Tiger Trap: America's Secret Spy War with China


David Wise - 2011
    Now, for the first time, based on numerous interviews with key insiders at the FBI and CIA as well as with Chinese agents and people close to them, David Wise tells the full story of China’s many victories and defeats in its American spy wars.Two key cases interweave throughout: Katrina Leung, code-named Parlor Maid, worked for the FBI for years, even after she became a secret double agent for China, aided by love affairs with both of her FBI handlers. Here, too, is the inside story of the case, code-named Tiger Trap, of a key Chinese-American scientist suspected of stealing nuclear weapons secrets. These two cases led to many others, involving famous names from Wen Ho Lee to Richard Nixon, stunning national security leaks, and sophisticated cyberspying. The story takes us up to the present, with a West Coast spy ring whose members were sentenced in 2010—but it surely will continue for years to come, as China faces off against America. David Wise’s history of China’s spy wars in America is packed with eye-popping revelations.

The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age


Adam Segal - 2016
    Nation-states wielded military force, financial pressure, and diplomatic persuasion to create “world order.” Even after the end of the Cold War, the elements comprising world order remained essentially unchanged.But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation “Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.

Command and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of Safety


Eric Schlosser - 2013
    A groundbreaking account of accidents, near misses, extraordinary heroism, and technological breakthroughs, Command and Control explores the dilemma that has existed since the dawn of the nuclear age: How do you deploy weapons of mass destruction without being destroyed by them? That question has never been resolved—and Schlosser reveals how the combination of human fallibility and technological complexity still poses a grave risk to mankind. While the harms of global warming increasingly dominate the news, the equally dangerous yet more immediate threat of nuclear weapons has been largely forgotten.Written with the vibrancy of a first-rate thriller, Command and Control interweaves the minute-by-minute story of an accident at a nuclear missile silo in rural Arkansas with a historical narrative that spans more than fifty years. It depicts the urgent effort by American scientists, policy makers, and military officers to ensure that nuclear weapons can’t be stolen, sabotaged, used without permission, or detonated inadvertently. Schlosser also looks at the Cold War from a new perspective, offering history from the ground up, telling the stories of bomber pilots, missile commanders, maintenance crews, and other ordinary servicemen who risked their lives to avert a nuclear holocaust. At the heart of the book lies the struggle, amid the rolling hills and small farms of Damascus, Arkansas, to prevent the explosion of a ballistic missile carrying the most powerful nuclear warhead ever built by the United States.Drawing on recently declassified documents and interviews with people who designed and routinely handled nuclear weapons, Command and Control takes readers into a terrifying but fascinating world that, until now, has been largely hidden from view. Through the details of a single accident, Schlosser illustrates how an unlikely event can become unavoidable, how small risks can have terrible consequences, and how the most brilliant minds in the nation can only provide us with an illusion of control. Audacious, gripping, and unforgettable, Command and Control is a tour de force of investigative journalism, an eye-opening look at the dangers of America’s nuclear age.

The Future of the Internet and How to Stop It


Jonathan L. Zittrain - 2008
    With the unwitting help of its users, the generative Internet is on a path to a lockdown, ending its cycle of innovation—and facilitating unsettling new kinds of control.IPods, iPhones, Xboxes, and TiVos represent the first wave of Internet-centered products that can’t be easily modified by anyone except their vendors or selected partners. These “tethered appliances” have already been used in remarkable but little-known ways: car GPS systems have been reconfigured at the demand of law enforcement to eavesdrop on the occupants at all times, and digital video recorders have been ordered to self-destruct thanks to a lawsuit against the manufacturer thousands of miles away. New Web 2.0 platforms like Google mash-ups and Facebook are rightly touted—but their applications can be similarly monitored and eliminated from a central source. As tethered appliances and applications eclipse the PC, the very nature of the Internet—its “generativity,” or innovative character—is at risk.The Internet’s current trajectory is one of lost opportunity. Its salvation, Zittrain argues, lies in the hands of its millions of users. Drawing on generative technologies like Wikipedia that have so far survived their own successes, this book shows how to develop new technologies and social structures that allow users to work creatively and collaboratively, participate in solutions, and become true “netizens.”The book is available to download under a Creative Commons Attribution Non-Commercial Share-Alike 3.0 license: Download PDF. http://futureoftheinternet.org/download

The FBI


Ronald Kessler - 1993
    Sessions in 1993. But those stunning revelations comprise only a small part of this dramatic, meticulously researched examination of the FBI int he post-Hoover era. Kessler has used unprecedented access to unimpeachable FBI sources and secret facilities to report first-hand on the greatest successes and most shocking failures of the Bureau. He shows us, as never before, the FBI leaders, their methods, and the secrets they keep, including:• how the FBI solved its most publicized cases, including the Pan Am Flight 103 bombing, Watergate, the Patty Hearst kidnapping, the John A. Walker, Jr., spy case, and the World Trade Center bombing.• how the FBI hid embarrassing internal scandals, including one involving two married agents who attended a wife-swapping club• the FBI's involvement in the Waco, Texas-David Koresh standoff, and its botched attempt to bug the cars of Soviet diplomats in Wasington• how the Bureau cracks cases with high tech-DNA analysis, computer aging of faces, super-secret surveillance techniques, and profiling of serial killersIncludes the changes—good and bad made by new FBI Director Louis Freeh.Eye-opening and autoritative, Kessler's The FBI will forever change the way America views its most powerful law enforcement agency.“Fascinating…[a] careful and well-written study…Kessler lays out the agency's clangers as well as its triumphs and reveals the incompetents hiding in its ranks…”—San Francisco Chronicle(Back Cover)An explosive expose from the bestselling author whose investigation brought down FBI director William S. Sessions. Offered unprecedented access and cooperation, Kessler reveals the inner workings of the modern FBI and the methods, powers and secrets of the people who run the Bureau. 16-page insert.

AI Superpowers: China, Silicon Valley, and the New World Order


Kai-Fu Lee - 2018
    Kai-Fu Lee—one of the world’s most respected experts on AI and China—reveals that China has suddenly caught up to the US at an astonishingly rapid and unexpected pace.In AI Superpowers, Kai-Fu Lee argues powerfully that because of these unprecedented developments in AI, dramatic changes will be happening much sooner than many of us expected. Indeed, as the US-Sino AI competition begins to heat up, Lee urges the US and China to both accept and to embrace the great responsibilities that come with significant technological power.Most experts already say that AI will have a devastating impact on blue-collar jobs. But Lee predicts that Chinese and American AI will have a strong impact on white-collar jobs as well. Is universal basic income the solution? In Lee’s opinion, probably not.  But he provides a clear description of which jobs will be affected and how soon, which jobs can be enhanced with AI, and most importantly, how we can provide solutions to some of the most profound changes in human history that are coming soon.

Biohazard: The Chilling True Story of the Largest Covert Biological Weapons Program in the World--Told from the Inside by the Man Who Ran It


Ken Alibek - 1999
    Smallpox. Incurable and horrifying Ebola-related fevers. For two decades, while a fearful world prepared for nuclear winter, an elite team of Russian bioweaponeers began to till a new killing field: a bleak tract sown with powerful seeds of mass destruction—by doctors who had committed themselves to creating a biological Armageddon. Biohazard is the never-before-told story of Russia’s darkest, deadliest, and most closely guarded Cold War secret.   No one knows more about Russia’s astounding experiments with biowarfare than Ken Alibek. Now the mastermind behind Russia’s germ warfare effort reveals two decades of shocking breakthroughs . . . how Moscow’s leading scientists actually reengineered hazardous microbes to make them even more virulent . . . the secrets behind the discovery of an invisible, untraceable new class of biological agents just right for use in political assassinations . . . the startling story behind Russia’s attempt to turn a sample of the AIDS virus into the ultimate bioweapon. And in a chilling work of real-world intrigue, Biohazard offers us all a rare glimpse into a shadowy scientific underworld where doctors manufacture mass destruction, where witnesses to errors are silenced forever, and where ground zero is closer than we ever dared believe.

Red Notice: A True Story of High Finance, Murder, and One Man's Fight for Justice


Bill BrowderBill Browder - 2014
    It continued in Moscow, where Browder made his fortune heading the largest investment fund in Russia after the Soviet Union's collapse. But when he exposed the corrupt oligarchs who were robbing the companies in which he was investing, Vladimir Putin turned on him and, in 2005, had him expelled from Russia. In 2007, a group of law enforcement officers raided Browder's offices in Moscow and stole $230 million of taxes that his fund's companies had paid to the Russian government. Browder's attorney Sergei Magnitsky investigated the incident and uncovered a sprawling criminal enterprise. A month after Sergei testified against the officials involved, he was arrested and thrown into pre-trial detention, where he was tortured for a year. On November 16, 2009, he was led to an isolation chamber, handcuffed to a bedrail, and beaten to death by eight guards in full riot gear. Browder glimpsed the heart of darkness, and it transformed his life: he embarked on an unrelenting quest for justice in Sergei's name, exposing the towering cover-up that leads right up to Putin. A financial caper, a crime thriller, and a political crusade, Red Notice is the story of one man taking on overpowering odds to change the world.

The Moscow Rules: The Secret CIA Tactics That Helped America Win the Cold War


Antonio J. Méndez - 2019
    Soviets kept files on all foreigners, studied their patterns, tapped their phones, and even planted listening devices within the US Embassy. In short, intelligence work was effectively impossible. The Soviet threat loomed larger than ever. The Moscow Rules tells the story of the intelligence breakthrough that turned the odds in America's favor. As Chief of Disguise and Authentication, Mendez was instrumental in creating and honing a series of tactics that allowed officers to finally get one step ahead of the KGB. These techniques included everything from elaborate, Hollywood-inspired identity swaps, to deception or evasion techniques, to more mundane document forgery. With these new guidelines in place, and with an armory of new gadgets perfected by the Office of Technical Services including miniature cameras, suitcase release body doubles, and wall repelling mechanisms, the CIA managed to gain a foothold in Moscow and pull off some of the greatest intelligence operations in the history of espionage. As America is again confronted by the threat of Russian disinformation, the dramatic inside story of how we defeated our once-and-future enemy is as timely as ever.

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code


Michael Hale Ligh - 2010
    Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

Zero Day: The Threat In Cyberspace


Robert O'Harrow Jr. - 2013
    For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.

We Have Been Harmonized: Life in China's Surveillance State


Kai Strittmatter - 2018
    As recently as 2013, Tim Berners-Lee, often credited as the inventor of the World Wide Web, declared that “piece by piece, website by website, China’s ‘great firewall’ would meet the same fate as the Berlin Wall.” Yet these predictions have been proved wrong. In We Have Been Harmonized, award-winning journalist Kai Strittmatter reveals how the internet and high tech have transformed the power of Chinese authoritarians, allowing them to create the most horrifying surveillance state in history.Advances in technology—facial recognition, GPS tracking, supercomputer databases, mobile phones, high-resolution security cameras—make it nearly impossible for a Chinese citizen to hide anything from authorities. Text messages and emails are instantly stripped of “problematic” words. The year 1989—when the world witnessed the student protests and tragic massacre at Tiananmen Square—has been banished from search results. Cameras scan for “appropriate” facial expressions as they track individuals’ movements. Each citizen is given a score for good behavior. Those who lose points can be banned from traveling, have their internet speed reduced, or even have their toilet paper limited. All of this has happened with the help of Chinese tech companies, as well as the complicity of Western governments and corporations eager to gain access to China’s huge market. While these companies export their technology to authoritarian states around the globe, they are also reshaping American lives via app, smart phones, and computing. Strittmatter’s book is a terrifying portrait of an Orwellian nightmare unlike anything we’ve ever witnessed, and a dire warning about what could happen anywhere.

Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier


Suelette Dreyfus - 1997
    Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

Chasing the Scream: The First and Last Days of the War on Drugs


Johann Hari - 2015
    On the eve of this centenary, journalist Johann Hari set off on an epic three-year, thirty-thousand-mile journey into the war on drugs. What he found is that more and more people all over the world have begun to recognize three startling truths: Drugs are not what we think they are. Addiction is not what we think it is. And the drug war has very different motives to the ones we have seen on our TV screens for so long.In Chasing the Scream, Hari reveals his discoveries entirely through the stories of people across the world whose lives have been transformed by this war. They range from a transsexual crack dealer in Brooklyn searching for her mother, to a teenage hit-man in Mexico searching for a way out. It begins with Hari's discovery that at the birth of the drug war, Billie Holiday was stalked and killed by the man who launched this crusade--and it ends with the story of a brave doctor who has led his country to decriminalize every drug, from cannabis to crack, with remarkable results.Chasing the Scream lays bare what we really have been chasing in our century of drug war--in our hunger for drugs, and in our attempt to destroy them. This book will challenge and change how you think about one of the most controversial--and consequential--questions of our time.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.