Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer


William R. Johnson - 1987
    CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations.Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath


Ted Koppel - 2015
    Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before.  It isn’t just a scenario. A well-designed attack on just one of the nation’s three electric power grids could cripple much of our infrastructure—and in the age of cyberwarfare, a laptop has become the only necessary weapon. Several nations hostile to the United States could launch such an assault at any time. In fact, as a former chief scientist of the NSA reveals, China and Russia have already penetrated the grid. And a cybersecurity advisor to President Obama believes that independent actors—from “hacktivists” to terrorists—have the capability as well. “It’s not a question of if,” says Centcom Commander General Lloyd Austin, “it’s a question of when.”  And yet, as Koppel makes clear, the federal government, while well prepared for natural disasters, has no plan for the aftermath of an attack on the power grid.  The current Secretary of Homeland Security suggests keeping a battery-powered radio.In the absence of a government plan, some individuals and communities have taken matters into their own hands. Among the nation’s estimated three million “preppers,” we meet one whose doomsday retreat includes a newly excavated three-acre lake, stocked with fish, and a Wyoming homesteader so self-sufficient that he crafted the thousands of adobe bricks in his house by hand. We also see the unrivaled disaster preparedness of the Mormon church, with its enormous storehouses, high-tech dairies, orchards, and proprietary trucking company – the fruits of a long tradition of anticipating the worst. But how, Koppel asks, will ordinary civilians survive?With urgency and authority, one of our most renowned journalists examines a threat unique to our time and evaluates potential ways to prepare for a catastrophe that is all but inevitable.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

ISIS: The State of Terror


Jessica Stern - 2015
    It has captured the imagination of the global jihadist movement, attracting recruits in unprecedented numbers and wreaking bloody destruction with a sadistic glee that has alienated even the hardcore terrorists of its parent organization, al Qaeda.Jessica Stern and J.M. Berger, two of America’s leading experts on terrorism, dissect the new model for violent extremism that ISIS has leveraged into an empire of death in Iraq and Syria, and an international network that is rapidly expanding in the Middle East, North Africa and around the world.ISIS: The State of Terror traces the ideological innovations that the group deploys to recruit unprecedented numbers of Westerners, the composition of its infamous snuff videos, and the technological tools it exploits on social media to broadcast its atrocities, and its recruiting pitch to the world, including its success at attracting thousands of Western adherents. The authors examine ISIS’s predatory abuse of women and children and its use of horror to manipulate world leaders and its own adherents as it builds its twisted society. The authors offer a much-needed perspective on how world leaders should prioritize and respond to ISIS’s deliberate and insidious provocations.

Inside Al Qaeda: Global Network of Terror


Rohan Gunaratna - 2002
    Based on over five years of research, Inside Al Qaeda provides the definitive story behind the rise of this small, mysterious group to the notorious organization making headlines today.

The Lessons of Terror: A History of Warfare Against Civilians


Caleb Carr - 2002
    Carr’s authoritative exploration demonstrates that the practice of terrorism, employed by national armies as well as extremists since the days of ancient Rome, is ultimately self-defeating. Far from prompting submission, it stiffens enemy resolve and never leads to long-lasting success.Controversial on its initial publication in 2002, The Lessons of Terror has been repeatedly validated by subsequent events. Carr’s analysis of individual terrorist acts, and particularly of the history of the Middle East conflict, is fundamental to a deep understanding of the roots of terrorism as well as the steps and reforms that must be taken if the continuing threat of terrorist behavior is to be met effectively today and, finally, eradicated tomorrow.

Dead Man Running


Martin McGartland - 1999
    Captured by the Provos, he escaped and was re-settled on the mainland, but later discovered that he had been deliberately sacrificed by MI5. The book also covers Martin McGartland's return back to Belfast to try and discover why MI5 had attempted to organise his execution. During his years in hiding he was arrested and taken to court many times on flawed charges brought against him by Northumbria Police. Eventually the Crown Prosecution Service, advised by Northumbria Police and MI5, ordered his trial for attempting to pervert the course of justice. The jury found Martin not guilty within 10 minutes after a 4 day trial. Both Northumbria Police and the CPS lied in Court in a desperate bid to win a conviction . Northumbria Police and the CPS even gave his name, new identity and his home address out in open court. As a direct result, the IRA tracked Martin down to his 'safehouse' and shot him six times. Northumbria Police, MI5 and the British State continue to cover up IRA involvement in Martin's attempted murder. Martin continues in his fight for truth and justice. Martin McGartland is also the author of bestselling FIFTY DEAD MEN WALKING .

WWI: Tales from the Trenches


Daniel Wrinn - 2020
    Uncover their mesmerizing, realistic stories of combat, courage, and distress in readable and balanced stories told from the front lines.Witness the creation of new technologies of destruction: tanks, planes, and submarines; machine guns and field artillery; poison gas and chemical warfare. It introduced U-boat packs and strategic bombing, unrestricted war on civilians and mistreatment of prisoners.World War I reduced Europe’s mightiest empires to rubble, killed twenty million people, and cracked the foundations of our modern world. In its wake, empires toppled, monarchies fell, and whole populations lost their national identities.If you like gripping, authentic accounts of life and combat during WWI, then you won't want to miss WWI: Tales from the Trenches.

The Dirty War


Martin Dillon - 1988
    Routledge is an imprint of Taylor & Francis, an informa company.

The 15:17 to Paris: The True Story of a Terrorist, a Train, and Three American Heroes


Anthony Sadler - 2016
    He would have succeeded except for three American friends who refused to give in to fear.On August 21, 2015, Ayoub El-Khazzani boarded train #9364 in Brussels, bound for Paris. There could be no doubt about his mission: he had an AK-47, a pistol, a box cutter, and enough ammunition to obliterate every passenger on board. Slipping into the bathroom in secret, he armed his weapons. Another major ISIS attack was about to begin.Khazzani wasn't expecting Anthony Sadler, Alek Skarlatos, and Spencer Stone. Stone was a martial arts enthusiast and airman first class in the US Air Force, Skarlatos was a member of the Oregon National Guard, and all three were fearless. But their decision-to charge the gunman, then overpower him even as he turned first his gun, then his knife, on Stone-depended on a lifetime of loyalty, support, and faith.Their friendship was forged as they came of age together in California: going to church, playing paintball, teaching each other to swear, and sticking together when they got in trouble at school. Years later, that friendship would give all of them the courage to stand in the path of one of the world's deadliest terrorist organizations.The 15:17 to Paris is an amazing true story of friendship and bravery, of near tragedy averted by three young men who found the heroic unity and strength inside themselves at the moment when they, and 500 other innocent travelers, needed it most.

Inside Terrorism


Bruce Hoffman - 1998
    In this revised edition of the classic text, Hoffman analyzes the new adversaries, motivations, and tactics of global terrorism that have emerged in recent years, focusing specifically on how al Qaeda has changed since 9/11; the reasons behind its resiliency, resonance, and longevity; and its successful use of the Internet and videotapes to build public support and gain new recruits. Hoffman broadens the discussion by evaluating the potential repercussions of the Iraqi insurgency, the use of suicide bombers, terrorist exploitation of new communications media, and the likelihood of a chemical, biological, radiological, or nuclear terrorist strike.Closer to home, Hoffman reconsiders the Timothy McVeigh case and the threats posed by American Christian white supremacists and abortion opponents as well as those posed by militant environmentalists and animal rights activists. He argues that the attacks on the World Trade Center fundamentally transformed the West's view of the terrorist threat. More relevant and necessary than ever, Inside Terrorism continues to be the definitive work on the history and future of global terrorism.

Spy Secrets That Can Save Your Life: A Former CIA Officer Reveals Safety and Survival Techniques to Keep You and Your Family Protected


Jason Hanson - 2015
    In addition to escaping handcuffs, picking locks, and spotting when someone is telling a lie, he can improvise a self-defense weapon, pack a perfect emergency kit, and disappear off the grid if necessary. He has also honed his “positive awareness”—a heightened sense of his surroundings that allows him to spot suspicious and potentially dangerous behavior—on the street, in a taxi, at the airport, when dining out, or in any other situation. In his engaging and empowering book Spy Secrets That Can Save Your Life, Jason shares this know-how with readers, revealing how to:   •  prevent home invasions, carjackings, muggings, and other violent crimes    •  run counter-surveillance and avoid becoming a soft target    •  recognize common scams at home and abroad    •  become a human lie detector in any setting, including business negotiations    •  gain peace of mind by being prepared for anything instead of uninformed or afraid With the skill of a trained operative and the relatability of a suburban dad, Jason Hanson brings his top-level training to everyday Americans in this must-have guide to staying safe in an increasingly dangerous world.

America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare


Joel Brenner - 2011
    An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.

The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization


James Bamford - 1982
    The NSA has long eluded public scrutiny, but The Puzzle Palace penetrates its vast network of power and unmasks the people who control it, often with shocking disregard for the law. With detailed information on the NSA's secret role in the Korean Airlines disaster, Iran-Contra, the first Gulf War, and other major world events of the 80s and 90s, this is a brilliant account of the use and abuse of technological espionage.