Book picks similar to
Scientific Methods of Inquiry for Intelligence Analysis by Hank Prunckun
intelligence
hank-prunckun
intelligence-studies
intelligence-analysis
Man in the Shadows: Inside the Middle East Crisis with a Man Who Led the Mossad
Efraim Halevy - 2000
In Man in the Shadows, Efraim Halevy--a Mossad officer since 1961 and its chief between 1998 and 2002--provides an unprecedented portrait of the Middle East crisis. Having served as the secret envoy of prime ministers Rabin, Shamir, Netanyahu, Barak, and Sharon, Halevy was privy to many of the top-level negotiations that determined the progress of the region's struggle for peace during the years when the threat of Islamic terror became increasingly powerful. Informed by his extraordinary access, he writes candidly about the workings of the Mossad, the prime ministers he served under, and the other major players on the international stage: Yasir Arafat, Saddam Hussein, Hafiz al-Assad, Mu'amar Gadhafi, Bill Clinton, George H. W. Bush, and George W. Bush. From the vantage point of a chief in charge of a large organization, he frankly describes the difficulty of running an intelligence agency in a time when heads of state are immersed, as never before, in using intelligence to protect their nations while, at the same time, acting to protect themselves politically. Most important, he writes fiercely and without hesitation about how the world might achieve peace in the face of the growing threat from Islamic terrorist organizations. In this gripping inside look, Halevy opens his private dossier on events past and present: the assassination attempt by the Mossad on the life of Khaled Mashal, now the leader of Khammas; the negotiations surrounding the Israeli-Jordan Peace Accord and its importance for the stability of the region; figures in the CIA, like Jim Angleton and George Tenet, with whom he worked (Halevy even shares his feelings about Tenet's abrupt resignation). He tells the truth about what the Mossad really knew before 9/11. He writes candidly about assessing the threat of the proliferation of weapons of mass destruction in the region and beyond, and what this spells for the future of international stability and survival. He touches on the increasing visibility of the CIA in the Middle East and openly shares his misgivings about both the report of the 9/11 Commission and the Middle East road map to peace that was pressed on all sides of the conflict by the U.S. government. He looks at the terrorist attacks in Madrid and London and their far-reaching effects, and states the unthinkable: We have yet to see the worst of what the radical Islamic terrorists are capable of. Sure to be one of the year's most talked-about books, this fierce and intelligent account of will be a must-read for those looking to hear from a man who wielded his influence, in the shadows, to save the Middle East and the world from a never-ending cycle of violence and destruction.
Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
William R. Johnson - 1987
CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations.Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.
Enter the Past Tense: My Secret Life as a CIA Assassin
Roland W. Haas - 2007
He underwent intensive training to prepare for insertion into hostile areas, including High Altitude Low Opening (HALO) parachuting and weapons instruction. In the course of his first mission (to East and West Germany, Turkey, Iran, Afghanistan, Pakistan, India, Bulgaria, Romania, and Austria), he assassinated several international drug dealers. On his return, he was thrown into an Iranian prison, where he was physically and psychologically tortured. Over the next thirty years, he served the agency on an as-needed basis, engaging in such activities as hunting down and eliminating members of the Red Army Faction and extracting Soviet Spetsnaz officers from East Germany. His cover jobs included being a part owner of an Oakland health club, which brought him into close contact with steroid abuse in professional athletics, drug abuse in general, and the Hell’s Angels, whom he believes tried to have him killed. He also served in Germany as site commander for the Conventional Forces in Europe weapons treaty. His most recent cover was as the deputy director of intelligence in the U.S. Army Reserve Command, which involved him with the Guantanamo detention facility.A true story that pulls no punches, Enter the Past Tense also chronicles Haas’s descent into, and recovery from, alcoholism that resulted from the stress of this extraordinary life. It is an eye-opening look at the dark, but many would argue necessary, side of intelligence work—and one that readers won’t soon forget.
The Man with the Golden Gun
Jim Lawrence - 2004
With his conditioning removed, M sends Bond on a deadly mission; to track down Francisco Scaramanga, "The Man with the Golden Gun". But with a KGB agent & the usual quota of beautiful, treacherous girls in his path, will Bond survive? Also features "The Living Daylights" plus background on Ian Fleming & a foreword by his niece, Lucy Fleming.
Why Intelligence Fails
Robert Jervis - 2010
government spends enormous resources each year on the gathering and analysis of intelligence, yet the history of American foreign policy is littered with missteps and misunderstandings that have resulted from intelligence failures. In Why Intelligence Fails, Robert Jervis examines the politics and psychology of two of the more spectacular intelligence failures in recent memory: the mistaken belief that the regime of the Shah in Iran was secure and stable in 1978, and the claim that Iraq had active WMD programs in 2002.The Iran case is based on a recently declassified report Jervis was commissioned to undertake by CIA thirty years ago and includes memoranda written by CIA officials in response to Jervis's findings. The Iraq case, also grounded in a review of the intelligence community's performance, is based on close readings of both classified and declassified documents, though Jervis's conclusions are entirely supported by evidence that has been declassified. In both cases, Jervis finds not only that intelligence was badly flawed but also that later explanations--analysts were bowing to political pressure and telling the White House what it wanted to hear or were willfully blind--were also incorrect. Proponents of these explanations claimed that initial errors were compounded by groupthink, lack of coordination within the government, and failure to share information. Policy prescriptions, including the recent establishment of a Director of National Intelligence, were supposed to remedy the situation.In Jervis's estimation, neither the explanations nor the prescriptions are adequate. The inferences that intelligence drew were actually quite plausible given the information available. Errors arose, he concludes, from insufficient attention to the ways in which information should be gathered and interpreted, a lack of self-awareness about the factors that led to the judgments, and an organizational culture that failed to probe for weaknesses and explore alternatives. Evaluating the inherent tensions between the methods and aims of intelligence personnel and policymakers from a unique insider's perspective, Jervis forcefully criticizes recent proposals for improving the performance of the intelligence community and discusses ways in which future analysis can be improved.
Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
Michael Bazzell - 2012
In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will greatly improve anyone's online investigative skills. Among other techniques, you will learn how to locate: Hidden Social Network Content Cell Phone Subscriber Information Deleted Websites & Posts Missing Facebook Profile Data Full Twitter Account Data Alias Social Network Profiles Free Investigative Software Useful Browser Extensions Alternative Search Engine Results Website Owner Information Photo GPS & Metadata Live Streaming Social Content Social Content by Location IP Addresses of Users Additional User Accounts Sensitive Documents & Photos Private Email Addresses Duplicate Video Posts Mobile App Network Data Unlisted Addresses s Public Government Records Document Metadata Rental Vehicle Contracts Online Criminal Activity Personal Radio Communications Compromised Email Information Automated Collection Solutions Linux Investigative Programs Dark Web Content (Tor) Restricted YouTube Content Hidden Website Details Vehicle Registration Details
The Drop & The List (Slough House Novella)
Mick Herron - 2019
But in relaying his suspicions to John Bachelor, who babysits retired spies like Solly, he sets in train events which will alter lives. Bachelor himself, a hair's breadth away from sleeping in his car, is clawing his way back to stability; Hannah Weiss, the double agent whose recruitment was his only success, is starting to enjoy the secrets and lies her role demands; and Lech Wicinski, an Intelligence Service analyst, finds that a simple favour for an old acquaintance might derail his career. Meanwhile, Lady Di Taverner is trying to keep the Service on an even keel, and if that means throwing the odd crew member overboard, well: collateral damage is her speciality.A drop, in spook parlance, is the passing on of secret information.It's also what happens just before you hit the ground.
**THE LIST**
'Mick Herron is an incredible writer and if you haven't read him yet, you NEED to' Mark Billingham
Dieter Hess, an aged spy, is dead, and John Bachelor, his MI5 handler, is in deep, deep trouble. Death has revealed that the deceased had been keeping a secret second bank account - and there's only ever one reason a spy has a secret second bank account. The question of whether he was a double agent must be resolved, and its answer may undo an entire career's worth of spy secrets.**previously published as two separate editions**
The Golden Keel / The Vivero Letter
Desmond Bagley - 2009
It was never seen again. Now, an expedition plans to unearth the treasure and smuggle it out of Italy. But their reckless mission is being followed - by enemies who are as powerful and ruthless as they are deadly…THE VIVERO LETTERJeremy Wheale's well-ordered life is blasted apart when his brother is murdered. The killer was after a family heirloom - an antique gold tray - which sets Wheale on a trail from Devon to the tropical rainforest of Yucatan. There he joins the hunt for a lost Mayan city. But in the dense cover of the jungle a band of vicious convict mercenaries are waiting to strike…Includes a unique bonus - Desmond Bagley's rare introduction to these books.
The Iron Men
Leonard B. Scott - 1993
Decades later, their fates are entangled with that of Jake Tallon, an American soldier stationed in Berlin who falls in love with Mader's daughter. Tallon, too, is a decorated war hero, though from Vietnam, not WWII. Together, the three iron men join together in Berlin just before the fall of the Wall to confront the legacy of the past . . . and defeat it.
Vince Flynn Collectors' Edition #2: Separation of Power, Executive Power, and Memorial Day
Vince Flynn - 2010
Irene Kennedy is the target of an inside plot to destroy her and prematurely end the American President's term. To make matters worse, Saddam Hussein is close to entering the nuclear arms race -- something Israel has vowed to stop. With the haunting specter of World War III looming, the President calls on his secret weapon: top counterterrorism operative Mitch Rapp. But with only two weeks to take out the nukes, Rapp is up against a ticking clock -- and impossible odds. Executive PowerAfter years of working in the shadows, Rapp is caught in the media spotlight -- and marked for death by virtually every terrorist in the world. Now a CIA advisor, Rapp is ready to battle terror far from the front lines. But when a Navy SEAL team in the Philippines is ambushed, all evidence points to a leak within the U.S. State Department. And a greater threat still lurks -- a ruthless assassin working for the most powerful men in the Middle East, who are bent on igniting a world war. With the world watching, Rapp must hold back the flames of Armageddon....Memorial DayCIA intelligence has pointed to a major terrorist attack on the United States, just as the nation's capital prepares for a grand Memorial Day tribute to the veterans of World War II. Racing to Afghanistan, Mitch Rapp leads a commando raid on an al Qaeda stronghold in a remote border village -- and defuses plans for a nuclear strike on Washington. The crisis averted, the special ops work is done. But Rapp knows, in the face of a new kind of enemy, nothing is as it seems -- and it's up to him alone to avert a disaster of unimaginable proportions.These special collectors’ edition hardcover books are bound in premium bonded leather with foil stamping.
Beyond Bad
Sandra Lee - 2002
Cruel and evil, Katherine Knight showed no mercy when she butchered her lover in a crime that put her behind bars in an Australian prison for a record life sentence.Swinging from a meat-hook, John Price's entire skin was in one piece, including his hair, face, ears, nose, mouth, and genitals. Slashes and stab holes tore through the human pelt, a testimony to the wounds he suffered before dying.Knight, a 44-year-old abattoir worker, had stabbed father-of-three John Price 37 times, skinned his body, cooked his head, and served him up as a meal for his children. Drawing on first-hand accounts, Beyond Bad tells what motivated Knight to commit such a heinous act and how it rocked the small town where she lived. This is a horrifying story of love, lust, revenge, and murder that is all the more shocking because it really happened.©2002 Sandra Lee; (P)2003 Bolinda Publishing Pty Ltd
Dead Letters
Michael Brissenden - 2021
Politician Dan LeRoi, Chairman of the Joint Committee on Intelligence and Security, has been shot. Four bullets to the head. The crime scene is chaotic. Homicide. Counter Terrorism. Media. And for Sid, hunting the killer is going to get complicated.Journalist Zephyr Wilde is complicated. She's tenacious and she's got Sid's number. Sid knows the gossip: how Zephyr's mother was murdered when Zephyr was a kid. He doesn't know that Zephyr is still getting letters from her long-dead mother. But when he learns that Dan LeRoi was helping Zephyr look into her mother's death, he realises that lines are going to be crossed. A cop should not be talking to a journalist.As they both ask too many questions, Sid and Zephyr stir up a hornet's nest of corruption. Knowing who to trust is going to mean the difference between solving a crime and being a victim. The question is, which side will they end up on.
America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare
Joel Brenner - 2011
An urgent wake-up call that identifies our foes; unveils their methods; and charts the dire consequences for government, business, and individuals.Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of national intelligence. He saw at close range the battleground on which our adversaries are now attacking us-cyberspace. We are at the mercy of a new generation of spies who operate remotely from China, the Middle East, Russia, even France, among many other places. These operatives have already shown their ability to penetrate our power plants, steal our latest submarine technology, rob our banks, and invade the Pentagon's secret communications systems.Incidents like the WikiLeaks posting of secret U.S. State Department cables hint at the urgency of this problem, but they hardly reveal its extent or its danger. Our government and corporations are a "glass house," all but transparent to our adversaries. Counterfeit computer chips have found their way into our fighter aircraft; the Chinese stole a new radar system that the navy spent billions to develop; our own soldiers used intentionally corrupted thumb drives to download classified intel from laptops in Iraq. And much more.Dispatches from the corporate world are just as dire. In 2008, hackers lifted customer files from the Royal Bank of Scotland and used them to withdraw $9 million in half an hour from ATMs in the United States, Britain, and Canada. If that was a traditional heist, it would be counted as one of the largest in history. Worldwide, corporations lose on average $5 million worth of intellectual property apiece annually, and big companies lose many times that.The structure and culture of the Internet favor spies over governments and corporations, and hackers over privacy, and we've done little to alter that balance. Brenner draws on his extraordinary background to show how to right this imbalance and bring to cyberspace the freedom, accountability, and security we expect elsewhere in our lives.In America the Vulnerable, Brenner offers a chilling and revelatory appraisal of the new faces of war and espionage-virtual battles with dangerous implications for government, business, and all of us.
The Napoleon of Crime: The Life and Times of Adam Worth, Master Thief
Ben Macintyre - 1997
. . .--Sherlock Holmes on Professor Moriarty in The Final ProblemThe Victorian era's most infamous thief, Adam Worth was the original Napoleon of crime. Suave, cunning Worth learned early that the best way to succeed was to steal. And steal he did.Following a strict code of honor, Worth won the respect of Victorian society. He also aroused its fear by becoming a chilling phantom, mingling undetected with the upper classes, whose valuables he brazenly stole. His most celebrated heist: Gainsborough's grand portrait of the Duchess of Devonshire--ancestor of Diana, Princess of Wales--a painting Worth adored and often slept with for twenty years.With a brilliant gang that included "Piano" Charley, a jewel thief, train robber, and playboy, and "the Scratch" Becker, master forger, Worth secretly ran operations from New York to London, Paris, and South Africa--until betrayal and a Pinkerton man finally brought him down.In a decadent age, Worth was an icon. His biography is a grand, dazzling tour into the gaslit underworld of the last century. . . and into the doomed genius of a criminal mastermind.
Harry Potter and the Art of Spying
Lynn M. Boughey - 2014
The seven-book saga is an excellent primer on spying, intelligence, and politics. Join spy novelist Lynn Boughey and thirty-six-year CIA veteran and executive director of the International Spy Museum Peter Earnest as they review the spy craft employed and celebrated in J.K. Rowling's bestselling books. From the invisibility cloak to house passwords to Fred and George Weasley's Extendable Ears, "Harry Potter & the Art of Spying" is full of spy lessons for the secret-agent-in-training in the Muggle realm. Learn how to break secret codes, gather intelligence, read character's motives, and why Severus Snape is the best double agent ever.