moscow, in a room occupied by the Federal Security Service (FSB), is a box the size of a VHS player marked SORM. The Russian government's front line in the battle for the future of the Internet, SORM is the world's most intrusive listening device, monitoring e-mails, Internet usage, Skype, and all social networks. But for every hacker subcontracted by the FSB to interfere with Russia's antagonists abroad -- such as those who, in a massive denial-of-service attack, overwhelmed the entire Internet in neighboring Estonia -- there is a radical or an opportunist who is using the web to chip away at the power of the state at home. Drawing from scores of interviews personally conducted with numerous prominent officials in the Ministry of Communications and web-savvy activists challenging the state, Andrei Soldatov and Irina Borogan peel back the history of advanced surveillance systems in Russia. From research laboratories in Soviet-era labor camps, to the legalization of government monitoring of all telephone and Internet communications in the 1990s, to the present day, their incisive and alarming investigation into the Kremlin's massive online-surveillance state exposes just how easily a free global exchange can be coerced into becoming a tool of repression and geopolitical warfare. Dissidents, oligarchs, and some of the world's most dangerous hackers collide in the uniquely Russian virtual world of The Red Web.

Agent Zigzag: A True Story of Nazi Espionage, Love, and Betrayal


Ben Macintyre - 2007
    He was also one of the most remarkable double agents Britain has ever produced. Inside the traitor was a man of loyalty; inside the villain was a hero. The problem for Chapman, his spymasters, and his lovers was to know where one persona ended and the other began.In 1941, after training as a German spy in occupied France, Chapman was parachuted into Britain with a revolver, a wireless, and a cyanide pill, with orders from the Abwehr to blow up an airplane factory. Instead, he contacted MI5, the British Secret Service. For the next four years, Chapman worked as a double agent, a lone British spy at the heart of the German Secret Service who at one time volunteered to assassinate Hitler for his countrymen. Crisscrossing Europe under different names, all the while weaving plans, spreading disinformation, and, miraculously, keeping his stories straight under intense interrogation, he even managed to gain some profit and seduce beautiful women along the way.The Nazis feted Chapman as a hero and awarded him the Iron Cross. In Britain, he was pardoned for his crimes, becoming the only wartime agent to be thus rewarded. Both countries provided for the mother of his child and his mistress. Sixty years after the end of the war, and ten years after Chapman’s death, MI5 has now declassified all of Chapman’s files, releasing more than 1,800 pages of top secret material and allowing the full story of Agent Zigzag to be told for the first time.A gripping story of loyalty, love, and treachery, Agent Zigzag offers a unique glimpse into the psychology of espionage, with its thin and shifting line between fidelity and betrayal.

The Plot to Hack America: How Putin's Cyberspies and WikiLeaks Tried to Steal the 2016 Election


Malcolm W. Nance - 2016
    Clinton 2016 presidential election, this book exposed the Russian hacking while the CIA was drafting their own report. In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization’s computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation’s top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails.Soon after, the remainder of the Democratic Party machine, the congressional campaign, the Clinton campaign, and their friends and allies in the media were also hacked. Credit cards numbers, phone numbers, and contacts were stolen. In short order, the FBI found that more than twenty-five state election offices had their voter registration systems probed or attacked by the same hackers.Western intelligence agencies tracked the hack to Russian spy agencies and dubbed them the “Cyber Bears.” The media was soon flooded with the stolen information channeled through Julian Assange, the founder of WikiLeaks. It was a massive attack on America but the Russian hacks appeared to have a singular goal—elect Donald J. Trump as president of the United States.Malcolm Nance’s fast paced real-life spy thriller takes you from Vladimir Putin’s rise through the KGB from junior officer to spymaster-in-chief and spells out the story of how he performed the ultimate political manipulation—convincing Donald Trump to abandon seventy years of American foreign policy including the destruction of NATO, cheering the end of the European Union, allowing Russian domination of Eastern Europe, and destroying the existing global order with America at its lead.The Plot to Hack America is the thrilling true story of how Putin’s spy agency, run by the Russian billionaire class, used the promise of power and influence to cultivate Trump as well as his closest aides, the Kremlin Crew, to become unwitting assets of the Russian government. The goal? To put an end to 240 years of free and fair American democratic elections.

Black Flags, Blue Waters: The Epic History of America's Most Notorious Pirates


Eric Jay Dolin - 2018
    Best-selling author Eric Jay Dolin illustrates how American colonists at first supported these outrageous pirates in an early display of solidarity against the Crown, and then violently opposed them. Through engrossing episodes of roguish glamour and extreme brutality, Dolin depicts the star pirates of this period, among them towering Blackbeard, ill-fated Captain Kidd, and sadistic Edward Low, who delighted in torturing his prey. Also brilliantly detailed are the pirates’ manifold enemies, including colonial governor John Winthrop, evangelist Cotton Mather, and young Benjamin Franklin. Upending popular misconceptions and cartoonish stereotypes, Dolin provides this wholly original account of the seafaring outlaws whose raids reflect the precarious nature of American colonial life.

Liberty Defined: 50 Essential Issues That Affect Our Freedom


Ron Paul - 2011
    The term "Liberty" is so commonly used in our country that it has become a mere cliche. But do we know what it means? What it promises? How it factors into our daily lives? And most importantly, can we recognize tyranny when it is sold to us disguised as a form of liberty? Dr. Paul writes that to believe in liberty is not to believe in any particular social and economic outcome. It is to trust in the spontaneous order that emerges when the state does not intervene in human volition and human cooperation. It permits people to work out their problems for themselves, build lives for themselves, take risks and accept responsibility for the results, and make their own decisions. It is the seed of America. This is a comprehensive guide to Dr. Paul's position on fifty of the most important issues of our times, from Abortion to Zionism. Accessible, easy to digest, and fearless in its discussion of controversial topics, Liberty Defined sheds new light on a word that is losing its shape.

The Unexpected Spy: From the CIA to the FBI, My Secret Life Taking Down Some of the World's Most Notorious Terrorists


Tracy Walder - 2020
    In high-security, steel-walled rooms in Virginia, Walder watched al-Qaeda members with drones as President Bush looked over her shoulder and CIA Director George Tenet brought her donuts. She tracked chemical terrorists and searched the world for weapons of mass destruction. She created a chemical terror chart that someone in the White House altered to convey information she did not have or believe, leading to the Iraq invasion. Driven to stop terrorism, Walder debriefed terrorists - men who swore they’d never speak to a woman - until they gave her leads. She followed trails through North Africa, Europe, and the Middle East, shutting down multiple chemical attacks. Then Walder moved to the FBI, where she worked in counterintelligence. In a single year, she helped take down one of the most notorious foreign spies ever caught on American soil. Catching the bad guys wasn’t a problem in the FBI, but rampant sexism was. Walder left the FBI to teach young women, encouraging them to find a place in the FBI, CIA, State Department or the Senate - and thus change the world. Length: 8 hrs and 10 mins