Book picks similar to
Code Warriors: NSA's Code Breakers and the Secret Intelligence War Against the Soviet Union by Stephen Budiansky
history
non-fiction
nonfiction
cold-war
The Secret History of MI6
Keith Jeffery - 2010
Britain's Secret Intelligence Service (MI6) was born a century ago amid fears of the rising power of other countries, especially Germany. The next 40 years saw MI6 taking an increasingly important & largely hidden role in shaping history. This revelatory account draws on a wealth of archival materials never before seen by outsiders to unveil the inner workings of the world's 1st spy agency. MI6's early days were haphazard but it was quickly forged into an effective organization during WWI. During the war years, MI6 also formed ties with the USA--harbingers of a relationship that would become vital to both. These early years also saw the development of techniques that would become plot devices in books & films--forgery, invisible ink, disguises, concealing mechanisms etc. The interwar years were nominally peaceful, but Britain perceived numerous threats, all of which MI6 was expected to keep tabs on. The outbreak of WWII again caught MI6 off balance, & high-profile blunders (& the memoirs of MI6 operatives like Graham Greene) created an impression of ineffectiveness. At the same time the service was pioneering cryptography at Bletchley Park, breaking the Enigma code & devising the methods & equipment inspiring Ian Fleming's novels. The aftermath of WWII was as dramatic as the war itself had been, because 1945-49 saw not only the end of the British Empire but also the emergence of a new sort of conflict--the Cold War. We witness MI6 wrestling with these epic changes as it tightens its bonds with the newly christened CIA, changes that would dictate the shape of the service & the world for decades.
The Billion Dollar Spy: A True Story of Cold War Espionage and Betrayal
David E. Hoffman - 2015
A man on the curb handed him an envelope whose contents stunned U.S. intelligence: details of top-secret Soviet research and developments in military technology that were totally unknown to the United States. In the years that followed, the man, Adolf Tolkachev, an engineer in a Soviet military design bureau, used his high-level access to hand over tens of thousands of pages of technical secrets. His revelations allowed America to reshape its weapons systems to defeat Soviet radar on the ground and in the air, giving the United States near total superiority in the skies over Europe.One of the most valuable spies to work for the United States in the four decades of global confrontation with the Soviet Union, Tolkachev took enormous personal risks—but so did the Americans. The CIA had long struggled to recruit and run agents in Moscow, and Tolkachev was a singular breakthrough. Using spy cameras and secret codes as well as face-to-face meetings in parks and on street corners, Tolkachev and his handlers succeeded for years in eluding the feared KGB in its own backyard, until the day came when a shocking betrayal put them all at risk.Drawing on previously secret documents obtained from the CIA and on interviews with participants, David Hoffman has created an unprecedented and poignant portrait of Tolkachev, a man motivated by the depredations of the Soviet state to master the craft of spying against his own country. Stirring, unpredictable, and at times unbearably tense, The Billion Dollar Spy is a brilliant feat of reporting that unfolds like an espionage thriller.
The Imagineers of War: The Untold Story of DARPA, the Pentagon Agency That Changed the World
Sharon Weinberger - 2017
Founded in 1958 in response to the launch of Sputnik, DARPA has been responsible for countless inventions and technologies that have evolved from the agency's mission: forward-thinking solutions to the Pentagon's challenges. Sharon Weinberger gives us a riveting account of DARPA's successes and failures, useful innovations and wild-eyed schemes: we see how the nuclear threat sparked investment in computer networking, which led to the Internet, as well as plans to power a missile-seeking particle beam by draining the Great Lakes...how, in Vietnam, DARPA developed technology for the world's first armed drones and was also responsible for Agent Orange... how DARPA's recent success with self-driving cars is counterbalanced with its disappointing contributions to the Afghanistan and Iraq wars. Weinberger has spoken to dozens of former DARPA and Pentagon officials--many of whom had never been interviewed before about their work with the agency--and synthesized countless documents obtained under the Freedom of Information Act. The result is a riveting history of a meeting point of science, technology, and politics.
The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth
Mark Mazzetti - 2013
The Way of the Knife is the untold story of that shadow war: a campaign that has blurred the lines between soldiers and spies and lowered the bar for waging war across the globe. America has pursued its enemies with killer drones and special operations troops; trained privateers for assassination missions and used them to set up clandestine spying networks; and relied on mercurial dictators, untrustworthy foreign intelligence services, and proxy armies.This new approach to war has been embraced by Washington as a lower risk, lower cost alternative to the messy wars of occupation and has been championed as a clean and surgical way of conflict. But the knife has created enemies just as it has killed them. It has fomented resentments among allies, fueled instability, and created new weapons unbound by the normal rules of accountability during wartime.
Red Moon Rising: Sputnik and the Hidden Rivalries That Ignited the Space Age
Matthew Brzezinski - 2007
Whenever America wanted to peer inside the Soviet Union, it launched a U-2, which flew too high to be shot down. But Sergei Korolev, Russia's chief rocket designer, had a riposte: an artificial satellite that would orbit the earth and cross American skies at will. On October 4, 1957, the launch of Korolev's satellite, Sputnik, stunned the world.In Red Moon Rising, Matthew Brzezinski takes us inside the Kremlin, the White House, secret military facilities, and the halls of Congress to bring to life the Russians and Americans who feared and distrusted their compatriots as much as their superpower rivals. Drawing on original interviews and new documentary sources from both sides of the Cold War divide, he shows how Khrushchev and Dwight Eisenhower were buffeted by crises of their own creation, leaving the door open to ambitious politicians and scientists to squabble over the heavens and the earth. It is a story rich in the paranoia of the time, with combatants that included two future presidents, survivors of the gulag, corporate chieftains, rehabilitated Nazis, and a general who won the day by refusing to follow orders.Sputnik set in motion events that led not only to the moon landing but also to cell phones, federally guaranteed student loans, and the wireless Internet. Red Moon Rising recounts the true story of the birth of the space age in dramatic detail, bringing it to life as never before.
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Clifford Stoll - 1989
citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.
The Art of Intelligence
Henry A. Crumpton - 2012
In the days after 9/11, the CIA tasked Crumpton to organize and lead the Afghanistan campaign. With Crumpton's strategic initiative and bold leadership, from the battlefield to the Oval Office, U.S. and Afghan allies routed al Qaeda and the Taliban in less than ninety days after the Twin Towers fell. At the height of combat against the Taliban in late 2001, there were fewer than five hundred Americans on the ground in Afghanistan, a dynamic blend of CIA and Special Forces. The campaign changed the way America wages war. This book will change the way America views the CIA.The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAV Predator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.No book like The Art of Intelligence has ever been written-not with Crumpton's unique perspective, in a time when America faced such grave and uncertain risk. It is an epic, sure to be a classic in the annals of espionage and war.
The Devil's Chessboard: Allen Dulles, the CIA, and the Rise of America's Secret Government
David Talbot - 2015
Drawing on revelatory new materials—including newly discovered U.S. government documents, U.S. and European intelligence sources, the personal correspondence and journals of Allen Dulles’s wife and mistress, and exclusive interviews with the children of prominent CIA officials—Talbot reveals the underside of one of America’s most powerful and influential figures.Dulles’s decade as the director of the CIA—which he used to further his public and private agendas—were dark times in American politics. Calling himself “the secretary of state of unfriendly countries,” Dulles saw himself as above the elected law, manipulating and subverting American presidents in the pursuit of his personal interests and those of the wealthy elite he counted as his friends and clients—colluding with Nazi-controlled cartels, German war criminals, and Mafiosi in the process. Targeting foreign leaders for assassination and overthrowing nationalist governments not in line with his political aims, Dulles employed those same tactics to further his goals at home, Talbot charges, offering shocking new evidence in the assassination of President John F. Kennedy.An exposé of American power that is as disturbing as it is timely, The Devil’s Chessboard is a provocative and gripping story of the rise of the national security state—and the battle for America’s soul.
A Fiery Peace in a Cold War: Bernard Schriever and the Ultimate Weapon
Neil Sheehan - 2009
Here is the never-before-told story of the nuclear arms race that changed history-and of the visionary American Air Force officer Bernard Schriever, who led the high-stakes effort. A Fiery Peace in a Cold War is a masterly work about Schriever's quests to prevent the Soviet Union from acquiring nuclear superiority, to penetrate and exploit space for America, and to build the first weapons meant to deter an atomic holocaust rather than to be fired in anger. Sheehan melds biography and history, politics and science, to create a sweeping narrative that transports the reader back and forth from individual drama to world stage. The narrative takes us from Schriever's boyhood in Texas as a six-year-old immigrant from Germany in 1917 through his apprenticeship in the open-cockpit biplanes of the Army Air Corps in the 1930s and his participation in battles against the Japanese in the South Pacific during the Second World War. On his return, he finds a new postwar bipolar universe dominated by the antagonism between the United States and the Soviet Union. Inspired by his technological vision, Schriever sets out in 1954 to create the one class of weapons that can enforce peace with the Russians-intercontinental ballistic missiles that are unstoppable and can destroy the Soviet Union in thirty minutes. In the course of his crusade, he encounters allies and enemies among some of the most intriguing figures of the century: John von Neumann, the Hungarian-born mathematician and mathematical physicist, who was second in genius only to Einstein; Colonel Edward Hall, who created the ultimate ICBM in the Minuteman missile, and his brother, Theodore Hall, who spied for the Russians at Los Alamos and hastened their acquisition of the atomic bomb; Curtis LeMay, the bomber general who tried to exile Schriever and who lost his grip on reality, amassing enough nuclear weapons in his Strategic Air Command to destroy the entire Northern Hemisphere; and Hitler's former rocket maker, Wernher von Braun, who along with a colorful, riding-crop-wielding Army general named John Medaris tried to steal the ICBM program. The most powerful men on earth are also put into astonishing relief: Joseph Stalin, the cruel, paranoid Soviet dictator who spurred his own scientists to build him the atomic bomb with threats of death; Dwight Eisenhower, who backed the ICBM program just in time to save it from the bureaucrats; Nikita Khrushchev, who brought the world to the edge of nuclear catastrophe during the Cuban Missile Crisis, and John Kennedy, who saved it. Schriever and his comrades endured the heartbreak of watching missiles explode on the launching pads at Cape Canaveral and savored the triumph of seeing them soar into space. In the end, they accomplished more than achieving a fiery peace in a cold war. Their missiles became the vehicles that opened space for America.
Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden from the Soviet Invasion to September 10, 2001
Steve Coll - 2004
It won the Pulitzer Prize in 2005.Prize-winning journalist Steve Coll has spent years reporting from the Middle East, accessed previously classified government files and interviewed senior US officials and foreign spymasters. Here he gives the full inside story of the CIA's covert funding of an Islamic jihad against Soviet forces in Afghanistan, explores how this sowed the seeds of Bin Laden's rise, traces how he built his global network and brings to life the dramatic battles within the US government over national security. Above all, he lays bare American intelligence's continual failure to grasp the rising threat of terrorism in the years leading to 9/11 - and its devastating consequences.
American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road
Nick Bilton - 2017
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark Web where anyone could trade anything—drugs, hacking software, forged passports, counterfeit cash, poisons—free of the government’s watchful eye. It wasn’t long before the media got wind of the new Web site where anyone—not just teenagers and weed dealers but terrorists and black hat hackers—could buy and sell contraband detection-free. Spurred by a public outcry, the federal government launched an epic two-year manhunt for the site’s elusive proprietor, with no leads, no witnesses, and no clear jurisdiction. All the investigators knew was that whoever was running the site called himself the Dread Pirate Roberts. The Silk Road quickly ballooned into $1.2 billion enterprise, and Ross embraced his new role as kingpin. He enlisted a loyal crew of allies in high and low places, all as addicted to the danger and thrill of running an illegal marketplace as their customers were to the heroin they sold. Through his network he got wind of the target on his back and took drastic steps to protect himself—including ordering a hit on a former employee. As Ross made plans to disappear forever, the Feds raced against the clock to catch a man they weren’t sure even existed, searching for a needle in the haystack of the global Internet.Drawing on exclusive access to key players and two billion digital words and images Ross left behind, Vanity Fair correspondent and New York Times bestselling author Nick Bilton offers a tale filled with twists and turns, lucky breaks and unbelievable close calls. It’s a story of the boy next door’s ambition gone criminal, spurred on by the clash between the new world of libertarian-leaning, anonymous, decentralized Web advocates and the old world of government control, order, and the rule of law. Filled with unforgettable characters and capped by an astonishing climax, American Kingpin might be dismissed as too outrageous for fiction. But it’s all too real.
Operation Snow: How a Soviet Mole in FDR's White House Triggered Pearl Harbor
John Koster - 2012
Many have argued that the attack was a brilliant Japanese military coup, or a failure of U.S. intelligence agencies, or even a conspiracy of the Roosevelt administration. But despite the attention historians have paid to the bombing of Pearl Harbor, the truth about that fateful day has remained a mystery—until now. In Operation Snow: How a Soviet Mole in FDR’s White House Triggered Pearl Harbor, author John Koster uses recently declassified evidence and never-before-translated documents to tell the real story of the day that FDR memorably declared would live in infamy, forever. Operation Snow shows how Joseph Stalin and the KGB used a vast network of double-agents and communist sympathizers—most notably, Harry Dexter White—to lead Japan into war against the United States, demonstrating incontestable Soviet involvement behind the bombing of Pearl Harbor. A thrilling tale of espionage, mystery and war, Operation Snow will forever change the way we think about Pearl Harbor and World War II.
The Moscow Rules: The Secret CIA Tactics That Helped America Win the Cold War
Antonio J. Méndez - 2019
Soviets kept files on all foreigners, studied their patterns, tapped their phones, and even planted listening devices within the US Embassy. In short, intelligence work was effectively impossible. The Soviet threat loomed larger than ever. The Moscow Rules tells the story of the intelligence breakthrough that turned the odds in America's favor. As Chief of Disguise and Authentication, Mendez was instrumental in creating and honing a series of tactics that allowed officers to finally get one step ahead of the KGB. These techniques included everything from elaborate, Hollywood-inspired identity swaps, to deception or evasion techniques, to more mundane document forgery. With these new guidelines in place, and with an armory of new gadgets perfected by the Office of Technical Services including miniature cameras, suitcase release body doubles, and wall repelling mechanisms, the CIA managed to gain a foothold in Moscow and pull off some of the greatest intelligence operations in the history of espionage. As America is again confronted by the threat of Russian disinformation, the dramatic inside story of how we defeated our once-and-future enemy is as timely as ever.
Worm: The First Digital World War
Mark Bowden - 2011
Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.