The Way of the Knife: The CIA, a Secret Army, and a War at the Ends of the Earth


Mark Mazzetti - 2013
    The Way of the Knife is the untold story of that shadow war: a campaign that has blurred the lines between soldiers and spies and lowered the bar for waging war across the globe. America has pursued its enemies with killer drones and special operations troops; trained privateers for assassination missions and used them to set up clandestine spying networks; and relied on mercurial dictators, untrustworthy foreign intelligence services, and proxy armies.This new approach to war has been embraced by Washington as a lower risk, lower cost alternative to the messy wars of occupation and has been championed as a clean and surgical way of conflict. But the knife has created enemies just as it has killed them. It has fomented resentments among allies, fueled instability, and created new weapons unbound by the normal rules of accountability during wartime.

Surveillance Valley: The Rise of the Military-Digital Complex


Yasha Levine - 2018
    This idea--using computers to spy on people and groups perceived as a threat, both at home and abroad--drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology.But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news--and the device on which you read it.

Compromised: Counterintelligence and the Threat of Donald J. Trump


Peter Strzok - 2020
    His career in counterintelligence ended shortly thereafter, when the Trump administration used his private expression of political opinions to force him out of the Bureau in August 2018. But by that time, Strzok had seen more than enough to convince him that the commander in chief had fallen under the sway of America’s adversary in the Kremlin.In Compromised, Strzok draws on lessons from a long career—from his role in the Russian illegals case that inspired The Americans to his service as lead FBI agent on the Mueller investigation—to construct a devastating account of foreign influence at the highest levels of our government. And he grapples with a question that should concern every U.S. citizen: When a president appears to favor personal and Russian interests over those of our nation, has he become a national security threat?

Deep State: Inside the Government Secrecy Industry


Marc Ambinder - 2013
    It was formed from the astonishing number of secrets held by the government and the growing ranks of secret-keepers given charge over them. The government secrecy industry speaks in a private language of codes and acronyms, and follows an arcane set of rules and customs designed to perpetuate itself, repel penetration, and deflect oversight. It justifies itself with the assertion that the American values worth preserving are often best sustained by subterfuge and deception.There are indications that this deep state is crumbling. Necessary secrets are often impossible to keep, while frivolous secrets are kept forever. The entire system has fallen prey to political manipulation, with leaks carefully timed to advance agendas, and over-classification given to indefensible government activities.DEEP STATE: INSIDE THE GOVERNMENT SECRECY INDUSTRY, written by two of the country’s most respected national security journalists, disassembles the secrecy apparatus of the United States and examines real-world trends that ought to trouble everyone from the most aggressive hawk to the fiercest civil libertarian. The book:- Provides the fullest account to date of the National Security Agency’s controversial surveillance program first spun up in the dark days after 9/11.- Examines President Obama’s attempt to reconcile his instincts as a liberal with the realities of executive power, and his use of the state secrets doctrine.- Exposes how the public’s ubiquitous access to information has been the secrecy industry’s toughest opponent to date, and provides a full account of how WikiLeaks and other “sunlight” organizations are changing the government’s approach to handling sensitive information, for better and worse.- Explains how the increased exposure of secrets affects everything from Congressional budgets to Area 51, from SEAL Team Six and Delta Force to the FBI, CIA, and NSA.- Assesses whether the formal and informal mechanisms put in place to protect citizens from abuses by the American deep state work, and how they might be reformed.DEEP STATE: INSIDE THE GOVERNMENT SECRECY INDUSTRY IS based on the authors’ insatiable curiosity for the ground truth and layered on a foundation of original and historical research as well as unprecedented access to lawmakers, intelligence agency heads, White House officials, and secret program managers. It draws on thousands of recently declassified documents and candid interviews with more than 100 military, industry, and government officials.By the bestselling authors of THE COMMAND: DEEP INSIDE THE PRESIDENT’S SECRET ARMY: Marc Ambinder, editor at large at The Week, contributing editor at GQ and The Atlantic, who has covered Washington for CBS News and ABC News; and D.B. Grady, a correspondent for The Atlantic, national security columnist for The Week, and former U.S. Army paratrooper and Afghanistan veteran.

That Used to Be Us: How America Fell Behind in the World It Invented and How We Can Come Back


Thomas L. Friedman - 2011
    We face four major challenges on which our future depends, and we are failing to meet them—and if we delay any longer, soon it will be too late for us to pass along the American dream to future generations. In That Used to Be Us, Thomas L. Friedman, one of our most influential columnists, and Michael Mandelbaum, one of our leading foreign policy thinkers, offer both a wake-up call and a call to collective action. They analyze the four challenges we face—globalization, the revolution in information technology, the nation's chronic deficits, and our pattern of excessive energy consumption—and spell out what we need to do now to sustain the American dream and preserve American power in the world. They explain how the end of the Cold War blinded the nation to the need to address these issues seriously, and how China's educational successes, industrial might, and technological prowess remind us of the ways in which "that used to be us." They explain how the paralysis of our political system and the erosion of key American values have made it impossible for us to carry out the policies the country urgently needs. And yet Friedman and Mandelbaum believe that the recovery of American greatness is within reach. They show how America's history, when properly understood, offers a five-part formula for prosperity that will enable us to cope successfully with the challenges we face. They offer vivid profiles of individuals who have not lost sight of the American habits of bold thought and dramatic action. They propose a clear way out of the trap into which the country has fallen, a way that includes the rediscovery of some of our most vital traditions and the creation of a new thirdparty movement to galvanize the country. That Used to Be Us is both a searching exploration of the American condition today and a rousing manifesto for American renewal.

The Death of Money: The Coming Collapse of the International Monetary System


James Rickards - 2014
    Deciding upon  the best course to follow will require  comprehending a minefield of risks, while  poised at a crossroads, pondering the  death of the dollar.”The international monetary system has collapsed three times in the past hundred years, in 1914, 1939, and 1971. Each collapse was followed by a period of tumult: war, civil unrest, or significant damage to the stability of the global economy. Now James Rickards, the acclaimed author of Currency Wars, shows why another collapse is rapidly approaching—and why this time, nothing less than the institution of money itself is at risk. The American dollar has been the global reserve currency since the end of the Second World War. If the dollar fails, the entire international monetary system will fail with it. No other currency has the deep, liquid pools of assets needed to do the job. Optimists have always said, in essence, that there’s nothing to worry about—that confidence in the dollar will never truly be shaken, no matter how high our national debt or how dysfunctional our government. But in the last few years, the risks have become too big to ignore. While Washington is gridlocked and unable to make progress on our long-term problems, our biggest economic competitors—China, Russia, and the oilproducing nations of the Middle East—are doing everything possible to end U.S. monetary hegemony. The potential results: Financial warfare. Deflation. Hyperinflation. Market collapse. Chaos. Rickards offers a bracing analysis of these and other threats to the dollar. The fundamental problem is that money and wealth have become more and more detached. Money is transitory and ephemeral, and it may soon be worthless if central bankers and politicians continue on their current path. But true wealth is permanent and tangible, and it has real value worldwide.The author shows how everyday citizens who save and invest have become guinea pigs in the central bankers’ laboratory. The world’s major financial players — national governments, big banks, multilateral institutions — will always muddle through by patching together new rules of the game. The real victims of the next crisis will be small investors who assumed that what worked for decades will keep working. Fortunately, it’s not too late to prepare for the coming death of money. Rickards explains the power of converting unreliable money into real wealth: gold, land, fine art, and other long-term stores of value. As he writes: “The coming collapse of the dollar and the international monetary system is entirely foreseeable... Only nations and individuals who make provision today will survive the maelstrom to come.”

The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda


Ali H. Soufan - 2011
    Soufan was handed a secret file. Had he received it months earlier—when it was requested—the attacks on New York and Washington could have been prevented. During his time on the front lines, Soufan helped thwart plots around the world and elicited some of the most important confessions from terrorists in the war against al-Qaeda—without laying so much as a hand on them. Most of these stories have never been reported before, and never by anyone with such intimate firsthand knowledge.This narrative account of America's successes and failures against al-Qaeda is essential to an understanding of the terrorist group. We are taken into hideouts and interrogation rooms. We have a ringside seat at bin Laden's personal celebration of the 9/11 bombings. Such riveting details show us not only how terrorists think and operate but also how they can be beaten and brought to justice.

Ghost Wars: The Secret History of the CIA, Afghanistan, and Bin Laden from the Soviet Invasion to September 10, 2001


Steve Coll - 2004
    It won the Pulitzer Prize in 2005.Prize-winning journalist Steve Coll has spent years reporting from the Middle East, accessed previously classified government files and interviewed senior US officials and foreign spymasters. Here he gives the full inside story of the CIA's covert funding of an Islamic jihad against Soviet forces in Afghanistan, explores how this sowed the seeds of Bin Laden's rise, traces how he built his global network and brings to life the dramatic battles within the US government over national security. Above all, he lays bare American intelligence's continual failure to grasp the rising threat of terrorism in the years leading to 9/11 - and its devastating consequences.

The Plot to Destroy Democracy: How Putin and His Spies Are Undermining America and Dismantling the West


Malcolm W. Nance - 2018
    In the greatest intelligence operation in the history of the world, Donald Trump was made President of the United States with the assistance of a foreign power. The Plot to Destroy Democracy reveals the dramatic story of how blackmail, espionage, assassination, and psychological warfare were used by Vladimir Putin and his spy agencies to steal the 2016 U.S. election—and attempted to bring about the fall of NATO, the European Union, and western democracy. The book shows how Russia and its fifth column allies tried to flip the cornerstones of democracy in order to re-engineer the world political order that has kept most of the world free since 1945. Career U.S. Intelligence officer Malcolm Nance examines how Russia has used cyber warfare, political propaganda, and manipulation of our perception of reality—and will do so again—to weaponize American news, traditional media, social media, and the workings of the internet to attack and break apart democratic institutions from within, and what we can expect to come should we fail to stop their next attack.Nance uses top secret Russian-sourced political and hybrid warfare strategy documents to demonstrate the master plan to undermine American institutions that has been in effect from the Cold War to the present day. Based on original research and countless interviews with espionage experts, Nance examines how Putin's recent hacking accomplished a crucial first step for destabilizing the West for Russia, and why Putin is just the man to do it. Nance exposes how Russia has supported the campaigns of right-wing extremists throughout both the U.S. and Europe to leverage an axis of autocracy, and how Putin's agencies have worked since 2010 to bring fringe candidate Donald Trump into elections.The Plot To Destroy Democracy puts a professional spy lens on Putin's plot and unravels it play-by-play. In the end, he provides a better understanding of why Putin's efforts are a serious threat to our national security and global alliances—in much more than one election—and a blistering indictment of Putin's puppet, President Donald J. Trump.

Privacy is Power: Reclaiming Democracy in the Digital Age


Carissa Véliz - 2020
    Before you’ve even switched off your alarm, a whole host of organisations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your ‘suggested friends’ on Facebook, you continually compromise your privacy.Without your permission, or even your awareness, tech companies are harvesting your information, your location, your likes, your habits, and sharing it amongst themselves. They're not just selling your data. They’re selling the power to influence you. Even when you’ve explicitly asked them not to. And it's not just you. It's all your contacts too.Digital technology is stealing our personal data and with it our power to make free choices. To reclaim that power and democracy, we must protect our privacy.What can we do? So much is at stake. Our phones, our TVs, even our washing machines are spies in our own homes. We need new regulation. We need to pressure policy-makers for red lines on the data economy. And we need to stop sharing and to adopt privacy-friendly alternatives to Google, WhatsApp and other online platforms.Short, terrifying, practical: Privacy is Power highlights the implications of our laid-back attitudes to data, and sets out how we can reclaim control.

Inside Cyber Warfare: Mapping the Cyber Underworld


Jeffrey Carr - 2009
    You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News


Clint Watts - 2018
    In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences.Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts.Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency


Parmy Olson - 2012
    WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.

The Coming Storm


Michael Lewis - 2018
    Weather can be deadly — especially when it strikes without warning. Millions of Americans could soon find themselves at the mercy of violent weather if the public data behind lifesaving storm alerts gets privatized for personal gain.In his first Audible Original feature, New York Times best-selling author and journalist Michael Lewis delivers hard-hitting research on not-so-random weather data — and how Washington plans to release it. He also digs deep into the lives of two scientists who revolutionized climate predictions, bringing warning systems to previously unimaginable levels of accuracy. One is Kathy Sullivan, a gifted scientist among the first women in space; the other, D.J. Patil, is a trickster-turned-mathematician and a political adviser.Most urgently, Lewis's narrative reveals the potential cost of putting a price tag on information with the potential to save lives, raising questions about balancing public service with profits in an ethically-ambiguous atmosphere.

Bit by Bit: How P2P Is Freeing the World


Jeffrey Tucker - 2015
    Jeffrey Tucker, CLO of Liberty.me and Distinguished Fellow of the Foundation for Economic Education, argues that peer-to-peer technology is forging a new and brighter social, economic, and political order. People tend to look at innovations in isolation. Here is my new e-reader. Here is an app I like. Here is my new mobile device and computer. Even bitcoin is routinely analyzed and explained in terms of its properties as an alternative to national currencies, as if there were no more than that at stake.But actually there is a historical trajectory at work here, one that we can trace through its logic, implementation, and spread. It’s the same logic that led from the dial phone at the county store, operated by people pulling and plugging in wires, to the wireless smartphone in your pocket that contains the whole store of human knowledge. It’s all about technology in the service of individuation.Once you understand the driving ethos — voluntarism, creativity, networks, individual initiative — you can see the outlines of a new social structure emerging within our time, an order that defies a century of top-down planning and nation-state restrictionism.It is coming about not because of political reform. It is not any one person’s creation. It is not happening because a group of elite intellectuals advocated it. The new world is emerging organically, and messily, from the ground up, as an extension of unrelenting creativity and experimentation. In the end, it is emerging out of an anarchist order that no one in particular controls and no one in particular can fully understand."The building of universal prosperity is a process that unfolds bit by bit through decentralized decision making and improvements at the margin through trial-and-error. To continue this process, we need understanding, patience, and dreams. Jeffrey Tucker’s book is an excellent guide to all three.” ~ Patrick Byrne, CEO of Overstock.com, from the introduction. “In Bitcoin’s brief existence Jeffrey Tucker has become one of its leading proponents. In this book we can see exactly why. Many people think of bitcoin as just money, but Mr. Tucker is able to explain, in a way that is easily understandable by all, the tsunami of innovation that bitcoin is about to release upon the world.” ~ Roger Ver, Bitcoin investor, from the Foreword