Cyberpunk: Outlaws and Hackers on the Computer Frontier


Katie Hafner - 1991
    In a book filled with as much adventure as any Ludlum novel, the authors show what motivates these young hackers to access systems, how they learn to break in, and how little can be done to stop them.

At the Abyss: An Insider's History of the Cold War


Thomas Reed - 2004
    presidents to outmaneuver the Russians, the Vietnam war, and the fall of the Berlin Wall. Original.

CIA & JFK: The Secret Assassination Files


Jefferson Morley - 2016
    Kennedy, Jefferson Morley is asked, “So who killed JFK? What’s your theory?” Morley, a former reporter for the Washington Post and author of Our Man in Mexico: Winston Scott and the Hidden History of the CIA, invariably disappoints. “I don’t know. It’s too early to tell.” Fifty-plus years after JFK’s death, this answer is laughable but serious. The JFK story remains unsettled well into the 21st century, no matter what the various conspiracy and anti-conspiracy theorists may proclaim. Indeed, the complex reality of how a president of the United States came to be gunned down on a sunny day, and no one lost his liberty — or his job — continues to live and grow in popular memory. This is a book that reveals deceit and deception on the part of the CIA relating to the Kennedy assassination and why the CIA should reveal to the American people what it is still keeping secret. Employing his investigative reporting skills through interviews and examination of long-secret records, Morley reveals that the CIA was closely monitoring the movements of accused assassin Lee Harvey Oswald in the months preceding the assassination of President Kennedy. Questions naturally arise: Did the CIA suspect that Oswald was up to no good? Or was its surveillance part of a CIA scheme to frame Oswald for the assassination of President Kennedy? Why did the CIA keep its surveillance secret from the Warren Commission?Morley also reveals a close relationship between the CIA and an American anti-Castro group that began advertising Oswald’s connections to communism and the Soviet Union immediately after the assassination? That raises questions: Why didn’t the CIA reveal that relationship to official agencies investigating the assassination of President Kennedy? Why did a federal judge and the chief counsel of the House Select Committee on Assassinations accuse the CIA of deceit and deception?The U.S. government retains almost 3,600 assassination-related records, consisting of tens of thousands of pages that have never been seen by the public. More than 1,100 of these records are held by the CIA.What is in those secret files? What do they reveal about JFK’s death? Why has the CIA been so reluctant to release them? And when will they finally be revealed to the public? Will they answer the disturbing questions that the revelations in this book raise?

The Spy in a Box


Ralph Dennis - 2019
     Will Hall is a CIA agent in a South American country on the brink of Civil War. But when the moderate, rebel leader that Hall covertly supported is assassinated, the spy resigns and retreats to a cabin in the North Carolina woods. His quiet, civilian life is shattered when an unknown adversary frames him for revealing Agency secrets, putting a kill-on-sight target on his back. Hall runs in a global chase to evade death, clear his name, and free himself from the flawless "box job" that could become his coffin. Praise for Ralph Dennis: "A breathless, lean noir thriller. Every line is razor sharp. Jason Bourne fans will find a lot to like." Publishers Weekly "Ralph Dennis has mastered the genre and supplied top entertainment." New York Times "Believable and constantly thrilling." The Spy Guys & Gals Site "His prose is muscular, swift and highly readable. " Joe R. Lansdale, New York Times bestselling author "Exceptional characterization, strong and vigorous prose." Mystery Scene Magazine "Straight-up, hardboiled crime fiction, written in a tight, evocative voice with a wicked, dark sense of humor." Lee Goldberg, New York Times bestselling author

The Sympathy Wave


P.R. Ganapathy - 2013
    Rohit is not just his party’s next Prime Ministerial candidate, but also a reluctant heir to his family’s political legacy. Soon after, the wreckage of the plane is discovered scattered over the Rajasthan desert, sending the media as well the nation’s public into a tizzy. As Rohit’s sister sweeps the general elections, riding a massive wave of public sympathy, some uncomfortable questions remain. Who is behind this audacious plan? What could be the reason behind this high-profile assassination? The proverbial finger seems to point at India’s geopolitical enemy, Pakistan, but not everyone is convinced. Anwar Islam reunites with his mentor Colonel Vijay Gupta, and his friend Vishal Karandikar to find the missing pieces of this puzzle. As the trio explores the dark alleys hidden behind the façade of India’s seat of power, unbelievable conspiracies come to light. A gripping thriller, The Sympathy Wave takes it reader into the heart of political India to uncover a nest of intrigues.

Zeroes


Chuck Wendig - 2015
    government, forced to work as white-hat hackers for Uncle Sam in order to avoid federal prison. At a secret complex known only as "the Lodge," where they will spend the next year working as an elite cyber-espionage team, these misfits dub themselves "the Zeroes."But once the Zeroes begin to work, they uncover secrets that would make even the most dedicated conspiracy theorist's head spin. And soon they're not just trying to serve their time, they're also trying to perform the ultimate hack: burrowing deep into the U.S. government from the inside, and hoping they'll get out alive. Packed with electric wit and breakneck plot twists, Zer0es is an unforgettable thrill ride through the seedy underbelly of "progress."

Inside Cyber Warfare: Mapping the Cyber Underworld


Jeffrey Carr - 2009
    You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Married to the Mossad: An Espionage and Crime Thriller


Shalva Hessel - 2017
    Strong willed as she is, she is not easily deterred. When Jerry is sent on a deep cover mission to a Muslim country under the guise of a European businessman, she insists on joining him with the full knowledge that her life as well as that of her family would be in danger. Would you risk it all for exciting experiences that accompany life undercover? After “living on the edge,” Sally is unable to live her quiet life as a wife, mother, and computer administrator at an insurance company. She yearns for thrills. So when Sally discovers a plot to defraud the Swiss billionaire who had funded her studies as a young woman, she jumps at the opportunity and calls forth all she had learned during her time undercover to face a ruthless and determined enemy bent on destroying anyone in his path. The threats Sally faces grow as she delves deeper into a complex web of seduction, love, intrigue, passion, and espionage. Reality becomes an intricate riddle that will test the bonds of her marriage and will demand all her courage and audacity to resolve. Scroll up to grab your copy of Married to the Mossad now!

The Hacker Ethic: A Radical Approach to the Philosophy of Business


Pekka Himanen - 2001
    Being a hacker has nothing to do with cyberterrorism, and it doesn’t even necessarily relate to the open-source movement. Being a hacker has more to do with your underlying assumptions about stress, time management, work, and play. It’s about harmonizing the rhythms of your creative work with the rhythms of the rest of your life so that they amplify each other. It is a fundamentally new work ethic that is revolutionizing the way business is being done around the world.Without hackers there would be no universal access to e-mail, no Internet, no World Wide Web, but the hacker ethic has spread far beyond the world of computers. It is a mind-set, a philosophy, based on the values of play, passion, sharing, and creativity, that has the potential to enhance every individual’s and company’s productivity and competitiveness. Now there is a greater need than ever for entrepreneurial versatility of the sort that has made hackers the most important innovators of our day. Pekka Himanen shows how we all can make use of this ongoing transformation in the way we approach our working lives.

Cassidy's Run: The Secret Spy War Over Nerve Gas


David Wise - 2000
    At the highest levels of the government, its code name was Operation Shocker. Lured by a double agent working for the USA, ten Russian spies, including a University of Minnesota professor, his wife & a classic sleeper spy in NYC, were sent by Moscow to penetrate America's secrets. Two FBI agents were killed & secret formulae were passed to the USSR in a dangerous ploy that may have spurred Moscow to create the world's most powerful nerve gas. Cassidy's Run tells this true story for the 1st time, following a trail that leads from DC to Moscow, with detours to Florida, Minnesota & Mexico. Based on documents secret until now & scores of interviews in the USA & USSR, the book reveals that: more than 4500 pages of classified documents, including US nerve gas formulas, were passed to the USSR in exchange for hundreds of thousands of dollars; an Armageddon code: a telephone call to a number in NYC, was to alert the sleeper spy to an impending nuclear attack--a warning he would transmit to the Soviets by radio signal from atop a rock in Central Park; two FBI agents were killed when their plane crashed during surveillance of one of the spies as he headed for the Canadian border; secret drops for microdots were set up by Moscow from NY to Florida to DC. More than a cloak-&-dagger tale, Cassidy's Run is the story of one ordinary man, Sergeant Joe Cassidy, not trained as a spy, who suddenly found himself the FBI's secret weapon in a dangerous clandestine war.

The Bletchley Girls


Tessa Dunlop - 2015
    Many were just school girls at the outbreak of war; the next six years would change their lives forever. This vivid portrayal of their experiences, sacrifices, and memories is a poignant reminder that without the work of thousands of young women Bletchley Park's extraordinary achievements would not have been possible. By meeting and talking to these fascinating female secret-keepers who are still alive today, Tessa Dunlop captures their extraordinary journeys into an adult world of war, secrecy, love, and loss. Through the voices of the women themselves, this is the story of life at Bletchley Park beyond the celebrated code-breakers; it's the story of the girls behind Britain's ability to consistently outsmart the enemy.

Moscow, Midnight


John Cody Fidler-Simpson - 2018
    The coroner rules it an accident, a sex game gone wrong. Jon Swift is from the old stock of journos - cynical, cantankerous and overweight - and something about his friend's death doesn't seem right. Then days after Macready's flat is apparently burgled, Swift discovers that his friend had been researching a string of Russian government figures who had met similarly 'accidental' fates. When the police refuse to investigate further, Swift gets in touch with his contacts in Moscow, determined to find out if his hunch is correct. Following the lead, he is soon drawn into a violent underworld, where whispers of conspiracies, assassinations and double-agents start blurring the line between friend and foe.But the truth will come at a price, and it may cost him everything.

Tor and The Dark Net: Remain Anonymous Online and Evade NSA Spying (Tor, Dark Net, Anonymous Online, NSA Spying)


James Smith - 2016
    Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you. This is a very simple scenario that just scratches the surface of reasons to stay anonymous but the point remains the same. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN's, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you. Bonus download included in the book! (Step-by-step guide to setup TOR) A Preview of What You Will Learn ✔ How to Remain COMPLETELY Anonymous ✔ Exactly What Tor, VPN's, and PGP Are. ✔ How To Setup and Use Tor Correctly For Maximum Safety ✔ Key Mistakes To Avoid ✔ The Real Capabilities of The NSA ✔ Much, much more! Take back your privacy today. Scroll up and buy this book!

Stealing the Network: How to Own an Identity


Raven Alder - 2005
    Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

Hunting Aquila


James Hume - 2017
    Porritt has no leads until Jane, a young British translator, unwittingly gets caught up with a German spy trying to flee the country. Can Porritt use his Special Branch teams in Glasgow, Yorkshire, London and Belfast to rescue Jane and smash the undercover spy organisation before Churchill’s invasion plans get leaked? This deftly plotted, action-packed spy thriller is full of twists and turns. Carefully weaving fact and fiction, it provides powerful and intriguing lessons that still apply in today’s changing world.