How Everything Became War and the Military Became Everything: Tales from the Pentagon


Rosa Brooks - 2016
    Today, America’s wars are everywhere and forever: our enemies change constantly and rarely wear uniforms, and virtually anything can become a weapon. As war expands, so does the role of the US military. Today, military personnel don’t just “kill people and break stuff.” Instead, they analyze computer code, train Afghan judges, build Ebola isolation wards, eavesdrop on electronic communications, develop soap operas, and patrol for pirates. You name it, the military does it. Rosa Brooks traces this seismic shift in how America wages war from an unconventional perspective—that of a former top Pentagon official who is the daughter of two anti-war protesters and a human rights activist married to an Army Green Beret. Her experiences lead her to an urgent warning: When the boundaries around war disappear, we risk destroying America’s founding values and the laws and institutions we’ve built—and undermining the international rules and organizations that keep our world from sliding towards chaos. If Russia and China have recently grown bolder in their foreign adventures, it’s no accident; US precedents have paved the way for the increasingly unconstrained use of military power by states around the globe. Meanwhile, we continue to pile new tasks onto the military, making it increasingly ill-prepared for the threats America will face in the years to come. By turns a memoir, a work of journalism, a scholarly exploration into history, anthropology and law, and a rallying cry, How Everything Became War and the Military Became Everything transforms the familiar into the alien, showing us that the culture we inhabit is reshaping us in ways we may suspect, but don’t really understand. It’s the kind of book that will leave you moved, astonished, and profoundly disturbed, for the world around us is quietly changing beyond recognition—and time is running out to make things right.

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics


John Sammons - 2011
    This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

The Snowden Files: The Inside Story of the World's Most Wanted Man


Luke Harding - 2014
    The consequences have shaken the leaders of nations worldwide. This is the inside story of Snowden's deeds and the journalists who faced down pressure from the US and UK governments to break a remarkable scoop.From the day he left his glamorous girlfriend in Hawaii, carrying a hard drive full of secrets, to the weeks of secret-spilling in Hong Kong and his battle for asylum, Snowden's story reads like a globe-trotting thriller.

The Dead Hand: The Untold Story of the Cold War Arms Race and its Dangerous Legacy


David E. Hoffman - 2009
    In the last half of the twentieth century the two superpowers had perfected the science of mass destruction and possessed nuclear weapons with the combined power of a million Hiroshimas. What’s more, a Soviet biological warfare machine was ready to produce bacteria and viruses to sicken and kill millions. In The Dead Hand, a thrilling narrative history drawing on new archives and original research and interviews, David E. Hoffman reveals how presidents, scientists, diplomats, soldiers, and spies confronted the danger and changed the course of history. The Dead Hand captures the inside story in both the United States and the Soviet Union, giving us an urgent and intimate account of the last decade of the arms race. With access to secret Kremlin documents, Hoffman chronicles Soviet internal deliberations that have long been hidden. He reveals that weapons designers in 1985 laid a massive “Star Wars” program on the desk of Soviet leader Mikhail Gorbachev to compete with President Reagan, but Gorbachev refused to build it. He unmasks the cover-up of the Soviet biological weapons program. He tells the exclusive story of one Soviet microbiologist’s quest to build a genetically engineered super-germ—it would cause a mild illness, a deceptive recovery, then a second, fatal attack. And he details the frightening history of the Doomsday Machine, known as the Dead Hand, which would launch a retaliatory nuclear strike if the Soviet leaders were wiped out. When the Soviet Union collapsed, the dangers remained. Soon rickety trains were hauling unsecured nuclear warheads across the Russian steppe; tons of highly-enriched uranium and plutonium lay unguarded in warehouses; and microbiologists and bomb designers were scavenging for food to feed their families. The Dead Hand offers fresh and startling insights into Reagan and Gorbachev, the two key figures of the end of the Cold War, and draws colorful, unforgettable portraits of many others who struggled, often valiantly, to save the world from the most terrifying weapons known to man.

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks


Michal Zalewski - 2005
    Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News


Clint Watts - 2018
    In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.

The Unexpected Spy: From the CIA to the FBI, My Secret Life Taking Down Some of the World's Most Notorious Terrorists


Tracy Walder - 2020
    In high-security, steel-walled rooms in Virginia, Walder watched al-Qaeda members with drones as President Bush looked over her shoulder and CIA Director George Tenet brought her donuts. She tracked chemical terrorists and searched the world for weapons of mass destruction. She created a chemical terror chart that someone in the White House altered to convey information she did not have or believe, leading to the Iraq invasion. Driven to stop terrorism, Walder debriefed terrorists - men who swore they’d never speak to a woman - until they gave her leads. She followed trails through North Africa, Europe, and the Middle East, shutting down multiple chemical attacks. Then Walder moved to the FBI, where she worked in counterintelligence. In a single year, she helped take down one of the most notorious foreign spies ever caught on American soil. Catching the bad guys wasn’t a problem in the FBI, but rampant sexism was. Walder left the FBI to teach young women, encouraging them to find a place in the FBI, CIA, State Department or the Senate - and thus change the world. Length: 8 hrs and 10 mins

Gray Day: My Undercover Mission to Expose America's First Cyber Spy


Eric O'Neill - 2019
    With zero training in face-to-face investigation, O'Neill found himself in a windowless, high-security office in the newly formed Information Assurance Section, tasked officially with helping the FBI secure its outdated computer system against hackers and spies--and unofficially with collecting evidence against his new boss, Robert Hanssen, an exacting and rage-prone veteran agent with a fondness for handguns. In the months that follow, O'Neill's self-esteem and young marriage unravel under the pressure of life in Room 9930, and he questions the very purpose of his mission. But as Hanssen outmaneuvers an intelligence community struggling to keep up with the new reality of cybersecurity, he also teaches O'Neill the game of spycraft. The student will just have to learn to outplay his teacher if he wants to win.A tension-packed stew of power, paranoia, and psychological manipulation, Gray Day is also a cautionary tale of how the United States allowed Russia to become dominant in cyberespionage--and how we might begin to catch up.

Duty: Memoirs of a Secretary at War


Robert M. Gates - 2014
    Bush and Barack Obama during the wars in Iraq and Afghanistan. Before Robert M. Gates received a call from the White House in 2006, he thought he’d left Washington politics behind: after working for six presidents in both the CIA and the National Security Council, he was happy in his role as president of Texas A&M University. But when he was asked to help a nation mired in two wars and to aid the troops doing the fighting, he answered what he felt was the call of duty. Now, in this unsparing memoir, meticulously fair in its assessments, he takes us behind the scenes of his nearly five years as a secretary at war: the battles with Congress, the two presidents he served, the military itself, and the vast Pentagon bureaucracy; his efforts to help Bush turn the tide in Iraq; his role as a guiding, and often dissenting, voice for Obama; the ardent devotion to and love for American soldiers—his “heroes”—he developed on the job. In relating his personal journey as secretary, Gates draws us into the innermost sanctums of government and military power during the height of the Iraq and Afghanistan wars, illuminating iconic figures, vital negotiations, and critical situations in revealing, intimate detail. Offering unvarnished appraisals of Dick Cheney, Joe Biden, Hillary Clinton, and Presidents Bush and Obama among other key players, Gates exposes the full spectrum of behind-closed-doors politicking within both the Bush and Obama administrations. He discusses the great controversies of his tenure—surges in both Iraq and Afghanistan,  how to deal with Iran and Syria, “Don’t Ask Don’t Tell,” Guantánamo Bay, WikiLeaks—as they played out behind the television cameras. He brings to life the Situation Room during the Bin Laden raid. And, searingly, he shows how congressional debate and action or inaction on everything from equipment budgeting to troop withdrawals was often motivated, to his increasing despair and anger, more by party politics and media impact than by members’ desires to protect our soldiers and ensure their success. However embroiled he became in the trials of Washington, Gates makes clear that his heart was always in the most important theater of his tenure as secretary: the front lines. We journey with him to both war zones as he meets with active-duty troops and their commanders, awed by their courage, and also witness him greet coffin after flag-draped coffin returned to U.S. soil, heartbreakingly aware that he signed every deployment order. In frank and poignant vignettes, Gates conveys the human cost of war, and his admiration for those brave enough to undertake it when necessary. Duty tells a powerful and deeply personal story that allows us an unprecedented look at two administrations and the wars that have defined them.

The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries


Andrei Soldatov - 2015
    Perhaps both. On the eighth floor of an ordinary-looking building in an otherwise residential district of southwest Moscow, in a room occupied by the Federal Security Service (FSB), is a box the size of a VHS player marked SORM. The Russian government's front line in the battle for the future of the Internet, SORM is the world's most intrusive listening device, monitoring e-mails, Internet usage, Skype, and all social networks. But for every hacker subcontracted by the FSB to interfere with Russia's antagonists abroad -- such as those who, in a massive denial-of-service attack, overwhelmed the entire Internet in neighboring Estonia -- there is a radical or an opportunist who is using the web to chip away at the power of the state at home. Drawing from scores of interviews personally conducted with numerous prominent officials in the Ministry of Communications and web-savvy activists challenging the state, Andrei Soldatov and Irina Borogan peel back the history of advanced surveillance systems in Russia. From research laboratories in Soviet-era labor camps, to the legalization of government monitoring of all telephone and Internet communications in the 1990s, to the present day, their incisive and alarming investigation into the Kremlin's massive online-surveillance state exposes just how easily a free global exchange can be coerced into becoming a tool of repression and geopolitical warfare. Dissidents, oligarchs, and some of the world's most dangerous hackers collide in the uniquely Russian virtual world of The Red Web.

Mindf*ck: Cambridge Analytica and the Plot to Break America


Christopher Wylie - 2019
    Bannon had long sensed that deep within America's soul lurked an explosive tension. Cambridge Analytica had the data to prove it, and in 2016 Bannon had a presidential campaign to use as his proving ground.Christopher Wylie might have seemed an unlikely figure to be at the center of such an operation. Canadian and liberal in his politics, he was only twenty-four when he got a job with a London firm that worked with the U.K. Ministry of Defense and was charged putatively with helping to build a team of data scientists to create new tools to identify and combat radical extremism online. In short order, those same military tools were turned to political purposes, and Cambridge Analytica was born. Wylie's decision to become a whistleblower prompted the largest data crime investigation in history. His story is both exposé and dire warning about a sudden problem born of very new and powerful capabilities. It has not only exposed the profound vulnerabilities and profound carelessness in the enormous companies that drive the attention economy, it has also exposed the profound vulnerabilities of democracy itself. What happened in 2016 was just a trial run. Ruthless actors are coming for your data, and they want to control what you think.

The Looming Tower: Al-Qaeda and the Road to 9/11


Lawrence Wright - 2006
    Lawrence Wright's remarkable book is based on five years of research and hundreds of interviews that he conducted in Egypt, Saudi Arabia, Pakistan, Afghanistan, Sudan, England, France, Germany, Spain, and the United States.The Looming Tower achieves an unprecedented level of intimacy and insight by telling the story through the interweaving lives of four men: the two leaders of al-Qaeda, Osama bin Laden and Ayman al-Zawahiri; the FBI's counterterrorism chief, John O'Neill; and the former head of Saudi intelligence, Prince Turki al-Faisal.As these lives unfold, we see revealed: the crosscurrents of modern Islam that helped to radicalize Zawahiri and bin Laden . . . the birth of al-Qaeda and its unsteady development into an organization capable of the American embassy bombings in Kenya and Tanzania and the attack on the USS Cole . . . O'Neill's heroic efforts to track al-Qaeda before 9/11, and his tragic death in the World Trade towers . . . Prince Turki's transformation from bin Laden's ally to his enemy . . . the failures of the FBI, CIA, and NSA to share intelligence that might have prevented the 9/11 attacks.The Looming Tower broadens and deepens our knowledge of these signal events by taking us behind the scenes. Here is Sayyid Qutb, founder of the modern Islamist movement, lonely and despairing as he meets Western culture up close in 1940s America; the privileged childhoods of bin Laden and Zawahiri; family life in the al-Qaeda compounds of Sudan and Afghanistan; O'Neill's high-wire act in balancing his all-consuming career with his equally entangling personal life--he was living with three women, each of them unaware of the others' existence--and the nitty-gritty of turf battles among U.S. intelligence agencies.Brilliantly conceived and written, The Looming Tower draws all elements of the story into a galvanizing narrative that adds immeasurably to our understanding of how we arrived at September 11, 2001. The richness of its new information, and the depth of its perceptions, can help us deal more wisely and effectively with the continuing terrorist threat.

Longitudes and Attitudes: The World in the Age of Terrorism


Thomas L. Friedman - 2002
    Freidman received his third Pulitzer Prize in 2002 “for his clarity of vision, based on extensive reporting, in commenting on the worldwide impact of the terrorist threat.” In Longitudes and Attitudes he gives us all of the columns he has published about the most momentous news story of our time, as well as a diary of his private experiences and reflections during his post–September 11 travels. Updated for this new paperback edition, with over two years’ worth of Friedman’s columns and an expanded version of his diary, Longitudes and Attitudes is a broadly influential work from our most trusted observer of the international scene.

Poisoner in Chief: Sidney Gottlieb and the CIA Search for Mind Control


Stephen Kinzer - 2019
    He made pills, powders, and potions that could kill or maim without a trace--including some intended for Fidel Castro and other foreign leaders. He paid prostitutes to lure clients to CIA-run bordellos, where they were secretly dosed with mind-altering drugs. His experiments spread LSD across the United States, making him a hidden godfather of the 1960s counterculture. For years he was the chief supplier of spy tools used by CIA officers around the world.Stephen Kinzer, author of groundbreaking books about U.S. clandestine operations, draws on new documentary research and original interviews to bring to life one of the most powerful unknown Americans of the twentieth century. Gottlieb's reckless experiments on "expendable" human subjects destroyed many lives, yet he considered himself deeply spiritual. He lived in a remote cabin without running water, meditated, and rose before dawn to milk his goats.During his twenty-two years at the CIA, Gottlieb worked in the deepest secrecy. Only since his death has it become possible to piece together his astonishing career at the intersection of extreme science and covert action. Poisoner in Chief reveals him as a clandestine conjurer on an epic scale.

How to Measure Anything in Cybersecurity Risk


Douglas W. Hubbard - 2016
    In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.Discover the shortcomings of cybersecurity's best practices Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.